<risk> Enterprise Risk Management

Similar documents
Innovation in Work Health and Safety Solutions

<workers> Online Claims and Injury Management

<cloud> Secure Hosting Services

Case Study: ICICI BANK INTERNAL AUDIT DEPARTMENT PENTANA AUDIT WORK SYSTEM IMPLEMENTATION

Audit & Inspection Management. Enterprise Cloud Audit & Inspection Management Solution

RSA ARCHER OPERATIONAL RISK MANAGEMENT

Risk & Hazard Management

Enterprise Risk Management in Compliance 360

Incident Reporting & Management

Action/Task Management

Claims Management for the London Market

Business information management software that moulds to your needs...

COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS

Web Based Management Systems ebms

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES

IT Service Continuity Management PinkVERIFY

HP Service Manager software. The HP next-generation IT Service Management solution is the industry-leading consolidated IT service desk.

Case Management. itouch Vision. This document gives an overview of Case management and discusses the different features and functionality.

COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS

HP Service Manager software

A full business solution that streamlines the property and financial management aspects of the

Ultracomms Cloud Solutions

Audit & Inspection Management. Enterprise Cloud Audit & Inspection Management Solution

Vistara Lifecycle Management

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

IT Service Management with System Center Service Manager

CorHousing. CorHousing provides performance indicator, risk and project management templates for the UK Social Housing sector including:

PRIME IDENTITY MANAGEMENT CORE

DOBUS And SBL Cloud Services Brochure

IBM Cognos Training: Course Brochure. Simpson Associates: SERVICE associates.co.uk

MAS 200. MAS 200 for SQL Server Introduction and Overview

ORACLE HYPERION PLANNING

IT Services. We re the IT in OrganIsaTion. Large Organisations

White Paper. Simplify SSL Certificate Management Across the Enterprise

LEVERAGE TECHNOLOGY TO EMPOWER INTERNAL AUDIT

Information Technology for Health Insurance

Accelerating the path to SAP BW powered by SAP HANA

Identify your future leaders with Kallidus Talent

Become more agile with Cloud services

The National Commission of Audit

Functional and technical specifications. Background

WelcomRisk. For organizations looking to improve project performance through proactive risk management.

IT Service Management with System Center Service Manager

Track-It! 8.5. The World s Most Widely Installed Help Desk and Asset Management Solution

Simply Sophisticated. Information Security and Compliance

ASSET ARENA PROCESS MANAGEMENT. Frequently Asked Questions

G-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS

Peregrine. AssetCenter. Product Documentation. Asset Tracking solution. Part No. DAC-441-EN38

The Requirements Compliance Matrix columns are defined as follows:

Symantec ediscovery Platform, powered by Clearwell

ADDENDUM 5 TO APPENDIX 4 TO SCHEDULE 3.3

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS)

Incorporate CMMI with Corporate Governance Using Enterprise Software Change Management Solutions

How To Use Intacct

Enterprise Workforce Management Solutions

ElegantJ BI. White Paper. The Enterprise Option Reporting Tools vs. Business Intelligence

SeeSOR.NET. Quality Management Approach and Technology of SeeSOR.NET.

Decision Maker's Guide - Evaluation Checklist for ITSM Solutions High Level Requirements

PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution

data sheet ORACLE DAILY BUSINESS INTELLIGENCE

White Paper. Contract Document Management with SharePoint. Conceive. Build. Succeed.

How Microsoft IT India s Test Organization Enabled Efficient Business Intelligence

Veritas ediscovery Platform

Digital Document Processing

WebFOCUS Cloud Express. The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions Ltd.

WHITE PAPER. Media Planning and Collaboration Platform

Xerox Workflow Automation Services Solutions Brochure. Xerox DocuShare 7.0. Enterprise content management for every organization.

Digital Marketplace - G-Cloud

How To Improve Your Business

Simplify SSL Certificate Management Across the Enterprise

Monitoring & Testing

InforCloudSuite. Business. Overview INFOR CLOUDSUITE BUSINESS 1

// your essential partner CLOUD

Oracle Hyperion Planning

How To Choose A Business Intelligence Toolkit

Case Management powered by Microsoft Dynamics CRM

Product Overview. acing.com

ACCESS INTELLIGENCE. an intelligent step beyond Access Management. White Paper

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff

CRGroup Whitepaper: Digging through the Data. Reporting Options in Microsoft Dynamics GP

Optimizing government and insurance claims management with IBM Case Manager

MOVING BEYOND QUICKBOOKS: Why now s the time to graduate to professional financial management software

Course 20465C: Designing a Data Solution with Microsoft SQL Server

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

MAGENTA KEYLINE IS A CUTTER GUIDE, DO NOT PRINT. PLEASE SET TRAPPING THROUGHOUT

Web project proposal. European e-skills Association

Oracle s Primavera P6 Enterprise Project Portfolio Management

Business Process Management & Workflow Solutions

Visualize, Optimize and Strategize Your Workforce

Hosted Treasury Management Solution

The Enterprise IT Cloud Company

Transcription:

Global Resources... Local Knowledge is vital in supporting business continuity across diverse and challenging environments and operating models. By consolidating risk management activities into a single, cloud-accessed management platform, Figtree empowers organisations with the necessary tools to support due diligence, accountability and sound commercial decision-making. NTT DATA Figtree Systems is a global software developer that provides business applications and cloud-based management tools to support organisations in driving efficient workflow, resource allocation, record management and mobility. Operating across public and private sectors, we provide solutions for, Workplace Health and Safety, Claims Management, and Fleet and Asset Management. Our typical clients include Third Party Claims Administrators, Self-insured Corporations and Government at all levels. Figtree Benefits Schedule, allocate and prioritise risk management processes under a single systemised governance framework. Create structure through paper-free risk identification, categorisation and record management. Tailor risk management accountabilities and escalation points according to organisational structure and business operating model. Access software service via cloud, with no requirement for in-house infrastructure or upkeep. Establish control measures and track effectiveness of risk reduction activities. Support commercial decision making through comprehensive Risk Assessments and ad hoc performance reporting. Reduce risk of litigation through verifiable due diligence and compliance. Deliver consistency via a transparent and accessible Risk Library that shares experience and results across different business units and departments. Promote an enterprise culture of risk awareness and accountability. Enable scalable and secure risk management practices that support enterprise mobility. Since commencing business in 1983, a focus on research and development has allowed NTT DATA Figtree Systems to grow and adapt alongside a valued group of international clientele. By retaining and developing our specialist consultants, developers and client service staff, we ensure our clients are supported by management tools that are scalable, secure and effective in an evolving IT service space. Quick Facts 300+ clients. 60+ professionals. 30+ years in operation. 10 global locations. 15+ years providing hosted solutions. Subsidiary of NTT DATA Corporation. Certified Health & Safety AS/ NZS 4801: 2001, Sydney Head Office. Certified Information Security ISO/IEC 27001: 2013, Sydney Head Office.

Summary Inherent (44) Low 2.3% Moderate 2.3% Figtree equips organisations with the tools to coordinate risk management activities under a single consolidated risk management platform. Modelled around the framework of ISO 31000, Figtree supports risk identification, analysis, evaluation and control. Irrespective of your organisation s risk management strategy, our systemised governance framework ensures that tasks are allocated, accountability is enforced and processes are transparent, cyclic and subject to ongoing review. Risk Library Risk Register Functionality By contrast, traditional paper-based risk management systems can result in poor document security, inconsistent and loosely defined operational structures, timeconsuming manual reporting, and an inability to provide enterprise-level risk visibility and oversight. As a centralised management platform with remote system access, Figtree provides continuity, consistency and structure to risk management activities enterprise-wide. Secure Cloud Accessed Platform Establish Risk Context Integration and Deployment Managed software solution, providing quick, low risk implementation. Integrates with NTT DATA Figtree Systems Work Health and Safety application. Interface with enterprise HR systems for the transfer of employee information for escalation purposes. Legacy data transition to Figtree platform. Multi-language capability for global expansion. Legacy Data Transition Powerful Reporting Capability High 45.5% Extreme 50.0% Current (43) Low 27.9% Moderate 9.3% High 37.2% Extreme 25.6% Target (40) Low 77.5% Moderate 15.0% High 2.5% Extreme 5.0% Enterprise (6) Low 50.0% Moderate 16.7% High 16.7% Extreme 16.7% Risk Search Screen and define the appropriate review frequency. Follow up actions are supported by dashboards and email reminders to ensure users are notified of any upcoming reviews. Practice drills can be scheduled for business continuity planning and emergency management at userdefined frequencies to ensure the risk management plan is working as intended and the business is prepared should such events occur. defined time-frames, ensuring that controls remain effective for the entire life of the risk. To assist with reporting and management, key risks can be categorised as either Top or Summary Risks. By utilising Top and Summary Risks, users are able to create a hierarchy of associated risks and drive risk outcomes in line with the most critical risks identified by the business. The Risk Assessment Search Screen operates as a virtual Risk Register, in which users can actively filter and sort through a real-time risk database to identify insights and concern areas. The search functionality allows users to quickly narrow down their risk database according to key fields, as well as offering a high level view of risk via the summary screen. Risk visibility is determined by hierarchical user access. This means that management can be provided with a whole-of-enterprise view of risks, while individual business units and operational teams see only those risks that apply to them. Notes and Attachments Automated workflows Role-Based User Access Execute Actions Determine Controls Verifiable Audit Trails Perform Risk Assessments Quick, Low Risk Implementation Real-Time Dash Boards Multi Language Capability Establishing Risk Context Central functions of the risk management program are managed via the the Risk Context Module. By creating Context Records, users are able to develop business continuity programs, coordinate emergency management operations, and manage various functions and activities. Each Context Record is linked to its Risks, Controls and Actions and is defined in terms of internal and external risk context. Users are able to allocate the relevant consultation groups for each Context Record Performing Risk Assessments The Risk Assessment Module provides users with the ability to assess and evaluate risks at different stages of development and in line with control implementation. Figtree provides a multidimensional view of risks, allowing organisations to understand and measure risks in terms of their Inherent, Current (Residual), Target and Enterprise Risk. Once risks have been assessed, Figtree will prompt users for ongoing risk reviews as per user-

Controls and Actions Users add Controls to Risk Assessment Records to support risk mitigation and prevention. Driving the implementation of Controls, intelligent workflows automate reminders for individuals regarding their nominated tasks, with escalations sent to line managers where such tasks go beyond their due date. Figtree ensures that the Control s lifecycle is monitored as it progresses from the point of being raised to the point of implementation, as designated actions are completed. When adding Controls, users have an option to enable predetermined risk ratings. Once a Control is successfully implemented, the existing risk rating will automatically be adjusted to the predetermined risk rating value, as defined by the user. To ensure that there is no unnecessary duplication of information, Figtree also allows a single Control to be linked with a multitude of Risks. Ineffective Controls can be replaced or retired, or rejected if they are deemed inappropriate. Defining Risk Methodology As a scalable and dynamic risk management platform, Figtree ensures that organisations are able to coordinate and monitor activities in line with their business needs and risk management strategy. Figtree enables administrators to configure risk-ratings and define risk review periods and timeframes for implementing Controls, ensuring that outcomes delivered are appropriate for the business risk appetite. Depending on the business risk methodology and maturity level, users may turn various Risk Matrices on or off as is appropriate. A Risk s severity can be viewed within each Matrix as per the risk categories defined within the system Inherent, Current, Target and Enterprise. By allowing the utilisation of various Matrices simultaneously, Figtree provides extensive risk oversight and transparency, ensuring that the critical dimensions to the risk are captured and communicated. Risk Library Functionality Figtree s Risk Library functionality, allows Risk Assessments to be stored in a Library, along with their associated Controls. Users creating a Risk Context Record can reference the Library to leverage the knowledge and experience of other areas of the business. The Library function is best used when the same or similar risks have previously been assessed and controlled elsewhere in the business. Once extracted, Risk Assessments and Controls from the library can be modified by the user to ensure they appropriately reflect the context in which they are used. This provides a more consistent approach to risk management, significantly reducing data entry and increasing efficiency. 5 4 3 2 1 If score is <= 10 If score is >= 4 And <= If score is >= If score is > Risk Matrix Score Configuration Risk Context Risk ranges Figtree Entity Relationship Diagram 3 8 14 Compatible Applications 8 6 4 2 And <= Risk Assessment Claims and Injury Management <fleet> 7 13 15 12 9 6 3 Risk outcome Low Moderate High Extreme Control Measures 20 16 12 8 4 Risk review due 104 52 26 13 25 20 15 10 5 Mitigation timeframe 364 182 31 7 Corrective Actions <safety> Safety Management System <claims>

Real-Time Dashboards Visually appealing, functional realtime multi-series dashboards have been designed to manage all aspects of the solution, from risk reviews to outstanding actions, driving accountably and transparency throughout the system. Analytical dashboards allow users to identify trends quickly, with various filters applied to dashboards to pinpoint areas of concern. Standard and Ad Hoc Reporting Tools The system is packaged with a standard suite of user-friendly statistical and KPI reports, including risk registers and critical control reports, that can be run at any time with minimal input. The reporting functionality also provides the ability for users to create their own ad-hoc report templates or access report templates that others have created (depending on security rights). Reports can be exported from the system in different formats such as Microsoft Word, PDF and XML/CSV to suit the desired outcome, as well as for use in other report generators such as BIRT, Excel, Crystal and other third party report writers. Automated Workflow The Workflow Engine runs in the background and is designed to automate and standardise business processes and functions, therefore removing human error and delays. These processes include sending notifications and reminder emails for upcoming tasks, and automatically running and delivering reports to an employee s email inbox. Escalation processes ensure accountably with the system by automatically notifying a responsible person s line manager should a task not be completed within a designated timeframe. Figtree To support enterprise mobility, Figtree is deployed via a secure cloud based user interface and hosting service managed by NTT DATA Figtree Systems. Figtree removes the complexity and cost associated with the running and upkeep of an in-house IT system. As such, there is no need to purchase and maintain servers, computer rooms or virus protection, or to implement back-up tasks or expensive data security systems. These are all included as part of the standard Figtree service. Supported by a robust disaster recovery and backup service, Figtree provides remote systems access, whilst also ensuring your information is protected against the threat of unforseen events and ready to restore to working order in the event of an emergency. Enforced Accountability To ensure that there is accountability for risk management activities, Figtree ensures that each Risk Context, Risk, Control and Action Record have a dedicated record owner assigned to it. As a result, accountability for implementing and maintaining risk management processes, as well as ensuring the effectiveness of any Controls, is directly linked to individual users. The responsibility for individuals to complete defined tasks within Figtree is clear, measurable and absolute. Cloud Software Architecture Cloud Infrastructure Security Help Desk Support Servers and Routers Cloud System Infrastructure Figtree Service Overview Web-accessed User Interface Data Centre Facilities NTT DATA Figtree Systems Software Telecommunications and Utilities Upgrades and Maintenance of Software and Security Around the Clock Security Backup Power Supply Replicated Data Centre Standard Backup

Global Resources... Local Knowledge <fleet> <claims> Drawing upon over 30 years of experience we have the resources to deliver our applications in a secure cloud environment hosted in Australia to fully utilise <life> mobile and web technologies. <web> <fleet> Claims and Injury Management <fleet> <canvas> <safety> <fleet> <claims> <policy> Safety Management <claims> System Underwriting and Policy <life> Management <fleet> <life> <web> <claims> <web> <life> <canvas> Enterprise <fleet> Risk Management <canvas> <claims> <web> <fleet> <life> <claims> <policy> <canvas> <mobile> General Insurance Claims Management <policy> <web> <life> <claims> <canvas> <policy> <web> <life> <enterprise> Secure Hosting Services <canvas> <web> <policy> <canvas> <policy> Fleet and Asset Management Life and Disability Insurance Claims Management Mobile Deployment Solutions Business Rules Management System and Data Warehouse

Global Resources... Local Knowledge Visit www.figtreesystems.com for contact details