SlideShare a Scribd company logo
1 of 48
Software for  Enterprise Risk Assessment RiskWatch ® Annapolis, Maryland
 
New Emphasis on Risk Assessment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Increased Requirements for  Security Risk Assessments ,[object Object]
R ISK W ATCH ® ,[object Object],[object Object],[object Object],[object Object],[object Object],A comprehensive and integrated software tool that automates the surveying, data collection, analysis and reporting for risk assessment and its on-going management.
RiskWatch Uses Compliance Regulations,  Standards and Guidelines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHAT’S RISKWATCH?   ,[object Object],[object Object],[object Object],[object Object],[object Object]
RiskWatch Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RISKWATCH ®  Value ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RISKWATCH ®  Risk Assessment Process Automated Survey Management Process Management Data Aggregation &  Analysis Content (Rules & Data) Risk Analysis Customization Reporting Respondents Analyst
RiskWatch Clients                
RiskWatch is The First Choice in Security Risk Assessment Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why RiskWatch Stays Number One ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RiskWatch Adds Business Continuity & Disaster Recovery Planning Integrating Risk and Recovery
RiskWatch Elevates  IT Security Compliance  Up to the Boardroom ,[object Object],[object Object],[object Object],[object Object],[object Object]
Progress at a Glance – Tracks the Case
ELEMENTS OF A METRICS-BASED  RISK ASSESSMENT APPROACH ASSETS THREATS VULNERABILITIES LOSSES SAFEGUARDS
ADAPTABLE FOR EITHER  QUALITATIVE  (COMPLIANCE ONLY) ASSESSMENTS OR  FULL RISK ASSESSMENTS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use Inventory Information or  Asset Configuration Tool based on  Standard Capital Expenditures Allocation Tables
RISKWATCH PROVIDES AGGREGATED THREAT DATA OR INPUT YOUR OWN ORGANIZATIONAL DATA SUCH AS INCIDENT REPORT DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THREAT TABLE  IS  FULLY CUSTOMIZABLE  BY THE USER BASED ON INCIDENT  DATA OR PEN TEST DATA
INCLUDES ALL RELEVANT VULNERABILITY AREAS
QUESTIONS CAN BE TAILORED BY THE USER AND CATEGORIES CAN BE SELECTED FOR EACH  SPECIFIC ANALYSIS ,[object Object],[object Object],[object Object],[object Object],[object Object]
YOU CAN SELECT QUESTIONS THAT MAP  EXACTLY TO THE ISO-17799 STANDARD OR ANY OTHER STANDARD
Each question uses actual security regulations as control standards and is linked to appropriate Functional Areas
 
Respondents Can Answer Questions over the Web or from an Internal Server with full ASP functionality
Respondents answer questions based on their job categories -- most surveys have 50-100 questions
Blue shading shows which questions have already been answered.
or Use The New Web-Based RWSURVEY ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ANALYSTS CAN CUSTOMIZE AND CHANGE QUESTIONS
INCLUDES ALL RELEVANT  IT CONTROL CATEGORIES
EACH POTENTIAL SAFEGUARD INCLUDES DEFAULT VALUES FOR COST, MAINTENANCE AND LIFE CYCLE
Data Aggregation & Analysis Financial Data Software Automatically Analyses  Over 3 Million  Linking Relationships Risk = Asset    Loss    Threat    Vulnerability Loss Delays & Denials Fines Disclosure Modification Direct Loss Asset Applications Database Financial Data Hardware System Software Threat Disclosure Hackers Fraud Viruses Network Attack Loss of Data Embezzlement Vulnerability Acceptable Use Disaster Recovery Authentication Network Controls No Security Plan Accountability Privacy Access Control Fines Disclosure Modification Fraud Loss of Data Acceptable Use Authentication Privacy Access Control
RESULTS FROM THE RISK ASSESSMENTS ,[object Object],[object Object],[object Object],[object Object]
The Case Summary Report is a Word Document and is Pre-Written as a Management Report
EASY TO UNDERSTAND GRAPHS ILLUSTRATE  OVERALL COMPLIANCE VS. NON-COMPLIANCE   AGAINST A PUBLISHED OR INTERNAL STANDARD
Vulnerability Distribution Report  Shows Percentage of Compliance  by Requirement
Accompanying Spreadsheet Gives Complete Information about Answer Details Lists actual number of answers who indicated compliance or non-compliance.
Track Compliance by Role or by Name
Graphs and Spreadsheets also  Detail Compliance by Standard
Reports Detail Asset Values for the Information Systems
ALE (Annual Loss Expectancy) reports include complete audit trails and powerful analysis tools to automatically analyze potential losses. Annual Loss Expectancy by Type of Loss
SAFEGUARD REPORT -- LISTS TOP TEN RECOMMENDED CONTROLS  BY RETURN ON INVESTMENT
Return On Investment Graphs Link to Detailed Spreadsheets
Justifies the Security Budget by Demonstrating Cumulative Loss Reduction by Combinations of Controls
THE BOTTOM LINE ,[object Object],[object Object],[object Object]
RiskWatch, Inc. [email_address] Caroline Hamilton 410-224-4773 x105 www.riskwatch.com

More Related Content

Featured

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

RiskWatch for Information Systems™

  • 1. Software for Enterprise Risk Assessment RiskWatch ® Annapolis, Maryland
  • 2.  
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. RISKWATCH ® Risk Assessment Process Automated Survey Management Process Management Data Aggregation & Analysis Content (Rules & Data) Risk Analysis Customization Reporting Respondents Analyst
  • 11. RiskWatch Clients             
  • 12.
  • 13.
  • 14. RiskWatch Adds Business Continuity & Disaster Recovery Planning Integrating Risk and Recovery
  • 15.
  • 16. Progress at a Glance – Tracks the Case
  • 17. ELEMENTS OF A METRICS-BASED RISK ASSESSMENT APPROACH ASSETS THREATS VULNERABILITIES LOSSES SAFEGUARDS
  • 18.
  • 19. Use Inventory Information or Asset Configuration Tool based on Standard Capital Expenditures Allocation Tables
  • 20.
  • 21. THREAT TABLE IS FULLY CUSTOMIZABLE BY THE USER BASED ON INCIDENT DATA OR PEN TEST DATA
  • 22. INCLUDES ALL RELEVANT VULNERABILITY AREAS
  • 23.
  • 24. YOU CAN SELECT QUESTIONS THAT MAP EXACTLY TO THE ISO-17799 STANDARD OR ANY OTHER STANDARD
  • 25. Each question uses actual security regulations as control standards and is linked to appropriate Functional Areas
  • 26.  
  • 27. Respondents Can Answer Questions over the Web or from an Internal Server with full ASP functionality
  • 28. Respondents answer questions based on their job categories -- most surveys have 50-100 questions
  • 29. Blue shading shows which questions have already been answered.
  • 30.
  • 31.
  • 32. INCLUDES ALL RELEVANT IT CONTROL CATEGORIES
  • 33. EACH POTENTIAL SAFEGUARD INCLUDES DEFAULT VALUES FOR COST, MAINTENANCE AND LIFE CYCLE
  • 34. Data Aggregation & Analysis Financial Data Software Automatically Analyses Over 3 Million Linking Relationships Risk = Asset  Loss  Threat  Vulnerability Loss Delays & Denials Fines Disclosure Modification Direct Loss Asset Applications Database Financial Data Hardware System Software Threat Disclosure Hackers Fraud Viruses Network Attack Loss of Data Embezzlement Vulnerability Acceptable Use Disaster Recovery Authentication Network Controls No Security Plan Accountability Privacy Access Control Fines Disclosure Modification Fraud Loss of Data Acceptable Use Authentication Privacy Access Control
  • 35.
  • 36. The Case Summary Report is a Word Document and is Pre-Written as a Management Report
  • 37. EASY TO UNDERSTAND GRAPHS ILLUSTRATE OVERALL COMPLIANCE VS. NON-COMPLIANCE AGAINST A PUBLISHED OR INTERNAL STANDARD
  • 38. Vulnerability Distribution Report Shows Percentage of Compliance by Requirement
  • 39. Accompanying Spreadsheet Gives Complete Information about Answer Details Lists actual number of answers who indicated compliance or non-compliance.
  • 40. Track Compliance by Role or by Name
  • 41. Graphs and Spreadsheets also Detail Compliance by Standard
  • 42. Reports Detail Asset Values for the Information Systems
  • 43. ALE (Annual Loss Expectancy) reports include complete audit trails and powerful analysis tools to automatically analyze potential losses. Annual Loss Expectancy by Type of Loss
  • 44. SAFEGUARD REPORT -- LISTS TOP TEN RECOMMENDED CONTROLS BY RETURN ON INVESTMENT
  • 45. Return On Investment Graphs Link to Detailed Spreadsheets
  • 46. Justifies the Security Budget by Demonstrating Cumulative Loss Reduction by Combinations of Controls
  • 47.
  • 48. RiskWatch, Inc. [email_address] Caroline Hamilton 410-224-4773 x105 www.riskwatch.com