You are on page 1of 3

PRACTICAL SOLUTIONS

How risky is your


risk assessment?

26 ACAMS TODAY | SEPTEMBER–NOVEMBER 2013 | ACAMS.ORG | ACAMSTODAY.ORG


PRACTICAL SOLUTIONS

I would like to begin by asking readers to


conduct a brief visualization exercise.
Read the following and then close your
eyes and think of the first thing that comes
to mind.
method and format, which leaves AML offi-
cers and risk practitioners to make sense of
the remaining 417 pages.
This article is divided into two parts. Part one
inherent risk is best attacked through a
multi-dimensional risk score that takes
into consideration impact and likelihood?
Regardless of the approach selected, the
critical success factor in developing the risk
focuses on the execution of the risk assess-
engine lies in establishing clearly defined and
Risk Assessment. ment, while the second part provides exam-
documented explanation of each risk level.
ples of actions you can take to effectively
For example, a range of 1 to 50 could be ideal
For most, I am guessing the two simple words leverage the risk assessment results across
so long as the difference between a risk score
conjured images of risk formulas, controls, the enterprise.
of 27 and 28 is clearly delineated. This delin-
or the intoxicatingly popular heat map. The first objective of the risk assessment is to eation should also go beyond the severity of
After all, inherent risk less the effectiveness identify the appropriate scope. Fortunately, adjectives in risk statements, for example
of mitigating controls equals residual risk. the exam manual provides extensive guid- highly likely vs. somewhat likely and include
Written another way IR – CE = RR. Regard- ance on specific risk factors within each risk quantifiable data. This brings us to our next
less of your preference, a simple formula category. These include the always popular pain point — data, data, data!
does not a risk assessment make. For those acronyms such as PEP, NRA, CIB, HIFCA,
The role data plays in the risk assessment
who read risk assessment and imagine new NBFI and RDC. However, how many risk
process cannot be overstated. Data provides
product development, dynamic customer factors does your risk universe include that
the foundation upon which to base risk deci-
risk models, calibration of transaction moni- are not set forth in the exam manual?
sions. Implementing a robust data support
toring scenarios or role based employee
Regrettably, when presented with a seem-
training — congratulations on your advanced ingly straight forward two-step process and
risk assessment vision! If you would like to library of risks it is all too easy to lose sight of
refine your vision even more, read on. a risk assessment’s true objective. After all,
This article will go beyond traditional risk the risk assessment establishes your orga-
assessment mechanics in favor of practical, nization’s risk profile and provides a mech-
actionable and easily implemented best prac-
tices. After all, the true test of the efficacy
anism for the development of appropriate
risk management strategies. While knowing Data provides the
whether you have 6 or 14 PEPs under your
of your risk assessments is not the birth of
a green three on an XY axis or a menacing
roof is useful, there are “hidden” risk factors foundation upon which
that also deserve your attention in combating
red sphere in the dreaded upper right quad-
rant of a heat map. Rather, efficacy will be
money laundering. Therefore, a holistic risk to base risk deci­sions
universe should also consider control risk
determined by your methodology’s ability to
factors. Identified independently or through
withstand microscopic scrutiny; to serve as collaboration with a broader enterprise-wide
the foundation for a risk-based program that risk function, control risk factors — not to
adapts to internal and external changes; to be confused with controls themselves — are
provide a reliable means for the institution role includes developing an inventory of
often at the root of AML program failures.
to make effective decisions regarding human where data resides across the organization,
resources, capital and other allocations; and Employee risk is one such risk factor and understanding how data is collected, stored
to provide assurance to key stakeholders is at the heart of several recent high profile and updated and conducting periodic testing
regarding your organization’s risk manage- enforcement actions. For example, are to ensure its accuracy. Once this process is
controls in place to ensure a rogue account complete, a comprehensive key risk indicator
ment practices.
officer cannot override risk scores of the (KRI) library should be developed. Your orga-
It would be fatuitous to write an article on customer risk model you have worked so nization’s risk profile is subject to change
risk assessments without acknowledging the hard to develop and hopefully calibrate on an every day you are in business and KRIs
guidance provided by the Federal Financial ongoing basis. provide key stakeholders with a measure to
Institutions Bank Secrecy Act/Anti-Money monitor ongoing risk and identify potential
Perhaps the most heavily debated risk
Laundering Examination Manual (exam vulnerabilities in their control environment.
assessment topic is the anatomy of the risk
manual). The exam manual describes a An example of AML KRIs include, but is
scoring engine. Inherent risk is generally
two-step process including the development certainly not limited to, the number of high-
defined as the “pure” risk that a particular
of risk categories (i.e., products, services, risk customers, type and volume of transac-
requirement poses to an entity in the absence
customers, entities, transactions and geo­ tions, investigation escalation percentages,
of any actions management might take to
graphic locations) and the requirement to SAR volumes and employee turnover.
alter its likelihood and/or impact. Should a
conduct a more detailed analysis of the data qualitative risk score give way to a quanti- No risk assessment article would be
to better assess the risk within these catego- tative approach, and if so, what is the most complete without a discussion on controls.
ries.1 The exam manual also eloquently artic- appropriate numeric range; 1 through 5, or Controls and their associated control score,
ulates its neutral position on the appropriate is 1 through 50 more appropriate? Perhaps act as the fulcrum between inherent and

The FFIEC’s 2010 Bank Secrecy Act/ Anti-Money Laundering Examination Manual Risk Assessment — Overview page 22
1

ACAMS TODAY | SEPTEMBER–NOVEMBER 2013 | ACAMS.ORG | ACAMSTODAY.ORG 27


PRACTICAL SOLUTIONS

residual risk. Traditionally, risk assessments line metrics including vacancies and turn- based on the extensive use of supporting data
involve making a control design effective- over, and changes to product offerings, of course. Why then does the enhanced due
ness decision that does not include a more risk models, third party relationships and diligence (EDD) process use a one size fits all
detailed operating test effectiveness. Never- department systems. This process is easily approach? Ideally, a MSB specific EDD form
theless, understanding your control environ- implemented through a formal checklist. The would be developed to address the additional
ment should involve the use of multiple data result of this evaluation provides manage- risk presented by this customer type.
points to ensure the most accurate design ment with a tool for identifying the need
for more robust interim assessments and Transaction Monitoring Scenario Coverage:
effectiveness assessment possible. Control
demonstrates a robust and proactive risk With customized EDD addressed, let us say
data point should include control type auto-
management culture. that your risk assessment has also deter-
mated versus manual and control focus
mined that correspondent banking reflects
preventative vs. detective. These classifica-
So you have diligently defined your scope, a high risk activity. Does your transaction
tions, while useful, are not sufficient when
developed your scoring engine, evaluated monitoring system have a rule or scenario
used in isolation, and should thus be lever- your controls, derived residual risk and even
aged holistically. For example, the robust to monitor this high risk activity? Organiza-
taken the time to develop a snazzy gradient tions should perform an annual assessment
preventative and automated transaction plat- shaded matrix depicting your organiza-
form is certainly a must but what if installa- to map the results of the risk assessment to
tion’s risk in vibrant red, green and yellow. production scenarios to ensure appropriate
tion occurred last week? This introduces the Congratulations…now what?
concept control maturity. Control use and coverage exists for those transaction types
control review are among a dozen or more presenting increased risk.
additional factors that can assist with making Targeted Training: Recent enforcement
a more educated control design effectiveness actions have highlighted the failure of a one
decision and serve as the roadmap upon size fits all training approach. One of the
which to develop a control testing plan.
At a minimum an easiest opportunities to embed risk assess-
ment results is in an organization’s training
Last, but certainly not least, we arrive at
residual risk. Residual risk is the remaining organization’s risk curriculum. Rather than look for providers
risk after management has taken action to with the latest tablet training capabilities,
alter inherent risk through the implemen- assessment can effectuate focus on your organization’s highest inherent
tation of controls. However, identifying risk categories and develop modules specific
residual risk must be viewed as the end of change to a dozen or to these risks. For example, if the NRA popu-
lation presents elevated risk to your organi-
the beginning rather than the beginning of
the end, as much work is left to be done
more elements zation, ensure training for employees who
work with this population have received
once the heat map is in hand. Regardless of
whether a residual risk score is automati-
of a comprehensive additional education focusing on the unique
cally derived based on control design effec-
tiveness or manually calculated through a
AML program risks presented by this customer type.
In summary, I suspect few will question the
thorough management review practice, the importance of the risk assessment process.
residual risk profile should become the play- However, I would encourage readers to ques-
book for integrating risk assessment results Recent surveys suggest that organizations
struggle to derive value from their risk tion the risk their risk assessment creates.
into the organization’s business practices. As money laundering schemes grow, increas-
assessment. When you consider the fact
Before we dive into part two it is important to that a risk assessment has the potential to ingly complex organizations must develop
note that in the time it has taken you to arrive shape almost every aspect of an organiza- and evolve their process to go beyond the
at this paragraph your organization’s AML tion’s AML program, it is disheartening to mechanics of updating three dozen risk
risk profile has changed. Customers have see the exercise conducted and the results factors and instead fully embrace a risk iden-
been onboarded, correspondent banks have left in the ether to await an annual update. tification and mitigation strategy to commen-
processed transactions, cash has changed At a minimum an organization’s risk assess- surate with the level of sophistication of
hands and changes to staffing may have ment can effectuate change to a dozen or those who are intent on exploiting it. To
occurred. Organizations are well advised more elements of a comprehensive AML close, please indulge me in one last visualiza-
to proactively assess their risk through the program. Three such opportunities are tion exercise. When you read the following
use of the aforementioned KRIs as well as a described below. words, what comes to mind? Ready?
robust interim risk assessment process.
Enhanced Due Diligence: As we have Risk Assessment. 
An interim risk assessment process should learned, “customers” are a primary risk
touch major lines of business and include assessment category. Let us pretend that Michael Florence, CAMS, anti-money laun-
an evaluation of potential red flags such as through the risk assessment process your dering practice leader, Treliant Risk Advi-
violations or non-compliance with regula- organization has determined that MSBs sors, Washington, DC, USA, mflorence@
tions and policies, department or business represent the highest risk customer type treliant.com

28 ACAMS TODAY | SEPTEMBER–NOVEMBER 2013 | ACAMS.ORG | ACAMSTODAY.ORG

You might also like