{"id":14939,"date":"2020-08-14T01:59:14","date_gmt":"2020-08-13T22:59:14","guid":{"rendered":"https:\/\/www.proya.com.tr\/?page_id=14939"},"modified":"2020-08-14T01:59:14","modified_gmt":"2020-08-13T22:59:14","slug":"hopex-irm-integrated-risk-management","status":"publish","type":"page","link":"https:\/\/www.proya.com.tr\/en\/hopex-irm-integrated-risk-management\/","title":{"rendered":"HOPEX IRM (Integrated Risk Management)"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1595614374732{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2020\/07\/hopex-1.jpg?id=13649) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<h3><span style=\"color: #ffffff;\">HOPEX IRM (Integrated Risk Management)<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h5><span style=\"color: #ffffff; font-weight: 400;\">GRC Information Technologies<\/span><\/h5>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;40px&#8221;][\/vc_column][\/vc_row][vc_row enable_top_separator=&#8221;true&#8221; top_separator_style=&#8221;slope-right&#8221; top_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1476279052293{padding-right: 10% !important;padding-left: 10% !important;}&#8221;]<div class=\"mkdf-section-title-holder\">\n\t<h2 class=\"mkdf-section-title mkdf-section-title-small\" style=\"color: #43648d;text-transform: capitalize\">\n\t\tGovernance, Risk Management and Compliance\t<\/h2>\n<\/div>[vc_empty_space height=&#8221;20px&#8221;][vc_column_text]GRC Information Technologies (IT) governance is the field that collects the concepts of risk control and compliance under its roof. In today&#8217;s fast-changing business world, every company has become a necessity (manageable) to manage its strategic and operational risks, enterprise internal controls and compliance with regulatory requirements.<\/p>\n<p>It is not possible to effectively meet these needs without using risk management and compliance, internal control and internal audit tools.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;11316&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]Choosing the right tool is a difficult issue in itself. A product manufactured in consideration of the best practices in the industry, containing standards set by international organizations such as the Institute of Internal Auditors (IIA) and the Open Compliance and Ethics Group (OCEG), and with which you can work in a long-term, healthy and efficient relationship with its manufacturer and \/ or supplier choosing is the most optimal solution.<\/p>\n<p>With over 15 years of experience, PROYA has joined forces with MEGA International, which has 30 years of experience, and started to offer the Hopex GRC package, one of the most ambitious and comprehensive product families in the field of IRM (Integrated Risk Management)<\/p>\n<p>MEGA&#8217;s platform, built on the central repository, ensures that all of your GRC goals are met.[\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;][vc_column_text]<\/p>\n<h4>Pains<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1596747832499{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 20px !important;padding-left: 10px !important;background-color: #111924 !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Lack of risk awareness<\/span><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Companies understand that compliance initiatives don&#8217;t always help remove risks.<\/li>\n<li>Organizations must promote risk -aware culture.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1596747892620{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 20px !important;padding-left: 10px !important;background-color: #111924 !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Managing risks in silos<\/span><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Managing risks in silos does not allow to understand the context and to adapt to rapid business and regulatory environement changes.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1596747918996{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 20px !important;padding-left: 10px !important;background-color: #111924 !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Risk impact on the organization<\/span><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Companies have difficulties to quickly and comprehensively assess the impact on risks and business operation.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14765&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]\n    <span class=\"mkdf-icon-shortcode normal mkdf-icon-tiny\"  >\n        \n        <span aria-hidden=\"true\" class=\"mkdf-icon-font-elegant  icon_check mkdf-icon-element\" style=\"\" ><\/span>\n            <\/span>\n\nImplement an integrated approach with business operations, to shift from a compliance to a risk-aware culture.<\/p>\n<p>\n    <span class=\"mkdf-icon-shortcode normal mkdf-icon-tiny\"  >\n        \n        <span aria-hidden=\"true\" class=\"mkdf-icon-font-elegant  icon_check mkdf-icon-element\" style=\"\" ><\/span>\n            <\/span>\n\nHOPEX IRM allows Risk Managers, Auditors, Internal Controllers, Data Privacy Officers, Compliance Officers, CISOs, Legal Counselors, IT teams, and Operational teams to work together towards risk identification and risk control in the most effective and efficient manner.[\/vc_column_text][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Understand Risks in the Context of Operations<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14766&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]\n    <span class=\"mkdf-icon-shortcode normal mkdf-icon-tiny\"  >\n        \n        <span aria-hidden=\"true\" class=\"mkdf-icon-font-elegant  icon_check mkdf-icon-element\" style=\"\" ><\/span>\n            <\/span>\n\nHOPEX IRM uniquely leverages information managed by IT, Business or Privacy compliance to better understand risk context and their impact on the business.<\/p>\n<p>\n    <span class=\"mkdf-icon-shortcode normal mkdf-icon-tiny\"  >\n        \n        <span aria-hidden=\"true\" class=\"mkdf-icon-font-elegant  icon_check mkdf-icon-element\" style=\"\" ><\/span>\n            <\/span>\n\nCombined with other HOPEX solutions, companies can effectively manage risks globally, ensuring employees share a common understanding of the enterprise assets, processes and technologies while ensuring data privacy compliance.<\/p>\n<p>\n    <span class=\"mkdf-icon-shortcode normal mkdf-icon-tiny\"  >\n        \n        <span aria-hidden=\"true\" class=\"mkdf-icon-font-elegant  icon_check mkdf-icon-element\" style=\"\" ><\/span>\n            <\/span>\n\nUnderstanding the context allows to better\u00a0qualify and quantify the\u00a0impact of risks[\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;][vc_column_text]<\/p>\n<h4>HOPEX Integrated Risk Management Key Benefits<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1596748504341{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 20px !important;padding-left: 10px !important;background-color: #111924 !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Move to a risk-aware culture<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_column_text css=&#8221;.vc_custom_1596748527954{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 20px !important;padding-left: 10px !important;background-color: #111924 !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Keep up with constant changes<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1596748559035{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 20px !important;padding-left: 10px !important;background-color: #111924 !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Managing risks with an integrated approach<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_column_text css=&#8221;.vc_custom_1596748654909{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 20px !important;padding-left: 10px !important;background-color: #111924 !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Speed-up risk management efforts<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Integrated Risk Management New Desktop<\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Encompasses Enterprise Risk Management (ERM), Internal Control (IC) and Incident Management as well as regulatory requirements.<\/li>\n<li>Uses a unified desktop<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14297&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Customizable Dashboards<\/h4>\n<p>[\/vc_column_text][vc_column_text]Use customizable dashboards to efficiently monitor risk management efforts[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14298&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h3>HOPEX IRM &#8211; Risk Management<\/h3>\n<p>[\/vc_column_text][vc_column_text]With HOPEX IRM, Risk Managers can capture and define Risks:<\/p>\n<ul>\n<li>Create a Risk and assign it to the relevant stakeholder<\/li>\n<li>Describe the context of the Risk by specifying which part of your Organization is affected<\/li>\n<li>Assess Risks directly or launch an automatic assessment campaign<\/li>\n<li>Compile and report on Risk Assessment results<\/li>\n<li>Capture Risk treatment method<\/li>\n<li>Define mitigating efforts with the relevant Controls and\/or an Action Plan<\/li>\n<li>Report on the efficiency of Risk mitigation efforts with trend analysis<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Risk Management<\/span> Identify Risks<\/h4>\n<p>[\/vc_column_text][vc_column_text]Risk Managers can create a new Risk, capture all relevant information and set Risk Target &amp; treatment method.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14302&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Risk Management<\/span> Define Context<\/h4>\n<p>[\/vc_column_text][vc_column_text]Risk Managers can also define the context of a Risk by specifying which Processes, Entities, Applications and Business Lines are affected.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14303&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Risk Management<\/span> <strong>Direct Risk Assessment<\/strong><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Risk managers can assess Risk directly&#8230;<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14769&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Or assign a stakeholder as Risk Assessors for a particular context.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14770&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Risk Assessment<\/span> Templates<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;14771&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Risks can be assessed in all their possible contexts with new assessment templates:\n<ul>\n<li>Risks per Business Process<\/li>\n<li>Risks per Organizational Process<\/li>\n<li>Risks per Applications<\/li>\n<li>Risks per Business Lines<\/li>\n<li>Risks per Entities<\/li>\n<\/ul>\n<\/li>\n<li>Risks are assessed by likelihood impact, control level<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Risk Management<\/span> Campaign Follow-up<\/h4>\n<p>[\/vc_column_text][vc_column_text]Risk Manager can monitor the progress of an Assessment Campaigns and report on results.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14306&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Risk Management<\/span> Action Plans<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Risk managers can define Action Plans to remedy Risks and assign them to the right Contributor&#8230;<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14773&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>&#8230;Who can access his\/her assigned Action Plans and other tasks from his dedicated interface.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14774&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Dashboard Widgets<\/h4>\n<p>[\/vc_column_text][vc_column_text]Widgets for risks are available from the dashboard:<\/p>\n<ul>\n<li>Risk Mitigation, Risks per Status, Risk Heatmap Report (Aggregated), Risk Assessment<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14309&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<em>Build a custom dashboard and follow up on the overall progress of risk management efforts.<\/em>[\/vc_column_text][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h3>HOPEX IRM \u2013 Internal Control<\/h3>\n<p>[\/vc_column_text][vc_column_text]HOPEX IRM supports Controllers in their mitigating efforts:<\/p>\n<ul>\n<li>Create Controls and specify which Risks are mitigated<\/li>\n<li>Specify which regulatory or business Requirements are implemented<\/li>\n<li>Describe the procedures or IT tools as well as the entities implementing the Control<\/li>\n<li>Create execution checklists and launch execution campaigns<\/li>\n<li>Plan and automate Control assessments<\/li>\n<li>Report on the efficiency of the Controls with regards to Risk mitigation<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Internal Control<\/span> Features<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Internal Controllers can create &amp; define Controls&#8230;<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14777&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>&#8230; And describe how to Control is to be implemented (processes), by whom (entities) and what (applications).<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14778&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Internal Control<\/span> Features<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Internal Controllers can also specify control methods and corresponding execution steps.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14779&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Several Control execution steps can be created in multiple formats for the same Control. These steps will later be answered by Control Executors.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14780&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Internal Control<\/span> Features<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Internal Controllers can prepare &amp; launch automated Control execution campaigns that sends control execution checklists to&#8230;<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14782&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>&#8230; Control Executors, who then fill in their execution checklists from their dedicated interface.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14783&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Internal Control<\/span> Features<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Internal Controllers can monitor the progress of their execution campaigns.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14784&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>And inspect the results of the Control execution.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14785&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Internal Control<\/span> Features<\/h4>\n<p>[\/vc_column_text][vc_column_text]Internal Controllers can assess controls directly and analyze the results.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14314&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h3>HOPEX IRM \u2013 Incident Management<\/h3>\n<p>[\/vc_column_text][vc_column_text]HOPEX IRM allows you to not only capture Incidents, but also to analyze them:<\/p>\n<ul>\n<li>Documents Incidents with dates of discovery and actual occurrence, context, financial consequence and what parts of the organization were affected<\/li>\n<li>Review Incidents by the stakeholder responsible for the affected part of the Organization<\/li>\n<li>Define, assign and track progress of remedial actions<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Incident Management<\/span> <strong>Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]Contributors can declare a new Incident from their dedicated Interface and provide all the relevant information.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14316&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Incident Management<\/span> <strong>Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]A different contributor, previously assigned as Incident Approver, can either ask the Incident Declarer for modification, approve or reject the Incident altogether.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14317&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Incident Management<\/span> <strong>Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]Prior to validating the Incident, a Risk Manager can<\/p>\n<ul>\n<li>Capture financial information regarding the Incident (Loss, Gains, Recoveries &amp; Provisions)<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14319&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]Contextualize the Incident by specifying the materialized Risk, the failing Control and other taxonomy related information[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14320&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Incident Management<\/span> <strong>Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]Risk manager can analyze Incidents in different manners (breakdown, evolution, relation to risks, financial\u2026)[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Incident and Loss Breakdown<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14788&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;10px&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Incidents vs Net Risk Level<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14789&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Incident and Loss Evolution<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14787&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;10px&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Loss Distribution<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;14786&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h3>HOPEX IRM \u2013 <span style=\"color: #808080;\">Regulatory Compliance, Controls &amp; Risks<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text]The solution supports Compliance efforts:<\/p>\n<ul>\n<li>Manage Regulation Frameworks and create your Organization\u2019s Requirements<\/li>\n<li>Specify what parts of your organization are affected by regulatory or business requirements<\/li>\n<li>Define Controls implementing regulatory compliance<\/li>\n<li>Report on the efficiency of the Controls with regards to Requirements compliance<\/li>\n<li>Identify &amp; Manage Risks of Non-Compliance<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Regulatory Compliance<\/span> <strong>Shared Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]Compliance Officers can create Requirements as part of either a Regulation Framework or the Organization\u2019s own Requirements.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14632&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Regulatory Compliance<\/span> <strong>Shared Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]Compliance Officers can specify what parts of the Organization have to comply with the Requirement (processes, entities and applications).[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14323&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Regulatory Compliance<\/span> <strong>Shared Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]Compliance Officers can analyze the effectiveness of implemented Controls with regards to compliance following a Control Assessment campaign run by an Internal Controller.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14325&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Regulatory Compliance<\/span> <strong>Shared Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]Compliance Officers can also identify Risks of non-compliance. These Risks can then be managed by the relevant Risk Managers. Compliance Officers can also analyze information collected during Risk Assessment campaigns.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14326&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h3>Internal Audit<\/h3>\n<p>[\/vc_column_text][vc_column_text]HOPEX gives you the tools necessary to manage your Internal Audit activities:<\/p>\n<ul>\n<li>Create long and short-term plans aligned to your board\u2019s strategy and direction<\/li>\n<li>Manage your Auditors with regards to their workload, skillset and expenses<\/li>\n<li>Generate Work programs\/activity plans automatically<\/li>\n<li>Assign the best suited Lead Auditor and Auditors to your Audits and corresponding Activities<\/li>\n<li>Capture all background information relevant to an Activity as well as define instructions and test sheets for your Auditors<\/li>\n<li>Document Findings, raise new Risks and issue Recommendations<\/li>\n<li>Track and report on Recommendation progress and launch follow-up Audits when necessary<\/li>\n<li>Auditors can continue to do their audit work offline (without internet connection) on Audit Everywhere application.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Internal Audit<\/span> <strong>Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]Audit Directors can group Audits under one Audit Plan. Resources, skills, availabilities, expenses and timelines can be managed for the overall Audit Plan.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14327&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Internal Audit<\/span> <strong>Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]Lead auditor can build a Work program for the Audits they are assigned to. Each Activity can have Workpapers and any background information necessary for the Auditor to carry out his\/her tasks. Once ready, the Work program is sent to the Audit Director for review.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14328&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Internal Audit<\/span> <strong>Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]If an Audit is recurrent, Lead Auditors can save time by \u00ab\u00a0cloning\u00a0\u00bb an already existing Audit\u2019s Work program thus saving planning time.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14329&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Internal Audit<\/span> <strong>Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]Once the Auditor has validated the Work program, Audit Activities are sent to the Auditors they have been assigned to. Auditors can then complete the Activity and any Test Sheets he\/she has been given to fill.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14331&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_single_image image=&#8221;14332&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Internal Audit<\/span> <strong>Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]A Finding being an Incident discovered by the Audit team, Auditors can create new Risks against their Findings. These Risks will then have to be managed by the Risk managers.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14333&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Internal Audit<\/span> <strong>Features<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]Once the Auditors have completed their Activities, documented their Findings, as well as written and assigned their Recommendations to an Auditee, the Activities can be submitted to the Lead Auditor for review.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14334&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14801&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]HOPEX gives you the tools and the information necessary to keep your Internal Audits aligned to your Organization\u2019s strategic priorities:<\/p>\n<ul>\n<li>Perform Quality Assurance, Compliance, RBIA and Control Tests<\/li>\n<li>Prioritize scope of your Audits to concentrate on the lesser managed Risks and the least performing Controls<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;14791&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;14338&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;50px&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243; enable_sticky=&#8221;true&#8221; sticky_offset=&#8221;100&#8243; css=&#8221;.vc_custom_1474589458588{padding-right: 10% !important;padding-left: 10% !important;}&#8221;][vc_single_image image=&#8221;11427&#8243; img_size=&#8221;300&#215;300&#8243;][vc_empty_space height=&#8221;50px&#8221;][vc_column_text]<\/p>\n<h6><span style=\"color: #294b8b; font-weight: 500;\"> GRC (Governance, Risk &amp; Control)<\/span><\/h6>\n<p>[\/vc_column_text]<a href=\"https:\/\/www.proya.com.tr\/hopex-enterprise-risk-management\/\" title=\"\"  data-id=\"mpc_button-5469dd44ade5254\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  fa fa-chevron-right\"><\/i><span class=\"mpc-button__title mpc-transition\">Enterprise Risk Management<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"https:\/\/www.proya.com.tr\/hopex-it-risk-management\/\" title=\"\"  data-id=\"mpc_button-769dd44ade534f\" class=\"mpc-button mpc-init mpc-transition mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  fa fa-chevron-right\"><\/i><span class=\"mpc-button__title mpc-transition\">IT Risk Management<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"https:\/\/www.proya.com.tr\/hopex-internal-audit\/\" title=\"\"  data-id=\"mpc_button-8969dd44ade5417\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  fa fa-chevron-right\"><\/i><span class=\"mpc-button__title mpc-transition\">Internal Audit<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"https:\/\/www.proya.com.tr\/hopex-internal-control\/\" title=\"\"  data-id=\"mpc_button-2069dd44ade54b4\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  fa fa-chevron-right\"><\/i><span class=\"mpc-button__title mpc-transition\">Internal Control<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row][vc_row enable_bottom_separator=&#8221;true&#8221; bottom_separator_style=&#8221;arrow-right&#8221; bottom_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1595614374732{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2020\/07\/hopex-1.jpg?id=13649) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text] HOPEX IRM (Integrated Risk Management) [\/vc_column_text][vc_column_text] GRC Information Technologies [\/vc_column_text][vc_empty_space height=&#8221;40px&#8221;][\/vc_column][\/vc_row][vc_row enable_top_separator=&#8221;true&#8221; top_separator_style=&#8221;slope-right&#8221; top_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1476279052293{padding-right: 10% !important;padding-left: 10% !important;}&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]GRC Information Technologies (IT) governance is the field that collects<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":[],"categories":[],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/14939"}],"collection":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/comments?post=14939"}],"version-history":[{"count":0,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/14939\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/media?parent=14939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/categories?post=14939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/tags?post=14939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}