Resources

Update Login Method

With the upcoming major update (Version 8.0), we will be retiring the usage of username and will be using email address instead as the login method going forward. As to […]

Orders of Magnitude Improvement

Do any change initiatives that would deliver an order of magnitude improvement spring to mind? Striving to make a real difference, to find that major breakthrough, is a passion shared […]

Generating a bowtie from a HAZID study

When it comes to risk management, the first task any organisation must undertake is identification. A comprehensive and structured risk identification process across your operations will create a prioritised list […]

Critical Control Identification for Fatality Risk Programs: A simple solution using bowtie analysis

Most businesses coping with fatality risk scenarios have an appreciation of the importance of critical control identification. What is often missing is a simple but robust method of identifying the […]

Creating a live link between HAZOPs and LOPA: 3 key benefits of using safety case LOPA software

A safety case often follows a natural progression from hazard study (HAZOP) to layers of protection analysis (LOPA). What is missing is a real live link between your HAZOP work […]

Building a risk management system with the help of good software

Businesses dealing with risk need to take a systematic and structured approach to risk. How does risk management software help this approach? The ISO 31000 standard provides a good starting […]

5 Reasons to take on bowtie analysis using bowtie software

In Australia, businesses have a pretty good handle on risk. We understand that it’s there, and we take steps to grapple with it. But why do we so often use […]

5 Benefits of Using Cloud-based Risk Software

The cloud-based software revolution has arrived, and more cloud-based risk software is available than ever before. But what benefits do you actually get from cloud-based software? Here’s a short list […]

How to use performance standards – 3 helpful insights

Critical control verification relies on good performance standards in order to be effective.  Without some criteria by which to judge the placement and effectiveness of controls, we are unable to provide […]

How to use critical control performance standards for control verification

Critical control verification relies on good performance standards in order to be effective.  In part two of our series on performance standards, we look at how they can be structured and […]

How to configure and customise critical risk software to suit your risk approach

When it comes to mining critical risks, the terminology may change, but the core concepts remain strong. Getting your critical risk software to accommodate your risk approach need not be […]

How to build Principal Mining Hazard Management Plans using risk studies and bowtie analysis

Principal Mining Hazard Management Plans are a new fact of life for the mining sector, and they can take significant effort to develop. Here we’ll be looking at how you […]

How is Meercat RiskView implemented in your organisation?

There’s no doubt that in high-risk industries, any changes to operations or processes demand careful consideration, and you need to know that implementing changes isn’t going to leave you vulnerable. […]

Harmonising enterprise risk with health and safety using bowtie analysis

Enterprise risk management is a simple name used to describe a complex and diverse domain of risk management. But if the safety risk management approach is not working in tandem […]

Getting the best of both worlds: bowtie analysis, risk analytics and business intelligence

Every business that deals with principal hazards, major accident events or critical risks needs to have access to risk analytics.  Each site or operating area will have a hazard register, […]

Getting live critical control management reporting: escaping the month-end reporting cycle

The whole point of critical control management is to carefully monitor the performance of controls that save lives. Reporting on performance need not be a manual, periodic process: it can […]

Using bowtie cost benefit analysis to make better critical control investment decisions

The value of risk analysis is the contribution it makes to good decision-making, especially when it comes to investing in risk controls. Bowtie cost benefit analysis is a great way […]

Time for a hazop review? 3 benefits of HAZOP software

Risk reviews and re-evaluations form a continuous cycle in risk management systems. How can software make the process of risk reviews more efficient? New Year, new risk reviews? With a […]

The Resilience Tactic: A New Approach for Dynamic Risk Environments

Conventional risk thinking is rooted in the anticipation of risk: identifying known risk events, predicting their frequency and impact, and preparing organisations to survive those risks. In this model, risks […]

The no-nonsense approach to critical risks in mining & resources

The resources sector is one of the highest risk areas when it comes to workplace fatalities. In 2016, a total of 49 workers died in Australia extracting natural resources (including […]

Setting up your base controls – the comprehensive guide to risk control setup – Part 1

Whether you call them common controls, master controls, major accident hazard controls, your library of standardised and auditable controls can really empower your risk system.  RiskView encourages you to build […]

Safety audits: Introducing 4 new improvements to boost the efficiency of audits

Safety audits, control assurance and verification are essential elements of any risk management system. The effectiveness of the measures used to mitigate risk must be verified in practice, not just […]

Risk management needs resilience thinking: implications for risk modelling, LOPA and emerging tech

Article by Peter Lacey at Meercat The idea of resilience is not new in the field of risk management, but the degree of emphasis placed on it certainly is. What […]

Work smarter with bowtie analysis software: the types of bowtie software

There are a few different bowtie analysis software packages on the market, so what’s the difference? There are three distinct features that can make all the difference. If you’re currently […]

PID, ProSafe and the License to Operate

PROSAFE 2016 is on next week. The context setter is the following quote by Douglas Adams: Human beings, who are almost unique in having the ability to learn from the […]

Performance monitoring with the Meercat RiskView dashboard

By now, almost everyone has switched attention from delivering risk reports with lovely graphs to worrying about verifying the controls that are keeping those risks in check. Still, there were […]

One way to Simplify Risk Management

For organisations that operate complex processes involving high energy interaction or exposure risks, threat to life justifiably holds the gravest concern. Comprehensive management of these challenges are critical to ensure […]

Need help with a safety case? Insight is the key to improving your submissions

Safety case submissions are a fact of life for many safety and risk professionals. You may not be able to avoid them, but you can certainly build them faster and […]

Moving from risk spreadsheets to a bowtie risk register

Conventional risk spreadsheets work well in particular contexts. They offer simplicity and ease of use, at the cost of a deeper understanding of risk. How does one take the plunge […]

Meercat exhibits at Hazards 2018

Meercat exhibited and presented at the Hazards Australasia 2018 conference in Perth last week, showcasing a number major innovations in its flagship RiskView software system.  Run by The Institution of […]

Media Release: Meercat RiskView Enterprise brings distributed risk and assurance under control

4 September 2018 Designing and delivering a top-down risk and assurance management programme is a complex logistical challenge. Site managers have a range of local idiosyncrasies to consider, including customers […]

Maps and Territories

As I have often said, the risk bowtie is a map. Thinking of it as a map means that it leverages the mental and historical baggage that has been attached […]

Mapping of Quantitative Values to Qualitative Options

A question that has been asked by many users: “When I perform a semi-quantitative risk assessment on my bowtie, how will the system know which likelihood value to pick for […]

Improving frontline safety culture through knowledge

Many professionals in the safety sector will encounter difficulties with frontline safety culture (especially in improving or changing that culture).  The rub lies in impressing the importance of safety on […]

Implementation of bowtie registers and critical controls: The new Register Type functionality

Businesses that are moving to a critical control management approach encounter a key challenge in propagating the approach downward (particularly for larger businesses with upstream and downstream divisions and multiple […]

Untying the bowtie to understand probability

When it comes to calculating risk, it’s pointless dealing in absolutes. Much of the work we do involves locking down possible scenarios so that a shared understanding can be achieved, […]

Setting up Base Controls – the comprehensive guide to risk control setup – Part 2

Part 1 of this series of articles looked at the concepts and general approach to smart base control setup.  If you’ve made it here, you’re ready to take those ideas […]

The Twelve Virtues of the Wise

Always on the lookout for that obscure source that might light the fire of insight, I read through much of “Artificial Intelligence as a Positive and Negative Factor in Global […]

Scaling Bowtie Registers and Critical Controls with Register Types

Businesses that are moving to a critical control management approach encounter a key challenge in propagating the approach downward (particularly for larger businesses with upstream and downstream divisions and multiple […]

Using One Platform for Bowtie, LOPA and Quantitative Risk Assessments

Many industries are embracing the use of bowties and layers of protection analysis to get to grips with the way their risk works.  Some professionals, such as process safety engineers, […]

Cyber Risk Assessments: ISO 27005 and the Bowtie model

It is often the case in risk practice that the risk assessment becomes an activity in going-through-the-motions: because so many risks are well known and theoretically well-controlled.  This certainly cannot […]

A risk-based approach to EHS system auditing

The safety management system is usually the backbone of an organisation’s approach to safety and general EHS risk.  These systems provide much-needed structure to an overall risk-based approach to protecting […]

Cyber Security Assurance Built on Bowtie Risk Analysis

The field of cyber security risk is so complex because the threat landscape is ever-changing and the threats themselves can be constant.  Cyber security assurance becomes vital because cyber controls […]

The Resilience Tactic: A New Approach for Dynamic Risk Environments

Conventional risk thinking is rooted in the anticipation of risk: identifying known risk events, predicting their frequency and impact, and preparing organisations to survive those risks. In this model, risks […]

Meercat RiskView Enterprise brings distributed risk and assurance under control

4 September 2018 Designing and delivering a top-down risk and assurance management programme is a complex logistical challenge. Site managers have a range of local idiosyncrasies to consider, including customers […]

The (In)Completeness of our Modelling

I’ve maintained a strong interest in climate change since the debate started. The logic connecting the effects of burning the concentrated biomass from roughly 1.3 billion years of springs, summers, […]

Meercat RiskView is now 100% aligned with the ISO 27002 Code of Practice

Should we go for cloud-based risk management software or a hosted system? One of the decisions every Risk Manager has to make is, should we go for cloud-based risk management […]

Best-Practice in Risk Control Software

Operating an efficient critical control verification process can be a real struggle. The month to month grind of completing verifications and compiling results on even small sites consumers precious time. […]

Incorporating human factors in bowtie risk assessment: 3 simple methods for handling human error

A common saying starts with “To Err is Human…” We as humans are not infallible: Any activity involving human action is vulnerable to human failure. These failures can include: errors […]

3 tips to manage an enterprise-wide risk register

Once you have a few work sites up and running, it becomes a challenge to manage your risk register across the business. Here are some tips on how to manage […]

3 Benefits of Connecting In-Field Critical Control Verification with your Risk Register

Critical control verification is an essential aspect of a mine safety management system. Without it, there is no assurance that fatality risks are effectively controlled. But how can we link […]

Multiplier on Preventative/Mitigative Risk Controls

Previously, all Risk Controls (Preventative and Mitigative) apply the same risk reduction to the causal/consequential pathway. Sometimes a mitigative control will not be as effectiveness as a preventative control (even […]

Dashboard Pages

having multiple pages that any user can quickly switch between each page covers a particular facet of the risk management and assurance process pages can be clearly titled describing what […]

Global Searching

every piece of risk data being available instantly being able to access all data direct from the search results clear visibility of what the item is and its context limiting […]

Mini Properties Panel on Bowties

building a bowtie with keyboard, mouse or finger in record time and with minimal training having a bowtie calculating residual risk in front of your eyes with zero technical understanding […]

Bowtie Filtering

there are a lot of nodes on the screen at any one time rejected nodes take up space inactive pathways take up space the focus is almost always on one […]

Cause Contribution Calculation

Overview Calculating bowties is complicated process, especially when they are large and/or some of the calculations involve cyclical or repetitive formulas. We’ve recently found a situation where these elements come […]

Bowtie Perspectives

There are many uses for a bowtie and with each use comes the requirement for a consistent visual format that highlights the important. Bowtie Perspectives let you capture and apply […]

Safety in Design Conference Presentation

Safety in Design Conference last week and delivered a paper on our work so far implementing RiskView within IPL. To quote from the summary: Day two of the event included […]

Update Login Method

With the upcoming major update (Version 8.0), we will be retiring the usage of username and will be using email address instead as the login method going forward. As to […]

Orders of Magnitude Improvement

Do any change initiatives that would deliver an order of magnitude improvement spring to mind? Striving to make a real difference, to find that major breakthrough, is a passion shared […]

Generating a bowtie from a HAZID study

When it comes to risk management, the first task any organisation must undertake is identification. A comprehensive and structured risk identification process across your operations will create a prioritised list […]

Critical Control Identification for Fatality Risk Programs: A simple solution using bowtie analysis

Most businesses coping with fatality risk scenarios have an appreciation of the importance of critical control identification. What is often missing is a simple but robust method of identifying the […]

Creating a live link between HAZOPs and LOPA: 3 key benefits of using safety case LOPA software

A safety case often follows a natural progression from hazard study (HAZOP) to layers of protection analysis (LOPA). What is missing is a real live link between your HAZOP work […]

Building a risk management system with the help of good software

Businesses dealing with risk need to take a systematic and structured approach to risk. How does risk management software help this approach? The ISO 31000 standard provides a good starting […]

5 Reasons to take on bowtie analysis using bowtie software

In Australia, businesses have a pretty good handle on risk. We understand that it’s there, and we take steps to grapple with it. But why do we so often use […]

5 Benefits of Using Cloud-based Risk Software

The cloud-based software revolution has arrived, and more cloud-based risk software is available than ever before. But what benefits do you actually get from cloud-based software? Here’s a short list […]

How to use performance standards – 3 helpful insights

Critical control verification relies on good performance standards in order to be effective.  Without some criteria by which to judge the placement and effectiveness of controls, we are unable to provide […]

How to use critical control performance standards for control verification

Critical control verification relies on good performance standards in order to be effective.  In part two of our series on performance standards, we look at how they can be structured and […]

How to configure and customise critical risk software to suit your risk approach

When it comes to mining critical risks, the terminology may change, but the core concepts remain strong. Getting your critical risk software to accommodate your risk approach need not be […]

How to build Principal Mining Hazard Management Plans using risk studies and bowtie analysis

Principal Mining Hazard Management Plans are a new fact of life for the mining sector, and they can take significant effort to develop. Here we’ll be looking at how you […]

How is Meercat RiskView implemented in your organisation?

There’s no doubt that in high-risk industries, any changes to operations or processes demand careful consideration, and you need to know that implementing changes isn’t going to leave you vulnerable. […]

Harmonising enterprise risk with health and safety using bowtie analysis

Enterprise risk management is a simple name used to describe a complex and diverse domain of risk management. But if the safety risk management approach is not working in tandem […]

Getting the best of both worlds: bowtie analysis, risk analytics and business intelligence

Every business that deals with principal hazards, major accident events or critical risks needs to have access to risk analytics.  Each site or operating area will have a hazard register, […]

Getting live critical control management reporting: escaping the month-end reporting cycle

The whole point of critical control management is to carefully monitor the performance of controls that save lives. Reporting on performance need not be a manual, periodic process: it can […]

Using bowtie cost benefit analysis to make better critical control investment decisions

The value of risk analysis is the contribution it makes to good decision-making, especially when it comes to investing in risk controls. Bowtie cost benefit analysis is a great way […]

Time for a hazop review? 3 benefits of HAZOP software

Risk reviews and re-evaluations form a continuous cycle in risk management systems. How can software make the process of risk reviews more efficient? New Year, new risk reviews? With a […]

The Resilience Tactic: A New Approach for Dynamic Risk Environments

Conventional risk thinking is rooted in the anticipation of risk: identifying known risk events, predicting their frequency and impact, and preparing organisations to survive those risks. In this model, risks […]

The no-nonsense approach to critical risks in mining & resources

The resources sector is one of the highest risk areas when it comes to workplace fatalities. In 2016, a total of 49 workers died in Australia extracting natural resources (including […]

Setting up your base controls – the comprehensive guide to risk control setup – Part 1

Whether you call them common controls, master controls, major accident hazard controls, your library of standardised and auditable controls can really empower your risk system.  RiskView encourages you to build […]

Safety audits: Introducing 4 new improvements to boost the efficiency of audits

Safety audits, control assurance and verification are essential elements of any risk management system. The effectiveness of the measures used to mitigate risk must be verified in practice, not just […]

Risk management needs resilience thinking: implications for risk modelling, LOPA and emerging tech

Article by Peter Lacey at Meercat The idea of resilience is not new in the field of risk management, but the degree of emphasis placed on it certainly is. What […]

Work smarter with bowtie analysis software: the types of bowtie software

There are a few different bowtie analysis software packages on the market, so what’s the difference? There are three distinct features that can make all the difference. If you’re currently […]

PID, ProSafe and the License to Operate

PROSAFE 2016 is on next week. The context setter is the following quote by Douglas Adams: Human beings, who are almost unique in having the ability to learn from the […]

Performance monitoring with the Meercat RiskView dashboard

By now, almost everyone has switched attention from delivering risk reports with lovely graphs to worrying about verifying the controls that are keeping those risks in check. Still, there were […]

One way to Simplify Risk Management

For organisations that operate complex processes involving high energy interaction or exposure risks, threat to life justifiably holds the gravest concern. Comprehensive management of these challenges are critical to ensure […]

Need help with a safety case? Insight is the key to improving your submissions

Safety case submissions are a fact of life for many safety and risk professionals. You may not be able to avoid them, but you can certainly build them faster and […]

Moving from risk spreadsheets to a bowtie risk register

Conventional risk spreadsheets work well in particular contexts. They offer simplicity and ease of use, at the cost of a deeper understanding of risk. How does one take the plunge […]

Meercat exhibits at Hazards 2018

Meercat exhibited and presented at the Hazards Australasia 2018 conference in Perth last week, showcasing a number major innovations in its flagship RiskView software system.  Run by The Institution of […]

Media Release: Meercat RiskView Enterprise brings distributed risk and assurance under control

4 September 2018 Designing and delivering a top-down risk and assurance management programme is a complex logistical challenge. Site managers have a range of local idiosyncrasies to consider, including customers […]

Maps and Territories

As I have often said, the risk bowtie is a map. Thinking of it as a map means that it leverages the mental and historical baggage that has been attached […]

Mapping of Quantitative Values to Qualitative Options

A question that has been asked by many users: “When I perform a semi-quantitative risk assessment on my bowtie, how will the system know which likelihood value to pick for […]

Improving frontline safety culture through knowledge

Many professionals in the safety sector will encounter difficulties with frontline safety culture (especially in improving or changing that culture).  The rub lies in impressing the importance of safety on […]

Implementation of bowtie registers and critical controls: The new Register Type functionality

Businesses that are moving to a critical control management approach encounter a key challenge in propagating the approach downward (particularly for larger businesses with upstream and downstream divisions and multiple […]

Untying the bowtie to understand probability

When it comes to calculating risk, it’s pointless dealing in absolutes. Much of the work we do involves locking down possible scenarios so that a shared understanding can be achieved, […]

Setting up Base Controls – the comprehensive guide to risk control setup – Part 2

Part 1 of this series of articles looked at the concepts and general approach to smart base control setup.  If you’ve made it here, you’re ready to take those ideas […]

The Twelve Virtues of the Wise

Always on the lookout for that obscure source that might light the fire of insight, I read through much of “Artificial Intelligence as a Positive and Negative Factor in Global […]

Scaling Bowtie Registers and Critical Controls with Register Types

Businesses that are moving to a critical control management approach encounter a key challenge in propagating the approach downward (particularly for larger businesses with upstream and downstream divisions and multiple […]

Using One Platform for Bowtie, LOPA and Quantitative Risk Assessments

Many industries are embracing the use of bowties and layers of protection analysis to get to grips with the way their risk works.  Some professionals, such as process safety engineers, […]

Cyber Risk Assessments: ISO 27005 and the Bowtie model

It is often the case in risk practice that the risk assessment becomes an activity in going-through-the-motions: because so many risks are well known and theoretically well-controlled.  This certainly cannot […]

A risk-based approach to EHS system auditing

The safety management system is usually the backbone of an organisation’s approach to safety and general EHS risk.  These systems provide much-needed structure to an overall risk-based approach to protecting […]

Cyber Security Assurance Built on Bowtie Risk Analysis

The field of cyber security risk is so complex because the threat landscape is ever-changing and the threats themselves can be constant.  Cyber security assurance becomes vital because cyber controls […]

The Resilience Tactic: A New Approach for Dynamic Risk Environments

Conventional risk thinking is rooted in the anticipation of risk: identifying known risk events, predicting their frequency and impact, and preparing organisations to survive those risks. In this model, risks […]

Meercat RiskView Enterprise brings distributed risk and assurance under control

4 September 2018 Designing and delivering a top-down risk and assurance management programme is a complex logistical challenge. Site managers have a range of local idiosyncrasies to consider, including customers […]

The (In)Completeness of our Modelling

I’ve maintained a strong interest in climate change since the debate started. The logic connecting the effects of burning the concentrated biomass from roughly 1.3 billion years of springs, summers, […]

Meercat RiskView is now 100% aligned with the ISO 27002 Code of Practice

Should we go for cloud-based risk management software or a hosted system? One of the decisions every Risk Manager has to make is, should we go for cloud-based risk management […]

Best-Practice in Risk Control Software

Operating an efficient critical control verification process can be a real struggle. The month to month grind of completing verifications and compiling results on even small sites consumers precious time. […]

Incorporating human factors in bowtie risk assessment: 3 simple methods for handling human error

A common saying starts with “To Err is Human…” We as humans are not infallible: Any activity involving human action is vulnerable to human failure. These failures can include: errors […]

3 tips to manage an enterprise-wide risk register

Once you have a few work sites up and running, it becomes a challenge to manage your risk register across the business. Here are some tips on how to manage […]

3 Benefits of Connecting In-Field Critical Control Verification with your Risk Register

Critical control verification is an essential aspect of a mine safety management system. Without it, there is no assurance that fatality risks are effectively controlled. But how can we link […]

Multiplier on Preventative/Mitigative Risk Controls

Previously, all Risk Controls (Preventative and Mitigative) apply the same risk reduction to the causal/consequential pathway. Sometimes a mitigative control will not be as effectiveness as a preventative control (even […]

Dashboard Pages

having multiple pages that any user can quickly switch between each page covers a particular facet of the risk management and assurance process pages can be clearly titled describing what […]

Global Searching

every piece of risk data being available instantly being able to access all data direct from the search results clear visibility of what the item is and its context limiting […]

Mini Properties Panel on Bowties

building a bowtie with keyboard, mouse or finger in record time and with minimal training having a bowtie calculating residual risk in front of your eyes with zero technical understanding […]

Bowtie Filtering

there are a lot of nodes on the screen at any one time rejected nodes take up space inactive pathways take up space the focus is almost always on one […]

Cause Contribution Calculation

Overview Calculating bowties is complicated process, especially when they are large and/or some of the calculations involve cyclical or repetitive formulas. We’ve recently found a situation where these elements come […]

Bowtie Perspectives

There are many uses for a bowtie and with each use comes the requirement for a consistent visual format that highlights the important. Bowtie Perspectives let you capture and apply […]

Safety in Design Conference Presentation

Safety in Design Conference last week and delivered a paper on our work so far implementing RiskView within IPL. To quote from the summary: Day two of the event included […]