Written by D. Klappenbach J. Schipper April 2016 Round table discussion Implementing BowTie centered Risk Analyses Contents 1. Intro from the authors 2. Why BowTie Risk Analyses 3. Risk Management process 4. Common practices 5. Differences in practices 6. Benefit case 7. Conclusion 8. Find out more 2 Implementing BowTie Risk Analyses 3. 4. 6. 7. 8. 9. 10. 11. 2 Chapter 1 Intro from the authors Several major Utilities in Power Generation as well as Gas Grid companies are implementing Risk based Asset Management using BowTie analyses as risk assessment method. Sometimes this is part of a larger change management process were process safety is the main theme or the improvement of Asset Management decision making in general. Implementation of the BowTie processes and methods isn’t an easy road. Four leading companies in our industry indicated a need to share practices and discuss several implementation topics and experiences. This E-book describes the results of the discussion held in a roundtable session in Denmark on April 19th 2016. Implementing BowTie Risk Analyses 3 Chapter 2 About BowTie analyses BowTie is the tool for process safety and gives a visual view of hazards and their barriers. It starts with the fundamental assessment of what could go wrong and captures in a structured way all barriers that are in place to prevent things going wrong. Missing barriers will be evaluated leading to further risk mitigating actions in terms of technical adjustments, process improvements or change of behavior. The starting point are often technical components, so the BowTie methodology is a “bottom-up” process. The BowTies also locks in corporate memory by including findings from various processes. Implementing BowTie Risk Analyses 4 Chapter 3 Why BowTie analyses? All participating companies in the round table session indicated the same kind of drivers for implementing Risk Analyses: • • • • Strong pressure on profitability Growing concern regarding reliability and availability Growing concern regarding safety Need for building up compliancy evidence on several topics including safety These drivers lead to the need of a more structured and robust decision-making process. Part of the participating companies followed the ‘process safety’ method that is marketed by Scottish Power, since this method already built evidence of success. This method has BowTie analyses as the main risk analysis method. Others developed own processes and methods - most of them also applying BowTie as a central piece. Implementing BowTie Risk Analyses 5 Chapter 4 Risk Management process Generic BowTie Local & specific BowTie Risk and Opportunity Identification Risk Review From the discussion a common process could be derived: • • • • Starting point is the creation of generic BowTie “templates” for selected asset types. Some organizations bought these in order to save time and effort, whereas other developed them “from scratch”. The number of generic Bowties are in the range of 60 to 120. Then, these generic BowTies are tuned to the local and specific situation e.g. at a power plant. For example, a generic “turbine BowTie” leads to many specific BowTies. Based on the specific BowTies, sessions are facilitated with experts to challenge effectivity of barriers and to identify potential missing barriers. This results in identification of opportunities and improvements. In recurring reviews, checks are done to verify that prioritized improvements actually have been implemented. The feedback from these reviews are used to adjust the generic BowTies to complete the cycle. Implementing BowTie Risk Analyses 6 Chapter 5 Common practices The participants recognized that since the management were similar, this leads to similar practices in how the BowTie methodology was applied at their different organizations. Organizations: - Small centralized teams to facilitate BowTie analyses and review at sites - Accountability for risk assessments and barrier improvements stays with line organization - Risk defined from a holistic perspective (financial, quality, safety etc..) Process: - Well structured process approach - From generic to specific - risk based approach - Two step decision: risk prioritization followed by prioritization of improvements project on risk mitigation Enabling Technology: - Tool to build up BowTies - Risk register - Risk prioritization and reporting functionality - Portfolio register - Portfolio prioritisation or optimisation functionality - Dashboard with consolidated overview of risk position and progress on improvement of results People & change: - Dependancy on subject matter expert judgement of risks - Effort on changing mindset and culture to support riskbased decision-making Implementing BowTie Risk Analyses 7 Chapter 6 Differences Meanwhile, the organizations also had differing complexity and set-up, which lead to some differences in how BowTies were applied. Organizations: - Different conditions resulting in different objectives - Some bought “ready solutions”, others developed their own solution - At operational level, some applied primarily RCM rather than BowTie as risk analysis method Process: - Different definitions and starting points used for barriers, e.g. life cycle stages, technology used, procedures, behaviour, expected & enhanced barriers Enabling Technology: - Different tools in the portfolio optimisation/prioritisation - Different focus and set-up of dashboards for management of risk and barriers People & Change: - Difficult to convince management of added value in the beginning - Large multinationals have bigger challenge in rolling out BowTies and also updating across several languages Implementing BowTie Risk Analyses 8 Chapter 6 Benefit case The participants could show substantial benefits from having implemented BowTie processes. Prioritization of scarce budgets and resources could now be made on a more objective basis and more fact-driven. Where previously only money and returns were quantified, now also abstract dimensions such as the general condition of diverse types of assets and the risk connected are quantified. That means that project portfolios can be better managed based on underlying risk. A specific benefit of the BowTie is the focus on barriers, leading to quite concrete measures that are connected to each other. Some organisations could show sophisticated dashboards for following the condition and effectiveness of their barriers. The methodology is intuitive and easy to transfer from one site/region to another. Resistance can even be turned around into being a driver for further implementation: many times engineers want to “find the flaw” in a BowTie analysis presented by someone else. In the discussion that arises, the engineer’s effort to invalidate the BowTie by point to what it’s lacking, actually only strengthens it. Every flaw or missing piece is added to the BowTie to make it more complete. Implementing BowTie Risk Analyses 9 Chapter 7 Conclusion Most agree that implementing BowTie into a tool that is a central piece of strategic and tactical decision-making is an effort which is not to be taken likely. The methodology needs to connect to other risk tools and to portfolio- and strategy management processes. As such, there are a lot of people involved across the organization and many manhours have to be put in. But the “investment” pays off, is the conclusion of the roundtable discussions. The experience is that after an initial effort both strategic levels and local site employees are thankful for the structure that is brought to prioritiziation of measures. In order words, difficult decisions and prioritizations that anyway have to made by the organization, are now made on a “higher level” of quality and transparency. As always, the “devil is in the details”. The BowTie methodology is “simple but not simplistic”. It’s an intuitive and very visual process, so the theory is not difficult to grasp for most people. So, the value is created more in the way the organization can adapt BowTie to it’s own conditions and embed it in it’s existing culture and Asset Management processes. Implementing BowTie Risk Analyses 10 Chapter 7 Find out more This E-Book is the result of a round table session facilitated by UMS Group. In the more than 25 years that we are in business we have found the round table session a very pragmatic and effective way to bring companies together to discuss and share practices on a variety of topics. You can contact us at [email protected] Implementing BowTie Risk Analyses 11
© Copyright 2026 Paperzz