Preparedness
Enhances organisational readiness against unforeseen events through proactive identification and assessment of potential risks.
Efficiency
Optimises transparency, resource allocation and management efforts by prioritising risks based on their impact and likelihood.
Accountability
Establishes clear stakeholder ownership for risk management activities, ensuring responsible monitoring and mitigation actions.
Compliance
Supports adherence to regulatory standards and improves governance through structured risk management practices.
Security - typically covering; counter terrorism, protective security, security culture & commitments, security planning, threat & risk assessment etc.
Housekeeping - typically covering; cleaning, chemical, biological, ergonomic, equipment, staffing and various risks associated with maintaining premises etc.
Logistics - typically covering; operations, transportation, supply chain, inventory, insurance coverage, technological, legal, regulatory, environmental etc.
Lobby & ACP - typically covering; evacuation, health & safety, breaches, equipment, crowding, equipment failures, compliance etc.
Engineering - typically covering; failures, project delays, cost overruns, quality, environmental, technological, IP, cyber, legal, maintenance, contracts etc.
Culture - typically covering; values, branding, miss-communication, resistance to change, heritage, diversity, conflict, talent retention, ethics etc.
Soft Landings - typically covering; performance gaps, readiness, user satisfaction, commissioning oversights, information handover, neglect, maintenance, budgets and time overruns, sustainability etc.
Edit and customise the existing risk register categories and types specific to your own requirements and processes.
Create your own risk register categories, types and workflows
Automatically integrate your risk register from other systems to provide a single repository of all risks across your business (see "APIs")
Edit - complete changes, collate, consolidate and manage all evidence centrally ensuring it is handled securely and in a compliant way.
Assignment - ownership and allocate responsibility of the alarms to individuals and teams - internal or 3rd party contractors.
Statuses - move the risk report through the cycle through to mitigation or closure.
Comments - two-way communication with responders, add notes, continuous commentary and narrative to the alarm report.
Mapping - view the risks location, surrounding area, swop the view from map to satellite & activate layers for people/sites.
Criticality - set priority, severity levels, likelihood and impact levels - manually escalate or deescalate alarms to keep teams informed.
Task automation - automate & orchestrate pre-defined protocols or procedures by the auto-creation of tasks.
Files - upload media, files & wide range of files to support a risk either manually uploaded, from a mobile device or via the API.
Tasks - coordinate the planning & tracking of response tasks to ensure designated actions are completed & deadlines are met.
Notifications - automatic or manually triggered alerts and notifications using a wide range of communication methods.
Responses forms - formalised responses, mitigation strategies, formal statements, response plans, checks, sign-offs, forms and processes can be setup and enforced.
Plot - add points, polygons & radius to the map with response forms to mark actions and additional locations.
Linking - linking of risks together and any incidents that have occurred, with configurable link relationships - to see the bigger picture.
Costs - Log all losses as a consequence of a risk - from time-based costs, purchased resources to damages, stock losses etc.
Audit timeline - transparency of all updates, actions and activities conducted on a risk, displayed in a clear timeline.
Data restrictions - management and control over user access & permissions defining which user group can access and manage.
Export - export the alarm details in a PDF format to print - PDF reports can branded and customised.
TV mode - for display on control rooms video walls and triage rooms for situational awareness and ongoing updates.
Data push - interface with 3rd party systems via API endpoints.
Search - powerful filtering facility & advanced query builder that allows users to customise search criteria, filter & interrogate data sets.
Analysis - map key metrics and unlimited reporting suites and dashboards using flexible widgets - add lists, counts, graphs & maps.
Creating a Risk Register within a Critical Event Management (CEM) system for an organisation involves identifying, assessing, and managing risks that could potentially impact the organisation's operations, safety, and continuity. Here's a step-by-step guide to develop an effective Risk Register as part of your CEM system:
The first step is to identify all possible risks that could affect the organisation. This can include natural disasters, cyber attacks, equipment failures, health and safety hazards, supply chain disruptions, and more. Use a combination of methods such as brainstorming sessions, expert consultations, and historical data analysis to compile a comprehensive list of risks.
Once risks are identified, assess each risk based on two main factors:
This assessment can be qualitative (low, medium, high) or quantitative (using specific metrics or scores).
Based on the assessment, prioritise the risks by their likelihood and impact. This helps in focusing resources and efforts on managing the most critical risks. A common method is to use a risk matrix to categorise risks into different levels of priority.
For each risk, assign a risk owner. This individual or team is responsible for monitoring the risk and implementing measures to mitigate or respond to it. The owner should have the authority, knowledge, and resources necessary to manage the risk effectively.
For each high-priority risk, develop mitigation strategies to prevent the risk from occurring and response plans to manage the risk if it does materialise. This includes identifying necessary resources, establishing procedures, and training relevant personnel.
Implement the mitigation and response strategies. This involves allocating resources, conducting training, and integrating risk management practices into the organisation's operations. Continuously monitor the environment and the effectiveness of the risk management strategies, adjusting as necessary.
Regularly review the Risk Register to ensure it remains current and reflective of the organisation's risk profile. Update it to include new risks, remove outdated items, and revise risk assessments, priorities, and management strategies based on changing circumstances and insights from past events.
Integrating a Risk Register into your CEM system enables proactive risk management, enhances organisational resilience, and supports effective decision-making during critical events. A comprehensive Risk Register should include the following information for each risk:
You have complete control over the categories and types of risks you wish to record and manage. They all follow the same management process and there should be a consistent approach across the entire organisation.
A Risk Register focusing on comprehensive security aspects, including counter-terrorism, protective security, security culture and commitments, security planning, and threat & risk assessment, requires a broad approach to identifying potential risks. These encompass not only immediate physical and cyber threats but also strategic and organisational risks that could impact security posture and readiness. Here are the types of risks to consider:
Mitigating these risks involves a multi-faceted approach, including establishing robust security frameworks, regular training and awareness programs, comprehensive threat assessments, and continuous monitoring and improvement of security practices. Collaboration across departments and with external agencies is also crucial to effectively address and manage these risks.
Yes! Here are key types of security risks to consider:
Mitigating these risks requires a comprehensive security strategy that includes technical controls, policy and compliance management, employee training and awareness programs, and regular security assessments to identify and address vulnerabilities.
In the field of engineering, whether it involves civil, mechanical, electrical, or software engineering, managing risks is crucial to project success and safety. Addressing these risks involves thorough planning, risk assessment, and implementing risk mitigation strategies to ensure project success, safety, and compliance.
A Risk Register for engineering projects typically includes:
In the logistics sector, managing risks effectively is crucial for smooth operations. Addressing these risks requires comprehensive planning, including the implementation of safety protocols, insurance coverage, cybersecurity measures, and efficient supply chain management practices to ensure resilience and continuity in logistics operations.
Here's a list of common types of risks encountered in a logistics Risk Register:
"Soft Landings" typically refers to a strategy used in the construction and building sector to ensure a smooth transition from project completion to operation, focusing on the building's performance and the occupants' satisfaction. The approach aims to avoid common pitfalls that occur when handing over a building to its operators and users.
Mitigating these risks involves early and ongoing engagement with all stakeholders, thorough planning and documentation, comprehensive commissioning activities, and continuous monitoring and optimisation of building performance post-occupancy.
Here are key types of risks associated with Soft Landings:
Creating a Risk Register for Housekeeping involves identifying various risks associated with cleaning and maintaining premises. Each of these risks requires specific mitigation and response strategies to ensure the safety and well-being of housekeeping staff and the effectiveness of cleaning operations.
Here are the types of risks typically considered:
Creating a Risk Register for a lobby area, often the first point of interaction for visitors in a building, involves identifying risks that could impact safety, security, and operations. Addressing these risks requires a combination of physical security measures, maintenance protocols, staff training, and emergency preparedness planning to ensure the lobby remains a safe, welcoming, and efficient space for all users.
Here are the types of risks typically associated with lobby areas:
Creating a Risk Register for "Culture" within an organisation or community context involves identifying potential risks that could negatively impact the cultural environment or cultural initiatives. Addressing these risks requires a strategic approach to culture management, including fostering open communication, promoting diversity and inclusivity, preserving cultural heritage, and ensuring alignment between culture and organisational objectives.
Here are key types of risks to consider: