
Operational Risk
Our Operational Risk Course will help your employees understand companies' common operational risks, including legal and compliance risk, third-party risk and cyber risk.
It shows learners how operational risk can be conceptualised in terms of cause, consequences and risk events.
The course also covers tools and techniques to identify and analyse risk, as well as the various ways risks can be managed by implementing risk controls.
- 50 Minutes
- All staff
- Based on best-practice risk management frameworks and suitable for global audiences.

Learning objectives
- Understand and identify the common operational risks that we face as a Company
- Implement appropriate controls to ensure effective risk management
- Identify the benefits and drawbacks of modelling risk
- Take appropriate action to manage operational risks in their day-to-day role
What can you expect your employees to learn?
Welcome
- Learning objectives
- How to complete this course
What is operational risk?
- In the news
- You decide: What type of operational risk is it?
Identifying operational risks
- You decide: Is it an operational risk or not?
- You decide: Whose approach to operational risk?
Understanding cause & effect
Collecting data on operational risks
- Assessing operational risk
- Probability (likelihood)
- Impact (severity)
- You decide: What are the chances of that?
- You decide: What impact would that have on us?
- Calculating the overall score
Methods of measuring operational risk
- Risk maps
Operational risk controls
- The 4Ts Model
- You decide: Controlling operational risks
Monitoring & reporting
- Risk reporting
- Stress testing & scenario analysis
- What are the benefits of scenario analysis?
- Our risk governance framework
The 3LoD model
Best practice for managing operational risk
Scenarios: A done deal
- Scenario 1: Assessing the risks
- Scenario 2: Controlling the risks
- Scenario 3: Better governance
Scenarios: The data breach
- Scenario 1: Assessing the risks
- Scenario 2: Controlling the risks
- Scenario 3: Better governance
Summary
Affirmation
Assessment
Does your company have…
Under 50 employees?
We recommend our CoreCompliance, our solution, perfect for smaller teams. Start your training immediately with pre-configured, ready-to-go courses.
Over 50 employees?
We have a range of flexible pricing plans to suit your unique needs. Choose from off-the-shelf course libraries or a customised, bespoke approach to reach your compliance learning goals.
Stay up to date on the latest compliance news
Your questions, answered
DORA
Common FAQs
How can I benchmark my team's cyber security awareness?
Are the courses SCORM-compliant?
What other tools are needed beyond training?
Can users only view the courses assigned to them?
Related courses
Boost your compliance efforts with our range of courses. Varying in length and topic, our courses equip you with the tools to create an ethical and resilient workplace.
Phishing
It's essential for your employees to know what phishing is, how to spot the signs of an attempt and how to protect themselves and your Company.
Information Security
The loss or theft of commercially sensitive information may damage revenues, reputation and consumer trust.
Spot a Phishing Attempt
Bring "Spot a Phishing Attempt" online training to life using animation characters and storylines.
Records Management
Records management refers to employees' creation, storage, archiving, and disposal of business records.
Deepfake Awareness
Bring "Deepfake Awareness" compliance training to life using animation characters and storylines.
Understanding Information Security
Bring "Understanding Information Security" e-learning to life using animation characters and storylines.
Common Cyber Threats
Bring "Common Cyber Threats" online training to life using animation characters and storylines.
Understanding the GDPR
Bring "Understanding the GDPR" online learning to life using animation characters and storylines.
Personal Data Breaches
Bring "Personal Data Breaches" online training to life using animation characters and storylines.
Bring Your Own Device Security
Bring "Bring Your Own Device Security" training to life using animation characters and storylines.
Device Hygiene
Bring "Device Hygiene" training to life using animation characters and storylines.
Malware
Bring "Malware" training to life using animation characters and storylines.
Ransomware
Bring "Ransomware" training to life using animation characters and storylines.
Smishing
Bring "Smishing" training to life using animation characters and storylines.
Spear Phishing
Bring "Spear Phishing" training to life using animation characters and storylines.
Video Conferencing
Bring "Video Conferencing" training to life using animation characters and storylines.
Vishing
Bring "Vishing" training to life using animation characters and storylines.
Creating Strong Passwords
Bring "Creating Strong Passwords" training to life using animation characters and storylines.
Multi-factor Authentication
Bring "Multi-factor Authentication" training to life using animation characters and storylines.
Reacting to Password Breaches
Bring "Reacting to Password Breaches" training to life using animation characters and storylines.
Information Classification
Bring "Information Classification" training to life using animation characters and storylines.
Information Security on the Move
Bring "Information Security on the Move" training to life using animation characters and storylines.
Tailgating and Piggybacking
Bring "Tailgating and Piggybacking" training to life using animation characters and storylines.
Secure Web Browsing
Bring "Secure Web Browsing" training to life using animation characters and storylines.
Supply Chain Cybersecurity
Bring "Supply chain cybersecurity" training to life using animation characters and storylines.
Transferring Information Securely
Bring "Transferring Information Securely" training to life using animation characters and storylines.
Using Wi-Fi safely
Bring "Using Wi-Fi safely" training to life using animation characters and storylines.
Advising customers on cybersecurity
Bring "Advising customers on cybersecurity" training to life using animation characters and storylines.
CEO fraud
Bring "CEO fraud" training to life using animation characters and storylines.
Guide to Secure Remote Working
Bring "Guide to Secure Remote Working" training to life using animation characters and storylines.
Think Before You Click
Bring "Think before you click" training to life using animation characters and storylines.
Risks in the Use of AI
Bring "Risks in the Use of AI" training to life using animation characters and storylines.