top of page

SEARCH

Find what you need

111 results found for "Golden Thread"

  • Bow Tie Template

    Both threats and opportunities are supported. Now you can prepare your defenses against threats and your attacks on opportunities.

  • The Effects of a Divided Brain on Risk and Compliance

    However, others will be proactive to anticipate, plan, and act to respond to new threats and opportunities Two Types of Risk McGilchrist's two hemisphere model also helps to understand how we contend with threats Risk as Threat: A Left-Brain Perspective Threats are typically associated with negative outcomes, potential It excels at identifying patterns, calculating probabilities, and developing strategies to mitigate threats Management Programs However, we also need to contend with emerging and new threats and opportunities.

  • Are Your Risk Measures Valid?

    basic level, the bow-tie diagram (simplified above) is used to visualize a risk path initiated by a threat It must have the capability on its own to completely terminate a threat sequence. Threat : A possible initiating event that can result in a loss of control or containment of a hazard Independent - Barriers should be independent of the threat and of other barriers on that pathway. For example, if the threat was loss of power and a barrier requires power to operate, then that would

  • Fighting the AI Dragon of Uncertainty

    answer all our questions, help us cure cancer, solve poverty, climate change, and all other existential threats And there are still others who believe AI is the existential threat that will end us and the world as

  • When The Internet Is The Hazard

    The opportunities are still high but so are are the threats. When it comes to the internet threats are not a probability that may or may not happen. Threats are a certainty and continuous. Threats are a certainty and continuous. That is why safeguarding against continuous threats is the priority for those operating on-line. This means establishing and managing barriers of defence, safeguards, and other measures that prevent threats

  • The Effects of Cyber Risk on Compliance Programs

    This should increase the level of concern as to an organization's ability to operate safety should a threat Threats like those similar to the WanaCry worm could disrupt an organization's ability to: Shutdown

  • Proceed, but Proceed with Caution

    Some will go as far as claiming that AI creates no threat to humans or the world we live in.

  • Improving the Probability of Mission Success Using LEAN

    However, the unifying thread across all these endeavours is the pervasive presence of uncertainty.

  • Compliance Improvement Spiral

    Improvement is characterized by closing of gaps, reduction in variation, and ameliorating threats on

  • Value Creation Through Integration

    Management traditionally handles common variation, while risk and compliance functions address specialized threats facilitates appropriate trade-offs between opportunities to improve margins and measures to contend with threats

  • If Compliance Was Like Star Trek

    lines SHIELDS (resiliency, integrity, margin, safety, etc) - protect organization and staff against threats in case of emergency TACTICAL (risk and compliance measures) - defend crew and organization against threats ALERT STATUS (change management) - adapt to changes in objectives, terrain, threat levels. (Gemba, investigations) - first contact, reconnaissance LONG RANGE SENSORS (leading indicators) - threat

  • Navigating Modern Risk: Embracing Uncertainty as the Key to Success

    Traditionally, risk management was synonymous with damage control – identifying potential threats and Risks Uncertainty can manifest in both positive and negative ways, leading to either opportunities or threats organizations rely on margins, insurance and contingency reserves to buffer against potential losses (threats

bottom of page