Enterprise-wide Risk Management

Coming from a crisis management and business continuity background, I really enjoyed reading Enterprise-wide Risk Management: Strategies for linking risk and opportunity by DeLoach has a refreshing new approach to risk management that is is cross-functional, integrated and adaptable in the face of constant change, simply because traditional risk management approaches are no longer adequate in today’s rapidly changing world in where traditional risk management is too fragmented and function-driven.

The evolution of risk management

deloach-risk-managementThere are many excellent and self-explaining illustrations in this book, but the one that fascinated me the most is the one to the left, showing how enterprise-wide risk management is the perfection of risk management in business, enterprise risk management is seen as a natural evolution of operational risk management into a strategic process, with clear linkage to business opportunities, and with the purpose to align strategy, processes, people, technology and knowledge on an enterprise-wide basis.

Four plus Two equals Six

Classic risk management literature acknowledges four ways of dealing with risk after establishing a risk matrix:  Avoid, Reduce, Transfer and Retain or Accept. As it turns out, there are six ways, not just four ways to deal with risk.  Two more are Exploit and Ignore. DeLoach points at exploit, while Tomlin (2006) points at Ignore, as I discuss in my later post on The six ways of dealing with Risk. And, ‘Exploit’ also makes into a discussion on risk management as a core competence by Lessard and Lucea (2009).



Reference

De Loach, J. W. (2000). Enterprise-wide Risk Management: Strategies for linking risk and opportunity. London: Financial Times/Prentice Hall.
Copyright note: The image used in this post is taken from the above book.

Author link

Buy this book

Related

Posted in BOOKS and BOOK CHAPTERS
Tags: , , , , ,

ARTICLES and PAPERS
Biting the hand that feeds. All firms are snakes.
'All firms are snakes'. So says Paul D. Cousins in A conceptual model for managing long-term inter-o[...]
State of the art in SCRM?
A severe supply chain disruption has hit my own blog: More than a month without a post. It's not tha[...]
BOOKS and BOOK CHAPTERS
Book review: Cost-Benefit Analysis: Theory and Application
I really enjoyed reading Cost-Benefit Analysis: Theory and Application by Tefvik Nas.  I used this b[...]
Book Review: Transportation Security
Instead of Transportation Systems Security, which I reviewed in an earlier post, I should have settl[...]
REPORTS and WHITEPAPERS
The Benefits of Investing in Supply Chain Security
With the memory of attacks by Somali pirates still fresh in mind, supply chain security has come to [...]
Vulnerable or valuable supply chain?
More than a year old now, but still holding not so few words of wisdom is the Pricewaterhouse Cooper[...]