25 04, 2019

ISO 31000 blog series – Risk analysis

2019-04-25T11:40:37+02:00Blog|

In our previous blogs, we talked about risk identification. Walking through this process, you end up with a large list of potential incidents scenarios, in other words: a risk register. A question we often get is: “Do we need to make a bowtie for every risk identified?” Well, the answer is no. ISO 31000 recommends [...]

16 04, 2019

ISO 31000 Blog Series – Risk identification in BowTieServer

2019-04-16T13:59:47+02:00Blog, BowTieServer, Software functionality blog|

In our last blog, we discussed how the risk identification phase looks like according to ISO 31000. One thing we noted is “The bowtie is not a specialized hazard identification method” which is true, but we do offer a risk or hazard identification tool in our BowTieServer tool. How to identify risk in BowTieServer The [...]

9 04, 2019

A Mining Guest Blog Series by Jim Joy – Part 7: Overview of critical control management and a few of its challenges

2019-04-11T13:05:17+02:00Blog, Mining|

Welcome to the 7th article in the series covering Operational Risk Management (ORM) in the mining industry. Earlier articles attempted to set a foundation of terms and concepts to help understand the ORM journey, as well as to help a site identify its current position on the journey. Figure 1: The operational risk management journey [...]

4 04, 2019

ISO 31000 Blog Series – Risk identification

2019-04-04T13:29:53+02:00Blog|

According to ISO 31010 “Risk identification is the process of finding, recognizing and recording risks.” Risk (or hazard) identification is a structured process to identify and assess the risks we are dealing with on a day-to-day operation. We assess the risks they pose to people, the environment, assets or reputation. Once these risks have been [...]

14 03, 2019

ISO 31000 Blog Series – A complete guide through the risk management standard using the CGE software portfolio

2019-04-04T11:55:04+02:00Blog|

Some organizations want to manage risk because they want to create safe working conditions for their employees or because they want to be good for the environment. Other organizations manage risk because accidents are often more expensive than being proactively safe or simply because they want to comply with certain regulations or standards and perhaps [...]

4 03, 2019

PHA Visualization converts Belief & Faith to Knowledge

2019-03-05T09:53:46+02:00Blog|

Guest blog by David Hatch from Process Safety Integrity The outputs from PHA/HAZOP studies are stale, static and forgettable. The passage of time quickly erodes the memories of those who contributed, and those who did not attend but have to manage the risks are unlikely to correctly & consistently interpret the findings from masses of [...]

11 02, 2019

Big Data text analysis for BowTies

2019-02-11T14:14:16+02:00Blog|

Guest blog by Prof. Coen van Gulijk from University of Huddersfield How to extract in-depth learning from 200,000 reports per year? Big data text analysis for BowTies. Dealing with vast numbers of text-based safety records One of the challenges for safety managers is dealing with vast amounts of data. Especially when it comes to near-miss reporting [...]

7 02, 2019

3 pillars to define barrier effectiveness

2019-02-07T10:39:50+02:00Blog|

Many bowtie creators are struggling to find out what makes a barrier effective. The barriers are mapped in a bowtie, but how are they performing in the real world? Barrier effectiveness is often defined based on expert judgment and historical experiences. In this blog, we provide other insights into barrier effectiveness by describing 3 pillars [...]