18 06, 2019

ISO 31000 blog series – Risk treatment

2019-06-18T13:24:35+02:00Blog|

This week’s blog is on Risk Treatment. It is an important step in completing the Plan-Do-Check-Act cycle for continuous quality improvement. Much like a doctor and her patient, before we can treat our operations, we need to diagnose what the problem is and where our treatment should be applied. Once the cure has been diagnosed, [...]

13 06, 2019

A Mining Guest Blog Series by Jim Joy – Part 9: Considering ‘acts’ as critical controls and the challenge of their measurability

2019-06-13T11:08:07+02:00Blog|

Welcome to the 9th article in the series. Article 8 overviewed the selection of critical controls, hopefully generating some thoughts about setting company or site objectives for moving to CCM, as well as considering the concept of ‘indicativeness’ as a potential critical control requirement. Critical control? This article will continue with the critical control selection [...]

4 06, 2019

ISO 31000 blog series – Risk evaluation with BowTieXP

2019-06-04T10:29:06+02:00Blog, BowtieXP, Software, Software functionality blog|

Two ways to evaluate your risk How do you evaluate risk? In this blog, we describe two functionalities that will help you to evaluate your risks and to see the strengths and weaknesses of your processes. The previous blog describes different approaches to evaluate risk, namely the qualitative way and quantitative way. In this part [...]

23 05, 2019

ISO 31000 blog series – Risk evaluation

2019-05-24T16:29:59+02:00Blog|

In the past blogs, we covered how to set the scope, identify major risks and analyze them using the bowtie methodology. In this edition, our focus is on evaluating the risk which was analyzed previously. It is possible to evaluate risks in different ways, divided into two categories, the qualitative and the quantitative way. Using [...]

13 05, 2019

A Mining Guest Blog Series by Jim Joy – Part 8: Identifying critical controls

2019-05-13T15:50:31+02:00Blog|

The 9-step Critical Control Management (CCM) process was shown in the last article with a discussion about the need to establish quality Control-Based Risk Management (CBRM) for priority unwanted events (step 3) before moving to CCM. This article will continue with the CCM process, presenting a variety of approaches to selecting potential critical controls (step [...]

7 05, 2019

ISO 31000 blog series – Which factors should you consider during risk analysis?

2019-05-07T12:19:57+02:00Blog|

In our last blog, we briefly mentioned ISO 31000 guidelines on risk analysis and then introduced the bowtie methodology. In this week’s blog, we will explore this in more detail using the bowtie methodology. According to the ISO 31000 guideline, you should consider multiple factors during the risk analysis phase. As the International Organization of [...]

25 04, 2019

ISO 31000 blog series – Risk analysis

2019-04-25T11:40:37+02:00Blog|

In our previous blogs, we talked about risk identification. Walking through this process, you end up with a large list of potential incidents scenarios, in other words: a risk register. A question we often get is: “Do we need to make a bowtie for every risk identified?” Well, the answer is no. ISO 31000 recommends [...]

16 04, 2019

ISO 31000 Blog Series – Risk identification in BowTieServer

2019-04-16T13:59:47+02:00Blog, BowTieServer, Software functionality blog|

In our last blog, we discussed how the risk identification phase looks like according to ISO 31000. One thing we noted is “The bowtie is not a specialized hazard identification method” which is true, but we do offer a risk or hazard identification tool in our BowTieServer tool. How to identify risk in BowTieServer The [...]

9 04, 2019

A Mining Guest Blog Series by Jim Joy – Part 7: Overview of critical control management and a few of its challenges

2019-04-11T13:05:17+02:00Blog, Mining|

Welcome to the 7th article in the series covering Operational Risk Management (ORM) in the mining industry. Earlier articles attempted to set a foundation of terms and concepts to help understand the ORM journey, as well as to help a site identify its current position on the journey. Figure 1: The operational risk management journey [...]

4 04, 2019

ISO 31000 Blog Series – Risk identification

2019-04-04T13:29:53+02:00Blog|

According to ISO 31010 “Risk identification is the process of finding, recognizing and recording risks.” Risk (or hazard) identification is a structured process to identify and assess the risks we are dealing with on a day-to-day operation. We assess the risks they pose to people, the environment, assets or reputation. Once these risks have been [...]