SlideShare uma empresa Scribd logo
1 de 37
Demonstration
• Introduction
• Background
• U-Risk® Overview
• Demonstration
• Questions
U-Risk® is a South African product
It is not a conventional software derived from a textbook, but designed
on the basis of practical thought leadership and identified gaps in the
market
U-Risk® provides a single, fully integrated automated approach to
efficient business management (Risk, Compliance, Audit, HR,
Supply Chain Management, Asset & Stock Management)
It supports best practice frameworks, such as ISO31000, COSO, Basel II
ISO9000, ISO18000, ISO14000, etc
Cash flow
Management
• Budget Forecasting
• Budget Tracking
• (Income vs Expenses)
Risk
Management
• Strategic Risks
• Operational Risks
• People Risks
• Project Risks
• OHS Risks
• Finance Risks
• IT Risks
• Environmental Risks
• Fraud Risks
• Incident/loss Monitoring
Asset & Stock
Management
• Asset Control
• Stock Control
• Claims Management
• Graphic retention of
assets
HR
Management
• Electronic Files
• Electronic Profiling
• Performance Management
• Time Management (ie Productivity)
• Leave Management
Customer &
Supplier
Management
Assurance
Compliance
Management &
Surveys
Document
Management
Communication
& Business
Intelligence
• Profiling
• Activity Monitoring
• Correspondence
• Internal Audit
• Compliance Audit
• IT Audit
• OHS Audit
• Risk Review
• Risk Control
• Risk-based Compliance
• Onsite-assessments
• Compliance Monitoring
• Internal Surveys
• External Surveys
• Retention of Documents
• Report Archiving
• Document knowledge base
• One-on-one Discussions
• Group Discussions
• Over 100 dashboard reports and graphical
representations of results
General Features
U-Risk®
Overview
From anywhere in the world – web based
• Platform independent
Accessible on
laptop, PC, smart-
phone, tablet
Access Profiles
Strategic
Risk Workshop
Global
Risk Workshop
Operational
Risk Workshop
Process
Risk Workshop
Project
Risk Workshop
Questionnaire
Workshop
Compliance
Risk Workshop
People
Risk Workshop
OHS
Risk Workshop
Insurance
Risk Workshop
Finance
Risk Workshop
Forensic
Risk Workshop
Environmental
Risk Workshop
IT
Risk Workshop
Step 1: Objective Identification &
Rating
Step 2:Strategy identification & ratingStep 3:Risk identification & ratingStep 4:Root Cause identification &
rating
Step 5:Consequence identification &
rating
Step 6:Incident identification &
quantification
Step 7: Control identification & ratingStep 8: Monitoring & Evaluation
1. Objective
2. Strategy
3. Risk
4. Root Cause
5. Consequence
6. Incident
7. Control
8. Reporting
Standard Reporting
Internal
Audit
Compliance
Audit
Follow Up
Audit
Forensic
Audit
Risk
Review
Risk
Control
Standard Reports
Action
Plans
Compliance
Questionnaires
Survey
Questionnaires
Assessment
Questionnaires
Risk
Assessments
Control Self
Assessments
Root Cause
Assessments
Consequence
Assessments
Internal
Audit
Compliance
Audit
Follow Up
Audit
Forensic
Audit
Risk
Review
Risk
Control
Timesheets
Performance
Management
Leave
Approval
Standard Reports
Standard Reports
Asset
Management
Stock
Management
Human Resource
Management
Finance
Management
Supplier
Database
Customer
Database
Support
Discussion
Notices
Fees include the
following:
- User license Valid for 5 years
- Dedicated U-Risk® Server
- Setup and configuration of
parameters
- Population of all existing
information (risk registers,
incident reports, etc)
- Unlimited user training to all
active users
- Dedicated Account Manager
- Telephonic & Onsite support
- Quarterly version upgrades
- Unlimited customised reports
- Embedded People Risk survey
- Embedded ERM Review Survey
- Compilation of 2 compliance
surveys per month
* Terms and Conditions apply
U-Risk® Server Solution
Single Company Costing
Contact us for costing:
admin@urisk.co.za
Direct Contact:
E. Hechter
Cell: + 27 84 380 3258
Tel: +27 11 039 6867
www.urisk.co.za
U-Risk Superior Business Software Solution - GRC

Mais conteúdo relacionado

Destaque

2011 year-end-report
2011 year-end-report2011 year-end-report
2011 year-end-reportDSS CDSE
 
Business in Israel (czech version)
Business in Israel (czech version)Business in Israel (czech version)
Business in Israel (czech version)Johann Wyxen
 
Bethel encounter 2012ss
Bethel encounter 2012ssBethel encounter 2012ss
Bethel encounter 2012ssprbutch
 
WiConnect Technology Support
WiConnect Technology SupportWiConnect Technology Support
WiConnect Technology SupportBrendan Rose
 
Metasructure of nursing informatics (manes)
Metasructure of nursing informatics (manes)Metasructure of nursing informatics (manes)
Metasructure of nursing informatics (manes)kyuwonie05
 
VMworld 2014 Announcements
VMworld 2014 AnnouncementsVMworld 2014 Announcements
VMworld 2014 AnnouncementsBrendan Rose
 
Synthesis mobile technology
Synthesis mobile technologySynthesis mobile technology
Synthesis mobile technologyAesthet1cs
 
Monica amani ihdaryanti
Monica amani ihdaryantiMonica amani ihdaryanti
Monica amani ihdaryantimonica_amani
 
Sample of my Projects using Revit Structure
Sample of my Projects using Revit StructureSample of my Projects using Revit Structure
Sample of my Projects using Revit StructureMohammad Salem, BSc CE
 
เศรษฐศาสตร์
เศรษฐศาสตร์เศรษฐศาสตร์
เศรษฐศาสตร์sunisasa
 
Distribusi multinomial
Distribusi multinomialDistribusi multinomial
Distribusi multinomialMarwaElshi
 
Tourism Development Strategy for Turkey 2020
Tourism Development Strategy for Turkey 2020Tourism Development Strategy for Turkey 2020
Tourism Development Strategy for Turkey 2020ValyT
 
CloudBrew 2016 - Building IoT solution with Service Fabric
CloudBrew 2016 - Building IoT solution with Service FabricCloudBrew 2016 - Building IoT solution with Service Fabric
CloudBrew 2016 - Building IoT solution with Service FabricTeemu Tapanila
 
SAP ABAP - Needed Notes
SAP   ABAP - Needed NotesSAP   ABAP - Needed Notes
SAP ABAP - Needed NotesAkash Bhavsar
 

Destaque (16)

2011 year-end-report
2011 year-end-report2011 year-end-report
2011 year-end-report
 
Business in Israel (czech version)
Business in Israel (czech version)Business in Israel (czech version)
Business in Israel (czech version)
 
Bethel encounter 2012ss
Bethel encounter 2012ssBethel encounter 2012ss
Bethel encounter 2012ss
 
WiConnect Technology Support
WiConnect Technology SupportWiConnect Technology Support
WiConnect Technology Support
 
Metasructure of nursing informatics (manes)
Metasructure of nursing informatics (manes)Metasructure of nursing informatics (manes)
Metasructure of nursing informatics (manes)
 
VMworld 2014 Announcements
VMworld 2014 AnnouncementsVMworld 2014 Announcements
VMworld 2014 Announcements
 
Examen de computacion
Examen de computacionExamen de computacion
Examen de computacion
 
Synthesis mobile technology
Synthesis mobile technologySynthesis mobile technology
Synthesis mobile technology
 
5. data umum desa
5. data umum desa5. data umum desa
5. data umum desa
 
Monica amani ihdaryanti
Monica amani ihdaryantiMonica amani ihdaryanti
Monica amani ihdaryanti
 
Sample of my Projects using Revit Structure
Sample of my Projects using Revit StructureSample of my Projects using Revit Structure
Sample of my Projects using Revit Structure
 
เศรษฐศาสตร์
เศรษฐศาสตร์เศรษฐศาสตร์
เศรษฐศาสตร์
 
Distribusi multinomial
Distribusi multinomialDistribusi multinomial
Distribusi multinomial
 
Tourism Development Strategy for Turkey 2020
Tourism Development Strategy for Turkey 2020Tourism Development Strategy for Turkey 2020
Tourism Development Strategy for Turkey 2020
 
CloudBrew 2016 - Building IoT solution with Service Fabric
CloudBrew 2016 - Building IoT solution with Service FabricCloudBrew 2016 - Building IoT solution with Service Fabric
CloudBrew 2016 - Building IoT solution with Service Fabric
 
SAP ABAP - Needed Notes
SAP   ABAP - Needed NotesSAP   ABAP - Needed Notes
SAP ABAP - Needed Notes
 

Semelhante a U-Risk Superior Business Software Solution - GRC

Bcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementBcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementStephen Ong
 
Risk-Management-in-ISO-9001.pdf
Risk-Management-in-ISO-9001.pdfRisk-Management-in-ISO-9001.pdf
Risk-Management-in-ISO-9001.pdfukavathekar
 
Operational Risk: Solvency II and the external factors’ analysis
Operational Risk: Solvency II and the external factors’ analysisOperational Risk: Solvency II and the external factors’ analysis
Operational Risk: Solvency II and the external factors’ analysisIgnacio Reclusa
 
Internal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsInternal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsNimonik
 
Operational risk management
Operational risk managementOperational risk management
Operational risk managementUjjwal 'Shanu'
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Emma Kelly
 
Gain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringGain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringEmma Kelly
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.pptHasnolAhmad2
 
Erm overview of auditing fraud and revenue assurance
Erm   overview of auditing fraud and revenue assuranceErm   overview of auditing fraud and revenue assurance
Erm overview of auditing fraud and revenue assurancewisnu wardhana, i nyoman
 
RISK IDENTIFICATION 18 Aug.pptx
RISK IDENTIFICATION 18 Aug.pptxRISK IDENTIFICATION 18 Aug.pptx
RISK IDENTIFICATION 18 Aug.pptxSameera Amjad
 
Risk Assessment vs. Risk Management in Manufacturing
Risk Assessment vs. Risk Management in ManufacturingRisk Assessment vs. Risk Management in Manufacturing
Risk Assessment vs. Risk Management in ManufacturingContentAssets
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detailecarrow
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 

Semelhante a U-Risk Superior Business Software Solution - GRC (20)

Bcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementBcu msc cg week 4 risk management
Bcu msc cg week 4 risk management
 
Risk-Management-in-ISO-9001.pdf
Risk-Management-in-ISO-9001.pdfRisk-Management-in-ISO-9001.pdf
Risk-Management-in-ISO-9001.pdf
 
Operational Risk: Solvency II and the external factors’ analysis
Operational Risk: Solvency II and the external factors’ analysisOperational Risk: Solvency II and the external factors’ analysis
Operational Risk: Solvency II and the external factors’ analysis
 
Internal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsInternal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality Audits
 
Operational risk management
Operational risk managementOperational risk management
Operational risk management
 
Gestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector PúblicoGestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector Público
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19
 
Risk Management – The Building Blocks
Risk Management – The Building BlocksRisk Management – The Building Blocks
Risk Management – The Building Blocks
 
Risk Technology Strategy, Selection and Implementation
Risk Technology Strategy, Selection and ImplementationRisk Technology Strategy, Selection and Implementation
Risk Technology Strategy, Selection and Implementation
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
 
Gain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringGain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls Monitoring
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
Erm overview of auditing fraud and revenue assurance
Erm   overview of auditing fraud and revenue assuranceErm   overview of auditing fraud and revenue assurance
Erm overview of auditing fraud and revenue assurance
 
Risk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public SectorRisk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public Sector
 
RISK IDENTIFICATION 18 Aug.pptx
RISK IDENTIFICATION 18 Aug.pptxRISK IDENTIFICATION 18 Aug.pptx
RISK IDENTIFICATION 18 Aug.pptx
 
Risk Assessment vs. Risk Management in Manufacturing
Risk Assessment vs. Risk Management in ManufacturingRisk Assessment vs. Risk Management in Manufacturing
Risk Assessment vs. Risk Management in Manufacturing
 
Governance, Risk Management, and Internal Control in the Public Sector
Governance, Risk Management, and Internal Control in the Public SectorGovernance, Risk Management, and Internal Control in the Public Sector
Governance, Risk Management, and Internal Control in the Public Sector
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

U-Risk Superior Business Software Solution - GRC

  • 2. • Introduction • Background • U-Risk® Overview • Demonstration • Questions
  • 3. U-Risk® is a South African product It is not a conventional software derived from a textbook, but designed on the basis of practical thought leadership and identified gaps in the market U-Risk® provides a single, fully integrated automated approach to efficient business management (Risk, Compliance, Audit, HR, Supply Chain Management, Asset & Stock Management) It supports best practice frameworks, such as ISO31000, COSO, Basel II ISO9000, ISO18000, ISO14000, etc
  • 4. Cash flow Management • Budget Forecasting • Budget Tracking • (Income vs Expenses) Risk Management • Strategic Risks • Operational Risks • People Risks • Project Risks • OHS Risks • Finance Risks • IT Risks • Environmental Risks • Fraud Risks • Incident/loss Monitoring Asset & Stock Management • Asset Control • Stock Control • Claims Management • Graphic retention of assets HR Management • Electronic Files • Electronic Profiling • Performance Management • Time Management (ie Productivity) • Leave Management Customer & Supplier Management Assurance Compliance Management & Surveys Document Management Communication & Business Intelligence • Profiling • Activity Monitoring • Correspondence • Internal Audit • Compliance Audit • IT Audit • OHS Audit • Risk Review • Risk Control • Risk-based Compliance • Onsite-assessments • Compliance Monitoring • Internal Surveys • External Surveys • Retention of Documents • Report Archiving • Document knowledge base • One-on-one Discussions • Group Discussions • Over 100 dashboard reports and graphical representations of results General Features
  • 6. From anywhere in the world – web based • Platform independent Accessible on laptop, PC, smart- phone, tablet
  • 8.
  • 9.
  • 10. Strategic Risk Workshop Global Risk Workshop Operational Risk Workshop Process Risk Workshop Project Risk Workshop Questionnaire Workshop Compliance Risk Workshop People Risk Workshop OHS Risk Workshop Insurance Risk Workshop Finance Risk Workshop Forensic Risk Workshop Environmental Risk Workshop IT Risk Workshop
  • 11. Step 1: Objective Identification & Rating Step 2:Strategy identification & ratingStep 3:Risk identification & ratingStep 4:Root Cause identification & rating Step 5:Consequence identification & rating Step 6:Incident identification & quantification Step 7: Control identification & ratingStep 8: Monitoring & Evaluation 1. Objective 2. Strategy 3. Risk 4. Root Cause 5. Consequence 6. Incident 7. Control 8. Reporting
  • 12.
  • 14.
  • 15.
  • 18.
  • 19.
  • 20.
  • 21.
  • 23.
  • 24.
  • 26.
  • 27.
  • 29.
  • 31.
  • 32.
  • 33.
  • 34.
  • 36. Fees include the following: - User license Valid for 5 years - Dedicated U-Risk® Server - Setup and configuration of parameters - Population of all existing information (risk registers, incident reports, etc) - Unlimited user training to all active users - Dedicated Account Manager - Telephonic & Onsite support - Quarterly version upgrades - Unlimited customised reports - Embedded People Risk survey - Embedded ERM Review Survey - Compilation of 2 compliance surveys per month * Terms and Conditions apply U-Risk® Server Solution Single Company Costing Contact us for costing: admin@urisk.co.za Direct Contact: E. Hechter Cell: + 27 84 380 3258 Tel: +27 11 039 6867 www.urisk.co.za