HOPEX GRC Common Features
About the GRC Manager Desktop
Accessing the GRC Desktop
Profiles used in GRC solutions
GRC Profiles/Solutions Summary
The GRC Documentation
GRC Functional Administration
Reusing Regulation Data
Converting Regulation Data
Managing Teams
Creating skill types
Creating skills
Creating skill levels
Viewing user skills
Managing Currencies
Defining Central Currency
Defining local currencies available to users
Specifying your local currency
Managing Exchange Rates
Configuring Time Sheets
Managing Campaign Calendars
Creating schedules
Creating calendar periods
Connecting a calendar to an audit or test plan
Managing Steering Calendars
Administrating Key Indicators
Accessing Indicator Administration Features
Managing Indicator Categories
Managing Indicator Interpretation logics
Managing Indicator Statuses
Creating indicator statuses
Computation of indicator statuses
Indicator status formulas
Managing Aggregation Periods and Methods
Aggregation periods
Aggregation methods
Creating aggregation periods or methods
Managing Key Indicator Value Computation Logics
Creating a computation logic
Key Indicator Value Computation Logics provided as default
GRC Environment
Organization
Managing Entities
Accessing organization entities
Creating an entity
Creating a sub- entity
Defining entity general characteristics
Specifying responsibilities within an entity
Scoping an entity
Managing Process Categories and Processes
Accessing processes
Process hierarchy
Specifying process characteristics
Specifying process scope
Specifying responsibilities
Specifying sub-processes
Managing business continuity
Other sections of a process
Managing Business Lines
Accessing Business Lines
Connecting entities and processes to a business line
Defining risks and incidents that impact a business line
Entering gross revenues for incident management
Managing Applications
Accessing applications
Specifying application scope
Managing business continuity
Managing Sites
Listing sites
Managing business continuity
Financial Environment
Accounts
Characteristics of an account
Connecting controls to an account
Products
Gross Incomes
Strategic Environment
Risk Environment
Describing Risk Environment
Defining the Environment of a Specific Risk
Risk types
Creating a risk type
Analyzing the impacts of a risk type
Risk Factors
Risk consequences
Control Environment
The Compliance Environment
Managing your Regulatory Environment
Using UCF Import
Creating Regulatory Content Manually
Managing Business Policies
Defining Applicable Regulations and Business Policies
Regulatory content applicability
Reviewing regulatory frameworks after UCF import
Selecting the regulatory content applicable to your organization
Defining the Scope of Regulations and Business Policies
Responsibilities (RACI)
Responsibility levels
Specifying Responsibilities
Key Indicators
Accessing Key Indicators
Defining Key Indicators
Creating a Key Indicator
Specifying the Aggregation Period and Method
Example of a Key Indicator
Key Indicator Categories
Description of Key Indicator Categories
Relation between Indicator Category and Interpretation Logic
Detailing Key Indicators
Editing Key Indicator Parameters
Defining a Measurement Unit to be Displayed in Reports
Activating / Deactivating a Key Indicator
Specifying the Indicator Scope
Specifying Action Plans
Connecting Risks
Key Indicator Overview
Indicator Status
Default statuses
Information about indicator status computation
Time to Failure
Last Measurement of the Key Indicator
Key Indicator Value
Defining Measurement Frequency and Notifications
Specifying Measurement Frequency
Managing Notifications
Entering Periodic Key Indicator Values
Entering a key indicator value manually
Parameterizing automatic value entering
Viewing the Indicator Graph
Assessment Campaigns
Accessing Assessments by Profiles
Accessing Assessment Templates
Preparing the Assessment Environment
Prerequisites to Risk Assessment
Pre-requisites to Control Assessment
Starting an Assessment Campaign
Creating Assessment Campaigns
Creating an Assessment Session Manually
GRC Reports
GRC Report Availability
Key Indicator Reports
Indicator comparator
Multi-Indicator Gauges
Multi-Indicator Graph
Action Plan Follow-up Reports
Action Plan Follow-Up (Dashboard)
Parameters
Result
Action Plan Follow-up Report (Dashboard)
Parameters
Result
GRC Solution Workflows
Risk Workflows
Testing Workflows
Test Plan/Audit Plan Workflow
Test Workflow
Test Activity Workflow
Expense Sheet Workflow
Action Plan Workflows
"Bottom-up" Action Plan Workflow
"Top-down" Action Plan Workflow
Action Workflow
Incident Workflow
Campaign Workflow
Assessment Campaign Workflow
Execution (Automatic) Campaign Workflow
The GRC Contributor Desktop
Presentation of the GRC Contributor Desktop
Accessing the GRC Contributor Desktop
Features Available to the GRC Contributor
Home Page
Dashboard
My Tasks
Environment
Risks
Controls
Incidents
Viewing your Environment
Processes
Applications
Business lines
Entities
Dashboard and Widgets
Widgets for Action Plans
GRC-specific widgets
Widgets specific HOPEX Internal Audit
Managing Incidents
Creating incidents
Accessing incidents
Managing Action Plans and Actions
Context for action plan creation
Accessing Action Plans
Connecting an issue to an action plan
Indicating action plan progress
Managing actions
Viewing action Gantt
Managing Recommendations
Accessing recommendations
Implementing recommendations
Viewing recommendation widgets
Managing Questionnaires and Check-lists
Accessing Questionnaires
Answering a Questionnaire
Completing Assessment Check-lists
Creating Risks and Controls
Creating a risk
Creating controls
Managing Key Indicators
Accessing Key Indicators
Enter a key indicator value
Submitting an action plan on a key indicator
Performing a BIA (Business Impact Analysis)
Taking Part in Business Continuity Plans
Viewing BCPs tested by ongoing exercises
Viewing BCPs triggered by ongoing crises
Appendix - Computation Rules
Risk Control Level
Context
Computation method
Computation example
Inherent risk
Computation method
Possible values
Residual Risk
Computation method
Possible values
RTO (Recovery Time Objective) Computation
Business Impact Computation
GRC Glossary
HOPEX Internal Control
About Control Management
Internal Control Process
Control register definition
Control Execution
Control Assessment
Issue and Action Plan Management
Control Management Profiles
Managing Controls
Creating Controls
Control Characteristics
General characteristics
Code
Key control
Status
Owner
Control nature
Execution mode
Operational cost
Description and Control objective
Control Overview
Identification
Dashboard
Responsibilities concerning Controls
Responsibility levels
Specifying control responsible users
Scope of a Control and Associated Risks
Regulatory and Business Policy Enforcement
Action Plans for Controls
Reports Related to Controls
Browsing a Control Environment
Accessing Controls
Listing Controls
Accessing Orphan Controls
Accessing Controls by Incidents
Contextualizing Controls
Assessing Controls
Control Assessment Types
Direct Assessment or via Campaign
Direct assessment
Assessment By Campaign
Controls Assessment Templates
Pre-requisites to Control Assessment
Control Assessment by Entity
Assessment contexts
Prerequisites
Respondent definition logics
Specifying respondents
Control Assessment by Entity and Regulatory Framework
Assessment contexts
Prerequisites
Possible use
Control Direct Assessment
Direct Assessment Context
Assessing a Control
Assessing Multiple Controls Simultaneously
Assessment Control Results
Displaying the Results of Control Assessment
Analyzing Control Assessment Results
Instant reports
Dedicated analysis reports
Assessment Result Computing Mode
Executing Controls
Preparing Control Execution
Defining controls Steps
Make Control Steps Reusable
Creating Control Steps from an Existing Template
Defining Steering Calendars on Controls
Specifying a control steering calendar
Modifying a steering calendar after campaign creation
Defining the Total Population and Sample Size
Defining Respondents
Connecting Controls to Entity Processes
Continuous Control Assessment Template
Respondents
Check-lists sent
Answer computation
Aggregated results
Creating an Execution Campaign
Defining scope via a tree
Displaying the Execution Campaign Summary
General information (Overview)
Contexts
Respondents
Assessed objects
How an Execution Campaign Works
Control Execution Periodicity
Examples of Session Automatic Launch
Consulting Execution Campaign Schedule
Defining Reminders
Modifying reminders provided as standard
Deactivating reminders
Closing Check-lists
Completing Control Execution Check-Lists
Accessing Execution Check-Lists
Completing a Check-List
Transferring a Check-List
Managing Execution Check-Lists
Accessing Check-Lists
Reassigning Check-Lists
Check-List Results
Control Execution Reports
Managing Compliance
About Unified Compliance Framework
Main UCF Concepts
Authority Documents
Citations
UCF Controls
Links between UCF concepts
Building a Shared List
Mapping between UCF and HOPEX Concepts
Managing the Regulatory Environment
Using UCF Import
UCF Import Prerequisites
Parameterizing UCF Import
Importing Data from the Common Controls Hub
Defining the Applicable Regulatory Content
Regulatory content relevance
Reviewing regulatory frameworks after UCF import
Selecting relevant content for your organization
Managing the Compliance Register
Concepts Used in the Compliance Register
Accessing the Elements of the Compliance Register
Displaying elements as a list
Displaying control directives in a tree of regulatory frameworks
Displaying business policies in a tree
Viewing Regulatory Frameworks
Accessing regulatory frameworks
Regulatory framework overview & description
Content of a regulatory framework
Viewing Regulation Articles
Accessing regulation articles
Connecting or viewing objects subjected to a regulation article
Enforcement of a regulatory article
Connecting Business Documents
Viewing Control Directives
Accessing control directives
Viewing articles associated to a control directive
Supported and supporting directives
Enforcement level of control directives
Viewing HOPEX controls implementing a control directive
Attaching business documents or external references
IT Regulatory Compliance Reports
Regulatory Compliance by Entity
Access path
Parameters and Launch
Example
Control Directives Implementation by Regulatory Framework
Access path
Parameters
Results
Compliance by Regulatory Framework
Access path
Parameters
Results
Regulatory Compliance Overview
Access path
Parameters
Results
Regulatory Compliance Progress
Access path
Parameters
Report example
Control Testing
Preparing Control Testing
Defining Test Sheet Questions
Defining Testing Methods
Preparing Tests
Creating Test Plans
Planning Tests
Creating a test
Accessing tests
Defining test properties
Viewing a test dashboard
Creating "template" tests
Selecting tests to be executed
Selecting tests to be integrated in the test plan
Planning tests using a Gantt chart
Assigning resources to tests
Sending the Notification Letter
Validating tests
Publishing tests
Preparing Tests
Work program creation prerequisites
Work program content
Accessing the tests to prepare
Creating work programs automatically
Completing the work program manually
Assigning activities
Reviewing the Work Program
Validating work programs
Executing administrative tasks
Executing Tests
Consulting the Work Program
Executing Tests on Samples
Creating workpapers
Specifying or modifying the sample size
Generating the test sample
Defining test sheet questions
Completing the generated test sheets
Assessing test activities
Assessing Controls
Generating questionnaires
Responding to Questionnaires
Managing Time and Expenses
Managing Expenses
Entering Vacations
Completing a Time Sheet
Management of issues and action plans
Managing Issues
Managing Action Plans
Supervising Tests
Test check reports
Time Sheet Follow-up Reports
Test expenses reports
Concluding Tests
Test assessment reports
Generating test reports
Assessing tests
Terminating tests
Closing tests
Test Follow-Up
Implementing Action Plans
Listing action plans
Implementing actions
Action plan implementation follow-up
Test Plan Follow-Up
Displaying test plan follow-up reports
Closing a test plan
Testing Dashboard
Managing Issues and Action Plans
Managing Issues
Creating Issues
Scoping an Issue
Remediating Issues
Following Up Issues
Managing Action Plans
Accessing Action Plans
Creating an Action Plan for Testing
Characterizing Action Plans
Overview
General characteristics
Responsibilities
Financial assertion
Success Factors and Outcome
Scope
Progress history
Milestones
Attachments
Managing Actions
Accessing actions
Creating actions
Describing action sequence flow
Viewing the actions Gantt
Reassigning actions
Action Plan Workflows
"Bottom-up" approach
"Top-down" approach
Action workflow
Indicating Action Plan Progress
Action Plan Follow-up Report (Dashboard)
Path
Result
Control-Related Reports
Control Environment Report
Access path
Report parameters
Creating a control environment report
Example
Control Impacts Report
Access path
Report parameter
Example
Control Register Reports
Control Identification (Dashboard)
Path
Parameters
Results
Example
Control Execution Reports
Consolidated Execution Results
Access path
Parameters
Result
Example
Following Up Execution Sessions
Access path
Parameters
Result
Control Testing Reports
Testing Coverage
Plan Synthesis
Path
Result
Example
Other Reports
Test plan follow-up reports
Test follow-up report
Action plan report
Issue-Related Reports
Issues by Remediation Status
Path
Result
Example
Issues by Impact
Path
Result
HOPEX Enterprise Risk Management
Managing Risks
Risk Management Profiles
Creating a Risk
Risk characteristics
General characteristics
Risk Overview
Risk Responsibilities (RACI)
Defining the Scope of a Risk
Analyzing Risks
Risk types
Risk Factors
Risk consequences
Viewing Audit Recommendations Connected to a Risk
Browsing a Risk Environment
Listing Risks
Accessing All Risks
Listing Risks by Risk Types
Accessing Orphan Risks
Accessing Materialized Risks
Risk Workflow
Risk validation steps
Validating or rejecting a risk
Assessing Risks
Risk Assessment Types
Direct Assessment or Assessment by Campaign
Risk Assessment Templates
Prerequisites to Risk Assessment
“Risk Assessment by Entity and Process” Template
“Risk Assessment by Application” Template
Risk Direct Assessment
Direct Risk Assessment Templates
Assessed characteristics
Respondents
Questionnaire
Creating a Direct Assessment on a Risk
Assessing Multiple Risks Simultaneously
Viewing and Analyzing Risk Assessment Results
Displaying Risk Assessment Results
Generating Reports on Assessments
Instant reports
Generating dedicated reports
Risk Mitigation and Remediation
Mitigating Risks
Specifying the Risk-Mitigation Strategy
Specifying Risk Appetite
Implementing Controls
Remediating Risks
Risk-Related Reports
Risk Environment Report
Access path
Report parameters
Creating a Risk Environment Report
Risk Impacts Report
Access path
Report parameter
Example
Risk Type Impact Breakdown
Bow-Tie Analysis
Access path
Example
Risk Profile Analysis by Context
Access path
Report parameters
Report Content
Examples
Aggregation Reports
Residual Risk by Risk Type
Access path
Example
Inherent and Residual Risk Heatmap
Access path
Report parameters
Heatmap content
Inherent and Residual Risk Heatmap by Context
Access path
Report parameters
Report example
Risk Assessment by Context
Access path
Report parameters
Example
Overall Risk Level by Process
Access path
Report parameters
Report example
Overall Risk Level by Entity
Access path
Report parameters
Report example
Aggregation Report
Access path
Report parameters
Report example
Risk Follow-Up Reports
Action Plan Follow-up Report
Access path
Report parameters
Report example
Session Statistics Report
Access path
Parameters
Report example
Result
Risk Management Effectiveness Reports
Risk and Incident Analysis
Path
Parameters
Report Content
Example
Coverage & Risks Matrix
Access path
Matrix content
Risk Trend
Access path
Report parameters
Report example
Result computation
HOPEX LDC
Collecting Incidents
Connection Profiles to HOPEX LDC
Managing Incidents
Accessing incidents
Filtering incidents
Accessing macro-incidents
Creating incidents
Specifying Incident Characteristics
Recording Incident-Linked Amounts
Accessing Incident Financial Analysis
Entering a Loss
Defining scope of a loss
Entering Gains
Recording Recoveries
Recording Provisions
Viewing Computed Amounts Related to the Incident
Gross Loss
Gross actual loss
Recoveries
Net loss
Net Actual Loss
Analyzing Incidents
Incident Qualitative Analysis
Risks and controls
Incident priority
Incident Impact
Risk factors
Risk consequences
Incident scope
Incident Impact Analysis
Managing Macro-Incidents
Connecting Incidents to Macro-Incidents
Creating a Macro-Incident
Analyzing a Macro-Incident
Incidents connected to the macro-incident
Macro-incident amounts
Losses evolution report
Incident Management Process
Incident Management Process General Description
Incident Management Process Steps
Submitting incidents
Approving incidents
Validating incidents
Closing incidents
Incident-Related Reports
Loss Analysis Reports
Incident and Loss Breakdown
Access path
Report parameters
Example
Incident and Loss Evolution by Month
Access path
Report parameters
Results
Incident and Loss Evolution by Risk Type
Access path
Report parameters
Results
Back Testing Reports
Losses by Risk (Back Testing)
Access path
Report parameters
Result
Incident X Risk Level by Risk Type (Back Testing)
Access path
Report parameters
Result
Incidents X Risk Level by Business Line (Back Testing)
Access path
Report parameters
Result
Capital Calculation Reports
Loss Distribution Matrix
Access path
Report parameters
Report
Basic Indicator Approach (BIA)
Access path
Report parameters
Result
Standardised Approach (TSA)
Access path
Report parameters
Result
HOPEX Cyber Resilience
Introduction to HOPEX Cyber Resilience
Definition of Cyber Resilience
Context
Use together with other solutions
Installation of the Cyber Resilience (CYRES) Module
Building Cyber Resilience
Steps in the Cyber Resilience Process
Managing the ICT Environment
Objec types managed by the GRC solutions
Object types managed by HOPEX Cyber Resilience
MS Excel to build the resilience environment
Modules complementary to HOPEX Cyber Resilience
Identifying Critical IT Processes and Resources
Assessing the Cyber Resilience Framework
Planning the Cyber Resilience Initiative
Managing Cyber-Related Incidents
Incident causes and incident type
Major incident
Calculation of time elapsed since the incident detection
Reports Related to Incidents
Viewing the BCPs triggered after a incident
Monitoring Cyber Resilience
ICT Vendors
Listing ICT Vendors
Creating an ICT Vendor
Specifying Vendor Contracts
Listing contracts
Creating a contract
Viewing the contract status
Specifying the contract characteristics
Attachments
Assessing ICT Vendors
Assessing an ICT Vendor
Assessing multiple ICT vendors
Assessing ICT vendors via campaigns
ICT Risks
ICT Risk Assessment Template
Contexts
Respondents
Questionnaire rendering
Prerequisites to ICT Risk Assessment
Launching an ICT Risk Assessment
Cyber Resilience Reports
ICT Service Providers and Contracts
Path
Illustration
Report parameters
Report Content
Report example
Gantt of ICT Service Provider Contracts
Path
Illustration
Report parameters
Report example
Vendors' Contracts (MS Word) Report
Path
Illustration
Report parameters
Report Content
Incident Monitoring
Path
Illustration
Report parameter
Report Content
Report example
Incident Impacts
Path
Illustration
Report parameter
Report Content
Report example
Major Incident Report (MS-Word)
Path
Illustration
Report Content
Basic information on the incident
Detailed information
Root Cause Analysis
Impacted elements
Financial assertion
Triggered BCPs
Incident Bow-Tie Analysis
Path
Illustration
Report parameter
Report example
Process Impacts
Path
Illustration
Report parameter
Report example
Process ICT Impacts Overview
Path
Illustration
Report parameter
Report Content
Table Columns
Report example
Risk Dashboard by Risk Type
Path
Illustrations
Report parameter
Dashboard Content
Residual risk level
Controls by control level
Residual risk heatmap
Incident heatmap by impact and priority
Evolutions of incidents over a year
Process Criticality and Supporting ICT Assets Table Overview
Path
Illustrations
Report parameters
Report Content
Example
Vendors Overview by Process
Path
Illustrations
Report parameters
Report Content
Example
Critical ICT Assets (from Process/Entity)
Path
Illustration
Report parameters
Report Content
Report example
HOPEX GRC Common Features
About the GRC Manager Desktop
Accessing the GRC Desktop
The GRC Documentation
GRC Functional Administration
Reusing Regulation Data
Managing Teams
Managing Currencies
Configuring Time Sheets
Managing Campaign Calendars
Managing Steering Calendars
Administrating Key Indicators
Managing Indicator Categories
Managing Indicator Interpretation logics
Managing Indicator Statuses
Indicator status formulas
Managing Aggregation Periods and Methods
Managing Key Indicator Value Computation Logics
GRC Environment
Organization
Managing Entities
Managing Process Categories and Processes
Managing Business Lines
Managing Applications
Managing Sites
Financial Environment
Strategic Environment
Risk Environment
Control Environment
The Compliance Environment
Managing your Regulatory Environment
Managing Business Policies
Defining Applicable Regulations and Business Policies
Defining the Scope of Regulations and Business Policies
Responsibilities (RACI)
Key Indicators
Accessing Key Indicators
Defining Key Indicators
Key Indicator Categories
Detailing Key Indicators
Key Indicator Overview
Defining Measurement Frequency and Notifications
Viewing the Indicator Graph
Assessment Campaigns
Accessing Assessments by Profiles
Accessing Assessment Templates
Preparing the Assessment Environment
Starting an Assessment Campaign
GRC Reports
GRC Report Availability
Key Indicator Reports
Indicator comparator
Multi-Indicator Gauges
Multi-Indicator Graph
Action Plan Follow-up Reports
Action Plan Follow-Up (Dashboard)
Action Plan Follow-up Report (Dashboard)
GRC Solution Workflows
Risk Workflows
Testing Workflows
Action Plan Workflows
Incident Workflow
Campaign Workflow
The GRC Contributor Desktop
Presentation of the GRC Contributor Desktop
Viewing your Environment
Dashboard and Widgets
Managing Incidents
Managing Action Plans and Actions
Managing Recommendations
Managing Questionnaires and Check-lists
Creating Risks and Controls
Managing Key Indicators
Performing a BIA (Business Impact Analysis)
Taking Part in Business Continuity Plans
Appendix - Computation Rules
Risk Control Level
Inherent risk
Residual Risk
RTO (Recovery Time Objective) Computation
Business Impact Computation
GRC Glossary
HOPEX Internal Control
About Control Management
Internal Control Process
Control Management Profiles
Managing Controls
Creating Controls
Control Characteristics
Control Overview
Responsibilities concerning Controls
Browsing a Control Environment
Accessing Controls
Contextualizing Controls
Assessing Controls
Control Assessment Types
Pre-requisites to Control Assessment
Control Assessment by Entity
Control Assessment by Entity and Regulatory Framework
Control Direct Assessment
Assessment Control Results
Displaying the Results of Control Assessment
Assessment Result Computing Mode
Executing Controls
Preparing Control Execution
Make Control Steps Reusable
Creating Control Steps from an Existing Template
Continuous Control Assessment Template
Creating an Execution Campaign
How an Execution Campaign Works
Completing Control Execution Check-Lists
Managing Execution Check-Lists
Check-List Results
Control Execution Reports
Managing Compliance
About Unified Compliance Framework
Managing the Regulatory Environment
Using UCF Import
Defining the Applicable Regulatory Content
Managing the Compliance Register
Viewing Regulatory Frameworks
Viewing Regulation Articles
Viewing Control Directives
IT Regulatory Compliance Reports
Regulatory Compliance by Entity
Control Directives Implementation by Regulatory Framework
Compliance by Regulatory Framework
Regulatory Compliance Overview
Regulatory Compliance Progress
Control Testing
Preparing Control Testing
Preparing Tests
Creating Test Plans
Planning Tests
Creating a test
Defining test properties
Viewing a test dashboard
Creating "template" tests
Selecting tests to be executed
Selecting tests to be integrated in the test plan
Planning tests using a Gantt chart
Assigning resources to tests
Sending the Notification Letter
Validating tests
Preparing Tests
Assigning activities
Reviewing the Work Program
Validating work programs
Executing administrative tasks
Executing Tests
Consulting the Work Program
Executing Tests on Samples
Assessing Controls
Managing Time and Expenses
Management of issues and action plans
Supervising Tests
Concluding Tests
Test Follow-Up
Implementing Action Plans
Test Plan Follow-Up
Testing Dashboard
Managing Issues and Action Plans
Managing Issues
Managing Action Plans
Accessing Action Plans
Creating an Action Plan for Testing
Characterizing Action Plans
Managing Actions
Action Plan Workflows
Indicating Action Plan Progress
Action Plan Follow-up Report (Dashboard)
Control-Related Reports
Control Environment Report
Control Impacts Report
Control Register Reports
Control Identification (Dashboard)
Control Execution Reports
Consolidated Execution Results
Following Up Execution Sessions
Control Testing Reports
Testing Coverage
Plan Synthesis
Other Reports
Issue-Related Reports
HOPEX Enterprise Risk Management
Managing Risks
Risk Management Profiles
Creating a Risk
Risk characteristics
Risk Overview
Risk Responsibilities (RACI)
Analyzing Risks
Viewing Audit Recommendations Connected to a Risk
Browsing a Risk Environment
Listing Risks
Risk Workflow
Assessing Risks
Risk Assessment Types
Prerequisites to Risk Assessment
Risk Direct Assessment
Direct Risk Assessment Templates
Creating a Direct Assessment on a Risk
Assessing Multiple Risks Simultaneously
Viewing and Analyzing Risk Assessment Results
Risk Mitigation and Remediation
Mitigating Risks
Remediating Risks
Risk-Related Reports
Risk Environment Report
Risk Impacts Report
Risk Type Impact Breakdown
Bow-Tie Analysis
Risk Profile Analysis by Context
Aggregation Reports
Residual Risk by Risk Type
Inherent and Residual Risk Heatmap
Inherent and Residual Risk Heatmap by Context
Risk Assessment by Context
Overall Risk Level by Process
Overall Risk Level by Entity
Aggregation Report
Risk Follow-Up Reports
Action Plan Follow-up Report
Session Statistics Report
Risk Management Effectiveness Reports
Risk and Incident Analysis
Coverage & Risks Matrix
Risk Trend
HOPEX LDC
Collecting Incidents
Connection Profiles to HOPEX LDC
Managing Incidents
Specifying Incident Characteristics
Recording Incident-Linked Amounts
Accessing Incident Financial Analysis
Entering a Loss
Defining scope of a loss
Entering Gains
Recording Recoveries
Recording Provisions
Viewing Computed Amounts Related to the Incident
Analyzing Incidents
Incident Qualitative Analysis
Incident scope
Incident Impact Analysis
Managing Macro-Incidents
Incident Management Process
Incident-Related Reports
Loss Analysis Reports
Incident and Loss Breakdown
Incident and Loss Evolution by Month
Incident and Loss Evolution by Risk Type
Back Testing Reports
Losses by Risk (Back Testing)
Incident X Risk Level by Risk Type (Back Testing)
Incidents X Risk Level by Business Line (Back Testing)
Capital Calculation Reports
Loss Distribution Matrix
Basic Indicator Approach (BIA)
Standardised Approach (TSA)
HOPEX Cyber Resilience
Introduction to HOPEX Cyber Resilience
Building Cyber Resilience
Steps in the Cyber Resilience Process
Managing the ICT Environment
Identifying Critical IT Processes and Resources
Assessing the Cyber Resilience Framework
Planning the Cyber Resilience Initiative
Managing Cyber-Related Incidents
Monitoring Cyber Resilience
ICT Vendors
ICT Risks
Prerequisites to ICT Risk Assessment
Launching an ICT Risk Assessment
Cyber Resilience Reports
ICT Service Providers and Contracts
Gantt of ICT Service Provider Contracts
Vendors' Contracts (MS Word) Report
Incident Monitoring
Incident Impacts
Major Incident Report (MS-Word)
Incident Bow-Tie Analysis
Process Impacts
Process ICT Impacts Overview
Risk Dashboard by Risk Type
Process Criticality and Supporting ICT Assets Table Overview
Vendors Overview by Process
Critical ICT Assets (from Process/Entity)