Strategic risk management
Risk management at Datatec is not viewed as a task that is performed in isolation. It is part of the day-to-day practices and staff at all levels are familiar with Datatec's risk policy. The Board is responsible for Datatec's strategy, leadership and decision-making which are all impacted by risk. Risk-based leadership is therefore fundamental to Datatec.
Board
- The Board determines the level of risk tolerance and limits of risk appetite are set as part of the strategic direction of the Group
- The Board is ultimately responsible for the governance of risk
ARCC
- Monitors risk management activities at the Group and subsidiary level on an ongoing basis
Group Chief Risk Officer
- Ensures that the risk management framework is operating effectively in the divisions
- Chairs bi-annual inter-divisional risk forum
Divisions - divisional boards and executive committees
- Regularly review strategic and emerging risks and identify and prioritise high-risk areas on risk maps based on impact and likelihood
- Analyse high-risk areas to identify potential root causes
- Identify mitigating controls and associated monitoring/ assurance activities for each high-risk area
Divisional chief risk officers
- Ensure divisional risk procedures are in accordance with and support the Group's risk management framework
- Oversee management's response to matters identified as requiring improvement
The Board is responsible for approving Datatec's risk appetite and when the risk tolerance is exceeded, it is management's responsibility to implement remedial action.
Datatec's aim is for the risk register to be a management tool driving the following two critical areas:
- Business-driven goals via strategic planning
- Compliance-driven goals via risk managers and internal audit
Risk-based leadership with the Board at its apex is fundamental to Datatec's approach to its operations. In line with the King IV Code, the Board governs risk in a way that supports the organisation in setting and achieving its strategic objectives.
Our risk management process
The Group's risk management process has three key steps:
How do we identify risks?
Our risks are identified as threats that can impact the Group's ability to deliver its objectives and its strategy. Our risks are regularly reviewed in the context of our operating environment.
How do we respond to our risks?
Our risks are assessed and prioritised. The relationship between the impact and likelihood of risks is recorded in risk registers. Key risk responses are identified and reviewed to ensure that our process continually improves and evolves.
Risk oversight
R I S K M A N A G E M E N T F R A M E W O R K
ORGANISATION
Datatec Board
POLICY AND PROCEDURES
Risk policy
Risk management procedures
DELIVERABLES
Risk registers
Risk maps
Assurance plans
ASSURANCE AND GUIDANCE
Internal audit
Organisation
Policy and procedures
Deliverables
Assurance and guidance
Our key risks
Key
- Technological market disruption
- Dependence on key vendors
- Internal technological risks - cyber security
- Risk of failure to fund working capital needs sufficiently
- Risk of overdependence on key personnel
As an ICT group with operations and activities across both established and emerging markets, we face challenging risks as well as numerous opportunities. The strategic objectives affected by each key risk are illustrated using our strategic objectives icons.
Datatec Group
| Key risk | Our strategic response | |
|
Technological market
disruption
|
||
| The Group’s operations focus on the higher-value, faster growing products and services in the ICT supply chain. It is essential to anticipate the impact of the rapid technological change including AI, which is a feature of the sector. |
|
|
|
Dependence on key
vendors
|
||
| The Group is dependent on certain vendors, particularly Cisco, whose products and services accounted for a significant proportion of the Group’s revenue. If any one of the Group’s principal vendors terminates, fails to renew or adversely changes its agreement or arrangements with the Group materially, it could significantly reduce the Group’s revenue and operating profit, and thereby seriously harm the Group’s business, financial condition and results of operations. |
|
|
|
Internal technological risks
– cyber security
|
||
| The Group’s internal systems are at risk, both from planned changes leading to business interruption and disruption by external “cyber” threats. The Group continued to face the threat of financial crime attempted by “phishing” emails, “social engineering” and ransomware attacks. The Group has high dependence on its key information systems. |
|
|
|
Risk of failure to fund working
capital needs sufficiently
|
||
| The Group’s business is working capital intensive; this is particularly relevant for Westcon International. Westcon International’s financing facilities are utilised to finance accounts receivable and inventories. The availability of these facilities and any material changes thereto may affect the business’s ability to fund its working capital requirements. |
|
|
|
Risk of overdependence on key
personnel
|
||
| The Group’s future success depends largely on the continued employment of its executive directors, senior management and key sales, technical and marketing personnel. Certain key employees have relationships with principal vendors and customers which are particularly important to the business of the Group. The executive directors, senior management team and key technical personnel would be difficult to replace and the loss of any of these key employees could harm the business and prospects of the Group. |
|
| Strategic objectives key | |||||||
| Improving shareholder returns | Business development | Enhancing competitiveness and profitability | Responsible business | ||||





