Skill Packages
Browse ready-made AI workflow skills for document elaboration, review, and structuring.
OSFI B-10 — Third-Party Risk Assessment
Draft risk identification, assessment, and due diligence for third-party arrangements under OSFI B-10 (criteria, concentration, subcontracting, Annex 1).
Learn MoreOSFI B-10 — Third-Party Risk Management Framework
Draft the enterprise-wide TPRMF (governance, accountabilities, lifecycle, inventory) for federally regulated financial institutions under OSFI B-10.
Learn MoreOSFI E-13 — RCM Framework
Draft the enterprise-wide Regulatory Compliance Management (RCM) framework document for federally regulated financial institutions under OSFI Guideline E-13.
Learn MoreOSFI E-13 — RCM Monitoring
Draft independent RCM monitoring and testing procedures (CCO-led) and IA validation for federally regulated financial institutions under OSFI E-13.
Learn MoreOSFI E-13 — RCM Procedures
Draft RCM procedures for identifying, risk-assessing, communicating, managing and mitigating regulatory compliance risk and day-to-day compliance under OSFI E-13.
Learn MoreOSFI E-13 — RCM Reporting
Draft internal RCM reporting procedures and report templates (Senior Management, CCO, IA) for federally regulated financial institutions under OSFI E-13.
Learn MoreOSFI E-13 — RCM Roles
Draft documented RCM roles and mandates (CCO, Senior Management, Internal Audit) for federally regulated financial institutions under OSFI E-13.
Learn MoreOSHA Written Safety & Health Program
Draft and validate the written safety and health programme documentation required or recommended by OSHA (29 CFR 1910 / 1926). Covers IIPP, hazard communication (HazCom), lockout/tagout (LOTO), confined space, respiratory protection, and other programme-specific written plans.
Learn MoreOT Asset Integrity Register (CISA CPG 2.1)
Maintain and validate an OT Asset Integrity Register for CISA CPG 2.1: catalog ICS, PLCs, HMIs, and sensors with firmware versions and physical locations; link assets to CISA KEV and vendor advisories (Siemens, Rockwell, etc.); cross-reference inventory with network discovery to flag unauthorized devices.
Learn MoreP3M3 — PfM3 Alignment
Elaborate alignment of portfolio management to the Portfolio Management Maturity Model (PfM3): how current practices map to PfM3's seven perspectives and five levels.
Learn MoreP3M3 — PgM3 Alignment
Elaborate alignment of programme management to the Programme Management Maturity Model (PgM3): how current practices map to PgM3's seven perspectives and five levels.
Learn MoreP3M3 — PjM3 Alignment
Elaborate alignment of project management to the Project Management Maturity Model (PjM3): how current practices map to PjM3's seven perspectives and five levels.
Learn More