In May 2023, the Clop ransomware group exploited a zero-day vulnerability in Progress Software's MOVEit transfer application. The breach ultimately affected more than 2,500 organizations worldwide, with estimated losses reaching $9.93 billion by October 2023. Among those impacted: Deutsche Bank, ING, Postbank, and Comdirect – all major European banks that used the same third-party vendor, Majorel, for account switching services.
The incident exposed a fundamental flaw in how organizations approach risk appetite. The Majorel compromise triggered cyber, operational, and reputational risk simultaneously. Traditional siloed appetite statements prove meaningless when confronted with cascading, interconnected exposures.
This is the integration challenge that Basel II inadvertently created. The 2004 regulatory framework established three pillars that explicitly separated credit risk, market risk, and operational risk as distinct categories requiring separate capital calculations.
Astrid Yee-Sobraques
Organizations built risk appetite frameworks that mirrored this structure because regulatory requirements and organizational charts made silos the path of least resistance. Yet, Basel’s own Pillar 2 – the forward-looking, supervisory review – explicitly demands the integrated horizontal analysis that the Pillar 1-based, siloed appetite statements simply cannot deliver.
The result: Risk appetite statements that look operationally precise but prove strategically unhelpful. “Zero tolerance for cyber incidents” or “moderate appetite for operational disruptions” or “low appetite for reputational risk” fail to guide strategic decisions when interconnected risks trigger simultaneously. Separate appetite statements for each risk type ignore the correlations that define how risks materialize.
Enterprise risk appetite must reflect a fundamental reality: Risks do not occur in isolation. Attempting to govern interconnected exposures through separate statements for each risk type misses how modern enterprises face loss events – through cascading scenarios that cross organizational and regulatory boundaries.
The alternative is horizontal risk appetite: identifying the organization’s top enterprise risk scenarios, quantifying the integrated exposure across all risk types within each scenario, and setting appetite thresholds that govern the complete cascade – not its standalone components.
Consider what an integrated risk appetite framework would have revealed for the European banks affected by MOVEit. A “shared critical vendor compromise” scenario would have quantified:
This represents the type of integrated analysis that scenario planning should reveal. Rigorous scenario quantification requires granular inputs: specific data types at risk, affected customer populations, operational recovery timelines, and attack vector characteristics. The four European banks knew they used Majorel to process sensitive customer data.
A hypothetical enterprise risk appetite statement for a MOVEit-like scenario would read: “We accept up to $50 million in integrated losses – including cyber response, regulatory penalties, operational disruption, and estimated customer attrition impacts – from any single critical vendor compromise, provided critical operations are restored within 10 business days.”
This statement does three things traditional siloed statements cannot:
First, it establishes an integrated threshold that accounts for cascading impacts across risk types. The $50 million limit governs the combined cyber, operational, regulatory, and reputational exposure – not separate limits that create false precision.
Second, it includes operational recovery and strategic impact constraints that force scenario testing. A vendor breach that costs $45 million but takes six months to resolve exceeds appetite, even though it’s under the financial threshold. The statement creates testable parameters.
Third, it enables capacity consumption analysis – the mechanism that makes risk appetite operational rather than aspirational.
Capacity consumption operates as both an individual scenario metric and a portfolio view. While each scenario is tested against its specific appetite threshold, the organization must also monitor cumulative capacity consumption across all material scenarios within a rolling 12-month period to ensure aggregate resilience.
Each scenario consumes a percentage of total capacity based on its estimated exposure:
Any scenario exceeding 100% capacity consumption, as the shared critical vendor and cloud outage scenarios clearly do, immediately signals that the organization’s current risk posture exceeds board-approved tolerances and requires a strategic decision: reduce the exposure through mitigation or formally accept residual risk outside appetite.
The board’s role is to ensure the organization operates within explicitly approved risk tolerances while pursuing strategic objectives. Enterprise risk appetite statements create the framework for that governance, but only if they force real decisions.
Board conversations should center on managing risk within risk appetite given strategic priorities. This requires three elements:
For banks operating under Basel III capital constraints, horizontal risk appetite operates above the regulatory capital solvency floor. Risk appetite statements govern strategic tolerance for integrated loss events within the capital buffer above regulatory minimums, exactly the type of forward-looking, judgment-based assessment that Pillar 2 supervisory review demands.
Enterprise risk management has long promised integration but often delivered compilation – collecting siloed risk assessments and presenting them together without addressing how they interact. Risk appetite statements inherited this fragmentation, creating the illusion of governance without the substance.
The shift to horizontal, capacity-tested risk appetite is the governance mechanism that makes measurement frameworks operational. Without appetite statements that reflect how risks cascade, organizations govern in theory but not in practice.
Astrid Yee-Sobraques, FRM, CISSP, is a senior risk executive in Enterprise Risk Management, Operational Resilience and Cybersecurity. Over 25 years at GE Capital, AIG, Citibank, and PwC, she specializes in "risk connectivity” – integrating people, processes, and data to strengthen how organizations anticipate, manage, and respond to cascading financial, operational, and compliance risks. Astrid serves on GARP’s New York Chapter Advisory Committee. She can be reached at Astrid@therisksherpa.com.