UK & Ireland Featured Project: Entrepose - Asselby to Pannal 48” Gas Pipeline

QEM Solutions provided project services and management consultancy to ensure that all internal processes associated with quality / risk mitigation during design were successfully developed and implemented. QEM Solutions managed all activities associated with quality, technical writing, document control and final project handover.

Tell Me More...
Overseas Featured Project: Capita Symonds - Valve Inspections

QEM Solutions were contracted to carry 3rd party inspection and witnessing activities on a series of valves fabricated in Germany for a series of SGN contracts throughout Scotland.

Tell Me More...
We are QEM Solutions We are QEM Solutions

We are problem solvers. We are organisers. From the project start-up to the very final evaluations and analysis, we can bring enthusiasm to each and every part of your project.

 

News Spotlight What is isoPlan®?

The utilities industry had an ongoing problem that no one had yet addressed. How do you visualise isolation devices and their isolation status in real time directly from a P&ID? And further, how do you derive a task-specific digital isolation plan directly from an engineering drawing?

Read more...

ISO 27001 Information Security Management

With ever-increasing threats to digital information, a breach in information security can be catastrophic to any business, no matter what the scale or what industry they operate in.

QEM can review your current working practices and identify which aspects of your business are at risk.

ISO 27001:2013 is an international standard that provides a framework that helps organisations meet both their legal and contractual obligations associated with data protection and information security. Unlike the other international management system standards, (ISO 9001, ISO 14001 and ISO 45001)  ISO 27001 focuses on a list of mitigation controls that reduces or eliminates risks.  These controls are detailed in Annex A and include everything from access and physical perimeter management to cryptography and supplier assessments.

Implementing a robust information management system in accordance with ISO 27001 can dramatically reduce the following threats:

  • Cyber crime (attacks for monetary gain, such as phishing, malware intrusion, identity theft etc.)
  • Hacktivism, (attacks to disrupt activities in order to make a political or activist standpoint)
  • Active persistant threat, (such as a power cut or utility failure)
  • Insider threat, (a threat caused by an internal resource such as an employee or ex-employee)
  • Native state, (a state-driven attack on a political or geographical region)

QEM can reduce the CHAIN threats by applying the measures detailed in Annex A of ISO 27001 in a cost-effective and realistic manner.

 

 

Related Projects