11:00 AM

UBS Finds Risk Management Stress Test Costly

UBS failed to stop a single rogue trader from racking up $2 billion in losses. Yet, some experts argue that banks overall may be better than others at managing risk.

What's the harm in having a risk management system in place, but ignoring the alarm bells when they seem inconvenient? No harm at all, if you don't mind seeing your quarterly net profit decline by 39%, and revenue slide by 4%.

Swiss banking giant UBS announced those results Tuesday, saying they reflected not only "market conditions," but also the recent "unauthorized trading incident" that resulted in its losing 1.8 billion Swiss francs ($2 billion). One piece of good news is that the actual losses were $300 million less than the bank had originally estimated.

UBS had discovered the unauthorized Delta One trades last month in its Global Synthetic Equity business and alerted London police. That same day, they arrested and later charged a 31-year-old trader, Kweku Adoboli, on suspicion of fraud and abuse of his position.

Delta One trades are a form of complex derivatives trading, and by all accounts, incredibly opaque. Interestingly, rogue trader Jerome Kerviel at Societe General in 2008 hid Delta One trades, ultimately resulting in losses of $7 billion. Accordingly, while Delta One trades might offer significant revenue potential, their potential for insider abuse--not least when traders get in over their heads and double down, seeking a quick fix for losses--should cause banks to carefully monitor such trades.

"Risk and operational systems did detect unauthorized or unexplained activity but this was not sufficiently investigated nor was appropriate action taken to ensure existing controls were enforced," UBS interim chief executive Sergio Ermotti told employees in a memo earlier this month. "We have accepted the resignations of the co-heads of Global Equities. Firm disciplinary action will be taken against further individuals in Equities and across other responsible functions. We have also taken specific steps to address the failures identified."

How did one of the world's biggest banks fail to heed the alarm bells, despite its former chief executive, Oswald Grubel--ousted over the unauthorized trading--having recently boasted that UBS had "one of the best" risk management programs in the business? "Having controls in place is one thing. Acting upon them is a different one," Martin Kuppinger, principal analyst at market researcher KuppingerCole, tells me. "That's why I strongly believe in automated controls which just can't be ignored that easily. But even that's about knowing risks, having controls in places, and the right processes and people."

Kuppinger, however, also cautions that until the full details of the UBS incident emerge--the bank has said it will release more details after the current investigation wraps--no one should jump to conclusions. "Without having proven details on what really happened and the reasons behind it, I won't blame UBS," he said.

Still, might UBS have been slow to rein in its massively profitable investment banking group's practices, especially given the firm's history of poor risk management oversight? "This story absolutely does suggest a deeper culture challenge," says Alexei Miller, executive VP at DataArt, a custom application development shop that builds risk management systems for financial services firms.

But, he says, no system, check, or balance--including governance, risk, and compliance (GRC) controls--is 100% foolproof. "The whole incident is not, in the end, about systems or controls or risk officer's power," says Miller. "No system will ever guarantee absolute protection. It is human behavior, first and foremost. A clever and well-connected bad apple will always find a way around risk controls. How many instances of unauthorized trading will we never learn about, because they go the trader's way?"

In the case of Societe Generale, Kerviel avoided detection for some time by using other people's passwords to subvert the access management system. He also bypassed the risk management system, based on his understanding of how it worked.

"Banks are still learning--not only from SocGen. But it's a process which takes its time. SocGen has alerted banks, and UBS added to this," says Kuppinger. Overall, banks are getting better at addressing risk management. "And honestly, they overall are much better than other industries," he says.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
10/27/2011 | 10:10:42 PM
re: UBS Finds Risk Management Stress Test Costly
"Having controls in place is one thing. Acting upon them is a different one." -- Good quote. An alarm is useless if it is ignored.
Brian Prince, InformationWeek contributor
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio