A Model and Best Practices for Risk Transformation

Risk Transformation
Author: David Vohradsky, CISA, CRISC, CISM, CGEIT, CDPSE
Date Published: 1 May 2019

Increasing globalization and the associated business transformation mean that enterprises are now complex networks dependent on both the nodes within other organizations and the nodes within the same organization.1 This business transformation includes outsourcing, offshoring, restructuring, mergers and acquisitions, and value chain optimization. It also creates new technology risk such as increasing third-party providers, complex service interconnections and challenges of emerging markets; other problems such as intellectual property, liability and data sovereignty issues also occur.2

Board members and executives believe that risk frameworks, processes and structures are no longer giving them the level of assurance they need. They see an increase in the speed and effect of risk events and a reduction in their ability to identify and tackle new risk.3 Cost pressures from boards feeling they are spending too much time and money running risk processes4 with limited effectiveness means risk organizations are being driven to optimize headcount, rationalize infrastructure and improve operating efficiency of their risk processes and technologies.5 The majority of risk managers see efficiency as the strongest driver of future investment in risk management.6

According to one report, technology is now involved in more than half of critical operational risk, and cybersecurity spending, for example, is growing at three times the rate of the technology being secured.7 As risk increases, control increases as well to mitigate the risk; controls become more prescriptive (e.g., Payment Card Industry Data Security Standard [PCI DSS]) and more dependent on the predictive model used.8

From a risk practitioner perspective, the following can be seen: fragmented risk governance and policy frameworks, a hodgepodge of nonscalable point solutions, spreadsheets and manual processes giving multiple views of risk and control,9 a shortage of qualified resources, and unclear business and technology ownership and accountabilities.10 The disparate systems cause confusion due to duplicated, opaque and contradicting information and cause waste due to overlapping and inconsistent strategies, policies, processes and systems that must be maintained.11

Clearly, a transformation of the risk-management function is needed alongside business transformation.

A Model for Risk Transformation

A formal definition of “risk transformation” does not exist. Loosely, it is the continual evolution of an organization’s risk function, systems and processes. So, delving deeper into the risk management business model to examine risk transformation fully is required.

Risk management is a “value shop”; that is, a process of value creation for knowledge-intensive industries that involves five primary activities: problem finding, problem solving, choice, implementation, and follow up and control12 (figure 1). Embracing the value shop model represents a potentially more useful approach for planning risk transformation than perpetuating a backward-looking risk function13 focused on tactical improvements to the linear Committee of Sponsoring Organizations of the Treadway Commission (COSO) risk activities of objective setting, event identification, risk assessment, information and communication, and risk response.

Figure 1

Figure 2The ISACA Business Model for Information Security (BMIS) is a useful framework for articulating the levers that can be adjusted within a risk-transformation program.14 These levers include organizational design and strategy, people, process and technology and their interconnections, including governing, culture, enabling and support, emergence (or continuous improvement), human factors, and architecture (figure 2).

A risk transformation journey (figure 3) would then be to assess the current state of the risk-transformation program and decide which capabilities related to the BMIS levers require what degree of enhancement to transform each of the value shop activities.

Most organizations are focused on risk identification and rating, with half developing dashboards, fewer improving governance, and only a third addressing skills and culture.15

Figure 3

Governance, Organization and Enablement

Governance involves “evaluating” and “directing” the risk management plans, ensuring resources are used responsibly16 and “monitoring” the contribution of risk management in achieving the enterprise strategy.17 Risk and strategy are linked through risk appetite.18

The organizational design defines how the organization implements its strategy,19 including where final responsibility for risk management lies, what the mandate and value add of the risk function can be, and how the board of directors (BoD) influences risk-related decisions. It also defines the role, structure and staffing of the risk organization and various risk committees.20

Successfully transforming risk governance and risk organization requires direct BoD and executive management sponsorship and direct chief risk officer leadership.21 It also requires both defining the roles of various management levels within the risk process and strengthening and streamlining risk committee structures.22

Some questions to ask include:

  • How effective is the governance of risk management and where does it need to improve?
  • What risk factors are fundamental to the enterprise strategy?
  • What is the risk to the strategy and the risk of the strategy?

Governance is essential to the transformation of the risk value shop “problem finding” activity because it decides the accountability and triggers for changes in risk models and what human intervention is required within automated processes. Risk governance is also necessary to decide whether analytically determined risk needs to be cascaded upward and how data quality errors and model risk should be addressed.23

Current risk-decision structures and processes (the “choice” value shop activity) have developed organically without standardized process flows or a clearly defined end state, and they will need to be redesigned before automation can occur.24 The risk appetite in many organizations is not explicitly defined or used to determine a strategic approach to risk,25 so it will need to be defined and articulated.

The risk-appetite statement should include the board’s attitude to risk, the business and risk environment, and the organizational risk culture and value proposition for the risk function.26 The end state of the “choice” activity is risk integrated with the corporate strategy and business management weighing risk/return implications and potential risk trade-offs in their strategic and operational decisions.27

The role of a transformed risk function is to make business functions more self-sufficient and help embed risk management in regular operational processes.28 The governance oversight of this “execution” value shop activity is establishing risk within the functional model and operating plan (resources, budget, goals) for each business function (resources, budget, maturity goals) and mapping risk goals to their strategic business goals.29 Defining and enforcing an enterprise metrics framework that includes risk metrics is an important governance “control/evaluation” value shop activity. Challenges will exist in achieving consensus on the most important metrics to measure or standardize and how metrics relate to each other.30

To ensure the right people receive the right information and are empowered to make risk-aware decisions,31 policies, standards and guidelines must be designed and promulgated. These execution-enabling documents need to ensure roles and responsibilities are well articulated and both flexible to changing business objectives and easy to follow at all levels of the organization.32

Architecture, Process and Technology

Building the right technology and data architectures and the corresponding processes, tools and applications are key enablers for risk transformation,33 with the most cost-effective transformation measures being simplification, standardization and digitization.34 In terms of the risk value shop model, the main role of technology is to deliver the right information to the right people in a timely manner to identify and resolve risk-related issues and distill information in ways that help the right people predict, prevent, detect, manage and report the risk associated with decisions.35

Most risk reference architectures focus on the risk data flows and not the complete set of capabilities needed for risk transformation, including business activity management (BAM), business intelligence (BI), business process management (BPM), and governance, risk and compliance (GRC).

The author developed and has been working with the reference architecture shown in figure 4 for the past decade. The architecture addresses the BPM and GRC “reactive” capabilities needed for the “execute” and “evaluation” value shop activities and the well-architected BAM and BI “proactive” capabilities needed for “problem finding,” “problem solving” and “choice” activities.36

Figure 4

Many organizations are struggling with backward-looking technologies and processes that focus on their current risk profile rather than on identifying their optimal risk profile for the future. These organizations need deep insight into root causes, indirect effects and early warning signals based on new rating methodologies using unique and innovative data sources.37

Current processes and technologies for problem finding and problem solving that increase control measurability and risk responsiveness include:

  • Sensors and agents38 such as social media listening platforms, horizon scanning and early warning systems39
  • Integrated data warehouses40 and big data technologies such as Hadoop41
  • High-frequency reporting42 and continuous control monitoring43
  • Crowdsourcing risk information44
  • Visual data discovery, optical character recognition45 and natural language processing46
  • Scenario planning and stress testing47
  • Risk analytics and machine learning

Fast automated access to accurate data through a business activity management (BAM) platform and an integrated data warehouse are prerequisites for the strategic use of advanced analytics. A BAM platform with appropriate sensors and agents answers questions using a set of analysis techniques that include baseline, threshold monitoring, correlation, root cause, impact analysis and predictions.48

Continuous control monitoring allows testing on a full population and offers near “absolute assurance” as opposed to reasonable assurance using traditional audit and assurance methods.49 In addition to cost reductions through improved efficiency and effectiveness, other benefits of continuous control monitoring include increased test coverage (through greater sampling and the ability to do more with the same or less labor), improved timeliness of testing, reduced risk velocity, potentially reduced remediation cost, greater visibility (when included in a GRC solution), improved consistency and the ability to identify trends.50

Risk analytics is the use of mathematical methods and tools51 to facilitate the risk value shop activities. These tools have evolved from “what did happen” data warehouse reporting to “why something happened” online analytical processing (OLAP) tools. The tools now comprise “what will happen” machine learning and artificial intelligence (AI). The key elements of risk analytics today are high-frequency reporting based on high-quality data, risk analysis drilling down to detailed data, risk modeling and optimization to predict events, continuous monitoring, real-time alerting, and automated response mechanisms.52

Machine learning algorithms can be classified53 as shown in figure 5.

Figure 5

In figure 5, specific machine learning algorithms can be selected for further consideration, based on the purpose required. In the “problem finding” and “problem solving” value shop activities, analytics and machine learning can be used to:

  • Discover processes from logs54
  • Detect process inconsistencies between different groups or applications55
  • Perform rule-based checking (such as service level agreements [SLAs])56
  • Identify trends and make forecasts57
  • Predict the likelihood and effect of an event58
  • Classify data and build decision tree
  • Visualize data59
  • Discover key risk indicators (KRIs)60
  • Analyze stresses and scenarios61
  • Identify typical problems or common solutions62
  • Generate treatment options for the risk of action, inaction, overreaction and underreaction63

Current processes and technologies for the “choice” value shop activity include:

  • Machine learning (as described previously)
  • Simulation models64
  • Stochastic optimization models
  • AI
  • Business process management65

The benefit of analytical measures for decision-making is that they can remove the overconfidence and anchoring biases in manual decision-making.66

However, due to evolving understanding of what information should trigger action, the use of analytics for decision-making should also be iterative.67

As mentioned in the architecture discussion, the BI-provided awareness and analysis needs to be combined with the BPM to provide the business rules, process models and process orchestration needed to make decisions and execute them. BI then enhances BPM to make decisions more efficient68 and more repeatable, scalable, traceable and accurate.69

Current processes and technologies for the “execute” and “evaluate” value shop activities include:

  • Machine learning
  • BPM
  • Case management through an integrated GRC70

A majority of organizations have structured only part of their risk-reporting process and do not have predefined escalation mechanisms in place.71 An integrated GRC approach improves effectiveness by reducing complexity, facilitates standardization of processes and taxonomy, allows for the rationalization of controls, and enables a movement from tactical to strategic activities through automation.72

Automating controls reduces the cost of the control (resources, time and effort) and the cost of assurance, which leads to reduced risk through increased control effectiveness and coverage.73 An advanced stage of automation is “enterprise valuation control,”74 where business performance is assessed and process risk vs. value is calculated at near real time during process execution. Beyond this stage is an adaptive IT system that will allow a movement from “security by design” to an adaptive threat, security and risk model.75

In determining a risk-transformation road map, a number of technology implementation options exist,76 including:

  • Using a full-stack vendor and implementing technologies based on their road map—if the organization is prepared for potential lock-in
  • Picking a best-of-breed solution that includes BI, BPM, GRC and an application development platform—if the organization can invest in the necessary skills
  • Picking a BI platform only—if the organization has sufficient data management and integration tools and skills

People, Culture and Human Factors

A key challenge to risk transformation is developing an enterprisewide risk culture77 to increase risk awareness and accountability.78 However, most organizations are struggling with how to assess their culture and how to change it, let alone establishing the needed change teams, action owners and milestone for risk cultural change.79 Culture is a pattern of shared experiences; expected behaviors, beliefs, assumptions and attitudes; and written and unwritten ways of doing things. Culture is both emergent and learned, and it is created from both internal and external factors.80 Cultural change is most successful81 when it incorporates:

  • Role modeling and “accompaniment”
  • Developing talent and skills82
  • Creating “social capital”
  • Implementing formal mechanisms such as well-defined roles83 and KPIs

Social capital comprises three dimensions:84

  • Structural—Developing network ties where people trust each other and commit to shared activities
  • Cognitive—Establishing a shared taxonomy and evolving informal codes of practice
  • Relational—Identifying as a group with associated trust and obligations

To transform the risk value shop “problem solving” activity, analytical skills that span the organization85 need to be quickly developed in the already changing workforce.86 These skills include mining structured and unstructured data, identifying data risk scenarios, working with databases, applying statistical methods and advanced analytics, leveraging analytics in risk assessments, and visually presenting complex data analysis.87

The pooling of risk data is crucial to collecting statistically significant data for predictive models, and willing collaboration is needed to drive this sharing of data across all business lines.88 The creation of a “single view of risk” through collaboration will also enable risk and controls to be treated holistically, thereby increasing effectiveness and efficiency.89

Recruiting and nurturing talent with an innovative “test and learn” mind-set and creating a culture of innovation are also necessary to transform the risk value shop “problem solving” activity.90 Innovations may include tapping into gamification—that is, harnessing game-playing principles such as competition to motivate development of out-of-the-box risk treatment options,91 or harnessing the power of crowdsourcing by hosting operational analysis/risk analysis hackathons.92

The risk value shop “choice” activity includes determining and articulating the risk philosophy and risk appetite, setting risk objectives, and making decisions between alternatives. The required cultural change includes explicitly tasking business and technology process owners with both organizational objectives and risk management responsibilities and giving them a support infrastructure93 such as a community of practice (CoP) or center of excellence (CoE).94 These constructs require talent with critical-thinking skills and hands-on experience in technology, business and risk in order to act as a thought partner and guide strategic decisions.95

A center of excellence96 transfers best practices and learning derived from bottom-up benchmarking. A center of excellence has four key elements:

  • Authorization—Assisting in aligning resources with strategic objectives
  • Standards—Establishing standard tools, templates and methodologies
  • Education—Providing training and education to all concerned with risk management
  • Readiness—Establishing whether an organizational unit is ready to use the required methodologies

A role of the transformed central risk function (as CoE) in the “choice” activity is to cascade down (and explain) the risk-appetite statement, risk-approval delegations and risk-appetite measurement metrics. These metrics are risk, financial and operational indicators linking risk appetite and business performance at each level of the organization.97 A consistent and global application of risk management disciplines provides several benefits: greater insight into key risk drivers and indicators; increases in operational efficiency, service improvements and higher customer satisfaction; decreased risk exposures and improved strategic decision-making.98

One cognitive change that needs to occur to transform the risk culture around the “choice” activity is leading operational staff to see risk decisions as their own business decisions and not the responsibility of a central risk function.99 Another cognitive change is to have a forward-looking strategic approach (“What risk/return trade-offs need to be made in the coming year?”) rather than a backward-looking approach (“How did the organization perform over the last year?”).100

Emergence and Continuous Improvement

Risk transformation needs a dynamic interconnection between people and processes that will continuously develop and evolve101 through feedback loops, process-improvement initiatives and consideration of emerging issues in risk management.102 Some of these issues include:

  • Decreasing data reliability as data availability increases—creating risk from business decisions based on that data103
  • Investigating the potential for flawed or misused AI algorithms—creating risk from business decisions using those algorithms104
  • Expanding cyberthreat surface as AI systems replace more vital business functions105
  • Making the optimistic assumption that systems will identify and manage all risk—emerging risk may be overlooked106
  • Displacing roles due to risk automation107
  • Teaching skills needed to ensure data quality is understood and managed
  • Developing skills needed to ensure the appropriate and ethical application of automation and analytics108

Endnotes

1 Ray, B.; C. Apte; K. McAuliffe; L. Deleris; “Harnessing Uncertainty: The Future of Risk Analytics,” IBM Research Report, IBM T. J. Watson Research Center, 14 April 2008, http://domino.research.ibm.com/library/cyberdig.nsf/papers/B910FD442135744585257434005349F4
2 PricewaterhouseCoopers, “Risk in Review: Global Risk in the Information Age,” USA, 2013
3 PricewaterhouseCoopers, “Black Swans Turn Grey: The Transformation of Risk,” USA, January 2012, http://www.pwc.co.uk/assets/pdf/risk-practices-black-swans-turn-grey-the-transformation-of-the-risk-landscape.pdf
4 Ibid.
5 Deloitte, “Risk Transformation: Aligning Risk and the Pursuit of Shareholder Value,” USA, 2014, http://www2.deloitte.com/content/dam/Deloitte/global/Documents/Financial-Services/gx-fsi-us-grc-RiskTransformation-in-Financial-2013-10.pdf
6 Vohradsky, D.; “Towards a Single View of Risk,” TCS Bancs Magazine, 2011, http://www.scribd.com/document/325043567/BaNCS-Newsletter-12th-Edition-06-2011
7 Bevan, O.; S. Ganguly; P. Kaminski; C. Rezak; The Ghost in the Machine: Managing Technology Risk, McKinsey & Company, July 2016, http://www.mckinsey.com/business-functions/risk/our-insights/the-ghost-in-the-machine-managing-technology-risk
8 Cordery, C.; M. Woods; P. M. Collier; “Value Chain to Value Cycle: The Role of Risk Management and ICT,” SSRN Electronic Journal, August 2010, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1761661
9 Op cit Vohradsky
10 Accenture, “Managing Successful Finance and Risk Transformations in the Insurance Industry,” Accenture, 2014, http://www.accenture.com/t00010101T000000__w__/pl-pl/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Local/pl-pl/PDF/Accenture-Managing-Successful-Insurance.pdf
11 Op cit Vohradsky
12 Op cit Cordery et al.
13 Bongiovanni, C.; L. Pancaldi; U. Stegemann; G. Taglioni, Transforming Enterprise Risk Management for Value in the Insurance Industry, McKinsey & Company, July 2016, http://www.mckinsey.com/business-functions/risk/our-insights/transforming-enterprise-risk-management-for-value-in-the-insurance-industry
14 ISACA, Business Model for Information Security, USA, 2010, xhrj.yutb.net/Knowledge-Center/BMIS/Pages/Business-Model-for-Information-Security.aspx
15 Op cit PricewaterhouseCoopers, 2013
16 Op cit ISACA
17 Standards Australia, “AS 8015-2005: Australian Standard for Corporate Governance of Information and Communication Technology,” Standards Australia, 2005, http://www.standards.org.au/standards-catalogue/sa-snz/communication/it-030
18 Op cit PricewaterhouseCoopers, 2012
19 Op cit ISACA
20 McNish, R.; A. Schlosser; F. Selandari; U. Stegemann; J. Vorhoit; “Getting to ERM: A Roadmap for Banks and Other Financial Institutions,” McKinsey Working Papers on Risk, March 2013, http://www.mckinsey.com/business-functions/risk/our-insights/getting-to-erm-a-road-map-for-banks-and-other-financial-institutions
21 Op cit Bongiovanni et al.
22 Op cit McNish et al.
23 Op cit Ray et al.
24 Ganguly, S.; H. Harreis; B. Margolis; K. Rowshankish; Digital Risk: Transforming Risk Management for the 2020s, McKinsey & Company, February 2017, http://www.mckinsey.com/business-functions/risk/our-insights/digital-risk-transforming-risk-management-for-the-2020s
25 Op cit PricewaterhouseCoopers, 2012
26 Ibid.
27 Op cit Bongiovanni et al.
28 Economist Intelligence Unit, “Beyond Box Ticking: A New Era in Risk Governance,” The Economist, United Kingdom, 2009, http://graphics.eiu.com/marketing/pdf/Beyondboxticking.pdf
29 Pironti, J. P.; “Key Considerations When Evaluating ISRM Programs and Capabilities,” ISACA Journal, vol. 2, 2011, http://xhrj.yutb.net/archives
30 Bakshi, S.; “Performance Measurement Metrics for IT Governance,” ISACA Journal, vol. 6, 2016, http://xhrj.yutb.net/archives
31 Op cit Deloitte
32 Op cit ISACA
33 Op cit Ganguly et al.
34 Harle, P.; A. Havas; H. Samandari; The Future of Bank Risk Management, McKinsey & Company, July 2016, http://www.mckinsey.com/business-functions/risk/our-insights/the-future-of-bank-risk-management
35 Rosenfelder, S.; “Risk Analytics: A Journey in Risk Transformation,” presentation to the Institute of Business Analytics, Indiana University, Kelley School of Business, Indiana, USA, 8 October 2014
36 Op cit Pironti
37 Op cit McNish et al.
38 Op cit Rosser
39 Op cit PricewaterhouseCoopers (2013)
40 Ibid.
41 Kress, R.; D. Hildebrand; “How Analytics Will Transform Internal Audit,” ISACA Journal, vol. 2, 2017, http://xhrj.yutb.net/Journal/archives
42 Op cit Rosenfelder
43 Vohradsky, D.; “A Practical Approach to Continuous Control Monitoring,” ISACA Journal, vol. 2, 2015, http://xhrj.yutb.net/archives
44 Op cit Harle et al.
45 Raphael, J.; “Rethinking the Audit,” Journal of Accountancy, April 2017, http://www.journalofaccountancy.com/issues/2017/apr/rethinking-the-audit.html
46 Sood, A. K.; M. Rinehart; “Data Science as a Tool for Cloud Security: Cloud Generation Visibility, Detection and Protection,” ISACA Journal, vol. 4, 2016, http://xhrj.yutb.net/archives
47 Op cit PricewaterhouseCoopers (2014)
48 Op cit Bongiovanni et al.
49 Caron, F.; J. Vanthienen; “Applications of Business Process Analytics and Mining for Internal Control,” ISACA Journal, vol. 4, 2012, http://xhrj.yutb.net/Journal/archives
50 Op cit Vohradsky, 2015
51 Op cit Ray et al.
52 Op cit Rosenfelder
53 Brownlee, J.; “A Tour of Machine Learning Algorithms,” http://machinelearningmastery.com/a-tour-of-machine-learning-algorithms
54 Ferreira, D. R.; M. Mira da Silva; “Using Process Mining for ITIL Assessment: A Case Study With Incident Management,” Bournemouth University, Dorset, England, 2008, http://web.ist.utl.pt/diogo.ferreira/papers/ferreira08using.pdf
55 Op cit Caron and Vanthienen
56 Ibid.
57 Op cit Ferreira and Mira da Silva
58 Op cit Ray et al.
59 Op cit Caron and Vanthienen
60 Op cit Ray et al.
61 Op cit Rosenfelder
62 Op cit Ferreira and Mira da Silva
63 Op cit PricewaterhouseCoopers, 2013
64 Op cit Ray et al.
65 Op cit Rosser
66 Op cit Harle et al.
67 Op cit Rosser
68 Op cit Ganguly et al.
69 Op cit Rosser
70 Op cit Vohradsky, 2015
71 Op cit Bongiovanni et al.
72 Op cit Vohradsky, 2011
73 Dutta, A.; D. Dopp; “A Framework for Estimating ROI of Automated Internal Controls,” ISACA Journal, vol. 5, 2011, http://xhrj.yutb.net/archives
74 Op cit Rosser
75 Wohlgemuth, S.; “Resilience as a New Enforcement Model for IT Security Based on Usage Control,” IEEE Security and Privacy Workshops, 2014, http://ieeexplore.ieee.org/document/6957281
76 Op cit Rosser
77 Op cit Accenture
78 Op cit PricewaterhouseCoopers, 2012
79 Op cit McNish et al.
80 Op cit ISACA
81 Aiken, C.; G. Bhatnager; S. Kieler; J. Lavoie; J. Malan; M. Rennie; How Do I Create a Distinctive Performance Culture, McKinsey & Company, 2009
82 Op cit Accenture
83 Op cit Rosenfelder
84 Walker, D. H. T.; D. Christenson; “Knowledge Wisdom and Networks: A Project Management Centre of Excellence Example,” The Learning Organisation, 2005, http://pmcoe.ca/wp-content/uploads/2015/06/TLO-COE-Journal-Article.pdf
85 Op cit Raphael
86 Op cit PricewaterhouseCoopers, 2013
87 Op cit Raphael
88 Op cit Ray et al.
89 Op cit Vohradsky, 2011
90 Op cit Ganguly et al.
91 EY, “The Upside of Disruption: Megatrends Shaping 2016 and Beyond,” EYGM Ltd., 2017
92 Op cit Raphael
93 Op cit Deloitte
94 Op cit Walker and Christenson
95 Op cit Bevan et al.
96 Op cit Walker and Christenson
97 Op cit McNish et al.
98 Op cit Ray et al.
99 Op cit PricewaterhouseCoopers, 2012
100 Op cit McNish et al.
101 Op cit PricewaterhouseCoopers, 2012
102 Op cit ISACA
103 Op cit Ray et al.
104 Zongo, P.; “The Automation Conundrum,” ISACA Journal, vol. 1, 2017, http://xhrj.yutb.net/archives
105 Ibid.
106 Op cit Cordery et al.
107 Op cit Zongo
108 Op cit Harle et al.

David Vohradsky, CRISC, CISM, CGEIT, QSA
Is an independent IT governance, risk and security consultant and director of Cyberisk Australia, a boutique consultancy focused on supplier risk and security management. He has previously held senior‐level management and consulting positions with Protiviti, Commonwealth Bank of Australia, NSW State Government, Macquarie Bank and Tata Consultancy Services. Vohradsky is a director of the ISACA Sydney (New South Wales, Australia) Chapter and has previously held a number of ISACA committee and working group roles.