About Henriette van Wijnen

This author has not yet filled in any details.
So far Henriette van Wijnen has created 98 blog entries.
23 05, 2019

ISO 31000 blog series – Risk evaluation

2019-05-24T16:29:59+02:00Blog|

In the past blogs, we covered how to set the scope, identify major risks and analyze them using the bowtie methodology. In this edition, our focus is on evaluating the risk which was analyzed previously. It is possible to evaluate risks in different ways, divided into two categories, the qualitative and the quantitative way. Using [...]

13 05, 2019

A Mining Guest Blog Series by Jim Joy – Part 8: Identifying critical controls

2019-05-13T15:50:31+02:00Blog|

The 9-step Critical Control Management (CCM) process was shown in the last article with a discussion about the need to establish quality Control-Based Risk Management (CBRM) for priority unwanted events (step 3) before moving to CCM. This article will continue with the CCM process, presenting a variety of approaches to selecting potential critical controls (step [...]

9 05, 2019

LNER using bowtie to plan for contingency

2019-05-09T11:30:21+02:00News|

The London North Eastern Railway, formerly known as Virgin Trains East Coast, developed a bowtie to be used as both a risk assessment and a project plan. In case of a strike, the company has two weeks to organize contingency operations. Using the bowtie ensures the operations are just as safe as during normal operations. [...]

7 05, 2019

ISO 31000 blog series – Which factors should you consider during risk analysis?

2019-05-07T12:19:57+02:00Blog|

In our last blog, we briefly mentioned ISO 31000 guidelines on risk analysis and then introduced the bowtie methodology. In this week’s blog, we will explore this in more detail using the bowtie methodology. According to the ISO 31000 guideline, you should consider multiple factors during the risk analysis phase. As the International Organization of [...]

25 04, 2019

ISO 31000 blog series – Risk analysis

2019-04-25T11:40:37+02:00Blog|

In our previous blogs, we talked about risk identification. Walking through this process, you end up with a large list of potential incidents scenarios, in other words: a risk register. A question we often get is: “Do we need to make a bowtie for every risk identified?” Well, the answer is no. ISO 31000 recommends [...]

24 04, 2019

Bowtie activity increasing in Brazil

2019-04-26T15:21:26+02:00BowtieXP, News|

In the past few years, CGE and its partners have organized workshops in Brazil to demonstrate how the bowtie methodology can help organizations improve their risk management. Currently, more and more people in this region are interested in applying the bowtie method, to manage their organizational risks. To further support current bowtie activity in Brazil, [...]

16 04, 2019

ISO 31000 Blog Series – Risk identification in BowTieServer

2019-04-16T13:59:47+02:00Blog, BowTieServer, Software functionality blog|

In our last blog, we discussed how the risk identification phase looks like according to ISO 31000. One thing we noted is “The bowtie is not a specialized hazard identification method” which is true, but we do offer a risk or hazard identification tool in our BowTieServer tool. How to identify risk in BowTieServer The [...]

9 04, 2019

A Mining Guest Blog Series by Jim Joy – Part 7: Overview of critical control management and a few of its challenges

2019-04-11T13:05:17+02:00Blog, Mining|

Welcome to the 7th article in the series covering Operational Risk Management (ORM) in the mining industry. Earlier articles attempted to set a foundation of terms and concepts to help understand the ORM journey, as well as to help a site identify its current position on the journey. Figure 1: The operational risk management journey [...]

4 04, 2019

ISO 31000 Blog Series – Risk identification

2019-04-04T13:29:53+02:00Blog|

According to ISO 31010 “Risk identification is the process of finding, recognizing and recording risks.” Risk (or hazard) identification is a structured process to identify and assess the risks we are dealing with on a day-to-day operation. We assess the risks they pose to people, the environment, assets or reputation. Once these risks have been [...]