Assess, Control, Monitor & Respond The Operational Risk Framework is based on the following four-step process: 1.Assess the risks in the business oInventory the processes, technology and other business assets oDetermine the risk profile oAssess the inherent risk for each process 2.Implement controls to mitigate those risks oInventory the existing controls oDetermine if the controls adequately address the risk or if modifications or additional controls are necessary oAssess the residual risk of each process based on these controls3.Monitor the performance of those controls oImplement periodic testing and reporting to identify deficiencies in controls 4.Respond to instances where the controls are deficientoImplement procedures to limit losses caused by control failures oCreate a process of continuous improvement that adjusts controls based on changes to the risk environment and repeat... It's that simple - and it is important to keep that in mind. Operational Risk is a very complex discipline. Just understanding the technology used in information security or planning for a critical business emergency are daunting challenges. Add on to that the applicable laws and regulations, the threats, policies, standards and guidelines, the ever changing business environment, etc. and you have a job that can frequently be overwhelming. But no matter what issue confronts you, it will fit within and be addressed by the process above. Just follow the steps discussed on the following pages.