How to handle a risk incident?

Learn about the mechanisms of the risk management system that enable comprehensive incident management from registration of a report, through documentation update, to reporting. We developed an exemplary scenario of system use, planned individual steps, and then recorded material that shows the use of the system from the level of two different users: Secondary Risk Owner and Risk Manager. Read the scenario, then watch our video material and evaluate the performance of the erisk risk management system.

Use case

HANDLING OF A RISK INCIDENT

System users

Secondary Risk Owner
Risk Manager

Use case scenario

The Secondary Risk Owner reports the risk incident so that the Risk Manager can handle it and take corrective actions. As a result of this action, the risk register and incident handling report are updated.

1
The user (risk assessor) reports the incident

The user selects the appropriate incident reporting form.

2
Incident Handling

The Risk Manager or another responsible person verifies the incident report, assigns the incident to the selected risk.

3
Incident monitoring

The Secondary Risk Owner analyzes the reported incidents, assigned to the risk for which he/she is responsible.

4
Incident reporting

The Risk Manager analyzes incident reports using reports.

Watch
the video

How to assess the risk in the erisk system?

Watch our demo videos. Learn the mechanisms of the risk management system. We developed a sample system use scenario and then recorded material that presents the functionalities of the risk management software in the area of risk assessment. We will present the process from the perspective of the Secondary Risk Owner and the Risk Manager, who will analyze the risk assessment and approve the changes made. We will also present the report view, which enables efficient verification of the assessment process by stages. The following scenario shows the various steps that are performed in the recording. Watch our video and evaluate the performance of the erisk risk management system. See how easy it is!

Use case

RISK ASSESSMENT IN THE ERISK SYSTEM

System users

Secondary Risk Owner
Risk Manager

Use case scenario

The Secondary Risk Owner performs risk assessment in accordance with the risk management methodology implemented in the software. The system automatically generates prompts. The results of the assessment are collected and saved in the system on an ongoing basis. The Risk Manager presents and analyzes data using reports.

1
The Secondary Risk Owner assesses the risk

The Secondary Risk Owner selects and assesses the risk from the risk register in accordance with the ERM form.

2
Risk Manager verifies the risk assessment

The Risk Manager verifies the course of the risk assessment. He monitors unacceptable risks.

3
Reporting the course of the risk assessment

Presentation of the results of the “risk assessment” from the access level of the Risk Manager or Secondary Risk Owner, taking into account current and historical data.

Watch
the video

How to analyze data using dedicated reports?

Learn about the mechanisms of the risk management system that enable comprehensive analysis and reporting in erisk. We developed an exemplary scenario of using the system, planned the individual steps, and then recorded a material that presents the functionalities of the risk management software in areas related to the automation of reporting in erisk. We present the activities carried out from the perspective of a Risk Manager who generates reports of interest based on current data available in real time. Read the scenario, then watch our video and evaluate the operation of the erisk risk management system.

Use case

ANALYSIS AND REPORTS IN ERISK.

System users

Secondary Risk Owner
Risk Manager

Use case scenario

The Risk Manager wants to analyze data using dedicated reports.

1
The Risk Manager selects the report data.

In the wizard, the Risk Manager selects what data he wants to see in the report.

2
Data visualization.

The system presents the results of the report. The Risk Manager chooses a convenient form of result visualization.

3
Report examples.

The Risk Manager switches to any report format: BIA, risk count, business continuity risk map. 

Watch
the video

All Use Case examples