SEARCH
Find what you need
111 results found for "Golden Thread"
- Taming the Dragon of Uncertainty
Until the threat arrives we have time to improve our vision to understand its nature and devise strategies Most threats are a manifestation of uncertainty which is the root cause of risk (ISO 31000). However, threats often will not be limited to either one but will consist of all forms of uncertainty When risk behaves mostly like aleatory uncertainty (random, chaotic, complex): Assume the threat is As our knowledge of the threat increases and effectiveness of risk measures is better understood our
- Risk Blindness: A Failure in Risk Perception
We were discussing operational threats stemming from a reorganization , something particularly critical Different domains have their own risk vocabularies, often leaving broader threats unseen.
- RISK: Losing Your Social License
Threats Companies may find after a significant incident has occurred that regaining their social license The stronger a company's legitimacy the more resilient it is to threats against their social license. culture, etc.) by the organization to achieve the desired outcomes Identify and evaluate risks (both threats
- What Do We Mean By Risk?
hazard, Management , risk is about uncertainty on system objectives, Health and Safety , risk is a threat to personnel, Finance , risk is threat to return on investment, Project Managers , risk are threats technique does not have parallels when considering impacts arising from organizational changes, cyber threats
- A Safety Model for AI Systems
In a nutshell, instead of thinking about risk in terms of only threats and impacts, she suggests we consider
- Jidoka and AI: Lessons for Compliance
Stopping Jidoka emerged from a simple innovation: Sakichi Toyoda's loom that stopped automatically when a thread
- Not All Rocks Are Obstacles
Whether something is a threat or an opportunity depends very much on what we are trying to accomplish In the same way, not all rocks are obstacles and not all risks are threats.
- Lean Compliance A3 Format
performance and outcome based compliance obligations, you need a more proactive approach that addresses threats
- Compliance Strategy: Protecting the Opportunity to Succeed
policies and procedures, are designed with a clear purpose: To prevent risks from materializing into real threats Avoid Danger: Establish Effective Guardrails Conduct a comprehensive risk assessment Identify potential threats
- How Do We Manage Cyber Safety?
protection is roughly speaking equal to the safeguards or margins that buffer us from the effects of the threats We can't reduce the threat from occurring, so we are left with creating a wall (safe guard) or at least uncertainty", which we can buy down by improving our knowledge, our models, and our measures to prevent threats Technical processes - are risk measures used to contend with threats, vulnerabilities, and risk. These are the controls to prevent or recover from threats to safety.
- Compliance: Obstacle or Opportunity?
In fact, compliance helps us avoid obstacles and threats, and helps us now to enable and exploit opportunities engineering terms such as: Design Thinking, Systems Engineering, Model Based Engineering, Digital Twins and Threads
- The Lean Compliance Way
Cyber threats, regulatory changes, operational failures, reputational damage—they're always pursuing.












