OPERATIONAL AUDIT CHAPTER 3: RISK ASSESSMENTS Risk Assessments - the process of identifying, measuring, and analyzing risks relevant to a program or process. - systematic, iterative, and subject to both quantitative and qualitative inputs and factors; dependent on the timeframe of the review Identification of Risks - key aspect of any risk assessment Below are common risks that operational auditors should consider. Operational Risk Types 1. Capacity • Inability to produce as many units as required • Process generating excessive amounts of waste • Producing too many defective parts (i.e., error rate) • Delivering ordered goods or services past the promised date • Inability to provide high quality service to every customer • Lack of funding to finance business expansion • Knowledge drain due to employee turnover • Failure to respond to changing customer preferences 3. Compliance • Failure to meet external requirements (e.g., laws and regulations) • Failure to meet internal standard operating procedure (SOP) requirements • Failure to meet combined requirements (e.g., contracts) 4. Natural environment • Energy supply disruption • Damage from fire, water, or natural disasters (e.g., floods, earthquakes, hurricanes, and tornadoes) • Inability to secure needed resources (e.g., water and minerals) • Dependency on carbon-based sources of energy • Business interruption caused by disease 5. Political • Changes in legislation or regulation due to government changes • Social unrest triggered by changes in government 2. Strategic • Failing to maintain beneficial relationships with customers’ • Computer system’s inability to support the operating unit’s needs • Manufacturing lines being unable to keep pace with sales growth Internal Constraints 1. Equipment – types of equipment available and the ways they are used limit the ability of the process to produce more high-quality goods and deliver services 2. People – lack of skilled and motivated workers limits the productive capacity of any process. Attitudes and other mental models (e.g., feeling defeated, victimized, or hopeless) embraced by workers can lead to behaviors that become a constraint on the process. 3. Policies – Written and unwritten policies can prevent the process from producing more of higher quality goods and services When evaluating internal dynamics and risks, internal auditors should be concerned about: 1. slowest operation in the process 2. synchronization of activities within/between processes The Risk Matrix 3. robbing materials and other resources within or between processes or units - Measurement of Risks - Measurement process – either subjective/quantitative; either driven by facts/not risks are quite often measured using a three-point scale of high-mediumlow or a five-point scale. Its key limitation is that they are not based on explicit figures/facts to improve, values can be attached to the assessments impact ratings can be expanded to provide more detailed descriptions of each range may include variables such as the degree of disruption to the org, bodily injury to workers and others, security, health and safety, social, economic, and environmental widely used and highly effective tool to record and analyze the objectives, risks, and controls in the program or process that is being audited an essential ingredient when conducting risk-based audits, as they provide a means to capture and analyze these items; the layout varies by organization ASSESSING RISKS AND CONTROL TYPES Risk assessment – different from risk management; it is a process that begins by identifying potential hazards and analyzing those items to determine what could happen if the hazard were to occur Important aspect: identifying and quantifying the assets that are at risk The conduct of a risk assessment means that we should look for weaknesses (sometimes referred to as vulnerabilities) that would make an asset susceptible to damage or loss from the hazard. Common weakness: age, condition, location of building, its contents Vulnerability - “degree to which people, property, resources, systems, and cultural, economic, environmental, and social activity is susceptible to harm, degradation, or destruction on being exposed to a hostile agent or factor.” The process of identifying relevant events can be done by following any of these approaches. 1. Objectives based - Identify events that may hinder the ability of the organization to achieve its objectives partially or completely. - brainstorming and the Adelphi method may be useful techniques to collect the relevant information and assess the impact of these events 2. Scenario based - Create different scenarios or alternative ways of achieving objectives and determine how forces interact. A useful approach is to identify triggers that can start–stop different scenarios from occurring For either of these two approaches, management must consider the external and internal factors that can affect event occurrence: External - economic, business, natural environment, political, social, and technological factors. Internal - infrastructure, personnel, processes, and technology common-risk checking – use a fabricated list of common risks in your industry/area of scope risk charting – combination of above approaches consists of listing resources at risk and the threats to those resources Mitigation – the impact of hazards and how to reduce them is the next aspect of the risk assessment process Federal Emergency Management Agency - provides the Mapping Information Platform and the Risk MAP (Mapping, Assessment, and Planning) to help organizations by delivering data that increases public awareness and leads to action to reduce the risk to property and life. US Geological Service (USGS) - has a great deal of seismic information to help organizations identify their vulnerabilities The National Weather Service - provides rain, hurricane, air quality, winter storm, flood, and marine weather information The Environmental Protection Agency (EPA) - provides information and assistance regarding harmful effects to human health or to ecological systems caused by exposure to any physical, chemical, or biological entity that can result in an adverse response (called stressors) common vulnerabilities and exposures (CVE) - a list of information security vulnerabilities and exposures that provides common names for known cyber security issues. If the impact can be significant, the organization should consider creating a mitigation strategy. If the impact is medium/low, then control activities are often enough. - - The Importance of Control SelfAssessments (CSA) consist of questionnaires and other forms that process owners complete that identify the major activities in their programs and processes, the objectives, risks and controls, the individuals that perform key tasks and controls, and the major challenges affecting these programs and processes. require managers to think about the design and condition of their areas of responsibility, and assess the presence and quality of the related controls. effective CSA programs require communication, linkage to internal audit results, providing feedback on the gap analysis, and reinforcement. - MAKE TO ORDER (MTO) - Involves manufacturing only after a customer’s order is received, so the process begins when demand occurs - A pull-type supply chain operation because manufacturing is performed when demand is confirmed; pulled by demand - Process of assembling prepared parts starts when actual demand occurs - Production process starts with the obtaining of materials and parts/further back from development designing (engineering) MAKE TO STOCK (MTS) - Push-type operation/production BUSINESS ACTIVITIES & THEIR RISK IMPLICATIONS The following is a select list and discussion of business practices to provide a general understanding of the concept, the implications for internal auditors and where risk and opportunities lie. - ASSEMBLE TO ORDER Type of production system where the material is prepared so it can be assembled quickly upon receipt of the customer request and is usually customizable to a certain degree Parts are already manufactured but won’t be assembled until the order is received Is between two other common manufacturing strategies: MTS (products are manufactured in advance) and MTO (the products are produced after the order is received. combining the two strategies, organizations can get products to the customer quickly while allowing some flexibility to be customizable, so customers can quickly receive products based on their needs. Fewer items in inventory, use lesser storage space concept is usually associated with manufacturing, such as computer systems, industrial equipment, and automobiles, it is also applicable in other environments, such as services, for example, corporate training. - - Products are manufactured based on demand forecasts Since the accuracy of the forecasts will prevent excess inventory on one end, and minimize the opportunity loss due to stockouts on the other, the issue for organizations is how to forecast demands accurately. In environments of mass production and mass marketing, the requirement for mass production urged standardization and efficient business management such as cost reduction. BOTTLENECK Refers to a point in a process where there is limited productive capacity and the flow slows down - This constriction can slow or even stop the flow of work until some intervention occurs, or time passes allowing items to move through, while other incoming items continue to accumulate - Blockage stalls production affecting the number of items produced; has an impact on customer satisfaction since it leads to an increase in cycle time - Additional effects: supply overstock, if items are being produced faster than they are being sold - Another form of long-term bottlenecks occurs when a machine cannot keep pace with the demand due to its inefficiency - Bottlenecks can be found by identifying the areas where accumulation occurs, evaluating the output of the process, assessing whether each machine used in the production process is being used to its full capacity, and finding the machine with the highest wait time. COLLABORATIVE INVENTORY MANAGEMENT - Consists of the cooperation between a buyer and a supplier to improve stock availability and reduce costs - Often accomplished by sharing forecast information and using a single plan CONSIGNMENT - inventory management and replenishment method where a buyer only pays for the products held at a third-party location when the items have been sold to the customer. Unsold products can usually be returned to the supplier as well. - means sending goods to another party, but ownership of these goods remains with the sender - often used to place products close to the customer to reduce shipping times; also reduce carrying and inventory costs because the other organization keeping custody of the items may warehouse the items at a lower cost than if the producing company did it itself by maintaining multiple storage facilities in various geographic locations - items remain on the owner’s financial records as inventory until sold - if the organization is incurring high inventory carrying costs, maintains multiple storage facilities, and is unable to manage them effectively, or delivery times are being affected by long lead times, a consignment arrangement may be a useful recommendation for management - - CYCLE TIME Refers to the reduction in the time and related costs needed for a product or service to move through part or all of a supply chain - - CONCEPT OF SUPPLY CHAIN refers to the system of people, activities, information, and resources involved in creating and moving a product or service from the supplier(s) to the customer DISTRIBUTION CENTER (DC) BYPASS OR DROP SHIP - refers to circumventing the DC or entire distribution channel by routing freight directly to its destination - move products from the manufacturer directly to the retailer or end user without going through the typical distribution channels - requires coordination with suppliers and customers to make sure there are sufficient items in stock and to address delivery frequencies required by customers - reduce cycle time and costs, but may create risks to the org as unscrupulous individuals could have items shipped to an unauthorized location for personal gain ELECTRONIC DATA INTERCHANGE (EDI) - consist of standardized sets of data transmitted between various business partners during business transactions - By using the same standard, two companies can exchange documents and reduce the reliance on paper, and reduce human interaction saving time and money - Easily retrievable and reduced storage costs while being protected from natural hazards - In the case of a buyer and a seller, it makes possible the sharing of information regarding supply chain events, such as invoices, shipping notices, purchase orders, and requests for quotation. used to exchange many other types of information, such as medical records, laboratory results, transportation information (e.g., type of container and mode of shipment), and telecommunications INVENTORY - Stock of raw materials, semi-finished goods (e.g., work in process), or finished material held to protect the organization against unpredictable, uncertain, or erratic supply or demand with the objective of avoiding stock-out situations JIT has been advocating zero or near-zero inventory levels. The idea is that the organization should only receive supplies it knows it will need, these items should arrive immediately when they are needed, and they should be moved forward toward the end user immediately. In effect, not hold any inventory but rather use pull systems. A pull strategy consists of the buyer “pulling” the goods or information they need (i.e., demand for their needs), while the suppliers “push” these items toward the consumers - Push production: based on forecast demand - Pull production: based on actual/consumed demand - main premise: inventory is the storage of company resources that could be used elsewhere for more productive purposes. Inventory also has carrying costs (e.g., storage and protection) and if the demand never materializes, the items may become obsolete. FUTURE CHALLENGES AND RISK IMPLICATIONS Organizations will increasingly be confronted with the ff: INCREASED OUTSOURCING it was touted as a great mechanism to reduce expenses, boost productivity and efficiency, and free the organization, so it could focus on its core activities - However, this trend toward outsourcing, which began with lowskill repetitive activities being performed by lower cost third parties, has evolved to the point where companies are increasingly becoming more reliant on third parties to perform critical business functions. - - GLOBAL SOURCING - Whereas most companies used to work with, and obtain their raw and semi-finished goods from local suppliers, it is commonplace now for organizations to search the globe for suppliers. - driven by lower prices and the related savings, but also because the quality of foreign-sourced inputs has increased in most cases - - MARGIN COMPRESSION As competition has expanded to a more global environment, and some of the new competitors benefit from lower costs and even subsidies and protectionist practices in some countries, many organizations struggle to remain competitive under such conditions. TECHNOLOGY Technological changes include ERP systems with built-in supply chain management, product life cycle management, customer relationship management, supplier relationship management, document management, and project management functionality. can also manage transportation, warehousing, billing, collections, staffing, and payroll GROWTH IN ASIA AND OTHER DEVELOPING MARKETS - The increasing purchasing power and wealth creation in emerging markets is opening new opportunities that many organizations cannot miss. This is resulting in the search for customers and the related adaptation of sales and marketing activities to address the different conditions in these diverse markets. IMPROVED CUSTOMER ANALYTICS information is being gathered from credit card transactions, internet traffic, loan information, POSs devices, and other means, resulting in the accumulation of data that is increasingly being mined and analyzed by specialists. - the widespread availability and analysis of data captured everywhere will result is a better understanding of the customer, and continue to drive a closer identification of their needs and wants - DATA CAPTURE AND TRANSFER CAPABILITIES - Improvements in data storage, lowering the costs dramatically over the past three decades, improvements in networking capabilities (local area network [LAN], wide area network [WAN]) and the internet, and enhancements in wireless communications, such as radio frequency identification (RFID), make it increasingly easy and economical for organizations to obtain, analyze, and disseminate information real time or near real time. ENVIRONMENTAL INITIATIVES - Ecological considerations are increasingly becoming a key concern for organizations. Whether it is the sourcing of materials locally, sourcing them through fair-trade practices, reducing the amount of inputs and packaging used, lowering the amount of waste generated, manufacturing goods using recycled components, or producing items from reused ingredients, environmental considerations are affecting how organizations are perceived and even steering buying decisions - The focus is not limited to what is produced, but also how items are produced and even under what conditions GOVERNMENT INVOLVEMENT While the degree of acceptance of government involvement varies by country and changes over time, governments in general are increasingly becoming more involved in the support of private sector activities - the result of a greater understanding of the role that governments can play to facilitate trade, provide protection under the rule of law, educate populations, build needed infrastructure, provide favorable tax regimes, and reduce financial controls to facilitate the flow of capital. - Evident in the number of trade agreements - Due to infrastructure challenges around the world, organizations are likely to embark on public–private - collaboration efforts through private investment, public policy, and shared infrastructure investment. Companies and governments will work to build, improve, and operate roads, ports, airports, and railroads. GEO-POLITICAL RISKS - The rise of extremism around the world threatens organizations’ abilities to operate freely around the world - Some of this is related to bombings on the facilities of companies in the oil and gas and other extractive industries to attacks on the general population that frightens tourists and affects the tourism industry (e.g., airlines, hotels, restaurants, and museums). CORRUPTION - dishonest or unethical conduct by a person entrusted with a position of authority, often to acquire personal benefit, it includes many activities including bribery and embezzlement, though it may also involve practices that are legal in many countries, such as blatant favoritism and nepotism, discrimination, and largesse - distorts the market by shifting resources to less productive purposes and increases the cost of doing business by forcing additional payments - also creates skepticism and suspicion. In the public sector, it limits the welfare of the population and is often evidenced in substandard infrastructure, child labor, human trafficking, high child mortality, poor education standards, and environmental damage