Before You Begin: Assign Information Classification

Download Report

Transcript Before You Begin: Assign Information Classification

Supply Chain
Risk Management
Framework
Supply Chain Risk Leadership Council
24 Oct 2007
Confidential
1
Overview
Scope
 Develop a Supply Chain Risk Mgmt Framework that
will allow SCLRC members to work from common
terms of reference and that will help guide future
SCLRC activities
Deliverables
 This presentation
 Adjustments as they become necessary
Confidential
2
SCRLC Track Definition
Track Title
Supply Chain Risk Management Framework
Track Objective
Develop a Supply Chain Risk Mgmt Framework that will
allow SCLRC members to work from common terms of
reference and that will help guide future SCLRC activities
Track Scope
Next Milestone(s)
In Scope: Supply Chain Risk Management Framework
which includes the following issues 1) Supplier Reliability
2) Security 3)Regulatory Concerns 4) Risk Management
and 5) Incident/Crisis Management
Out of Scope: Broader issues of enterprise risk
management will be considered separately from supply
chain risk management. For example: Issues not included
are 1) Intellectual Property 2) Branding
1. Obtain consensus from the broader SCRLC group
2. Close out track until adjustments are necessary
Confidential
3
Team Members and Sources
Team Members
 Ely Kahn and Andrew Cox, TSA
 Tim Astley, Zurich
 Brent Myers, FedEx
 Craig Babcock, P&G
 Ravi Anupindi, University of Michigan
Sources
 Committee of Sponsoring Organizations of the Treadway
Commission (COSO), Enterprise Risk Management - Integrated
Framework, 2004
 Supply Chain Risks and Risk Sharing Instruments, Robert Lindroth
& Andreas Norrman, 2001
Confidential
4
Definition of SCRM
Supply Chain Risk Management (SCRM) is the
practice of managing the risk of any factor or event
that can materially disrupt a supply chain whether
within a single company or spread across multiple
companies.
The ultimate purpose of supply chain risk
management is to enable cost avoidance, customer
service, and market position. Supply chain risks
can be grouped into 3 broad categories: physical,
process, and institutional risks
Confidential
5
Supply Chain Risk Framework
Types of risk are not
mutually exclusive
Types of risk
Risk Assessment
Risk Response
Control Activities
Downstream Customer
Event Identification
Your Company
First-tier Supplier
Risk management
components
Risk
Management
is an iterative
process
X-Tier Supplier
Objective Setting
Primary Customer
Internal Environment
Information & Communication
Monitoring
Includes links (logistics and
electronic transfer of information)
between supplier, your company, and
customer
Confidential
6
Supply Chain Risk Management vs.
Enterprise Risk Management
Earnings/Sales Miss
Acquisition
Integration
Purpose
Vision
Principles
Breach
CEO/Leadership
Succession Plans
Marketing
Strategy
Concentration
Product Quality/
Risk/Supply
Safety
Chain Resilience
Confidential
Major IT Outage
Phys. Security
People/Assets
Company Tax
Structure
7
Key Risks
Enterprise
Supply Chain
Stock market volatility
General availability (cost, quality) of labor
Global terrorism
Regulatory concerns
Over-regulation
Reliability of suppliers (quality, warranty, yield,…)
Currency fluctuations
Commodity shortage/price fluctuations
Reputational risk
Fluctuations of foreign exchange rates
Corporate governance issues
Intellectual property theft
Price deflation
Obsolescence of product inventory or technology
Emerging technologies
War, terrorism, other geopolitical concerns
Increased competition
Problems with supply chain infrastructure
Loss of key talent
Plant breakdown, mechanical failures
Cost of capital
Natural disasters
Others
Source: PWC : 7th Annual Global CEO
Survey – Managing Risk, 2004)
Source: McKinsey quarterly global survey of business
executives, Sept 2006
Confidential
8
Risk Management Components
Confidential
9
Risk Management Components
Components of SCRM
Internal Environment
 Internal Environment
Objective Setting
 Objective Setting
Event Identification
 Event Identification
Risk Assessment
 Risk Assessment
 Risk Response
Risk Response
 Control Activities
Control Activities
 Information &
Communication
Information & Communication
Monitoring
 Monitoring
The components should be looked at as being interrelated.
Confidential
10
Internal Environment
 Encompasses the tone of an
organization
Internal Environment
 Influences the consciousness
and awareness of its people
Objective Setting
 Basis for all other components
Event Identification
 Provides discipline, structure
and organization
 Establishes a philosophy
regarding risk management,
including its risk appetite
 Oversight by board of directors
 Integrity, ethical values,
competence
Risk Assessment
Risk Response
Control Activities
Information & Communication
Monitoring
 Assigning of authority and
responsibility
Confidential
11
Objective Setting
 Set at the strategic level,
establishing a basis for
operations, reporting and
compliance
Internal Environment
Objective Setting
Event Identification
 Precondition for event
identification, risk
assessment and risk
response
Risk Assessment
Risk Response
 Aligned with the risk
appetite (as defined in
internal environment)
Control Activities
Information & Communication
 Risk tolerance
Monitoring
Confidential
12
Event Identification
 Management identifies
potential events
Internal Environment
 Differentiates risks and
opportunities.
Objective Setting
 Events that may have a negative
impact represent risks, which
require management response
 Events that may have a positive
impact represent natural offsets
(opportunities), which management
channels back to strategy setting.
 Involves identifying those incidents,
occurring internally or externally,
that could affect strategy and
achievement of objectives.
 Addresses how internal and
external factors combine and
interact to influence the risk profile.
Confidential
Event Identification
Risk Assessment
Risk Response
Control Activities
Information & Communication
Monitoring
13
Event Identification
Possible techniques
Internal Environment
 Event inventories
Objective Setting
 Scenario analysis
 Internal analysis
Event Identification
 Escalation or threshold
triggers
Risk Assessment
 Facilitated workshops and
interviews
 Process flow analysis
 Leading event indicators
 Loss event data
methodologies
Risk Response
Control Activities
Information & Communication
Monitoring
 Interdependencies
Confidential
14
Event Identification
Categorization of events
(with reference to other
framework axes), e.g.
 External
Internal Environment
Objective Setting
Event Identification
- Economic
- Environment
Risk Assessment
- Political
Risk Response
- Social
Control Activities
- Technological
 Internal
Information & Communication
- Infrastructure
Monitoring
- Personnel
- Process
- Technology
Confidential
15
Risk Assessment
 Allows an entity to understand the
extent to which potential events
might impact objectives.
Internal Environment
Objective Setting
 Assesses risks from two
perspectives:
Event Identification
- Likelihood
- Impact
 Employs a combination of both
qualitative and quantitative risk
assessment methodologies.
Risk Assessment
Risk Response
 Relates time horizons to objective
horizons.
Control Activities
 Assesses risk on both an inherent
and a residual basis.
Information & Communication
Monitoring
 Impact of events should be
assessed individually or by
category across the entity
Confidential
16
Risk Assessment
Assessment Techniques
 Benchmarking
Internal Environment
Objective Setting
 Probabilistic models
 Non-probabilistic models
Event Identification
Risk Assessment
Risk Response
Control Activities
Information & Communication
Monitoring
Confidential
17
Risk Response
 Identifies and evaluates possible
responses to risk.
 Possible Responses:
Internal Environment
Objective Setting
- Avoidance
Event Identification
- Reduction
- Sharing
Risk Assessment
- Acceptance
 Evaluates options in relation to
risk appetite, cost vs. benefit of
potential risk responses, and
degree to which a response will
reduce impact and/or likelihood.
 Selects and executes response
based on evaluation of the
portfolio of risks and responses.
Risk Response
Control Activities
Information & Communication
Monitoring
 Examines, whether residual risk
is within risk tolerance
Confidential
18
Control Activities
 Policies and procedures
that help ensure that the
risk responses, as well as
other entity directives, are
carried out.
 Occur throughout the
organization, at all levels
and in all functions.
 Include approvals,
authorizations, verifications,
reconciliations, review of
operating performance,
security of assets and
segregation of duties.
Confidential
Internal Environment
Objective Setting
Event Identification
Risk Assessment
Risk Response
Control Activities
Information & Communication
Monitoring
19
Information & Communication
 Management identifies,
captures, and communicates
pertinent information in a form
and timeframe that enables
people to carry out their
responsibilities.
 Communication occurs in a
broader sense, flowing down,
across, and up
the organization.
 Personnel receive a clear
message from top
management
 Means for communicating
upstream
Internal Environment
Objective Setting
Event Identification
Risk Assessment
Risk Response
Control Activities
Information & Communication
Monitoring
 Communication with
external parties
Confidential
20
Monitoring
 Monitoring shall assess
presence and functioning
of ERM over time
Internal Environment
 Effectiveness of the other
ERM components is
monitored through:
Event Identification
- Ongoing monitoring
activities.
Objective Setting
Risk Assessment
Risk Response
- Separate evaluations.
Control Activities
- A combination of the two.
 Serious matters reported
to top management and
the board
Confidential
Information & Communication
Monitoring
21
Issues to be aware of
 Risk Management is an iterative discipline---Risks must be revisited on a
regular basis
 Need to balance the audit approach (avoid or mitigate risk) vs. proactive
approach (deal actively with risks)
 Need to recognise role of risk management in realizing strategic objectives
 Risk should be seen as a necessary component and factor in
strategic opportunity.
 There might be an economic benefit in accepting a particular risk, the focus
should be on the risk-return tradeoff
 Risk quantification needs to be included as well as the focus on
risk mitigation.
 Need to adequately reflected the external environment even though some
risk-factors are beyond management’s control
 Need to recognise correlation of risks – often difficult
 Risk management is a coordinating function
 Risk management is a dynamic process, not a check list approach
 Need to recognise risk to reputation
Confidential
22
Risk Management Components
Internal Environment
Objective Setting
 Where do exposures
remain after risk
responses (mitigations/
controls) which are still
beyond the company’s
tolerance level?
Event Identification
Risk Assessment
Risk Response
 Develop plans to respond
to these residual
exposures should
they occur:
Control Activities
Information & Communication
- Business Continuity Plans
Monitoring
- Incident Response Plans
- Disaster Recovery Plans
- Crisis Management Plans etc.
Confidential
23
Risk Mitigation Effects
Risk Map
Before Response / Controls
Limit Of
Risk Tolerance
Risk Map
After Response / Controls
Limit Of
Risk Tolerance
3
4
7
5
6
Likelihood
Likelihood
1
2
Develop
Recovery
Plans
1
7
3
2
6
5
4
8
8
Impact
Impact
Confidential
24
Incident Management “Planning P”
Preparing for the
Tactics Meeting
Preparing for the
tactics meeting
Command and
General Staff
Meeting Briefing
Planning Meeting
Planning Meeting
IAP Prep &
Approval
Operations
Briefing
IC/UC
develop/Update
objectives meeting
Execute Plan & Assess
Progress
Initial UC Meeting
Incident brief: ICS
201
Initial response
notification
incident/event
http://www.dfg.ca.gov/ospr/organizational/msb/readiness/2006%20IMH.pdf
Confidential
25
Types of Risk
Confidential
26
Types of Risk
 Physical Disruptions: Destruction of critical infrastructure in the supply chain
-
Critical Infrastructure includes the material components or assets necessary for the continuous
operation of the transportation system including equipment and personnel
 Process Disruptions: Events that involve day-to-day
operations of supply chain processes
-
Processes include the rules, actions, decisions, and information
flows that give life to the physical level and are necessary for
efficient and effective operation of the transportation
system. Processes are what allow material
components to work together—physically or
virtually—as a system or supply chain
 Institutional Disruptions: Events
that involve changes in company or
supply-network governance and strategy.
-
Institutional considerations include the policies,
guidance, and organizations that empower and
constrain the operation of the supply chain to meet
large-scale company goals. Public sector
examples of institutional disruptions include federal
legislation, national policies, and state regulations.
Private sector examples include company
reorganizations, mergers, market shifts, and
technology breakthroughs.
Confidential
27
Risk Category Examples
 Physical Disruptions
- Natural Disasters
- Terrorist Attacks
- Accidents
 Process Disruptions
- Cyber Attacks
- Demand Forecasting Errors
(Bullwhip effect)
- Missing or late shipments
 Institutional Disruptions
(Supplier Reliability)
- New / Increased Regulations
- Geopolitical Issues / War
- Technology Step-Change
Confidential
28
Supply Chain Scope
Confidential
29
Supply Chain Scope
As a company looks beyond its own suppliers
and customers, the scope of what is Included
in supply chain expands…
Scope includes links
between supplier, your
company, and customer
Downstream Customer
Your Company
 Primary customer: Any direct customer
of your company
First-tier Supplier
 X-tier supplier: Companies that supply your
first-tier suppliers.
X-Tier Supplier
 First-tier supplier: Any supplier that directly
supplies your company. This scope does not
include companies that are 2nd tier or beyond
Primary Customer
 Your company: Your company is the center of
your supply network. The scope here refers
only to in-house supply chain issues
 Downstream customer: Any customer
of your customers.
Confidential
30
Supply Chain Framework
Interdependencies
Plan
Plan
Plan
Deliver
Source Make Deliver
Return
Return Design Return
Supplier’s
Supplier
Supplier
Internal or External
Source
Return
Make
Deliver
Design Return
Your Company
Plan
Plan
Source Make Deliver
Source
Return Design Return
Return
Customer
Internal or External
Customer’s
Customer
Physical Movement
Information Flow
Information Flow
Financial Flow
Confidential
31
Next Steps
 Discussion
- Close out track?
- How do we use this framework?
Confidential
32