{"id":16085,"date":"2017-02-06T00:22:10","date_gmt":"2017-02-05T21:22:10","guid":{"rendered":"https:\/\/www.proya.com.tr\/?page_id=16085"},"modified":"2022-11-30T00:10:46","modified_gmt":"2022-11-29T21:10:46","slug":"hopex-enterprise-risk-management","status":"publish","type":"page","link":"https:\/\/www.proya.com.tr\/en\/hopex-enterprise-risk-management\/","title":{"rendered":"HOPEX Enterprise Risk Management"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1476999933160{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/proya-kurumsal-mimari-header.jpg?id=9698) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<h3><span style=\"color: #ffffff;\">HOPEX Enterprise Risk Management <\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h5><span style=\"color: #ffffff; font-weight: 400;\">HOPEX Enterprise Risk Management (ERM) <\/span><\/h5>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;40px&#8221;][\/vc_column][\/vc_row][vc_row enable_top_separator=&#8221;true&#8221; top_separator_style=&#8221;slope-right&#8221; top_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1476279052293{padding-right: 10% !important;padding-left: 10% !important;}&#8221;]<div class=\"mkdf-section-title-holder\">\n\t<h2 class=\"mkdf-section-title mkdf-section-title-small\" style=\"color: #43648d;text-transform: capitalize\">\n\t\tHOPEX Enterprise Risk Management\t<\/h2>\n<\/div>[vc_empty_space height=&#8221;20px&#8221;][vc_column_text]HOPEX Enterprise Risk Management (ERM), one of the modules of the HOPEX GRC product family, helps you manage the wide spectrum of risks and related operations in your organization, from identifying risks to generating reports. Moreover, while doing all these, it also guarantees data consistency and quality.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;11316&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<strong>HOPEX Enterprise Risk Management (ERM)<\/strong> risk management units and in your institution;<\/p>\n<p><strong>Increases effectiveness and quality:<\/strong> It enables the establishment and management of a structured risk library in a common repository where all changes are tracked. This step is also important as it facilitates inspections. Automated risk assessment surveys also lighten the workload of risk managers, allowing them to focus on tasks that require less or no repetition.<\/p>\n<p><strong>It ensures that risks are evaluated together with business units and users:<\/strong> Each participant in the process has a specific interface where they can see only the information within their own responsibility. In addition, there is a collaborative workspace that allows multiple departments to work together comfortably. This structure enables the collection of input from business units and users to assist in the assessment of risks and controls. All exchanges between risk managers and business unit users can be tracked and automated.<\/p>\n<p><strong>Allows automation of communication and consolidation:<\/strong> Advanced[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;13357&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]It enables you to standardize and automate the collection, analysis and reporting of IT risks and their business impact so that you can evaluate and control your organization&#8217;s Information Technology (IT) resources and infrastructure.<br \/>\nIt meets the needs of traditional IT administrators, IT Risk managers, IT Security Managers and IT Compliance Managers:<\/p>\n<ul>\n<li>Identifying threats and vulnerabilities of applications, system technologies, and other IT resources<\/li>\n<li>Identification and assessment of applications and IT risks that may arise from their deployment<\/li>\n<li>Identification and evaluation of IT security controls of applications<\/li>\n<li>Reporting of IT control levels and regulatory compliance summaries<\/li>\n<li>Qualitative assessment of IT suppliers and consultants<\/li>\n<\/ul>\n<p>Its comprehensive features in the categories of IT risk assessment, IT compliance risk assessment, and IT vendor risk assessment support you and your organization.<\/p>\n<p>IT risk assessment provides deep impact analysis that includes changes and the impact of these changes on your IT infrastructure, data and capacity by creating a resource inventory, identifying threats and vulnerabilities, identifying and assessing risks, generating solutions and reporting the solution produced.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;11349&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;11350&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;11351&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<strong>IT regulatory compliance risk assessment<\/strong><\/p>\n<p>The IT compliance process uses the regulatory repository. After all the legislation is imported, the controls are created and collected in a repository. These two steps enable the compliance assessment to be performed and the relevant reports to be obtained.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;11352&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;13359&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;11354&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;11355&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;11356&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<strong>IT vendor risk assessment<\/strong><\/p>\n<p>The IT vendor evaluation methodology uses a proprietary database. This database is based on survey-based assessments submitted to eligible owners in the institution. After the suppliers are identified and the scope of the assessment is defined, the assessments are sent to the relevant owners. Results are analyzed so that action plans and reports can be triggered.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;11357&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;11358&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;11359&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]MEGA&#8217;s platform built on the central repository ensures that all your GRC goals reach each other.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;11318&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;]\t<div class=\"mkdf-video-banner-holder\">\n\t\t<a class=\"mkdf-video-banner-link\" href=\"https:\/\/youtu.be\/kcgaTcU-Nw4\" data-rel=\"prettyPhoto[831675777]\">\n\t\t\t\t\t\t\t<img width=\"1592\" height=\"895\" src=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2017\/02\/hpvid-1.jpg\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2017\/02\/hpvid-1.jpg 1592w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2017\/02\/hpvid-1-300x169.jpg 300w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2017\/02\/hpvid-1-768x432.jpg 768w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2017\/02\/hpvid-1-1024x576.jpg 1024w\" sizes=\"(max-width: 1592px) 100vw, 1592px\" \/>\t\t\t\t\t\t<div class=\"mkdf-video-banner-overlay\">\n\t\t\t\t<div class=\"mkdf-vb-overlay-tb\">\n\t\t\t\t\t<div class=\"mkdf-vb-overlay-tc\">\n\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"mkdf-icon-font-elegant arrow_triangle-right_alt2 mkdf-vb-play-icon\" ><\/span>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/a>\n\t<\/div>\n[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243; enable_sticky=&#8221;true&#8221; sticky_offset=&#8221;100&#8243; css=&#8221;.vc_custom_1474589458588{padding-right: 10% !important;padding-left: 10% !important;}&#8221;][vc_empty_space height=&#8221;50px&#8221;][vc_column_text]<\/p>\n<h6><span style=\"color: #294b8b; font-weight: 500;\">GRC (Governance, Risk &amp; Control)<\/span><\/h6>\n<p>[\/vc_column_text]<a href=\"https:\/\/www.proya.com.tr\/hopex-enterprise-risk-management\/\" title=\"\"  data-id=\"mpc_button-356a0f4762cfb10\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  fa fa-chevron-right\"><\/i><span class=\"mpc-button__title mpc-transition\">Enterprise Risk Management<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"https:\/\/www.proya.com.tr\/hopex-it-risk-management\/\" title=\"\"  data-id=\"mpc_button-266a0f4762cfc28\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  fa fa-chevron-right\"><\/i><span class=\"mpc-button__title mpc-transition\">IT Risk Management<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"https:\/\/www.proya.com.tr\/hopex-internal-audit\/\" title=\"\"  data-id=\"mpc_button-246a0f4762cfcf5\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  fa fa-chevron-right\"><\/i><span class=\"mpc-button__title mpc-transition\">Internal Audit<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"https:\/\/www.proya.com.tr\/hopex-internal-control\/\" title=\"\"  data-id=\"mpc_button-436a0f4762cfddc\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  fa fa-chevron-right\"><\/i><span class=\"mpc-button__title mpc-transition\">Internal Control<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row][vc_row enable_bottom_separator=&#8221;true&#8221; bottom_separator_style=&#8221;arrow-right&#8221; bottom_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1476999933160{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/proya-kurumsal-mimari-header.jpg?id=9698) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text] HOPEX Enterprise Risk Management [\/vc_column_text][vc_column_text] HOPEX Enterprise Risk Management (ERM) [\/vc_column_text][vc_empty_space height=&#8221;40px&#8221;][\/vc_column][\/vc_row][vc_row enable_top_separator=&#8221;true&#8221; top_separator_style=&#8221;slope-right&#8221; top_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1476279052293{padding-right: 10% !important;padding-left: 10% !important;}&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]HOPEX Enterprise Risk Management (ERM), one of the modules<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":[],"categories":[],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/16085"}],"collection":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/comments?post=16085"}],"version-history":[{"count":1,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/16085\/revisions"}],"predecessor-version":[{"id":16086,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/16085\/revisions\/16086"}],"wp:attachment":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/media?parent=16085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/categories?post=16085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/tags?post=16085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}