SlideShare uma empresa Scribd logo
1 de 16
RiskTaker : Business Risk Management
Enterprising risk management for teams and SME’s
Contents

   Risk Governance Overview
       Why manage risks ?
       Risk Maturity
       Integrated Risk Management

   Line Xero Introduction

   RiskTaker
       Award winning software
       Reliable hardware
       Support Services
Why manage risks ?

“A company's objectives, its internal organisation and the environment in which it operates
    are continually evolving and as a result, the risks it faces are continually changing. A
    sound system of internal control therefore depends on a thorough and regular evaluation
    of the nature and extent of the risks to which the company is exposed. Since profits are,
    in part, the reward for successful risk-taking in business, the purpose of internal control is
    to help manage and control risk appropriately rather than to eliminate it.”

“The guidance is based on the adoption by a company's board of a risk-based approach to
   establishing a sound system of internal control and reviewing its effectiveness. This
   should be incorporated by the company within its normal management and governance
   processes. It should not be treated as a separate exercise undertaken to meet regulatory
   requirements.”


Turnbull Report, September 1999
The Evolution of Risk Management

Previously                     Now
      Historical risks only        Non-traditional risks
      Expert management            Causes of risk
      Statistical analysis         Organisation-wide involvement
                                    Senior management buy-in
                                    Risk indicators
Risk Governance Maturity


Maturing
• Simplistic framework
• Departmental
• Limited corporate visibility
• Risk exposure may be inaccurate
• Mitigation plans may be used
 to identify priorities
                                                        Mature
                                                        • Flexible governance framework
                                                        • Whole of company
                                                        • Corporate visibility & control
                                                        • Risk appetite known & monitored
                                                        • Use of risk data to drive
               Immature                                  investments & priorities
               • Risk management is ad-hoc
               • Individuals or small teams
               • No corporate visibility
               • Appetite & exposure unknown
               • Risk data not used to drive strategy
Integrated risk management

   Risk management must be a “whole of company” process
        Requires board level buy-in to objectives and methods of risk management
        Risks are controlled at the appropriate level within the business, by the most
         appropriate people
        Control & management of risks must be part of the normal business process – not an
         add-on or afterthought

   Risks must be balanced at the corporate level
        Without risk co-ordination, perceived risks may be blown out of proportion
        There must be mechanisms to escalate risks to the appropriate level.

   The risk management system needs to support the risk process without being
    intrusive
        Intrusion usually results in non-use
        Risk co-ordination & challenge processes become “big stick” exercises.
Integrating RM & strategic processes



                                 Quantify risk
           Identify risks                                                 Identify risk:
                                  Impact &         Agree acceptable
           & understand                                                  Related actions
                                  mitigation          Risk levels
              origins                                                       required
                                 Cost/benefit



                      Identify actions        Monitor         Monitor external        Update
Agree strategic
                     Required & likely     implementation       & internal         Assumptions &
    goals
                          effects            of actions          changes               goals
Line Xero : Company Overview

   Formed in 1990 as an IT strategy consultancy

   Provides IT Design Authority services to a number of FTSE-100
    companies

   Created XeroRisk as a product in 2004
       Originally built for United Utilities
       Strong take up in asset intensive & regulated businesses
       Launched RiskTaker in 2008

   Operates e-commerce web application facilities on behalf of
    several Internet based businesses
Line Xero: RiskTaker Overview

 Licensing
    Easy& flexible licensing schemes
    Web based purchasing process ensures no “down time”

 Support
    Dedicated  RiskTaker support team – email, telephone and self-
     service portal options available
 Maintenance
    Clearroadmap – XeroRisk release + 1 month
    Maintenance contract to cover support and new releases
RiskTaker: A risk management solution

                   Fully web based application

                   Integrates with existing business
                    processes

                   Simple to deploy

                   Very intuitive to use

                   Risks identified, managed &
                    controlled “on the ground”

                   Corporate exposure valued &
                    monitored through escalation and
                    aggregation
RiskTaker: Functional Coverage
RiskTaker Features

   Full organisation model support
   Role based security
   Fully configurable risk assessment
    categories & levels
   Email escalation & notification
   Full audit trail of all user risk
    management activities
   Built in reporting functions include
    Excel export, graphs etc
   Support for unlimited risks,
    organisation units, hierarchy levels
A flexible deployment solution
   Quick Implementation
        RiskTaker doesn’t require installation on each client
        Supplied as a pre-configured appliance – simply plug in and go.

   Reduced support costs
        New releases & updates are installed on central servers
        Does not impact desktop builds or current security policies

   True Thin-Client
        There are no ActiveX or Java components downloaded to the client
        Partners or contractors can be quickly added without IS intervention

   Low client hardware demands
        Only a standard web browser is required for access
        Integrates with standard or thin client desktops (e.g. Citrix)

   Industry leading components
        Windows 2003 Server R2 or higher (Windows 2003 R2 Advanced server recommended)
        Microsoft SQL Server 2000 (Microsoft SQL Server 2005 SP2 recommended)
Reliable Hardware

   Dedicated appliance pre-configured with the latest RiskTaker software version
        All third party components licensed through the RiskTaker license
        Simply plug into your network and run
   Eliminates expensive server hardware and complex installation
        No co-existence issues to complicate the support requirements.
   Can be upgraded as the business grows
        Additional memory and/or processors
        Additional licenses to increase RiskTaker users
Support Services

   Dedicated Support Team
        Web portal – Online submission of low priority support requests, access to FAQ’s and upgrades
        Phone – Support for urgent requests including hardware failures, software errors and problems
         with licensing and upgrade services
        Email – Dedicated email queue monitored by the support team

   Hosting Service
        If you cannot host your own RiskTaker appliance, Line Xero can do it for you – simply access
         your RiskTaker over the Internet

   Licensing Service
        Fully automated licensing service ensures additional licenses can be added without waiting for
         purchase approvals
        Temporary licensing possible for short-term projects & programmes.

   Migration Services
        For RiskTaker installations growing beyond the scalability of the hardware, an upgrade to
         hosted XeroRisk canbe performed
        Data is transferred securely from RiskTaker to the hosted XeroRisk installation with no loss of
         information
Thank you

Mais conteúdo relacionado

Mais procurados

Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management OverviewWesley Moore
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Common failures of risk management
Common failures of risk management   Common failures of risk management
Common failures of risk management Surajit Datta
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)Resolver Inc.
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationResolver Inc.
 
2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentationGlobalForum
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityResolver Inc.
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity ModelCSCJournals
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity AssessmentClaude Baudoin
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Resolver Inc.
 
Governance, Risk and Compliance- Energy Industry
Governance, Risk and Compliance- Energy Industry Governance, Risk and Compliance- Energy Industry
Governance, Risk and Compliance- Energy Industry MetricStream Inc
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 

Mais procurados (20)

Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management Overview
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
CISSPills #3.02
CISSPills #3.02CISSPills #3.02
CISSPills #3.02
 
Enterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slidesEnterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slides
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
Security Maturity Model
Security Maturity ModelSecurity Maturity Model
Security Maturity Model
 
Common failures of risk management
Common failures of risk management   Common failures of risk management
Common failures of risk management
 
CISSPills #3.03
CISSPills #3.03CISSPills #3.03
CISSPills #3.03
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 
2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
Integrated GRC
Integrated GRCIntegrated GRC
Integrated GRC
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security
 
Governance, Risk and Compliance- Energy Industry
Governance, Risk and Compliance- Energy Industry Governance, Risk and Compliance- Energy Industry
Governance, Risk and Compliance- Energy Industry
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 

Destaque

Are you a_risk_taker
Are you a_risk_takerAre you a_risk_taker
Are you a_risk_takermportole
 
What It Takes To Be An Entrepreneur
What It Takes To Be An EntrepreneurWhat It Takes To Be An Entrepreneur
What It Takes To Be An Entrepreneurguestf83c89
 
Educating social entrepreneurs
Educating social entrepreneursEducating social entrepreneurs
Educating social entrepreneursTim Curtis
 
10 traits of Successful Entrepreneurs
10 traits of Successful Entrepreneurs10 traits of Successful Entrepreneurs
10 traits of Successful EntrepreneursPiseth Kham
 
What is entrepreneurships
What is entrepreneurshipsWhat is entrepreneurships
What is entrepreneurshipsugik sugiharto
 
Cost leadership & differentiation
Cost leadership & differentiationCost leadership & differentiation
Cost leadership & differentiationAsep Maulana Akbar
 
Smart Risk Taking
Smart Risk TakingSmart Risk Taking
Smart Risk TakingDonnaChilds
 
Positive risk taking
Positive risk takingPositive risk taking
Positive risk takingAnthony Coe
 
Risk Taking Behavior
Risk Taking BehaviorRisk Taking Behavior
Risk Taking Behaviorllleu
 
Basics of entrepreneurship
Basics of entrepreneurshipBasics of entrepreneurship
Basics of entrepreneurshipDivya Pandey
 

Destaque (13)

Are you a_risk_taker
Are you a_risk_takerAre you a_risk_taker
Are you a_risk_taker
 
What It Takes To Be An Entrepreneur
What It Takes To Be An EntrepreneurWhat It Takes To Be An Entrepreneur
What It Takes To Be An Entrepreneur
 
Educating social entrepreneurs
Educating social entrepreneursEducating social entrepreneurs
Educating social entrepreneurs
 
Entrepreunership
EntrepreunershipEntrepreunership
Entrepreunership
 
Entrepreunership in practice
Entrepreunership in practiceEntrepreunership in practice
Entrepreunership in practice
 
10 traits of Successful Entrepreneurs
10 traits of Successful Entrepreneurs10 traits of Successful Entrepreneurs
10 traits of Successful Entrepreneurs
 
What is entrepreneurships
What is entrepreneurshipsWhat is entrepreneurships
What is entrepreneurships
 
Cost leadership & differentiation
Cost leadership & differentiationCost leadership & differentiation
Cost leadership & differentiation
 
Smart Risk Taking
Smart Risk TakingSmart Risk Taking
Smart Risk Taking
 
Positive risk taking
Positive risk takingPositive risk taking
Positive risk taking
 
Risk Taking Behavior
Risk Taking BehaviorRisk Taking Behavior
Risk Taking Behavior
 
Entreprenuership
EntreprenuershipEntreprenuership
Entreprenuership
 
Basics of entrepreneurship
Basics of entrepreneurshipBasics of entrepreneurship
Basics of entrepreneurship
 

Semelhante a Risk Taker Product Presentation V1.0 7th January 2008

Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementJamesMooreCo
 
Governance, Risk, and Compliance Services
Governance, Risk, and Compliance ServicesGovernance, Risk, and Compliance Services
Governance, Risk, and Compliance ServicesCapgemini
 
Agiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key StepsAgiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key Stepsagiliancecommunity
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyNICSA
 
Vulnerability Management Whitepaper PowerPoint Presentation Slides
Vulnerability Management Whitepaper PowerPoint Presentation SlidesVulnerability Management Whitepaper PowerPoint Presentation Slides
Vulnerability Management Whitepaper PowerPoint Presentation SlidesSlideTeam
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixNix Inc.,
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTuan Phan
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTri Phan
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTuan Phan
 
Ta Security
Ta SecurityTa Security
Ta Securityjothsna
 

Semelhante a Risk Taker Product Presentation V1.0 7th January 2008 (20)

Agiliance Risk Vision
Agiliance Risk VisionAgiliance Risk Vision
Agiliance Risk Vision
 
Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk Management
 
Governance, Risk, and Compliance Services
Governance, Risk, and Compliance ServicesGovernance, Risk, and Compliance Services
Governance, Risk, and Compliance Services
 
Agiliance Wp Key Steps
Agiliance Wp Key StepsAgiliance Wp Key Steps
Agiliance Wp Key Steps
 
Agiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key StepsAgiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key Steps
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 
Vulnerability Management Whitepaper PowerPoint Presentation Slides
Vulnerability Management Whitepaper PowerPoint Presentation SlidesVulnerability Management Whitepaper PowerPoint Presentation Slides
Vulnerability Management Whitepaper PowerPoint Presentation Slides
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
Adaptive RiskPro
Adaptive RiskProAdaptive RiskPro
Adaptive RiskPro
 
NEMEA Compliance center
NEMEA Compliance centerNEMEA Compliance center
NEMEA Compliance center
 
Bpo risk management
Bpo risk managementBpo risk management
Bpo risk management
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A Glance
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
Riskpro Trainings Automotive Industry
Riskpro Trainings Automotive IndustryRiskpro Trainings Automotive Industry
Riskpro Trainings Automotive Industry
 
Riskpro Trainings Automotive Industry
Riskpro Trainings Automotive IndustryRiskpro Trainings Automotive Industry
Riskpro Trainings Automotive Industry
 
Riskpro Trainings Automotive Industry
Riskpro Trainings Automotive IndustryRiskpro Trainings Automotive Industry
Riskpro Trainings Automotive Industry
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability Management
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
 
Ta Security
Ta SecurityTa Security
Ta Security
 

Risk Taker Product Presentation V1.0 7th January 2008

  • 1. RiskTaker : Business Risk Management Enterprising risk management for teams and SME’s
  • 2. Contents  Risk Governance Overview  Why manage risks ?  Risk Maturity  Integrated Risk Management  Line Xero Introduction  RiskTaker  Award winning software  Reliable hardware  Support Services
  • 3. Why manage risks ? “A company's objectives, its internal organisation and the environment in which it operates are continually evolving and as a result, the risks it faces are continually changing. A sound system of internal control therefore depends on a thorough and regular evaluation of the nature and extent of the risks to which the company is exposed. Since profits are, in part, the reward for successful risk-taking in business, the purpose of internal control is to help manage and control risk appropriately rather than to eliminate it.” “The guidance is based on the adoption by a company's board of a risk-based approach to establishing a sound system of internal control and reviewing its effectiveness. This should be incorporated by the company within its normal management and governance processes. It should not be treated as a separate exercise undertaken to meet regulatory requirements.” Turnbull Report, September 1999
  • 4. The Evolution of Risk Management Previously Now  Historical risks only  Non-traditional risks  Expert management  Causes of risk  Statistical analysis  Organisation-wide involvement  Senior management buy-in  Risk indicators
  • 5. Risk Governance Maturity Maturing • Simplistic framework • Departmental • Limited corporate visibility • Risk exposure may be inaccurate • Mitigation plans may be used to identify priorities Mature • Flexible governance framework • Whole of company • Corporate visibility & control • Risk appetite known & monitored • Use of risk data to drive Immature investments & priorities • Risk management is ad-hoc • Individuals or small teams • No corporate visibility • Appetite & exposure unknown • Risk data not used to drive strategy
  • 6. Integrated risk management  Risk management must be a “whole of company” process  Requires board level buy-in to objectives and methods of risk management  Risks are controlled at the appropriate level within the business, by the most appropriate people  Control & management of risks must be part of the normal business process – not an add-on or afterthought  Risks must be balanced at the corporate level  Without risk co-ordination, perceived risks may be blown out of proportion  There must be mechanisms to escalate risks to the appropriate level.  The risk management system needs to support the risk process without being intrusive  Intrusion usually results in non-use  Risk co-ordination & challenge processes become “big stick” exercises.
  • 7. Integrating RM & strategic processes Quantify risk Identify risks Identify risk: Impact & Agree acceptable & understand Related actions mitigation Risk levels origins required Cost/benefit Identify actions Monitor Monitor external Update Agree strategic Required & likely implementation & internal Assumptions & goals effects of actions changes goals
  • 8. Line Xero : Company Overview  Formed in 1990 as an IT strategy consultancy  Provides IT Design Authority services to a number of FTSE-100 companies  Created XeroRisk as a product in 2004  Originally built for United Utilities  Strong take up in asset intensive & regulated businesses  Launched RiskTaker in 2008  Operates e-commerce web application facilities on behalf of several Internet based businesses
  • 9. Line Xero: RiskTaker Overview  Licensing  Easy& flexible licensing schemes  Web based purchasing process ensures no “down time”  Support  Dedicated RiskTaker support team – email, telephone and self- service portal options available  Maintenance  Clearroadmap – XeroRisk release + 1 month  Maintenance contract to cover support and new releases
  • 10. RiskTaker: A risk management solution  Fully web based application  Integrates with existing business processes  Simple to deploy  Very intuitive to use  Risks identified, managed & controlled “on the ground”  Corporate exposure valued & monitored through escalation and aggregation
  • 12. RiskTaker Features  Full organisation model support  Role based security  Fully configurable risk assessment categories & levels  Email escalation & notification  Full audit trail of all user risk management activities  Built in reporting functions include Excel export, graphs etc  Support for unlimited risks, organisation units, hierarchy levels
  • 13. A flexible deployment solution  Quick Implementation  RiskTaker doesn’t require installation on each client  Supplied as a pre-configured appliance – simply plug in and go.  Reduced support costs  New releases & updates are installed on central servers  Does not impact desktop builds or current security policies  True Thin-Client  There are no ActiveX or Java components downloaded to the client  Partners or contractors can be quickly added without IS intervention  Low client hardware demands  Only a standard web browser is required for access  Integrates with standard or thin client desktops (e.g. Citrix)  Industry leading components  Windows 2003 Server R2 or higher (Windows 2003 R2 Advanced server recommended)  Microsoft SQL Server 2000 (Microsoft SQL Server 2005 SP2 recommended)
  • 14. Reliable Hardware  Dedicated appliance pre-configured with the latest RiskTaker software version  All third party components licensed through the RiskTaker license  Simply plug into your network and run  Eliminates expensive server hardware and complex installation  No co-existence issues to complicate the support requirements.  Can be upgraded as the business grows  Additional memory and/or processors  Additional licenses to increase RiskTaker users
  • 15. Support Services  Dedicated Support Team  Web portal – Online submission of low priority support requests, access to FAQ’s and upgrades  Phone – Support for urgent requests including hardware failures, software errors and problems with licensing and upgrade services  Email – Dedicated email queue monitored by the support team  Hosting Service  If you cannot host your own RiskTaker appliance, Line Xero can do it for you – simply access your RiskTaker over the Internet  Licensing Service  Fully automated licensing service ensures additional licenses can be added without waiting for purchase approvals  Temporary licensing possible for short-term projects & programmes.  Migration Services  For RiskTaker installations growing beyond the scalability of the hardware, an upgrade to hosted XeroRisk canbe performed  Data is transferred securely from RiskTaker to the hosted XeroRisk installation with no loss of information

Notas do Editor

  1. Talk about the agenda in terms of why risk governance is needed, through an overview of Line Xero and its capabilities and finally onto XeroRisk itself. We will look briefly at the product roadmap which is provided at least bi-annually to the customers for input and priorities.
  2. Background to risk management. Increasing use of regulatory, legal and litigation pressures has forced the risk governance agenda. It’s nothing new but the visibility has increased…
  3. Talk about project management and financial risk governance as being the typical scenarios. Solutions that supported these areas are either extremely complex & specialist or are built into project management toolsets – e.g. Primavera Corporate & business risks are not widely catered for. Prior to implementation in UU there were 3 “other” risk systems (H&S, Display Screen Equipment, Leakage) plus a plethora of spreadsheets to manage project risks.
  4. Cash positive company – No debts, loans etc Capability in application development, support and application hosting services
  5. Development team – 3, Support team – 5 + partners