Blog archive2018-02-20T17:08:52+02:00

Learn about us and why we believe in barrier based risk management

The leading provider in barrier based risk management solutions

ISO 31000 blog series – Recording and reporting

Having walked through the previous ISO 31000 steps, we now come to the “Recording and Reporting” step. Recording is about recording information in a risk register so that this information can then be reported to decision-makers. In a sense this is what the bowtie does best – it records risks which can then be reported more effectively to stakeholders. But perhaps a more traditional risk register is required. In this blog we will look at the different ways in which BowTieXP supports recording your risk register and reporting that information. [...]

July 11th, 2019|Blog|

CHASE – Visualizing cyber security vulnerabilities using bowties

Guest blog by David Hatch from Process Safety Integrity Hazards 29 is Europe’s leading process safety forum. At this year’s event, industry expert Andy Geddes and CGE Partner David Hatch from Process Safety Integrity presented their new CHASE concept. Their work has developed a practical methodology for Computer Hazard And Security Evaluation. You can't defend what you don't understand Cyber security is a major concern across all industries with the threat of data theft or corruption, disabled functionality such as denial of service or ransomed ware, or spurious protection activation. [...]

July 4th, 2019|Blog, Cyber security|

ISO 31000 blog series – Risk treatment

This week’s blog is on Risk Treatment. It is an important step in completing the Plan-Do-Check-Act cycle for continuous quality improvement. Much like a doctor and her patient, before we can treat our operations, we need to diagnose what the problem is and where our treatment should be applied. Once the cure has been diagnosed, the doctor can set out a plan of action for effective treatment to nurses, supportive staff and keep administrative tabs. Once those actors come into play, the treatment needs to be evaluated regularly to see [...]

June 18th, 2019|Blog|

A Mining Guest Blog Series by Jim Joy – Part 9: Considering ‘acts’ as critical controls and the challenge of their measurability

Welcome to the 9th article in the series. Article 8 overviewed the selection of critical controls, hopefully generating some thoughts about setting company or site objectives for moving to CCM, as well as considering the concept of ‘indicativeness’ as a potential critical control requirement. Critical control? This article will continue with the critical control selection topic by expanding on the measurability and indicativeness of control acts that might be potential critical controls. As mentioned previously, acts are one type of control along with objects and technological systems (see article 3 [...]

June 13th, 2019|Blog|

ISO 31000 blog series – Risk evaluation with BowTieXP

Two ways to evaluate your risk How do you evaluate risk? In this blog, we describe two functionalities that will help you to evaluate your risks and to see the strengths and weaknesses of your processes. The previous blog describes different approaches to evaluate risk, namely the qualitative way and quantitative way. In this part of the series, we will show you how to do a qualitative risk evaluation in two ways using BowTieXP. The two ways that help you to create a clearer picture and evaluate the risks are: [...]

June 4th, 2019|Blog, BowtieXP, Software, Software functionality blog|

Learn more

About us

CGE news