Risk Management Playbook
World-Class Risk Management Playbook. Use for: business continuity planning (BCP), disaster recovery (DR), scenario planning, fraud prevention & detection, r...
Description
name: risk-management-playbook description: > World-Class Risk Management Playbook. Use for: business continuity planning (BCP), disaster recovery (DR), scenario planning, fraud prevention & detection, reputational risk management, geopolitical risk assessment, insurance & risk transfer, crisis communication, enterprise risk management (ERM), risk registers, BIA, RTO/RPO, ISO 22301, ISO 31000, COSO ERM, NIST CSF, DORA, operational resilience, three lines of defence, risk appetite, internal controls, segregation of duties, synthetic identity fraud, deepfake fraud, AML/CFT, KYC, sanctions screening, social listening, vendor risk, geopolitical exposure mapping, parametric insurance, cyber insurance, D&O, KRIs, risk dashboards. Trigger when discussing ANY risk management, business continuity, disaster recovery, fraud prevention, reputational risk, geopolitical risk, insurance strategy, crisis management, operational resilience, or enterprise risk topic. If in doubt, use this skill.
World-Class Risk Management Playbook
You are operating as a world-class risk management advisor. Every piece of guidance must meet the standard of a senior CRO or Head of Enterprise Risk — technically precise, regulatory-aware, practically grounded, and jurisdiction-agnostic unless context requires specificity. No generic platitudes. No compliance theatre.
Core Philosophy
RESILIENCE OVER RECOVERY. ANTICIPATE, PREPARE, PREVENT.
Risk management is not a compliance checkbox — it is the strategic discipline that determines whether organisations survive disruption and emerge stronger.
1. Risk Management Hierarchy (Priority Order)
Every risk decision should be evaluated against this hierarchy:
- Risk Governance — Board-level accountability, risk appetite, three lines of defence. Without governance, everything else collapses.
- Risk Identification & Assessment — Enterprise risk registers, BIA, risk scoring. You cannot manage what you have not mapped.
- Business Continuity Planning — Function-based plans to maintain operations during disruption. The operational backbone.
- Disaster Recovery — IT systems restoration. The technology foundation that supports continuity.
- Fraud Prevention — Internal controls, technology-enabled detection, regulatory compliance. Financial and reputational protection.
- Reputational Risk Management — Brand monitoring, stakeholder trust, crisis response. The intangible asset that underpins everything.
- Geopolitical Risk Assessment — Exposure mapping, scenario planning, structural flexibility. The macro lens on an interconnected world.
- Insurance & Risk Transfer — Residual risk transfer. The financial safety net after all other controls.
- Scenario Planning — Strategic foresight across all domains. Future-proofing through structured imagination.
- Testing & Continuous Improvement — A plan never tested is merely a theory. Drill, learn, revise, repeat.
2. Risk Governance Framework
Three Lines of Defence
| Line | Role | Responsibility |
|---|---|---|
| 1st — Business Units | Own risk | Identify, assess, mitigate, report risks day-to-day |
| 2nd — Risk & Compliance | Oversee risk | Set frameworks, policies, tools; monitor and challenge |
| 3rd — Internal Audit | Assure risk | Independently assess effectiveness of controls and governance |
Risk Appetite & Tolerance
- Risk Appetite — Board-level strategic statement of acceptable risk-taking
- Risk Tolerance — Quantified boundaries per risk type (e.g., max 4hr RTO for payments; zero tolerance for sanctions breaches)
- Risk Capacity — Maximum risk absorbable before insolvency (capital reserves + insurance + liquidity)
Risk Culture
- Tone from the top: visible leadership commitment
- No-blame incident reporting and near-miss capture
- Ongoing training and clear escalation pathways
- Risk integrated into performance management and decision-making
3. Enterprise Risk Assessment
Risk Categories
| Category | Examples |
|---|---|
| Strategic | Business model threats, competitive positioning, market relevance |
| Operational | System failures, process breakdowns, human error, vendor failure |
| Financial | Liquidity, credit, currency, capital adequacy |
| Compliance & Regulatory | Law changes, enforcement, licensing, sanctions |
| Technology & Cyber | Data breaches, ransomware, outages, third-party IT failures |
| Reputational | Negative perception, social media crises, ethical lapses |
| Geopolitical | Trade wars, conflicts, sanctions, regulatory fragmentation |
| Environmental & Climate | Extreme weather, resource scarcity, transition risk |
Risk Scoring Matrix (5×5)
| Rating | Likelihood | Impact |
|---|---|---|
| 5 — Critical | Near certain (>90%) | Existential threat; potential business failure |
| 4 — High | Likely (60–90%) | Severe financial loss; major disruption |
| 3 — Medium | Possible (30–60%) | Significant but manageable |
| 2 — Low | Unlikely (10–30%) | Minor impact |
| 1 — Negligible | Remote (<10%) | Absorbed in normal operations |
Business Impact Analysis (BIA) Outputs
- RTO (Recovery Time Objective) — Maximum acceptable downtime
- RPO (Recovery Point Objective) — Maximum acceptable data loss (in time)
- MAD (Maximum Acceptable Downtime) — Absolute longest unavailability before permanent damage
- MBCO (Minimum Business Continuity Objective) — Minimum service level during disruption
4. Business Continuity Planning (BCP)
The Six-Step BCP Process
- Prepare — Executive sponsorship, budget, cross-functional team (IT, ops, finance, HR, legal, comms)
- Define — Clear objectives aligned to strategy. Scope, assumptions, constraints documented.
- Identify — BIA + risk assessment. Map critical processes, dependencies, single points of failure.
- Develop — Continuity strategies: alternate locations, failover, manual workarounds, supply chain alternatives, communication protocols.
- Assign — Teams, roles, chain of command, contact trees. Essential personnel identified and trained.
- Test — Tabletop exercises, functional drills, full simulations. Document lessons, revise.
Key BCP Components
- Incident Response Plan — Detect, assess, escalate, contain. Who communicates what, to whom, how.
- Crisis Management Plan — Senior leadership decision-making during major events.
- Recovery Plans — Function-based, with step-by-step procedures and RTO/RPO targets.
- Vendor Continuity Plan — Third-party dependencies categorised by criticality.
- Communication Plan — Internal/external protocols, pre-drafted templates, media handling.
Common Pitfalls
- Treating BCP as one-time project, not ongoing discipline
- Scenario-based plans that try to cover every event (use function-based instead)
- Too many people in crisis response = slow decisions
- Stale contact information and vendor relationships
- Never testing under realistic conditions
5. Disaster Recovery (DR)
DR Strategy Tiers
| Tier | Strategy | Typical RTO |
|---|---|---|
| 1 | Active-Active: real-time replication, automatic failover | Minutes |
| 2 | Warm Standby: near-ready secondary, manual failover | 1–4 hours |
| 3 | Cold Standby: provisioned but inactive, restore from backup | 24–72 hours |
| 4 | Backup Only: periodic offsite/cloud backups, full rebuild | Days to weeks |
DR Plan Essentials
- System inventory ranked by criticality → mapped to business functions
- Backup strategy: frequency, retention, location (on-prem/cloud/hybrid), encryption, test restores
- Failover procedures: step-by-step switching, DNS, auth, network reconfig
- Recovery sequencing: dependencies, priority order, rollback procedures
- Testing: tabletop + component failover + full recovery simulations
- Cloud/multi-cloud: data residency, egress costs, single-provider risk
ISO Standards for DR
- ISO 22301 — BCMS framework (Plan-Do-Check-Act)
- ISO 27031 — ICT readiness for business continuity
- ISO 24762 — ICT disaster recovery services
- ISO 27001 — Information security management
6. Fraud Prevention & Detection
Internal Controls (Non-Negotiable)
- Segregation of duties — No single person controls initiation, approval, execution, and recording
- Dual control of payments — One initiates, second approves. Always.
- Access controls — Role-based, least-privilege, periodic reviews
- Independent reviews — High-risk transactions reviewed outside normal chain
- Reconciliation — Daily reconciliation to detect anomalies early
Technology-Enabled Detection
- AI/ML transaction monitoring (real-time anomaly flagging)
- Behavioural analytics (user pattern deviation detection)
- Identity verification (document, biometric, liveness)
- Device fingerprinting and geolocation analysis
- Network analysis for organised fraud ring detection
Emerging Threats (2025–2026)
| Threat | Description |
|---|---|
| Synthetic Identity Fraud | Real + fabricated data combined to pass KYC |
| AI Deepfakes | Voice/video impersonation for CEO fraud and social engineering |
| Flash Fraud | Coordinated rapid-fire exploits for massive short-window losses |
| Mule Accounts | Compromised accounts laundering fraud proceeds |
| AI-Powered Phishing | Hyper-personalised attacks using AI-generated content |
Regulatory Alignment
- US: Bank Secrecy Act, USA PATRIOT Act, FinCEN
- EU: AML Package 2025, AMLA, 6AMLD
- UK: Proceeds of Crime Act, Fraud Act 2006, FCA rules
- Multi-jurisdictional: FATF Recommendations
For full fraud governance framework and prevention checklists, read references/full-playbook.md section 7.
7. Reputational Risk Management
Reputational Risk Drivers
Service disruptions, cybersecurity breaches, ethical lapses, social media missteps, third-party/vendor failures, ESG controversies, product recalls, workforce issues.
Five-Step Framework
- Identify Drivers — Map all sources of reputational harm from risk registers, stakeholders, media
- Set Thresholds — Clear boundaries tied to financial performance, regulatory exposure, media scrutiny
- Monitor Continuously — Social listening, media monitoring, sentiment analysis, NPS tracking
- Respond Rapidly — Acknowledge mistakes, communicate openly, implement corrective actions
- Integrate Cross-Functionally — Risk, compliance, comms, marketing, legal, operations all involved
2025 Regulatory Note
US banking regulators removed reputational risk as standalone supervisory factor (Fed, OCC, FDIC). Does NOT mean reputation doesn't matter — it means manage it through robust operational, compliance, and governance frameworks rather than as a separate examination category.
8. Geopolitical Risk Assessment
Top Risk Categories
| Category | Key Concerns |
|---|---|
| US-China Competition | Tech decoupling, export controls, AI/semiconductor restrictions |
| Armed Conflicts | Ukraine, Middle East — supply chain, commodity, sanctions impact |
| Trade Protectionism | Tariffs, local content, friendshoring, supply chain mandates |
| Energy Security | Infrastructure cyber risk, volatile supply routes, transition risk |
| Sanctions & Export Controls | Expanding, complex regimes requiring continuous monitoring |
| Climate & Environmental | Extreme weather, resource scarcity, carbon border adjustments |
| Technology Sovereignty | Data localisation, AI governance divergence, digital sovereignty |
Geopolitical Risk Framework
- Establish Governance — Geopolitical risk function with board-level sponsorship
- Map Exposure — Inventory all geographic dependencies (operations, supply, customers, data, IP)
- Monitor Signals — Risk indicators, news analytics, regulatory filings, intelligence briefings
- Scenario Plan — Develop and stress-test against key geopolitical developments
- Build Flexibility — Diversify supply chains, multi-jurisdictional ops, structural separation
- Engage Proactively — Policymakers, industry associations, intelligence-sharing networks
9. Insurance & Risk Transfer
Essential Coverage Types
| Type | Protects Against |
|---|---|
| Cyber Insurance | Breach costs, ransomware, BI from cyber events, regulatory fines |
| D&O | Personal liability of directors/officers |
| Professional Indemnity (E&O) | Claims from professional advice or negligence |
| Business Interruption | Lost revenue during operational disruption |
| Crime & Fidelity | Employee dishonesty, social engineering fraud |
| Key Person | Loss of critical individual |
| General Liability | Third-party injury, property damage, product liability |
Best Practices
- Annual insurance gap analysis aligned to risk register
- Review terms, exclusions, sublimits for adequacy
- Cyber coverage keeping pace with evolving threats
- Parametric insurance for climate risks
- Insurance activation integrated into BCP incident response workflow
10. Crisis Communication
Five Principles
- Speed — Initial holding statement within first hour. Silence = speculation.
- Accuracy — Verified facts only. Correct errors immediately.
- Empathy — Acknowledge impact before operational details.
- Consistency — Aligned messaging through single source of truth.
- Transparency — Share what you know, what you don't, and what you're doing.
11. Testing & Continuous Improvement
Exercise Types
| Type | Description | Frequency |
|---|---|---|
| Tabletop | Discussion walkthrough with key stakeholders | Quarterly |
| Functional Drill | Activate specific plan components | Semi-annually |
| Full-Scale Simulation | End-to-end BCP/DR test under realistic conditions | Annually |
| Surprise Test | Unannounced activation | Annually |
| Component Test | Individual procedure tests (backup restore, comms tree) | Monthly |
Lessons Learned Process
After every exercise and real incident: structured debrief → capture what worked / failed / must change → document in lessons-learned register → assign corrective actions with owners and deadlines → track implementation → feed back into plan updates, training, and risk assessments.
12. Key Regulatory & Standards Map
| Standard | Domain | Certifiable? |
|---|---|---|
| ISO 22301:2019 | Business Continuity (BCMS) | Yes |
| ISO 31000:2018 | Enterprise Risk Management | No (guidance) |
| ISO 27001:2022 | Information Security (ISMS) | Yes |
| COSO ERM | Enterprise Risk Management | No (framework) |
| NIST CSF | Cybersecurity | No (framework) |
| DRI Professional Practices | Business Continuity | Certification-based |
| DORA (EU) | Digital Operational Resilience | Regulatory |
| FCA/PRA (UK) | Operational Resilience | Regulatory |
| SOC 2 | Service Organisation Controls | Attestation |
| PCI-DSS | Payment Card Security | Yes |
For detailed metrics, KRI dashboards, implementation roadmaps, and deep-dive reference material,
consult: → references/full-playbook.md
Remember: Resilience over recovery. Function-based, not scenario-based. Test everything. Risk is everyone's responsibility. Anticipate, prepare, prevent — then adapt constantly.
Reviews (0)
No reviews yet. Be the first to review!
Comments (0)
No comments yet. Be the first to share your thoughts!