This learner guide summarises the main ideas, activities, and applied tasks for this session. Use it during class and for post-session review.
· Evaluate how technology dependency changes the operational-risk profile of an organisation.
· Explain the operational-risk implications of cyber events, data-quality issues, and model use.
· Assess outsourcing and critical third-party relationships as sources of concentration, dependency, and control risk.
· Differentiate between primary exposure, control weakness, and downstream business impact in technology and third-party settings.
· Prepare an initial risk view for a technology- and vendor-dependent operating model.
· Technology, data, models, and vendors are connected operational-risk exposures, not isolated topics.
· A dependency is most important when several critical services rely on it.
· Operational-risk evaluation should focus on implications for service, control, customers, and resilience.