Operational Risk

Services

Operational Risk

Deloitte helps organizations transform the ways they leverage people, third-party relationships, technology, data, business processes, and controls to manage operational risks and elevate business performance. Developing integrated, strategically-aligned operational risk management solutions allow organizations to make optimized business decisions.

Our services

【Internal Audit (IA)】 We help transform internal audit functions by teaming with, or serving as, the internal audit function to make improvements in internal control and process efficiency and contribute to effective regulatory compliance. We provide input to established internal audit functions on their strategy and purpose, resourcing models, and technology.  

【Assurance】 We offer specialized information technology audit services to deliver risk and controls, audit analytics to extract insights from data, as well as third-party assurance to manage risks from the extended enterprise.

【Conduct Risk】 We help organizations assess and evolve the values, beliefs, tone, conduct, and understanding of risk culture to align with their strategy and business practices.

【Extended Enterprise Risk Management】We evaluate and manage third-party risk related to outsourcing, licensing, alliances, and other business partnerships across the organization to maximize business performance, streamline information technology and licensing costs, and optimize supply chains.

【Operational Risk & Transformation】We help clients transform the ways in which they leverage people, technology, data, business processes, and controls to address their operational risks and drive business performance. 

【Technology & Data Risk】We help clients transform their enterprise-wide technology and data management frameworks to improve decision-making at the senior stakeholder level.
 

Risk Advisory Leaders

Chia-han Wu

Chia-han Wu

Risk Advisory Leader

Mr. Chia-han Wu has Information Security Experiences for 14 Years. Expert in practical application and RD in computer network, information security, computer crime area, e-commerce, network security, ... More