SlideShare uma empresa Scribd logo
1 de 37
Demonstration
• Introduction
• Background
• U-Risk® Overview
• Demonstration
• Questions
U-Risk® is a South African product
It is not a conventional software derived from a textbook, but designed
on the basis of practical thought leadership and identified gaps in the
market
U-Risk® provides a single, fully integrated automated approach to
efficient business management (Risk, Compliance, Audit, HR,
Supply Chain Management, Asset & Stock Management)
It supports best practice frameworks, such as ISO31000, COSO, Basel II
ISO9000, ISO18000, ISO14000, etc
Cash flow
Management
• Budget Forecasting
• Budget Tracking
• (Income vs Expenses)
Risk
Management
• Strategic Risks
• Operational Risks
• People Risks
• Project Risks
• OHS Risks
• Finance Risks
• IT Risks
• Environmental Risks
• Fraud Risks
• Incident/loss Monitoring
Asset & Stock
Management
• Asset Control
• Stock Control
• Claims Management
• Graphic retention of
assets
HR
Management
• Electronic Files
• Electronic Profiling
• Performance Management
• Time Management (ie Productivity)
• Leave Management
Customer &
Supplier
Management
Assurance
Compliance
Management &
Surveys
Document
Management
Communication
& Business
Intelligence
• Profiling
• Activity Monitoring
• Correspondence
• Internal Audit
• Compliance Audit
• IT Audit
• OHS Audit
• Risk Review
• Risk Control
• Risk-based Compliance
• Onsite-assessments
• Compliance Monitoring
• Internal Surveys
• External Surveys
• Retention of Documents
• Report Archiving
• Document knowledge base
• One-on-one Discussions
• Group Discussions
• Over 100 dashboard reports and graphical
representations of results
General Features
U-Risk®
Overview
From anywhere in the world – web based
• Platform independent
Accessible on
laptop, PC, smart-
phone, tablet
Access Profiles
Strategic
Risk Workshop
Global
Risk Workshop
Operational
Risk Workshop
Process
Risk Workshop
Project
Risk Workshop
Questionnaire
Workshop
Compliance
Risk Workshop
People
Risk Workshop
OHS
Risk Workshop
Insurance
Risk Workshop
Finance
Risk Workshop
Forensic
Risk Workshop
Environmental
Risk Workshop
IT
Risk Workshop
Step 1: Objective Identification &
Rating
Step 2:Strategy identification & ratingStep 3:Risk identification & ratingStep 4:Root Cause identification &
rating
Step 5:Consequence identification &
rating
Step 6:Incident identification &
quantification
Step 7: Control identification & ratingStep 8: Monitoring & Evaluation
1. Objective
2. Strategy
3. Risk
4. Root Cause
5. Consequence
6. Incident
7. Control
8. Reporting
Standard Reporting
Internal
Audit
Compliance
Audit
Follow Up
Audit
Forensic
Audit
Risk
Review
Risk
Control
Standard Reports
Action
Plans
Compliance
Questionnaires
Survey
Questionnaires
Assessment
Questionnaires
Risk
Assessments
Control Self
Assessments
Root Cause
Assessments
Consequence
Assessments
Internal
Audit
Compliance
Audit
Follow Up
Audit
Forensic
Audit
Risk
Review
Risk
Control
Timesheets
Performance
Management
Leave
Approval
Standard Reports
Standard Reports
Asset
Management
Stock
Management
Human Resource
Management
Finance
Management
Supplier
Database
Customer
Database
Support
Discussion
Notices
Fees include the
following:
- User license Valid for 5 years
- Dedicated U-Risk® Server
- Setup and configuration of
parameters
- Population of all existing
information (risk registers,
incident reports, etc)
- Unlimited user training to all
active users
- Dedicated Account Manager
- Telephonic & Onsite support
- Quarterly version upgrades
- Unlimited customised reports
- Embedded People Risk survey
- Embedded ERM Review Survey
- Compilation of 2 compliance
surveys per month
* Terms and Conditions apply
U-Risk® Server Solution
Single Company Costing
Contact us for costing:
admin@urisk.co.za
Direct Contact:
E. Hechter
Cell: + 27 84 380 3258
Tel: +27 11 039 6867
www.urisk.co.za
U-Risk Superior Business Software Solution - GRC

Mais conteúdo relacionado

Destaque

2011 year-end-report
2011 year-end-report2011 year-end-report
2011 year-end-reportDSS CDSE
 
Business in Israel (czech version)
Business in Israel (czech version)Business in Israel (czech version)
Business in Israel (czech version)Johann Wyxen
 
Bethel encounter 2012ss
Bethel encounter 2012ssBethel encounter 2012ss
Bethel encounter 2012ssprbutch
 
WiConnect Technology Support
WiConnect Technology SupportWiConnect Technology Support
WiConnect Technology SupportBrendan Rose
 
Metasructure of nursing informatics (manes)
Metasructure of nursing informatics (manes)Metasructure of nursing informatics (manes)
Metasructure of nursing informatics (manes)kyuwonie05
 
VMworld 2014 Announcements
VMworld 2014 AnnouncementsVMworld 2014 Announcements
VMworld 2014 AnnouncementsBrendan Rose
 
Synthesis mobile technology
Synthesis mobile technologySynthesis mobile technology
Synthesis mobile technologyAesthet1cs
 
Monica amani ihdaryanti
Monica amani ihdaryantiMonica amani ihdaryanti
Monica amani ihdaryantimonica_amani
 
Sample of my Projects using Revit Structure
Sample of my Projects using Revit StructureSample of my Projects using Revit Structure
Sample of my Projects using Revit StructureMohammad Salem, BSc CE
 
เศรษฐศาสตร์
เศรษฐศาสตร์เศรษฐศาสตร์
เศรษฐศาสตร์sunisasa
 
Distribusi multinomial
Distribusi multinomialDistribusi multinomial
Distribusi multinomialMarwaElshi
 
Tourism Development Strategy for Turkey 2020
Tourism Development Strategy for Turkey 2020Tourism Development Strategy for Turkey 2020
Tourism Development Strategy for Turkey 2020ValyT
 
CloudBrew 2016 - Building IoT solution with Service Fabric
CloudBrew 2016 - Building IoT solution with Service FabricCloudBrew 2016 - Building IoT solution with Service Fabric
CloudBrew 2016 - Building IoT solution with Service FabricTeemu Tapanila
 
SAP ABAP - Needed Notes
SAP   ABAP - Needed NotesSAP   ABAP - Needed Notes
SAP ABAP - Needed NotesAkash Bhavsar
 

Destaque (16)

2011 year-end-report
2011 year-end-report2011 year-end-report
2011 year-end-report
 
Business in Israel (czech version)
Business in Israel (czech version)Business in Israel (czech version)
Business in Israel (czech version)
 
Bethel encounter 2012ss
Bethel encounter 2012ssBethel encounter 2012ss
Bethel encounter 2012ss
 
WiConnect Technology Support
WiConnect Technology SupportWiConnect Technology Support
WiConnect Technology Support
 
Metasructure of nursing informatics (manes)
Metasructure of nursing informatics (manes)Metasructure of nursing informatics (manes)
Metasructure of nursing informatics (manes)
 
VMworld 2014 Announcements
VMworld 2014 AnnouncementsVMworld 2014 Announcements
VMworld 2014 Announcements
 
Examen de computacion
Examen de computacionExamen de computacion
Examen de computacion
 
Synthesis mobile technology
Synthesis mobile technologySynthesis mobile technology
Synthesis mobile technology
 
5. data umum desa
5. data umum desa5. data umum desa
5. data umum desa
 
Monica amani ihdaryanti
Monica amani ihdaryantiMonica amani ihdaryanti
Monica amani ihdaryanti
 
Sample of my Projects using Revit Structure
Sample of my Projects using Revit StructureSample of my Projects using Revit Structure
Sample of my Projects using Revit Structure
 
เศรษฐศาสตร์
เศรษฐศาสตร์เศรษฐศาสตร์
เศรษฐศาสตร์
 
Distribusi multinomial
Distribusi multinomialDistribusi multinomial
Distribusi multinomial
 
Tourism Development Strategy for Turkey 2020
Tourism Development Strategy for Turkey 2020Tourism Development Strategy for Turkey 2020
Tourism Development Strategy for Turkey 2020
 
CloudBrew 2016 - Building IoT solution with Service Fabric
CloudBrew 2016 - Building IoT solution with Service FabricCloudBrew 2016 - Building IoT solution with Service Fabric
CloudBrew 2016 - Building IoT solution with Service Fabric
 
SAP ABAP - Needed Notes
SAP   ABAP - Needed NotesSAP   ABAP - Needed Notes
SAP ABAP - Needed Notes
 

Semelhante a U-Risk Superior Business Software Solution - GRC

Bcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementBcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementStephen Ong
 
Risk-Management-in-ISO-9001.pdf
Risk-Management-in-ISO-9001.pdfRisk-Management-in-ISO-9001.pdf
Risk-Management-in-ISO-9001.pdfukavathekar
 
Operational Risk: Solvency II and the external factors’ analysis
Operational Risk: Solvency II and the external factors’ analysisOperational Risk: Solvency II and the external factors’ analysis
Operational Risk: Solvency II and the external factors’ analysisIgnacio Reclusa
 
Internal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsInternal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsNimonik
 
Operational risk management
Operational risk managementOperational risk management
Operational risk managementUjjwal 'Shanu'
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Emma Kelly
 
Gain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringGain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringEmma Kelly
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.pptHasnolAhmad2
 
Erm overview of auditing fraud and revenue assurance
Erm   overview of auditing fraud and revenue assuranceErm   overview of auditing fraud and revenue assurance
Erm overview of auditing fraud and revenue assurancewisnu wardhana, i nyoman
 
RISK IDENTIFICATION 18 Aug.pptx
RISK IDENTIFICATION 18 Aug.pptxRISK IDENTIFICATION 18 Aug.pptx
RISK IDENTIFICATION 18 Aug.pptxSameera Amjad
 
Risk Assessment vs. Risk Management in Manufacturing
Risk Assessment vs. Risk Management in ManufacturingRisk Assessment vs. Risk Management in Manufacturing
Risk Assessment vs. Risk Management in ManufacturingContentAssets
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detailecarrow
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 

Semelhante a U-Risk Superior Business Software Solution - GRC (20)

Bcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementBcu msc cg week 4 risk management
Bcu msc cg week 4 risk management
 
Risk-Management-in-ISO-9001.pdf
Risk-Management-in-ISO-9001.pdfRisk-Management-in-ISO-9001.pdf
Risk-Management-in-ISO-9001.pdf
 
Operational Risk: Solvency II and the external factors’ analysis
Operational Risk: Solvency II and the external factors’ analysisOperational Risk: Solvency II and the external factors’ analysis
Operational Risk: Solvency II and the external factors’ analysis
 
Internal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsInternal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality Audits
 
Operational risk management
Operational risk managementOperational risk management
Operational risk management
 
Gestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector PúblicoGestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector Público
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19
 
Risk Management – The Building Blocks
Risk Management – The Building BlocksRisk Management – The Building Blocks
Risk Management – The Building Blocks
 
Risk Technology Strategy, Selection and Implementation
Risk Technology Strategy, Selection and ImplementationRisk Technology Strategy, Selection and Implementation
Risk Technology Strategy, Selection and Implementation
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
 
Gain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringGain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls Monitoring
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
Erm overview of auditing fraud and revenue assurance
Erm   overview of auditing fraud and revenue assuranceErm   overview of auditing fraud and revenue assurance
Erm overview of auditing fraud and revenue assurance
 
Risk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public SectorRisk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public Sector
 
RISK IDENTIFICATION 18 Aug.pptx
RISK IDENTIFICATION 18 Aug.pptxRISK IDENTIFICATION 18 Aug.pptx
RISK IDENTIFICATION 18 Aug.pptx
 
Risk Assessment vs. Risk Management in Manufacturing
Risk Assessment vs. Risk Management in ManufacturingRisk Assessment vs. Risk Management in Manufacturing
Risk Assessment vs. Risk Management in Manufacturing
 
Governance, Risk Management, and Internal Control in the Public Sector
Governance, Risk Management, and Internal Control in the Public SectorGovernance, Risk Management, and Internal Control in the Public Sector
Governance, Risk Management, and Internal Control in the Public Sector
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

U-Risk Superior Business Software Solution - GRC

  • 2. • Introduction • Background • U-Risk® Overview • Demonstration • Questions
  • 3. U-Risk® is a South African product It is not a conventional software derived from a textbook, but designed on the basis of practical thought leadership and identified gaps in the market U-Risk® provides a single, fully integrated automated approach to efficient business management (Risk, Compliance, Audit, HR, Supply Chain Management, Asset & Stock Management) It supports best practice frameworks, such as ISO31000, COSO, Basel II ISO9000, ISO18000, ISO14000, etc
  • 4. Cash flow Management • Budget Forecasting • Budget Tracking • (Income vs Expenses) Risk Management • Strategic Risks • Operational Risks • People Risks • Project Risks • OHS Risks • Finance Risks • IT Risks • Environmental Risks • Fraud Risks • Incident/loss Monitoring Asset & Stock Management • Asset Control • Stock Control • Claims Management • Graphic retention of assets HR Management • Electronic Files • Electronic Profiling • Performance Management • Time Management (ie Productivity) • Leave Management Customer & Supplier Management Assurance Compliance Management & Surveys Document Management Communication & Business Intelligence • Profiling • Activity Monitoring • Correspondence • Internal Audit • Compliance Audit • IT Audit • OHS Audit • Risk Review • Risk Control • Risk-based Compliance • Onsite-assessments • Compliance Monitoring • Internal Surveys • External Surveys • Retention of Documents • Report Archiving • Document knowledge base • One-on-one Discussions • Group Discussions • Over 100 dashboard reports and graphical representations of results General Features
  • 6. From anywhere in the world – web based • Platform independent Accessible on laptop, PC, smart- phone, tablet
  • 8.
  • 9.
  • 10. Strategic Risk Workshop Global Risk Workshop Operational Risk Workshop Process Risk Workshop Project Risk Workshop Questionnaire Workshop Compliance Risk Workshop People Risk Workshop OHS Risk Workshop Insurance Risk Workshop Finance Risk Workshop Forensic Risk Workshop Environmental Risk Workshop IT Risk Workshop
  • 11. Step 1: Objective Identification & Rating Step 2:Strategy identification & ratingStep 3:Risk identification & ratingStep 4:Root Cause identification & rating Step 5:Consequence identification & rating Step 6:Incident identification & quantification Step 7: Control identification & ratingStep 8: Monitoring & Evaluation 1. Objective 2. Strategy 3. Risk 4. Root Cause 5. Consequence 6. Incident 7. Control 8. Reporting
  • 12.
  • 14.
  • 15.
  • 18.
  • 19.
  • 20.
  • 21.
  • 23.
  • 24.
  • 26.
  • 27.
  • 29.
  • 31.
  • 32.
  • 33.
  • 34.
  • 36. Fees include the following: - User license Valid for 5 years - Dedicated U-Risk® Server - Setup and configuration of parameters - Population of all existing information (risk registers, incident reports, etc) - Unlimited user training to all active users - Dedicated Account Manager - Telephonic & Onsite support - Quarterly version upgrades - Unlimited customised reports - Embedded People Risk survey - Embedded ERM Review Survey - Compilation of 2 compliance surveys per month * Terms and Conditions apply U-Risk® Server Solution Single Company Costing Contact us for costing: admin@urisk.co.za Direct Contact: E. Hechter Cell: + 27 84 380 3258 Tel: +27 11 039 6867 www.urisk.co.za