Blog archive2018-02-20T17:08:52+02:00

Learn about us and why we believe in barrier based risk management

The leading provider in barrier based risk management solutions

ISO 31000 blog series – Risk evaluation

In the past blogs, we covered how to set the scope, identify major risks and analyze them using the bowtie methodology. In this edition, our focus is on evaluating the risk which was analyzed previously. It is possible to evaluate risks in different ways, divided into two categories, the qualitative and the quantitative way. Using the quantitative way, the focus is set on numbers and data-driven values which are for example based on manufacturer specifications, historical data or any other reliable source, while qualitative data is driven by expert judgments [...]

May 23rd, 2019|Blog|

A Mining Guest Blog Series by Jim Joy – Part 8: Identifying critical controls

The 9-step Critical Control Management (CCM) process was shown in the last article with a discussion about the need to establish quality Control-Based Risk Management (CBRM) for priority unwanted events (step 3) before moving to CCM. This article will continue with the CCM process, presenting a variety of approaches to selecting potential critical controls (step 4). Defining CCM and critical control The 2015 ICMM guide defines CCM and critical control as follows: Critical Control Management (CCM) – a process of managing the risk of material (or priority) unwanted events that [...]

May 13th, 2019|Blog|

ISO 31000 blog series – Which factors should you consider during risk analysis?

In our last blog, we briefly mentioned ISO 31000 guidelines on risk analysis and then introduced the bowtie methodology. In this week’s blog, we will explore this in more detail using the bowtie methodology. According to the ISO 31000 guideline, you should consider multiple factors during the risk analysis phase. As the International Organization of Standardization states: "Risk analysis should consider factors such as”: 1 - The likelihood of events and consequences Although the bowtie method is more qualitative at its core, it is also possible to add quantitative data [...]

May 7th, 2019|Blog|

ISO 31000 blog series – Risk analysis

In our previous blogs, we talked about risk identification. Walking through this process, you end up with a large list of potential incidents scenarios, in other words: a risk register. A question we often get is: “Do we need to make a bowtie for every risk identified?” Well, the answer is no. ISO 31000 recommends taking the high-risk scenarios from the risk register, i.e. major hazards or occupational hazards. If you don’t know where to start or if there are still a lot of high risks; make a top 10. [...]

April 25th, 2019|Blog|

ISO 31000 Blog Series – Risk identification in BowTieServer

In our last blog, we discussed how the risk identification phase looks like according to ISO 31000. One thing we noted is “The bowtie is not a specialized hazard identification method” which is true, but we do offer a risk or hazard identification tool in our BowTieServer tool. How to identify risk in BowTieServer The HAZID Module in BowTieServer guides you through the steps: 1 - Start a new session and fill in the details about this HAZID session 2 - Add a new hazard In this step, you identify [...]

Learn more

About us

CGE news