Free Essay

Week 4 Assignment 2: Organizational Risk Appetite and Risk Assessment

In:

Submitted By spade28
Words 2047
Pages 9
Week 4 Assignment 2: Organizational Risk Appetite and Risk Assessment

Abstract
This report will touch on what is needed to prepare in case of untimely disaster and what should be done when the worse has happen and you need to recover. We will take a look at what the business impact analysis look like and the company risk assessment for our company and look for risk that can be handled and risk the most be avoided and try to come up with a plans and policies for how to handle all future risks and problems. ”Business Impact Analysis (BIA) determines the importance of the organization’s activities by assessing the impact over time, if they are interrupted, and establishes continuity and recovery objectives”. (Engemann & Henderson, 2012) When looking to make a Business Impact Analysis we need to talk a look at all the resources of our company and what they do for the company. Then we figure what each piece need in the event of a crisis and how long and how much money it will take to get back on line so let take a look at the most valuable piece of equipment and work our way to the most expandable piece of equipment. The first and most important is the 3 file servers which is the central storage and the managing of data files to the company. These servers house not only private information on the company but also customer information. This means if they are damage or found missing work is loss and vital customer data is either gone or in a worse case stolen. This is a prime reason to get the file servers up and running first and to make sure that damage assessment is done right away. The Piece of equipment that we need to look into is the 2008 Active Directory Domain Controllers (DC). This piece of hardware and software has two important functions in the company the first is that it responsible for again access to Windows domain resources and it stores account information while at the same time authenticates users and enforces security policy for a windows domain. When this is down we lose remote access to a great many services in the company and it can stop productivity of the company. If password are leak it can lead to loss data and fraud claims not to mention you system could be held for ransom if they lock you out. The email servers are a lynch pin to any company because they give us lines of communication through company infrastructure. CEO can send information down the chain all the way to the low level employee and because of this when the system crashes you can bring companies to a grinding stop. The email sever like the file server and Active directory domain should be checked like the other server contact information and personal information is stored and if lost lead the company open to thief and sabotage. If a disaster strike these should be the first system brought back on line so the company can begin to recover. Since we have covered the core piece of equipment for work inside the company let us take a look at the hardware and software for access to the company remotely and to get to the internet. The most dangerous and important piece to this hold plan is getting access to the world wide web depending on what service provider will determine what kind of service you can and what kind of protection comes with it. If you go with a top tier internet provider like Comcast, Time Warner and Verizon you can have the safety of knowing you have constant service and people who have a stable infrastructure. However we need to make sure that the internet is made safe before letting it flow into our system so this is why we have a Network intrusion Detection System (NIDS). The NIDS protects us from anything that has to do with the internet because it can intercept incoming packets and stop anything it deems to me of a malicious nature. This give the IT department time to trace and fix any attacks on the system. If you online system is ever down this need to be the first that comes up if you don’t have it you entire system becomes at risk from outside attacks. This is also one of the pieces of software and hardware that should be check daily to make sure it is running correctly. If the network intrusion detection system fails we must rely on the 2 firewall that the system has put into place. These are software and hardware that control incoming and outgoing traffic by analyzing data packing moving through our network. The down side to firewall is that they have been around for a while and most good hackers know how to get around them. However not having them in place is like not putting a lock on the house door it is just asking for trouble there are some good firewall software suites but the best defense is to have IT monitor them and to make sure that the latest software update have been added. This lead us into the office wireless setup which give us a FTP server which allows us to wireless retrieve files or store work remotely and a wireless access point which allows the 100 laptop/desktop to work from the office and at home. This is a great setup as long as everything stays secure WEP security has long since be made obsolete but people still use it when WPA security is vastly superior. We want to make sure that each of the computer has its own login goes though the in-house PKI environment so that you get rotating passwords and nothing can just force hack our system. Also with the VOIP telephone system we want to make sure that its hard-line connected and that we have enough lines to handle the volume of calls. Since we know what are asset are and what need to be protected we should perform risk assessment to make sure we are prepared encase there is any kind of problem. The first step in the risk assessment plan is to list out all of the hazards that might be incurred when a task process or job is finished. In our case the greatest risk is programmers not backing up their work and looking valuable time and money reprogramming. We then have to worry about work being stolen if we have people trying to hack our system we need to have something in place to make sure that not only is work protected but that we can reverse hack to find out who is trying to get into our system. Our next area of concern is making sure that we don’t have hardware failure. Lastly we need to plan out for unforeseen disasters if we have a earthquake or power outage we need to have steps in place to get back on line. Now that we know what the major risks are we should put them in order and plan out steps to come up with for if one of risks happens. The great risk is the failure to back up work we should have in place software that will auto save at least every ten minutes to that we never have to go back to far. Also employees should be trained and given company policy about saving their work to the fileservers or FTP servers if they are working from home. Our next biggest risk is from theft, hackers are a major concern and we need to have steps in place to protect against them. One important step is not to log into the office in a public place people will look over the shoulder or dumpster dive to get access to personal information to break into the system. All papers should be shredded and sent out to be properly handle so as not to give information. We should also remember to have our password keys on us and if someone fails to many time in a row to lock them out. The NIDS should be check on regular bases to make nothing got through. Hardware is always a concern and should have maintenance done to make sure it is in good working order. All repair persons should sign in and out and should have a security officer with them at all times. A report should also be made of any repairs so that we have a running long of everything that as fixed. In the event of a emergency such as a fire we should remember that employees most get to safety first. We then want to make sure that all work can be back up remotely so as not to lost everything. We should also plan to have the insurance company come in and assess what everything is worth encase items need to be replace. One of the risks we need to accept is a natural disaster since there is very little we can do if one strikes we should work to recover have fast as possible. If we waste to much money trying to avoided it we will be forever sinking money into something that can’t be stop. One risk we need to stop is failure to back up our work to there is no reason that we shouldn’t items in place to handle auto back up and teaching our employees why this is important. Since most of our work comes from billable hours we need to have proof of productivity and we also need to make sure that all the file servers and FTP are always online. The risk that should be shared is handling thief in the company since we can’t see everything coming at us we need to enlist help from outside the company. There are some good IT companies out there that handle hacker preventions and I believe we would be well served in hiring one of them to protect our system. Since we already have a NIDS and firewalls adding a lost prevention team can cover any holes we might overlook or not think to check. The items we can control is privacy we can handle the shredding and making sure that no customer information is lost. We can buy our own shredders and we can also make sure they a delivered to be destroyed. “Risk can be defined as the combination of the probability of an event and its consequences”. (AIRMIC, 2002)In regards to our company anything that takes more than a 15% loss to profits will be too much of a risk. When you factor how much it going to cost to make the game and to advertise the product and pay back our investors we can’t lose more than 15% or we will not break even. Also if at anytime we lost more than 20% of our information to theft we also will have to pull out because we can no longer guarantee our product or our reputation. The steps we need to make sure we turn a profits and secure our data should be: We need to do product testing before and a feasibility study before we begin anything this will give us a idea what the market is looking for before we begin testing. Also we need to have general meeting with the programmers and management to come up with a budget to see how much we are going to need before we make a profit. If we are going to maintain project security we need to monitor employee log-on and make sure the NIDS is working. Also we need to make sure that our antivirus/malware is up to date to protect from virtual attack. We should also let employees know set policy about security so that they don’t unknowingly make any mistakes.

AIRMIC. (2002). A risk management standard. Retrieved from http://www.theirm.org/publications/documents/Risk_Management_Standard_030820.pdf
Hiles, A. (2002). Enterprise risk assessment and business impact analysis: Best practices. Rothstein Associates Inc.
Engemann, K. J., & Henderson, D. M. (2012). Business continuity and risk management: essentials of organizational resilience. Rothstein Associates, Inc.

Similar Documents

Premium Essay

Organizational Risk Appetite and Risk Assessment

...Assignment 2: Organizational Risk Appetite and Risk Assessment Due Week 4 and worth 70 points Imagine you have just been hired as an Information Assurance Officer and the leader of business impact analysis (BIA) and risk assessment team for a video game development company. The organization network structure is identified in the network diagram below and specifically contains: •2 firewalls •3 file servers •1 Web / FTP server •1 wireless access point (WAP) •1 exchange email server •100 desktop / laptop computers •1 Network Intrusion Detection System (NIDS) •In-house PKI environment •2 Windows 2008 Active Directory Domain Controllers (DC) •VoIP telephone system Description: Network The Chief Information Officer (CIO) has seen reports of malicious activity on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requests your help. Write a three to five (3-5) page paper in which you: 1.Conduct an organizational business impact analysis (BIA) and determine which information assets need to have a risk assessment performed. 2.Conduct an organizational risk assessment and provide an initial report that includes the following: 1.Identify information assets and prioritize identified assets. 2.Define risks and prioritize the risks. 3.Identify the critical asset(s) and its associated...

Words: 539 - Pages: 3

Premium Essay

Enterprise Risk Management

...must be completed, signed and attached to each assignment you submit within the Faculty of Business and Law. If submitting online, this form must be completed and submitted with your assignment. Last NamePlease use block letters, and enter your name as it appears on your Deakin student card | First Name | Student ID | Li | Ke | 900335188 | Unit code | Unit name | Campus | Lecturer/Tutor/Unit Coordinator | MAF754 | Enterprise Risk Management | | Lecturer: David SewellPeter | | | | Tutor: | Assignment number / title | Due date | Assignment 2: A research paper of enterprise risk management for Sinomaster(SMT) group | 25 May 2012 | If this assignment has been completed by a group or team:1. Each student in the group must complete and sign a separate form;2. The assignment will be returned to the student in the group nominated below.*This assignment was completed in a group or team: No (circle or delete as necessary)The assignment should be returned to the student named on this form: No (circle or delete as necessary) | Plagiarism and Collusion Plagiarism occurs when a student passes off as the student’s own work, or copies without acknowledgement as to its authorship, the work of another person. Collusion occurs when a student obtains the agreement of another person for a fraudulent purpose with the intent of obtaining an advantage in submitting an assignment or other work. Work submitted may be reproduced...

Words: 3717 - Pages: 15

Premium Essay

Research on Internal Audit Participate in Risk Management-Based on the Erm Framework of Coso

...换一个你的 School of Management, University of Glamorgan Research on Internal Audit Participate in Risk Management-Based on the ERM Framework of COSO By: Weichen Zhu Candidate no: 学号 September 2012 Supervised by: 你导师的名字 The dissertation is submitted as part of the requirement for the award of Masters of Science: 你专业的名字 Declaration This Dissertation has been prepared on the basis of my own work and that where other published and unpublished source materials have been used, these have been acknowledged. Word Count: Student Name: __________________ Signature: ______________________ Date of Submission:______________ Acknowledgement This is my first time to go aboard for studying. During different campus life in the UK, it is wonderful with deep impression. I learned how to use my internal power to make things happen and how to live my own life. All efforts contribute to my growth, but I cannot forget people who encourage and help me. Probably, I am not happy to study in my whole postgraduate time without support. Firstly, I would like to thank my supervisor 你导师的名字. He helps me develop the ideas and complete this dissertation. Especially, when I make a survey in China, I communicate with him through email. Sometimes, I am afraid that my timetable could have bad effects on him. However, he usually gives me feedback as soon as possible. Therefore, I only use 20 days to finish my survey. This kind of strong professional ethic is worth to learn...

Words: 20009 - Pages: 81

Premium Essay

Risk Management

...Risk Management Guidelines for Commercial Banks & DFIs. Table of Contents Page No. Introduction Defining Risk Risk Management Board & Senior Management oversight Risk Management Framework Integration of Risk Business Line Accountability Risk Evaluation / Measurement Independent Review Contingency Planning 1 1 2 3 3 4 4 4 4 5 5 7 8 8 9 9 10 10 13 14 15 15 17 17 18 18 18 19 20 20 21 21 21 22 24 24 24 25 Managing Credit Risk Components of Credit Risk Management Board & Senior Management oversight Organization Structure Systems and Procedures Credit origination Limit setting Credit Administration Measuring Credit Risk Internal Risk Rating Credit Risk Monitoring & Control Risk Review Delegation of Authority Managing Problem Credits Managing Market Risk Interest Rate Risk Foreign Exchange Risk Equity / commodity price Risk Element of Market Risk Management Board and Senior Management Oversight Organization Structure Risk Management Committee ALCO Middle Office Risk Measurement Repricing Gap Models Earning at Risk &Economic Value of Equity Models Value at Risk Risk Monitoring Risk Controls Audit Risk limits 25 27 28 28 30 30 30 31 31 33 34 34 35 36 37 37 38 38 38 39 39 39 Managing Liquidity Risk Early Warning Indicators Board and Senior Management Oversight Liquidity Risk Strategy and Policy ALCO/ Investment Committee Liquidity Risk Management Process MIS Liquidity Risk Measurement & Monitoring Contingency Funding Plan Cash Flow Projections Liquidity Ratios...

Words: 18341 - Pages: 74

Premium Essay

Risk Management

...Risk Management Guidelines for Commercial Banks & DFIs. Table of Contents Page No. Introduction Defining Risk Risk Management Board & Senior Management oversight Risk Management Framework Integration of Risk Business Line Accountability Risk Evaluation / Measurement Independent Review Contingency Planning 1 1 2 3 3 4 4 4 4 5 5 7 8 8 9 9 10 10 13 14 15 15 17 17 18 18 18 19 20 20 21 21 21 22 24 24 24 25 Managing Credit Risk Components of Credit Risk Management Board & Senior Management oversight Organization Structure Systems and Procedures Credit origination Limit setting Credit Administration Measuring Credit Risk Internal Risk Rating Credit Risk Monitoring & Control Risk Review Delegation of Authority Managing Problem Credits Managing Market Risk Interest Rate Risk Foreign Exchange Risk Equity / commodity price Risk Element of Market Risk Management Board and Senior Management Oversight Organization Structure Risk Management Committee ALCO Middle Office Risk Measurement Repricing Gap Models Earning at Risk &Economic Value of Equity Models Value at Risk Risk Monitoring Risk Controls Audit Risk limits 25 27 28 28 30 30 30 31 31 33 34 34 35 36 37 37 38 38 38 39 39 39 Managing Liquidity Risk Early Warning Indicators Board and Senior Management Oversight Liquidity Risk Strategy and Policy ALCO/ Investment Committee Liquidity Risk Management Process MIS Liquidity Risk Measurement & Monitoring Contingency Funding Plan Cash Flow Projections Liquidity Ratios...

Words: 18341 - Pages: 74

Premium Essay

Credit Risk Management

...Credit Risk Management CHAPTER: ONE ORIENTATION TO THE REPORT CHAPTER-1 Orientation to the Report 1.1 THE AUTHORIZATION FACT Internship is a compulsory requirement for everybody pursuing a BBA degree at University of Dhaka. The Internship program includes organizational attachment period of 12 weeks and report writing period of 4 weeks. I am working with the Operations Divisions of IDLC Finance Limited. After consultation with my faculty advisor Mr. Md. Nazim Uddin Bhuiyan and my supervisor in the host organization Mr. Md. Abdul Hannan, I decided to work on the policies and practices of credit risk management and appraisal process of IDLC. I strongly believe that, this study will enrich my knowledge in the very crucial area of the financial institutions (FIs): Credit Risk Management. 1.2 OBJECTIVES OF THE REPORT • MAIN OBJECTIVE: The main focus of the report is on credit risk management practices and credit appraisal procedure of IDLC Finance Limited. • SPECIFIC OBJECTIVES: The specific objectives are: ❖ To look at the portfolio of sectors financed by IDLC ❖ To evaluate the norms and rules practiced in assessing the borrower ❖ To compare the credit policy of IDLC with the credit policy guideline for the financial institutions (non-bank) of Bangladesh Bank and to identify the extent to which IDLC follows this guideline. ❖ To compare the credit risk management practices of IDLC Finance Limited with that of Industrial Promotion and Development Company...

Words: 20597 - Pages: 83

Free Essay

Credit Risk Management

...pursuing a BBA degree at University of Dhaka. The Internship program includes organizational attachment period of 12 weeks and report writing period of 4 weeks. I am working with the Operations Divisions of IDLC Finance Limited. After consultation with my faculty advisor Mr. Md. Nazim Uddin Bhuiyan and my supervisor in the host organization Mr. Md. Abdul Hannan, I decided to work on the policies and practices of credit risk management and appraisal process of IDLC. I strongly believe that, this study will enrich my knowledge in the very crucial area of the financial institutions (FIs): Credit Risk Management. 1.2 OBJECTIVES OF THE REPORT • MAIN OBJECTIVE: The main focus of the report is on credit risk management practices and credit appraisal procedure of IDLC Finance Limited. • SPECIFIC OBJECTIVES: The specific objectives are: ❖ To look at the portfolio of sectors financed by IDLC ❖ To evaluate the norms and rules practiced in assessing the borrower ❖ To compare the credit policy of IDLC with the credit policy guideline for the financial institutions (non-bank) of Bangladesh Bank and to identify the extent to which IDLC follows this guideline. ❖ To compare the credit risk management practices of IDLC Finance Limited with that of Industrial Promotion and Development Company of Bangladesh Limited, as a sample financial institution, to get an idea of the common deviations of credit risk management practices of the FIs from the central bank guideline. ❖ To...

Words: 20723 - Pages: 83

Premium Essay

Mba Outline

...you should rely. Melbourne Business School reserves the right to change course content, lecturers, course time, examination procedures and other course details. To the extent permitted by law, Melbourne Business School specifically excludes any liability for any error or inaccuracy in, or omissions from, the information in this Guide and any loss or damage which you or any person may suffer. Last updated: 12 March 2010 1 2 MELBOURNE BUSINESS SCHOOL 2010 ACADEMIC CALENDAR ___________________________________________________________________ TERM 1 Thursday Monday Tuesday 14 January 18 January 26 January Orientation Evening – Weekend Mode and Standard Part Time World of Management Weekend Mode and Part Time (until Friday 22 January) Australia Day Academic School Holiday Carlton Campus on Sunday operations Monday Thursday Friday Monday Thursday Friday Friday Thursday Friday Sunday 9 February 18 February 26 February 8 March 18 March 19 March 2 April 15 April 16 April 25 April Commencement Term 1 Teaching (standard 12-week format subjects) Weekend Mode – Module 1a (until Monday 22 February) Elective Weekend Mode – Module 1a (until Sunday 28 February) CORE Labour Day Normal teaching day Weekend Mode – Module 1b (until Monday 22 March) Elective Weekend Mode – Module 1b (until Sunday 21 March) CORE Easter Break (until Monday 5 April) Carlton Campus on Sunday operations Weekend Mode – Module 1c (until Monday 19 April) Elective Weekend Mode – Module...

Words: 31716 - Pages: 127

Premium Essay

An Introduction to Pmbok Guide 5th Edition

...An Introduction to PMBOK Guide 5th Edition: Knowledge Areas, Processes and Process Groups One of the most discussed tables in the Project Management Institute’s (PMI), A Guide to the Project Management Body of Knowledge, (PMBOK® Guide) Fifth Edition is the “Project Management Process Groups and Knowledge Areas Mapping” matrix, found in Table 3-1 on page 61. This table maps the 47 processes of project management to their corresponding Knowledge Area, as well as to their corresponding Process Group. At first glance, the table seems quite complicated, so let’s break it down and uncover why a solid understanding of the relationships between processes, Process Groups, and Knowledge Areas is important to anyone preparing to take the Project Management Professional (PMP) ® exam. It’s so important, in fact, that we suggest you memorize this matrix and the relationships it calls out. Memorizing the table will prove to be a valuable asset to you during your PMP Exam. What is a “Process” – 47 processes of project management? Let’s start with the building blocks of the matrix - what is a process? At its most basic level, a process is simply a way of transforming an input into an output using proven tools and techniques. The PMBOK® Guide defines a process as “a set of interrelated actions and activities performed to achieve a specified set of products, results, or services.” Good processes-based on sound principles and proven practices-are extremely important for a project’s success....

Words: 20151 - Pages: 81

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information...

Words: 229697 - Pages: 919

Premium Essay

Accounting Information System

...the audit of Springer’s Lumber & Supply a. What deficiencies existed in the internal environment at Springer’s? The "internal environment" refers to the tone or culture of a company and helps determine how risk consciousness employees are. It is the foundation for all other ERM components, providing discipline and structure. It is essentially the same thing as the control environment in the internal control framework. The internal environment also refers to management's attitude toward internal control, and to how that attitude is reflected in the organization's control policies and procedures. At Springer's, several deficiencies in the control environment are apparent: 1. Management authority is concentrated in three family members, so there are few, if any, checks and balances on their behavior. In addition, several other relatives and friends of the family are on the payroll. 2. Since the company has a "near monopoly" on the business in the Bozeman area, few competitive constraints restrain prices, wages, and other business practices. 3. Lines of authority and responsibility are loosely defined, which make it difficult to identify who is responsible for problems or decisions. 4. Management may have engaged in "creative accounting" to make its financial performance look better, which suggests a management philosophy that could encourage unethical behavior among employees. b. Do you agree with...

Words: 16377 - Pages: 66

Premium Essay

Operational Risk Management

...≈√ F M A G u i d e l i n e s on Operational Risk Management These guidelines were prepared by the Oesterreichische Nationalbank in cooperation with the Financial Market Authority Published by: Oesterreichische Nationalbank (OeNB) Otto-Wagner-Platz 3, 1090 Vienna, Austria Austrian Financial Market Authority (FMA) Praterstraße 23, 1020 Vienna, Austria Produced by: Oesterreichische Nationalbank Editor in chief: Günther Thonabauer, Communications Division (OeNB) Barbara Nösslinger, Staff Department for Executive Board Affairs and Public Relations (FMA) Editorial processings: Chapter I and III: Roman Buchelt, Stefan Unteregger (OeNB) Chapter II and IV: Wolfgang Fend, Radoslaw Zwizlo, Johannes Lutz (FMA) Design: Peter Buchegger, Communications Division (OeNB) Typesetting, printing and production: OeNB Printing Office Published and printed at: Otto-Wagner-Platz 3, 1090 Vienna, Austria Inquiries: Oesterreichische Nationalbank Communications Division Otto-Wagner-Platz 3, 1090 Vienna, Austria Postal address: Post Office Box 61, 1011Vienna, Austria Phone (+43-1) 40420-6666 Telefax (+43-1) 40420-6696 Austrian Financial Market Authority (FMA) Executive Board Affairs & Public Relations Division Praterstraße 23, 1020 Vienna, Austria Phone (+43-1) 24959-5100 Orders: Oesterreichische Nationalbank Documentation Management and Communications Services Otto-Wagner-Platz 3, 1090 Vienna, Austria Postal address: Post Office Box 61, 1011Vienna, Austria Phone...

Words: 50825 - Pages: 204

Premium Essay

Audit Risk Solution for Chapter 4

...a Solutions for Chapter 4 Audit Risk, Business Risk, and Audit Planning Review Questions: 4-1. Business Risk - Those risks that affect the operations and potential outcomes of organizational activities. Engagement Risk - The risk auditors encounter by being associated with a particular client: loss of reputation, inability of the client to pay the auditor, or financial loss because management is not honest and inhibits the audit process. Financial Reporting Risk - Those risks that relate directly to the recording of transactions and the presentation of financial data in an organization’s financial statements; also referred to as the risk of material misstatement. Audit Risk - The risk that the auditor may provide an unqualified opinion on financial statements that are materially misstated. 2. Business risk management is defined as: “Process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risks to within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives.” (COSO, 2004) The organization itself bears the responsibility for effective implementation of ERM. It is important for all organizations to implement an effective ERM so that risks are understood and properly controlled by members of the organization, particularly...

Words: 18740 - Pages: 75

Premium Essay

Recruitment

...a million dwelling units. HDFC has developed significant expertise in retail mortgage loans to different market segments and also has a large corporate client base for its housing related credit facilities. With its experience in the financial markets, a strong market reputation, large shareholder base and unique consumer franchise, HDFC was ideally positioned to promote a bank in the Indian environment. • BUSINESS FOCUS HDFC Bank's mission is to be a World-Class Indian Bank. The objective is to build sound customer franchises across distinct businesses so as to be the preferred provider of banking services for target retail and wholesale customer segments, and to achieve healthy growth in profitability, consistent with the bank's risk appetite. The bank is committed to maintain the highest level of ethical standards, professional integrity, corporate governance and regulatory compliance. HDFC Bank's business philosophy is based on four core values - Operational Excellence, Customer Focus,...

Words: 6845 - Pages: 28

Premium Essay

Pmbok

...Project Management Institute A Guide to the Project Management Body of Knowledge (PMBOK® Guide) – Fifth Edition Licensed To: Jorge Diego Fuentes Sanchez PMI MemberID: 2399412 This copy is a PMI Member benefit, not for distribution, sale, or reproduction. Library of Congress Cataloging-in-Publication Data A guide to the project management body of knowledge (PMBOK® guide). -- Fifth edition. pages cm Includes bibliographical references and index. ISBN 978-1-935589-67-9 (pbk. : alk. paper) 1. Project management. I. Project Management Institute. II. Title: PMBOK guide. HD69.P75G845 2013 658.4’04--dc23 2012046112 ISBN: 978-1-935589-67-9 Published by: Project Management Institute, Inc. 14 Campus Boulevard Newtown Square, Pennsylvania 19073-3299 USA Phone: +610-356-4600 Fax: +610-356-4647 Email: customercare@pmi.org Internet: www.PMI.org ©2013 Project Management Institute, Inc. All rights reserved. “PMI”, the PMI logo, “PMP”, the PMP logo, “PMBOK”, “PgMP”, “Project Management Journal”, “PM Network”, and the PMI Today logo are registered marks of Project Management Institute, Inc. The Quarter Globe Design is a trademark of the Project Management Institute, Inc. For a comprehensive list of PMI marks, contact the PMI Legal Department. PMI Publications welcomes corrections and comments on its books. Please feel free to send comments on typographical, formatting, or other errors. Simply make a copy of the relevant page of the book, mark the error, and...

Words: 162869 - Pages: 652