New Articles

  1. Overall Bow-Tie Diagram

    Overview The Bowtie method is a risk evaluation method that can be used to analyze and demonstrate causal relationships in risk scenarios. The method takes its name from the shape of the diagram that you create, which looks like a men’s bowtie. ...
  2. Bow-Tie Diagram To Objectives

    Overview This page displays the Bow-tie diagram To specific Objectives.  The bow-time diagram of the Event " Failed Integration with Failure Monitoring System Network " to the objective " Public Relations "  is displayed below. The selecte...
  3. Bow-Tie Diagram From Threats

    Overview This page displays the Bow-tie diagram from specific Threats.  In Riskion, we refer to threats , causes , hazards , and sources  interchangeably.  While they may have slightly different nuances depending on the context in which th...
  4. Identify Controls

    Overview Controls   can be a combination of people, processes, and tools that are put in place to prevent, detect, or correct issues caused by unwanted events. Controls can also be referred to as Treatments , or as specified from the Workgroup...
  5. Overall Less Exceedance Curve (LEC)

    Overview The LEC represents the annual frequency whereupon a determining economic loss will be exceeded. It is the most important and strongest measurement of risk since it provides basic information for the planning and appropriation of the re...
  6. Controls for Threats

    Controls for Threats/Sources can be viewed, added, and assigned to this page.  The Controls for Threats/Sources are listed as rows under the "Control Name" column, and the succeeding columns headings to the right are the threats/sources.  You ca...
  7. Controls for Event Vulnerabilities (by Event)

    Controls for Events Vulnerabilities can be viewed, added, and assigned to this page.  Here the controls are being assigned to one selected event given the threats/sources.  From the grid above, you can assign the potential controls to mitigate ...
  8. Measurement Methods for Controls for Threats

    On this page, you can define the measurement method to use when evaluating the Controls for Threats/Sources.  The Controls for Threats/Sources are listed as rows under the "Control Name" column, and the succeeding column headings to the right ar...
  9. Controls for Event Consequences (by Event)

    Controls to mitigate Events Consequences can be viewed, added, and assigned to this page.  Here the controls are being assigned to one selected event with respect to Objectives.  From the grid above, you can assign the potential controls to mit...
  10. Controls for Event Vulnerabilities (by Control)

    In addition to managing (view, add, assign) the Controls for Events Vulnerabilities for one selected event at a time (by Event) , you can also perform the same actions for one selected control at a time (by Control). From the grid above, you c...