View original document

The full text on this page is automatically extracted from the file linked above and may contain errors and inconsistencies.

Speech
Governor Susan Schmidt Bies

At the Financial Women’s Association Washington Briefing, Washington, D.C.

June 12, 2006

A Supervisor’s Perspective on Enterprise Risk Management
Thank you for the invitation to speak here today. I am impressed by the range of interesting subjects
covered in your program, and I hope that my remarks on enterprise risk management will be
informative as well.
Today I will look at some recent cases in which we believe bankers and supervisors have learned
some key lessons about enterprise risk management, or ERM. These lessons demonstrate how good
risk management increases business efficiency and profitability. Naturally, what we've learned from
the banking industry can be more broadly applied to other industries and sectors. Indeed, one could
argue that ERM can improve management of many different types of entities, including government
agencies and nonprofit organizations. But before I start discussing particular examples, I want to
take a step back and give you my thoughts on ERM generally.
General Thoughts on Enterprise Risk Management
The financial services industry continues to evolve to meet the challenges posed by emerging
technologies and business processes, new financial instruments, the growing scale and scope of
financial institutions, and changing regulatory frameworks. The Federal Reserve, as the supervisor
of state member banks and bank and financial holding companies, has been working with other
regulators and financial institutions to improve the effectiveness and relevance of regulation and
supervision in this changing environment. The Federal Reserve has long emphasized the need for
appropriate and strong internal controls in institutions we supervise, and we have taken a
continuous-improvement approach to our risk-focused examinations. For many years, enterprise risk
management across multiple organizational units within an entity has received increased scrutiny.
In some cases, firms may be practicing good risk management on an exposure-by-exposure basis,
but they may not be paying close enough attention to aggregation of exposures across the entire
organization. Rapid growth can place considerable pressure on, among other areas, an organization's
management information systems, change-management controls, strategic planning, credit
concentrations, and asset/liability management. An organization must also understand how its
various business components, some of which can be quite sophisticated and complex, dynamically
interact. A successful ERM process can help an organization to meet many of these challenges.
Of course, enterprise risk management is a fairly broad topic that can mean different things to
different people. For our purposes here today, I will define ERM as a process that enables
management to effectively deal with uncertainty and associated risk and opportunity, enhancing the
capacity to build stakeholder value. Borrowing from ERM literature, I would say that ERM includes
z
z
z
z
z
z

aligning the entity's risk appetite and strategies,
enhancing the rigor of the entity's risk-response decisions,
reducing the frequency and severity of operational surprises and losses,
identifying and managing multiple and cross-enterprise risks,
proactively seizing on the opportunities presented to the entity, and
improving the effectiveness of the entity's capital deployment.

Some of you are probably familiar with the ERM framework published over a year ago by the
Committee of Sponsoring Organizations of the Treadway Commission, or COSO. The COSO
framework provides a useful way to look at ERM and helps generate further discussion.
In the COSO framework, ERM consists of eight interrelated components derived from the way
management runs an enterprise and integrated with the management process: (1) internal
environment, (2) objective setting, (3) event identification, (4) risk assessment, (5) risk response, (6)
control activities, (7) information and communication, and (8) monitoring. Each of these is
described in more detail in the COSO literature.
Notably, the COSO framework states explicitly that, while its components will not function
identically within every entity, its principles should apply to all sizes of institutions. Small and midsize entities, for example, may choose to apply the framework in a less formal and less structured
way and scale it to their own needs--as long as quality is maintained. This underscores the message
from bank supervisors that good risk management is expected of every institution, regardless of size
or sophistication. Naturally, there will still be some tension between what supervisors expect and
what bankers do, but we hope that supervisory expectations for risk management are becoming
more and more aligned with the way that bankers run their businesses.
I would now like to discuss a few recent examples from banking that highlight the importance of
ERM. With the benefit of hindsight, the financial regulators and the industry have been trying to
distill the lessons learned from these recent breakdowns in risk management and internal control in
the financial services sector.
Compliance Risk
One area in which ERM provides tangible value is the area of compliance risk, which can be defined
as the risk of legal or regulatory sanctions, financial loss, or damage to an organization's reputation
and franchise value. This type of risk may arise when an organization fails to comply with the laws,
regulations, or codes of conduct that are applicable to its business activities and functions. The
Federal Reserve expects banking organizations to have in place an infrastructure that can identify,
monitor, and effectively control the compliance risks that they face. Needless to say, the
infrastructure should be commensurate with the nature of the organization's compliance risk. For a
large complex banking organization, dealing with compliance risk can be particularly challenging
unless it has a well-developed risk-management program.
To create appropriate compliance-risk controls, organizations should first understand compliance
risk across the entire entity. Understandably, this can be a daunting task, but I think most would
agree that an effective risk assessment is critical. Managers should be expected to evaluate the risks
and controls within their scope of authority at least annually.
An enterprise-wide compliance-risk management program should be dynamic and proactive. It
should constantly assess evolving risks when new business lines or activities are added, when
existing activities and processes are altered or when there are regulatory changes. The process
should include an assessment of how those changes may affect the level and nature of risk
exposures, and whether mitigating controls are effective in limiting exposures to targeted levels. To
avoid having a program that operates on autopilot, an organization must continuously reassess its
risks and controls and communicate with all employees who are part of the compliance process. If
compliance is seen as a one-off project, an organization risks facing a situation down the road where
its compliance program has not kept up with the changes in its organization. Also, the board of
directors needs to ensure the organization has a top-to-bottom compliance culture that is well
communicated by senior management so that all staff members understand their compliance
responsibilities. Clear lines of communication and authority help to avoid conflicts of interest.
Compliance-risk management can be more difficult for management to integrate into an
organization's regular business processes because it often reflects mandates set out by legislation or
regulation that the organization itself does not view as key to its success. For example, bankers
understand how vital credit-risk management and interest-rate risk management are to their

organizations, because they reduce the volatility of earnings and limit losses. However, regulations
enacted for broader societal purposes can be viewed as an expensive mandate. For example, the
Patriot Act requires significant reporting of transactions to the government, and many in industry
have expressed frustration about the burden associated with such reporting. I can assure you, we
recognize banking organizations' investment in and commitment to compliance with regulatory
requirements, including those imposed by anti-money-laundering and counter-terrorism regulations.
The Federal Reserve will continue to work with our counterparts in the federal government to
encourage enhanced feedback on how reporting is contributing to our common fight against money
laundering and terrorism.
Operational Risk
Over the past few years, the Federal Reserve has been increasing its focus on operational risk. For
many nonfinancial organizations, the largest share of enterprise risk is likely to be operational risk,
as opposed to credit and interest-rate risk. Banks have learned much from the practices that
nonfinancial firms have developed over the years. Operational risk has more relevance today for
bankers largely because they are able to shed much of their interest-rate and credit risk through sales
of loans, use of financial derivatives and sound models to manage the risks that are retained.
Further, the revenue streams that are growing the fastest are increasingly related to transaction
processing, servicing accounts, and selling sophisticated financial products. To be successful,
organizations must have complex systems to execute these activities.
Banks are also utilizing advanced models to estimate and manage credit-risk and market-risk
exposures. Growing use of sophisticated models requires stronger risk-management practices since
weaknesses in the models' operational design and data integrity can lead to significant losses. Thus,
effective risk management requires financial institutions to have more-knowledgeable employees to
identify system requirements, monitor their effectiveness, and interpret model results appropriately.
We have learned quite a bit about operational risk from our examinations of banking organizations.
For example, during routine examinations we look at the adequacy of banks' procedures, processes,
and internal controls. Such reviews include transaction testing of control routines in higher-risk
activities. For example, a bank's wire transfer activities and loan administration functions are often
targeted for review, and our experiences have identified some common weaknesses in operational
control that are worthy of attention.
With wire transfers and similar transactions, a banking organization could suffer a significant
financial loss from unauthorized transfers and incur considerable damage to its reputation if
operational risks are not properly mitigated. A few recurring recommendations from our reviews are
to (1) establish reasonable approval and authorization requirements for wire transactions to ensure
that an appropriate level of management is aware of the transaction and to establish better
accountability; (2) establish call-back procedures, passwords, funds transfer agreements, and other
authentication controls related to customers' wire transfer requests; and (3) pay increased attention
to authentication controls, since this area may also be particularly susceptible to external fraud.
Loan administration is another area where banking organizations could suffer significant financial
losses from inappropriate segregation of duties or lack of dual controls. An institution could also
incur considerable damage to its reputation if operational risk factors are not properly mitigated. A
few recurring recommendations from these types of reviews that may be applied to corporations
more generally are to (1) ensure that loan officers do not have the ability to book and maintain their
own loans; (2) confine employee access to only those loan system computer applications that are
consistent with their responsibilities; and (3) provide line staff with consistent guidance, in the form
of policies and procedures, on how to identify and handle unusual transactions.
Operational Risk Arising In Recent Financial Restatements
Risks can sometimes quickly appear where they were not traditionally expected. For example,
consider the changes we have seen in financial reporting quality of corporations in all industries. In
2005, there were approximately 1,200 restatements of previously filed financial statements by
publicly traded companies--twice the rate for 2004. The complexity of generally accepted

accounting principles and a more stringent, literal interpretation of the application of those standards
by auditors and regulatory bodies, primarily the Securities and Exchange Commission, are two
major factors that have led to the restatements.
Examples of prominent restatements include FAS 133 hedge accounting and lease accounting
issues. In the area of hedge accounting, the restatements generally resulted from the misapplication
of the "short-cut" method. The organizations in question did not satisfy all of the criteria for use of
the short-cut method but, nonetheless, utilized hedge accounting treatment allowed by this method.
In the area of lease accounting issues, most companies simply failed to apply longstanding
accounting standards related to revenue recognition reserves, accruals and contingencies, and equity
accounting. Most companies believed they were actually reporting correctly prior to the
restatements. Virtually all of these companies were audited by auditing firms that are now registered
with the Public Company Accounting Oversight Board (PCAOB). The PCAOB's inspection process,
which involves close scrutiny of registered firms, may be a factor in the increased number of
restatements.
Section 404 of the Sarbanes-Oxley Act of 2002 requires each annual report of a public company to
include a report by management on the company's internal control over financial reporting.
Restatements by banking organizations alone resulted in the revision of a number of material
weaknesses in internal control for the 2004 reporting period, fifty-two from the thirty-seven
originally reported. This increase implies a significant amount of operational risk associated with the
accounting process.
Generally, examiners review the Sarbanes-Oxley 404 process to determine whether the organization
has a clear understanding of the roles of the audit committee, management, internal audit, and the
external auditor and whether the organization has implemented an effective plan to achieve the
objectives and requirements of Sarbanes-Oxley 404. Examiners also review the Sarbanes-Oxley 404
process to determine whether the organization has an effective follow-up strategy for the
remediation of significant deficiencies and material weaknesses. Examiners are encouraged to
utilize the results of the Sarbanes-Oxley 404 process, where possible, in their overall assessment of
the organization's risk-management and control process and in the risk scoping of safety-andsoundness examinations and inspections.
Information Security
Issues involving information security and identity theft have received quite a bit of attention from
the federal government over the past several years. In fact, just recently, President Bush signed an
executive order that created an Identity Theft Task Force for the purpose of strengthening federal
efforts to protect against identity theft. The heads of the federal bank regulatory agencies are
designated members of this task force; and as supervisors of financial institutions, I believe we can
offer a unique perspective on this issue.
As you have probably noticed, cyber attacks and security breaches involving nonpublic customer
information appear in the headlines almost every week. These events have cost the financial services
industry millions of dollars in direct losses and have done considerable reputational damage. The
cost of identity theft to affected consumers is also significant. With banking organizations
increasingly using the Internet to interact with customers, business partners, and service providers,
concerns about the use of the Internet as a communication and delivery channel have resulted in the
need for and use of more-sophisticated control mechanisms, such as enterprise-wide firewall
protections, multifactor authentication schemes, and virtual private-network connections.
While many of the widely publicized information security breaches have involved parties outside
the affected banking organization accessing the organization's customer information, organizations
also remain at risk for breaches or misuses of information by an insider. During our examination
activities, we have seen breakdowns in internal control, resulting in operating losses that were traced
back to weak controls over insiders' access to information technology systems interfacing with
electronic funds transfer networks. Further investigation into these situations suggests that the

duration and magnitude of the fraud and resulting losses is a direct function of the internal party's
access to accounting and related systems.
Several lessons have emerged. First, institutions should tightly control logical access to funds
transfer systems and ensure that access settings enforce separation of duties, dual controls, and
management sign-offs. Second, an institution's senior management should be restricted from regular
access to business-line functional systems, especially funds transfer systems. When such restriction
is impractical, additional controls must be in place and functioning effectively. Finally, effective
management of information security risk, even when focused on a specific function, requires an
enterprise-wide approach to yield a true and complete evaluation of the associated risks.
Mutual Funds
Well-publicized instances of late trading and market timing at mutual fund firms, and the related
investigations, have involved many businesses, including banking, securities, and insurance firms.
These types of breakdowns in internal control result in sanctions or financial loss and adversely
affect a firm's reputation and franchise value.
I would like to highlight a few lessons learned from our experience in investigating control breaches
in these mutual fund cases. One of the most obvious is the need to critically evaluate unusual client
relationships that require variances from standard procedures. If a high percentage of compensation
is derived from a single client, a red flag should immediately go up. Also, organizations should have
a formal process for reviewing and approving unique products, customers, and services at the
inception of the client relationship. Furthermore, it is always a good idea to shine some light on
areas historically labeled "low risk" to validate that assessment. The low occurrence of loss from an
activity should not be the only factor considered when assessing risk.
Finally, compensation systems that reward employees for sales without adequately monitoring their
internal control breaches can create a conflict between the interest of employees and the interest of
the enterprise. As companies move away from straight salaries to more incentive-based systems, it is
important that personnel departments be included in an effective enterprise-wide risk-management
program to consider how changes in compensation practices affect risks to the enterprise.
Credit Derivatives
I would now like to turn to one more issue that has relevance to ERM, and that is the importance of
companies including an ERM perspective as they design and build new lines of business. As many
of you might know, last year a dialogue between supervisors and credit derivatives dealers was
initiated to support industry efforts to address weaknesses in the operations surrounding credit
default swaps (CDS). While we view these new instruments as an effective way to diversify and
mitigate risks related to credit exposures from corporations, an industry-led study, the Counterparty
Risk Management Policy Group II report, identified significant weaknesses in the infrastructure
supporting sales and risk monitoring of these instruments. While the report identified forty-seven
recommendations, regulators in the United States and other countries have focused on two major
weaknesses.
One weakness relates to the lack of discipline in enforcing contract terms. Any time an instrument is
traded over the counter, it is important to know with whom you are doing business. Since an
exchange does not stand between the two sides of the trade, parties make payments directly to each
other to honor the terms of the contracts. The market practice is to use collateral or pricing to
mitigate the risk that the other side of the trade cannot perform according to the agreement. The
recent industry study also found that competitive pressures were such that brokers were not
enforcing the standard CDS agreement, because their counterparties were routinely assigning the
trade to another party without the broker's prior consent. As a result, dealers often did not have a
real-time understanding of the counterparty exposure. Obviously, this can significantly change the
risk profile of a transaction and also make it very difficult to settle payments in a timely manner.
Another weakness is related to the success of the product. Trading volume has grown so quickly and
reached such a significant level that broker-dealers' paper-based systems to record the trades and

document the transactions have not been able to keep up. As a result, significant backlogs of
confirmations of these over-the-counter derivatives built up. This creates concerns that information
feeding risk-management systems--information about the volume, term, and counterparty to the
trade--is not complete. This problem would be exacerbated in a stress situation, when positions need
to be changed very quickly to mitigate risk.
A few months ago, fourteen major market participants published a letter reiterating their
commitment to improving the infrastructure that supports the credit derivatives markets. The market
participants are committed to the development and implementation of a set of industrywide
guidelines that include a targeted reduction in each market participant's confirmation backlogs and
assurance that agreement terms will be enforced. Additionally, the fourteen participants will work to
create a largely electronic marketplace in which all trades will be processed through an industryaccepted platform, develop a new set of processing standards for those trades that cannot be
confirmed electronically, and establish a new procedure for settlement following a credit event.
We are generally pleased with both the industry's self-identification of the issues and its
commitment to making improvements. But for purposes of our discussion of ERM today, the
problems surrounding CDS sales highlight the challenges risk managers face when market pressures
make the firm's line management reluctant to initiate appropriate controls on their own. It also
illustrates that in new lines of business, sometimes ERM must go outside the enterprise and work
with competitors to support the growth of shared systems and standards to mitigate risks.
Conclusion
At the Federal Reserve, we believe that all banking organizations need good risk management. An
enterprise-wide approach is appropriate for setting objectives across the organization, instilling an
enterprise-wide culture, and ensuring that key activities and risks are being monitored regularly. In
many ways, bankers have learned from nonfinancial industries about ERM. In other cases, banks'
application of ERM may hold lessons for entities outside the financial sector. Whichever the case, it
is clear that there is always an opportunity to improve upon ERM strategies and maintain the proper
discipline to implement them effectively.
Return to top