Attacks/Breaches
10/25/2011
11:00 AM
50%
50%

UBS Finds Risk Management Stress Test Costly

UBS failed to stop a single rogue trader from racking up $2 billion in losses. Yet, some experts argue that banks overall may be better than others at managing risk.

What's the harm in having a risk management system in place, but ignoring the alarm bells when they seem inconvenient? No harm at all, if you don't mind seeing your quarterly net profit decline by 39%, and revenue slide by 4%.

Swiss banking giant UBS announced those results Tuesday, saying they reflected not only "market conditions," but also the recent "unauthorized trading incident" that resulted in its losing 1.8 billion Swiss francs ($2 billion). One piece of good news is that the actual losses were $300 million less than the bank had originally estimated.

UBS had discovered the unauthorized Delta One trades last month in its Global Synthetic Equity business and alerted London police. That same day, they arrested and later charged a 31-year-old trader, Kweku Adoboli, on suspicion of fraud and abuse of his position.

Delta One trades are a form of complex derivatives trading, and by all accounts, incredibly opaque. Interestingly, rogue trader Jerome Kerviel at Societe General in 2008 hid Delta One trades, ultimately resulting in losses of $7 billion. Accordingly, while Delta One trades might offer significant revenue potential, their potential for insider abuse--not least when traders get in over their heads and double down, seeking a quick fix for losses--should cause banks to carefully monitor such trades.

"Risk and operational systems did detect unauthorized or unexplained activity but this was not sufficiently investigated nor was appropriate action taken to ensure existing controls were enforced," UBS interim chief executive Sergio Ermotti told employees in a memo earlier this month. "We have accepted the resignations of the co-heads of Global Equities. Firm disciplinary action will be taken against further individuals in Equities and across other responsible functions. We have also taken specific steps to address the failures identified."

How did one of the world's biggest banks fail to heed the alarm bells, despite its former chief executive, Oswald Grubel--ousted over the unauthorized trading--having recently boasted that UBS had "one of the best" risk management programs in the business? "Having controls in place is one thing. Acting upon them is a different one," Martin Kuppinger, principal analyst at market researcher KuppingerCole, tells me. "That's why I strongly believe in automated controls which just can't be ignored that easily. But even that's about knowing risks, having controls in places, and the right processes and people."

Kuppinger, however, also cautions that until the full details of the UBS incident emerge--the bank has said it will release more details after the current investigation wraps--no one should jump to conclusions. "Without having proven details on what really happened and the reasons behind it, I won't blame UBS," he said.

Still, might UBS have been slow to rein in its massively profitable investment banking group's practices, especially given the firm's history of poor risk management oversight? "This story absolutely does suggest a deeper culture challenge," says Alexei Miller, executive VP at DataArt, a custom application development shop that builds risk management systems for financial services firms.

But, he says, no system, check, or balance--including governance, risk, and compliance (GRC) controls--is 100% foolproof. "The whole incident is not, in the end, about systems or controls or risk officer's power," says Miller. "No system will ever guarantee absolute protection. It is human behavior, first and foremost. A clever and well-connected bad apple will always find a way around risk controls. How many instances of unauthorized trading will we never learn about, because they go the trader's way?"

In the case of Societe Generale, Kerviel avoided detection for some time by using other people's passwords to subvert the access management system. He also bypassed the risk management system, based on his understanding of how it worked.

"Banks are still learning--not only from SocGen. But it's a process which takes its time. SocGen has alerted banks, and UBS added to this," says Kuppinger. Overall, banks are getting better at addressing risk management. "And honestly, they overall are much better than other industries," he says.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
10/27/2011 | 10:10:42 PM
re: UBS Finds Risk Management Stress Test Costly
"Having controls in place is one thing. Acting upon them is a different one." -- Good quote. An alarm is useless if it is ignored.
Brian Prince, InformationWeek contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1449
Published: 2014-12-25
The Maxthon Cloud Browser application before 4.1.6.2000 for Android allows remote attackers to spoof the address bar via crafted JavaScript code that uses the history API.

CVE-2014-2217
Published: 2014-12-25
Absolute path traversal vulnerability in the RadAsyncUpload control in the RadControls in Telerik UI for ASP.NET AJAX before Q3 2012 SP2 allows remote attackers to write to arbitrary files, and consequently execute arbitrary code, via a full pathname in the UploadID metadata value.

CVE-2014-3971
Published: 2014-12-25
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.

CVE-2014-7193
Published: 2014-12-25
The Crumb plugin before 3.0.0 for Node.js does not properly restrict token access in situations where a hapi route handler has CORS enabled, which allows remote attackers to obtain sensitive information, and potentially obtain the ability to spoof requests to non-CORS routes, via a crafted web site ...

CVE-2014-7300
Published: 2014-12-25
GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.