No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Featured

Manage Enterprise Risk Like an Orchestra Conductor

by John Verver
May 31, 2017
in Featured, Risk
closeup of orchestra conductor's hands holding baton

Marrying Compliance and Risk Management

Professionals in the risk management field have shifted gradually away from a siloed approach to a more integrated approach. As most of us know, however, the switch is not easy; it can be overwhelming to keep on top of the full range of enterprise risks. John Verver posits that technology is the critical enabler here. Without it, getting a big picture view of critical risks can be difficult.

Attitudes and approaches to managing risk across the enterprise have evolved considerably over the past decade or so. Not long ago, relatively few enterprises had a formal chief risk officer (CRO) role or any specific enterprisewide risk management function. The C-suite and board dealt with strategic risk issues, along with some of the bigger-picture operational risks, as part of their everyday roles. In sectors such as finance and insurance, there was generally a more formal recognition of the risk management function. However, in most industries, structured processes for managing risks tended to be limited to regulatory compliance issues.

Today, while fully integrated enterprisewide risk management functions are still the exception, there is a far broader awareness of the value of moving beyond a siloed approach to risk management and compliance toward considering a full range of risks in one overall, interrelated context.  The challenge of actually managing to do this in an effective way is, of course, not simple. Keeping on top of macroeconomic risks, data security and privacy, IT system failures, new regulations, compliance, fraud, unethical behaviour, technology innovation and obsolescence, third parties, AML, bribery and corruption, together with countless operational and financial process risks, is potentially overwhelming.

But there is a way to do it — and the challenge is a fascinating one. The analogy that comes to mind to describe this whole process is that of recording a symphony orchestra in a sound studio. Each main component of the risk universe is like a different instrument, with unique risks and management processes. Some components, like instruments, have more impact on the overall symphony, but even the less dominant instruments can still severely reduce the overall effect if not played well.

The conductor is responsible for bringing together all of the different sounds and melodies produced by the musicians and instruments into one cohesive and interconnected result. The sound engineer then uses the sound board to take the multiple inputs produced by microphones, balance and fine tune the distinct musical elements and enhance or suppress levels of different instruments – all so they are heard in the right context and the symphony makes sense as a whole.

Enabling the symphony — and more — through technology

While no analogy is perfect, the CRO and risk management team do have a comparable role to the conductor and sound engineer: bringing together disparate risk and compliance management functions and putting the combined enterprise risk management (ERM) process in place.

As with the symphony recording process, technology is the critical enabler. Without an effective ERM function, and without effective technology, the chances of moving from a siloed approach to an integrated, enterprisewide one are slim. Without the equivalent of a sophisticated recording sound board, for example, it is nearly impossible to produce a comprehensive ERM dashboard that enables management to truly understand and respond to critical risk indicators.

One of the most exciting aspects of the evolving world of ERM is technology — and not just that which manages core processes and produces valuable risk dashboards.

Big data and analytics, used in increasingly innovative ways, enables organizations to transition from a traditional, control-oriented and backward-looking view of risk to one in which risks can be increasingly predicted, detected and even prevented.

Data analytics have long been used to monitor transactions for regulatory compliance risks, as well as internal controls. However, as the volume and velocity of data continues to increase — in some cases, exponentially — there are multiple new sources of data to monitor and analyze. Email, social media, shared industry databases, physical access control and scanning devices, vehicle GPS sensors, as well as a host of types of IoT data, all provide tremendous opportunities for increasingly intelligent ERM.

Pattern detection and prediction capabilities of analytics are becoming ever more powerful, helping transform risk monitoring and management into a far more dynamic process. This, in turn, enables an enterprise to respond to and leverage risks more strategically, giving it a dynamic competitive advantage.

Analytics also provide an opportunity to fundamentally transform traditional approaches to internal controls. Enormous effort and valuable resources are buried in implementing, adhering to and testing traditional financial and operational internal control systems. What if, instead of blindly following existing control procedures, businesses relax controls and use analytics to monitor what is actually happening? This could enable an immediate response to solve actual problems as they arise, rather than creating multiple walls of controls that protect against unsubstantial or irrelevant risks.

The highest-performing enterprises know much of this already; their CROs and ERM teams have likely been effective in driving change in risk management processes. These companies are aware of the benefits of advanced technology and integrated data analytics. For the rest of the enterprise world, the opportunity to turn an inefficient, backward-looking, disparate set of risk management instruments into a coordinated, technology-enabled symphony that truly improves corporate performance is still waiting to be played.


Tags: Big DataData AnalyticsEnterprise Risk Management (ERM)Internet of Things (IoT)
Previous Post

TRACE: The FIFA Swamp

Next Post

TRACE: The Death of Sergei Magnitsky

John Verver

John Verver

image001John Verver, CPA CA, CMC, CISA Advisor, ACL John Verver is currently an advisor to ACL. Previously, John spent two decades as a vice president with ACL, with overall responsibility for product and services strategy, as well as leadership and growth of ACL’s professional services organization, including customer success services, training, and technical support. John is acknowledged as an expert authority and domain thought leader on the use of enterprise governance technology, particularly data analytics and data automation for audit, risk management, and compliance. He speaks regularly at global conferences and is a frequent contributor of articles in professional and business publications. John is a Chartered Professional Accountant, Certified Management Consultant, and Certified Information System Auditor.

Related Posts

risk tunnel

From Regulation to Volume, There Is No Light at the End of the Data Privacy Tunnel

by Jim DeLoach
March 15, 2023

Data proliferation and data privacy regulatory activity across the globe have created the need for focused boardroom discussions. An underpinning...

ai bias_f

Still Racist After All These Datasets: Once Bias Is Baked Into Your AI, It’s Hard to Root Out

by Nigel Cannings
November 9, 2022

Spending on artificial intelligence across all sectors is expected to more than double by 2025, but Nigel Cannings of Intelligent...

protecht series a

Protecht Group Lands $30M in Series A Funding From Arrowroot Capital

by Corporate Compliance Insights
February 22, 2022

Risk management software and services provider Protecht has secured a $30 million Series A funding round from Arrowroot Capital. Founded...

ankura noragh M&A

Ankura Acquires Noragh Analytics to Expand Advanced Data Capabilities

by Corporate Compliance Insights
February 9, 2022

Ankura Consulting Group, a global expert services and advisory firm, has acquired Noragh Analytics. Terms of the deal between the...

Next Post
TRACE: The Death of Sergei Magnitsky

TRACE: The Death of Sergei Magnitsky

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Code of Conduct Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT