About Daphne de Groot

This author has not yet filled in any details.
So far Daphne de Groot has created 38 blog entries.
10 05, 2017

Succesful Workshop in Asturias


On the 9th of May 2017, Tema Litoclean, IQPA and CGE organized a Barrier Management workshop in Asturias. The workshop was hosted by the safety and rescue services department of Asturias (SEPA). About 40 people attended this workshop, working for many different organizations, including Arcelor Mittal, Glencore, DuPont and Bayer. The workshop included different presentations [...]

2 05, 2017

Bowtie pilot at Shaikh Khalifa Medical City


We are pleased to work together with one of the greatest hospitals in the UAE Shaikh Khalifa Medical City (SKMC) in Abu Dhabi to share knowledge by running a pilot* in the coming period. The objective of this pilot is to integrate the bowtie methodology into the clinical risk management process, to improve patient safety [...]

1 05, 2017

We zoeken nieuwe collega’s!


We zijn op zoek naar nieuw talent voor sales en product management. Wegens uitbreiding van ons team zijn wij opzoek naar accountmanagers en product managers. Bekijk de vacature van accountmanager Bekijk de vacature van productmanager    

25 04, 2017

CGE Innovation Center officially opened


On Friday 21 April 2017 the CGE Innovation Center was officially opened during a festive afternoon. The Innovation Center has been established to facilitate CGE's efforts to share knowledge and best practices in barrier based risk management. During the opening, Victor Roggeveen and Berend Brinkhuis from BAM Infra presented their thoughts about barrier based Risk Management. [...]

19 04, 2017

Managing Cyber Security Risks using Bowties

2017-07-04T09:43:09+02:00Blog, BowtieXP, IT|

Co-written by Peter Moar - IO4U Nowadays an increasing number of companies are becoming dependent upon their IT-Systems. A large number of processes are being computerized and stored information becomes more important every day. Automation, therefore, has become crucial for most companies. The reliability, security, controllability, and availability of IT is getting business critical [...]

5 11, 2016

Barrier Benefit Analysis

2017-08-04T14:12:40+02:00Blog, Quantification|

  Some of the most asked questions about risk management are "how do we know whether we save money by controlling and mitigating our risks?" and "does adding more barriers still add significant value to our risk reduction?" The bowtie cost-benefit analysis automatically calculates how much money you are expected to save by implementing a [...]

5 11, 2016

General Data Protection Regulation

2017-07-05T11:36:09+02:00Blog, Compliance, Cyber security|

Introduction This overview highlights the key themes of the General Data Protection Regulation (GDPR) to help organizations understand the new legal framework in the EU. Relevance Data Protection is a topic that can be analyzed from a risk perspective using the BowTie method. Our partner P@ssport offers training courses for Data Protection Officers Who does [...]

22 07, 2016

Common Cyber Attacks – Reducing the impact, Governance and the state of it now

2017-08-04T13:45:23+02:00Articles & Reports, Blog, Compliance, Cyber security, IT|

Guestblog - Peter Rus, Enterprise Architect for Passport The first country in the world that has implemented laws and not directives concerning protecting critical infrastructure were the United Arab Emirates. We in the Netherlands already have the Bill on Notification of data leaks (Wetsvoorstel Meldplicht datalekken en uitbreiding bestuurlijke boetebevoegdheid Cbp, the Bill). The Bill introduces a duty [...]

22 04, 2016

IOGP Report 415: Standardization of Barrier Definitions

2017-08-03T13:42:38+02:00Articles & Reports, Blog, BowtieXP|

The concept of barrier thinking in risk management is well understood. However, in practice, the term ‘barrier’ is used in different ways and at different levels of detail, which makes it difficult to consistently link event or incident causes with necessary improvements in controls. This report standardizes the types and categories of process safety barriers. [...]