Critical control management

Issue 5 2020 Integrated Solutions

We have been very active with essential service delivery for a large corporate client during the lockdown period. In particular, when performing bowtie risk analysis methods from remote locations with multiple team players, proving that we can be as effective with this process despite the lockdown.

The critical control management process is an excellent practical approach to ensure effective controls over potentially catastrophic events. Often these events are referred to as a main event or Material Unwanted Event (MUE).

A bowtie summarises the main controls that companies should have in place to prevent unwanted events. Bowties are popular processes that are captured in an illustrative format to show the links between causes of an incident or risk and the controls which serve as barriers to prevent an unwanted event. A further step includes mitigation factors if a main event should occur.

The bowtie follows a typical Plan, Do, Check and Act (PDCA) approach with ten key steps.

The benefits include:

• Focus on smaller and more manageable number of controls.

• Bowties provide a readily understood picture of the associations between a MUE and controls.

• The process answers the 5W and H approach, but sets clear performance metrics.

• Provision of a proactive ‘health check’ for improved governance.

• Summarises the critical controls in a register format across the entire enterprise.

• Meaningful discussion due to the layout of the bowties.


Kevin van Zyl.

An ‘X Matrix Template’ was used successfully during the bowtie process to achieve the desired outcomes. Usually the matrix is applied to lean policy deployment for strategic, tactical, and coordination efforts across people and an organisation. The X-Matrix also ensures there is ownership at all levels as well as accountability.

This approach to the critical control management process also encourages organisational learning, faster course corrections, and cross-departmental coordination. A truly successful and effective outcome during this time.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.