SlideShare a Scribd company logo
1 of 20
IIBA® Perth
Not So Risky Business with Ashley Aitken
29 August 2023
IIBA® Global 2022 Chapter of the Year
IIBA® Australia acknowledges the Traditional Owners of
country throughout Australia and recognise their continuing
connection to land, waters and culture.
We pay our respects to Elders past, present and emerging
and extend our respects to all Aboriginal and Torres Strait
Islander people present with us today.
Acknowledgement of Country
Thank you to our Venue and F&B
Sponsor for tonight
Festival of Business Analysis
16 – 20 of October 2023
Australia & New Zealand
https://festivalofbusinessanalysis.org
https://festivalofbusinessanalysis.org
Mary Karborani
Chief Technology Officer | Capricorn
Eddie Zhang
Founder and Managing Director
Zhamatix
Helen McLeish
Chief Cyber Security Officer | East
Metropolitan Health Service
Phil Delalande
Managing Director | Symphonia
and Neovate Education and
Founder - UXCamp
IIBA® Perth
Speakers
Anna Rajander
Senior Manager
Business Analysis | RAC
The main reference for Business Analysis in Brazil. The first Latin American
CBAP in 2008, he is also certified as PMP, AAC, and CPOA.
Consultant and instructor for more than 25 years working with methodology,
solution development, business analysis, systems analysis, project
management, business architecture, and systems architecture.
Performing live, on YouTube, or in his online courses, he always explains
complex things in a charming and approachable way.
His online courses are appreciated by students in more than 65 different
countries.
https://thebrazilianba.com
https://www.youtube.com/TheBrazilianBA
Keynote: Fabricio Laguna
The Future of Business Analysis with Artificial Intelligence
IIBA Perth Business Analysis Day 2023
19 October 2023 @ Mecure Perth
4
https://australia.iiba.org/event/iibar-perth-networking-event-2
IIBA Perth Networking Event
21 September 2023 @ Aviary, William st. Perth
5
Introducing…
Business Information Risk Management
Please complete survey at https://bit.ly/birmsurvey
© Running Code Productions 2023-
https://runningcode.com.au
Risk RABI
https://riskrabi.com 1
Not So
Risky Business
29/8/2023 • IIBA® Perth
Dr Ashley Aitken • @AshleyAitken • ashley.aitken@runningcode.com.au
Running Code Productions • www.runningcode.com.au
NSFW
8
Business Information
All the information flowing throughout the organisation,
between people and applications,
being stored or transmitted and received or retrieved.
Business Information Risk Management
9
The Problem – Business Information Risk
Business Information Risk Management
EXTERNAL INTERNAL
14
The Solution – Business Information Risk Management
1. Identify business information risks
§ Confidentiality
§ Integrity
§ Availability
2. Protect the business information
ISO/IEC 27001
Information Security Management Systems
Identify
Protect
Detect
Respond
Recover
Lead
#1
#2
US NIST Cyber Security Framework
Business Information Risk Management
16
Business
Information
Risk Management
29/8/2023 • IIBA® Perth
Dr Ashley Aitken • @AshleyAitken • ashley.aitken@runningcode.com.au
Running Code Productions • www.runningcode.com.au
18
Overview and Introduction
BUSINESS INFORMATION
RISK MANAGEMENT
19
Business Information Risk Management
Please complete survey at https://bit.ly/birmsurvey
© Running Code Productions 2023-
https://runningcode.com.au
Risk RABI
https://riskrabi.com 2
Overview
§ Overview and Introduction
§ Business Information Risk Management
§ Modelling Business Information Flows
§ Analysing Business Info Flows and Applications
§ Analytics, Insights, and Actions
§ Summary and Q&A
Business Information Risk Management
21
About Me and Running Code Productions
Dr Ashley Aitken
– PhD UNSW (CS/SE/AI)
– Creating Business Value with IT
– Enterprise Software Developer
– Corporate Innovation
– Ex-Academic
– Startups
Running Code Productions
1. Business Analysis, IS, & IT
– Creating Business Value with IT
2. Full-Stack Enterprise Software
– Java, .Net, Akka, CQRS,…
3. Professional Training
Since 1998
Business Information Risk Management
22
Thank You to the Sponsors
IIBA® Australia & Perth Talent International
Business Information Risk Management
24
Any Questions?
Business Information Risk Management
25
Overview
§ Overview and Introduction
§ Business Information Risk Management
§ Modelling Business Information Flows
§ Analysing Business Info Flows and Applications
§ Analytics, Insights, and Actions
§ Summary and Q&A
Business Information Risk Management
26
Business Information
Risk Management
BUSINESS INFORMATION
RISK MANAGEMENT
27
Business Information Risk Management
Please complete survey at https://bit.ly/birmsurvey
© Running Code Productions 2023-
https://runningcode.com.au
Risk RABI
https://riskrabi.com 3
Why? Business Information Risk
— Business information risk puts the organisation at risk!
How? Business Information Risk Management
— Identify inherent vulnerabilities and risks in business information flows and applications.
— Protect the business information flows and applications
What? Collect Data, Analyse, and Act
— Build a model of all business information flowing through systems, analyse, and act.
Business Information Risk Management?
Business Information Risk Management
29
WHY Business Information Risk Management?
§ Unknown business information information flows & applications?
§ Risks with legacy and current application / systems?
§ Before modernisation or digital transformation
§ Operational risk associated with
§ Confidential Information
§ Critical Information
Business Information Risk Management
31
HOW Business Information Risk Management?
Over
Protecting?
Managed
Appropriately
Check
Appropriate?
Warning:
Danger!
Less Confidential or
Critical Information
More Confidential or
Critical Information
Less Secure Applications (including Communications)
More Secure Applications (including Communications)
Business Information Risk Management
32
1. Model Business Information Flows and Applications
2. Analyse Business Information Flows and Applications
3. Analytics, Insights, and Actions
WHAT Business Information Risk Management?
Business Information Model Info Flow & Application Attributes
2. Analyse Info Flows & Applications
1. Model Info Flows & Applications 3. Analytics, Insights, & Action
Protect
Business Information Risk Management
34
A high-level model of:
– All the types of information that flows through the organisation, from
external sources, internally, and to external sources
including
– Various business and security-related attributes of the information flows
and the systems / applications associated with them
that we can analyse to assess business vulnerabilities and risks.
Business Information Model (BIM)
Business Information Risk Management
35
Business Information Model (BIM)
SAMPL
Business Information Risk Management
36
Business Information Risk Management
Please complete survey at https://bit.ly/birmsurvey
© Running Code Productions 2023-
https://runningcode.com.au
Risk RABI
https://riskrabi.com 4
High-Level Model
Examples
— Training
– NOT Regional Training ,Metro Training
— Diagnosis
– NOT Cancer Diagnosis, Infection
Diagnosis
— Project Management
– NOT ABC Project, DEF Project, GHI
Project …
— Advice & Feedback
– NOT Government Advice & Feedback,
Agency Advice & Feedback, …
Examples
—Financial Report
– Not P&L Statement, Balance Sheet,…
—Court Document
– Not Affidavit, VRO,…
—Relevant Document
– NOT Legislation, Policy, …
But not too high level…
—NOT just Info, Data, Document
WHAT, NOT WHO, WHERE, HOW TYPES OF INFO FLOWS
Business Information Risk Management
37
Manual as well as Software Applications
Software Applications & Systems
§ Desktop Applications
§ Enterprise Applications
§ SaaS / Web Applications
Manual ”Applications”
§ Pen & Paper / Printed
§ Face-to-Face
§ …
Business Information Risk Management
38
A “business capability” defines an organisation’s capacity
to successfully perform a unique business activity.
§ Model business information flows in each business capability, NOT in each
department or function
§ Helps minimalise modelling of the same information flow types in different
department or functions…
Use Business Capabilities to segment the Organisation
Business Information Risk Management
41
Core and Support Business Capabilities
Core Business Capabilities
1. ...
2. …
3. …
4. …
5. …
6. … depends on the organisation!
Support Business Capabilities
1. General Management
2. Sales & Marketing Management
3. Human Resource Management
4. Information & Technology Management
5. Contract & Procurement Management
6. Corporate Comms & Rel. Management
7. Corporate Governance Management
8. Development Management
9. Research Management
10. Financial Management
11. Asset Management
Business Information Risk Management
43
Business Capabilities at a Hospital?
Core Business Capabilities
1. Diagnosis
2. Treatment Planning
3. Treatment
4. After-Treatment Care
5. Patient Administration
Support Business Capabilities
1. General Management
2. Sales & Marketing Management
3. Human Resource Management
4. Information & Technology Management
5. Contract & Procurement Management
6. Corporate Comms & Rel. Management
7. Corporate Governance Management
8. Financial Management
9. Asset Management
Business Information Risk Management
44
Any Questions?
Business Information Risk Management
50
Business Information Risk Management
Please complete survey at https://bit.ly/birmsurvey
© Running Code Productions 2023-
https://runningcode.com.au
Risk RABI
https://riskrabi.com 5
Overview
§ Overview and Introduction
§ Business Information Risk Management
§ Modelling Business Information Flows
§ Analysing Business Info Flows and Applications
§ Analytics, Insights, and Actions
§ Summary and Q&A
Business Information Risk Management
51
Modelling
Business Information Flows
and Applications
BUSINESS INFORMATION RISK MANAGEMENT
52
1. What business capability is being modelled ?
2. What information flows are produced?
3. What information flows are required to (produce the info flows above)?
4. What are the applications (software and manual) used by the info flows?
Four Key Questions
Business Information Risk Management
53
Business
Capability
Role(s)
System(s)
Applications
Information Flow Produced
Information Flows Required
Information Flows Produced and Required
by a Business Capability
Business Information Risk Management
55
Leave
Management
Manager
HRM App
Hardcopy
Leave Approval
Leave Application
Employee Details
Work Plan
Sample Information Flows Produced and Required
by a Business Capability
Business Information Risk Management
56
Business
Capability
Role(s)
System(s)
Applications
Applications
or Systems
used to
produce the
Information
Flow
Applications
or Systems
used to store
or transmit
the Info
Flow
Information Flow Produced
Information Flows Required
Information Flow Applications
Business Information Risk Management
60
Business Information Risk Management
Please complete survey at https://bit.ly/birmsurvey
© Running Code Productions 2023-
https://runningcode.com.au
Risk RABI
https://riskrabi.com 6
Business
Capability
Role(s)
System(s)
Applications
Producing
Applications
Applications for
producing info flows:
Office Apps
Enterprise Apps
Email / Web
In Person / Telephone
Pen & Paper…
Storing / Transmitting
Applications
Applications for
storing/transmitting
info flows:
Network / Cloud Drive
Enterprise Apps
Email / Web / Post
In Person / Telephone
Filing Cabinet …
Information Flow Produced
Information Flows Required
Producing and Storing / Transmitting Applications
Business Information Risk Management
62
Information Flow Applications
Word, Excel, PowerPoint
Local or Network Drive
Microsoft Outlook
Cloud Drive e.g. OneDrive
Video Conference App
Enterprise Content Mgmt
Hardcopy (Producing)
Microsoft Outlook
Enterprise Applications Enterprise Applications
Telephone Post (Transmit Only)
Face-to-Face Telephone / Fax
Face-to-Face
Video Conference App
Info Flow
Producing
Applications
Info Flow
Storing or
Transmitting /
Receiving or
Reading
Applications
Hardcopy (Storage)
Business Information Risk Management
63
Applications
or Systems
used to
retrieve or
receive the
Info Flow
Business
Capability
Role(s)
System(s)
Applications
Receiving / Retrieving and Access / Reading Applications
Information Flows Required
Applications
or Systems
used to
access the
Information
Flow
Business Information Risk Management
64
Exercise
Model A Business Information Flow
BUSINESS INFORMATION RISK MANAGEMENT
Business Information Risk Management
81
Answer the questions:
1. What business capability is being modelled?
2. What information flow is produced?
3. What information flows are required?
4. What is the application(s) used to produce the information flow?
5. What is the application(s) used to store or transmit the information flow?
6. What is the application(s) used to receive or access each information flow required?
7. What is the application(s) used to read each information flow required?
Exercise – Model a Business Information Flow
Business Information Risk Management
83
Any Questions?
Business Information Risk Management
129
Business Information Risk Management
Please complete survey at https://bit.ly/birmsurvey
© Running Code Productions 2023-
https://runningcode.com.au
Risk RABI
https://riskrabi.com 7
Overview
§ Overview and Introduction
§ Business Information Risk Management
§ Modelling Business Information Flows
§ Analysing Business Info Flows and Applications
§ Analytics, Insights, and Actions
§ Summary and Q&A
Business Information Risk Management
130
Analysing
Business Information Flows
and Applications
BUSINESS INFORMATION
RISK ASSESSMENT
131
Business
Capability
Role(s)
System(s)
Applications
Information Flow Produced
Information Flows Required
Confidentiality Integrity Availability
Sensitivity
Frequency Integration
Business and Security Information Flow Attributes
NEW
Business Information Risk Management
132
1. Business-Related Attributes
1. Frequency – How often on average is information flow?
2. Integration – How is the info flows required integrated to make info flow produced?
2. Security-Related Attributes
1. Confidentiality – How confidential is the information flow?
2. Integrity – How important is it to control who changes the information flow?
3. Availability – How important is it to the business that the Info flow is available?
4. Government Security / Sensitivity Classification (Optional)
Business Information Flow Attributes
Business Information Risk Management
133
1. Frequency – How often (on average) is information flow produced?
1. Minutely
2. Hourly
3. Daily
4. Weekly
5. Monthly
6. Yearly
2. Integration – How are the info flows required integrated to create the info flow produced?
1. Manual – you create the data, information, document
2. Automatic - Single – the data, information, document is created automatically internal to a single application
3. Automatic - Multiple – the data, information, document is created automatically by integrating multiple applications
Business-Related Information Flow Attributes
Business Information Risk Management
134
Confidentiality (Security Attribute)
How important *to the
business* is it to protect
visibility of the information?
Notes
– Use the highest value that may apply
to the information flow of this type,
e.g. if most information flows are
Medium but some are Very High, use
Very High
Possible impact on business of wrong
person viewing the info flow is:
— Low – little or no impact
— Medium – limited adverse impact
— High – serious adverse impact
— Very High – severe or catastrophic
— Extreme – very severe or
catastrophic
Business Information Risk Management
146
Business Information Risk Management
Please complete survey at https://bit.ly/birmsurvey
© Running Code Productions 2023-
https://runningcode.com.au
Risk RABI
https://riskrabi.com 8
Integrity (Security Attribute)
How important *to the
business* is it to protect who
can change the information
flow?
Notes
– Use the highest value that may apply
to the information flow of this type,
e.g. if most information flows are
Medium but some are Very High, use
Very High
Possible impact on business of
wrong person changing the info flow
is:
—Low – little or no impact
—Medium – limited adverse impact
—High – serious adverse impact
—Very High – severe or catastrophic
Business Information Risk Management
147
Availability (Security Attribute)
How important *to the
business* is it to be able to
access the information flow?
Notes
– Use the highest value that may apply
to the information flow of this type,
e.g. if most information flows are
Medium but some are Very High, use
Very High
Possible impact on business of info
flow not being available is:
—Low – little or no impact
—Medium – limited adverse impact
—High – serious adverse impact
—Very High – severe or catastrophic
Business Information Risk Management
148
Business Information Risk Management
Information Flows – CIA Security Classification
The impacts shown below are based on the affect of the unauthorised disclosure, modification or destruction, or availability of information on the organisation.
Security Levels
Security Objective
Low
Little or no adverse effect
Medium
Limited adverse effect
High
Serious adverse effect
Very High
Severe or catastrophic adverse
effect
Extreme
Very severe or catastrophic
adverse effect
Confidentiality
Preserving
authorised
restrictions on
information access
and disclosure. This
includes means for
protecting.
Low (Official)
• Data that is available to
the public with minimal
sensitivity
E.g. Public websites, press
releases, no sensitive
content
Medium (Restricted)
• Data that requires a
low safeguard with low
verification
E.g. Emails & documents
with no sensitive data,
passwords are required
High (Sensitive)
• Data that requires a high
safeguard with high
verification
E.g. Financial Records,
Authentication data, Intellectual
Property, Employee Personal
Details
Very High (Classified)
• Data that requires a very high
safeguard with very high
authentication (2 step
verification)
E.g. Govt & State Critical Path
rollouts, Cabinet related matters,
Agency classified documentation
Extreme (Top Secret)
• Classified information a
Government body deems
to be extremely sensitive
that must be highly
protected
• Formal Security Clearance
required
E.g. Law Enforcement
operations, Military Operations
Integrity
Guarding against
improper
information
modification or
destruction.
Low (Unverifiable)
• Low data accuracy
• Low safeguarding
against inappropriate or
unauthorised changes
E.g. Inaccurate stock
available
Medium (Verifiable)
• Medium data accuracy
• Some safeguarding
against inappropriate or
unauthorised changes
E.g. Some accuracy around
important stock availability
High (Protected)
• High data accuracy
• Higher safeguarding against
inappropriate or unauthorised
change
E.g. Accurate critical stock
available
Very High (Undisputable)
• Very high data timely accuracy
• Higher safeguarding against
inappropriate or unauthorised
change
E.g. Live updates to systems to
update extremely critical stock
available live (System Integration)
Availability
Ensuring timely and
reliable access to
and use of
information. These
are determined by
the business needs.
Low (Transient)
• Low data availability
impact based on the
businesses needs
• Data may not be
recoverable
E.g. Minimal controls
around to make sure the
allocated person is
contacted (not urgent)
Medium (Recoverable )
• Medium data availability
impact based on the
businesses needs
• Data is recoverable
E.g. Controls around to
make sure the allocated
person is contacted
High (Reliable)
• High data availability impact
based on the businesses
needs
• Data should always be
available
E.g. Additional Controls around
to make sure the allocated
person is contacted
Very High (Continuous)
• Very high data availability
Impact based on the businesses
needs
• Unavailability of data could be
severe or catastrophic
E.g. Cause damage to the
operational effectiveness or
security of the organisation
149
Business
Capability
Role(s)
System(s)
Applications
Business Flow Application Attributes
Applications
or Systems
used to
access the
Information
Flow
Applications
or Systems
used to
retrieve or
receive the
Info Flow
Information Flows Required
Business Information Risk Management
Applications
or Systems
used to
retrieve or
receive the
Info Flow
Applications
or Systems
used to
access the
Information
Flow
Information Flows Produced
161
We also need to collect the following attributes for all applications:
1. Name = Formal and Internal Name(s)
2. Developer / Provider = Vendor or Responsible Party
3. Importance / Criticality of Application = Low, Medium, High, Very High, Extreme
4. Management of Application = Custom, Internal, External, SaaS, NA
5. Application Lifecycle Status = Maintained, End-of-Life, End-of-Support, Unknown, NA
6. Operating System / Platform Lifecycle Status – Maintained, EoL, EoS, Unknown, NA
7. Application Strategy = Retain, Replace, Rewrite, Retired, Retired
Application Attributes
Business Information Risk Management
162
How critical is the application / system to business operations?
Possible values:
1. Low
2. Medium
3. High
4. Very High
Criticality of the Application
Business Information Risk Management
165
Business Information Risk Management
Please complete survey at https://bit.ly/birmsurvey
© Running Code Productions 2023-
https://runningcode.com.au
Risk RABI
https://riskrabi.com 9
Who manages (e.g. releases of) the application?
Possible values:
1. Custom (e.g. in-house development)
2. Managed Internal (e.g. COTS)
3. Managed External (e.g. COTS)
4. SaaS (Software as a Service)
Management of the Application
Business Information Risk Management
166
What is the current lifecycle status of the application / system?
Possible values:
1. Maintained
2. End-Of-Life (EOL)
3. End-Of-Support (EOS)
4. Unknown
5. N/A
Current Application / System Lifecycle Status
Business Information Risk Management
167
What is the current lifecycle status of the operating system / platform on
which the application runs?
Possible values:
1. Maintained
2. End-Of-Life (EOL)
3. End-Of-Support (EOS)
4. Unknown
5. N/A
Current Operating System / Platform Lifecycle Status
Business Information Risk Management
168
What is the current strategy with respect to the application / system
going forward?
Possible values:
1. Unknown
2. Replace
3. Retain
4. Retire
5. Rewrite
6. Retired
Current Application / System Strategy
Business Information Risk Management
169
Exercise
Analyse a Business Information Flow & Application
BUSINESS INFORMATION RISK MANAGEMENT
Business Information Risk Management
172
Business Information Flow & Application Attributes
1. Capability
2. Name
3. Frequency
4. Confidentiality
5. Integrity
6. Availability
7. Integration
1. Name(s)
2. Vendor
3. Importance / Criticality
4. Management
5. Application Lifecycle Status
6. Platform/OS Lifecycle Status
7. Current Strategy
INFORMATION FLOW ATTRIBUTES APPLICATION ATTRIBUTES
Business Information Risk Management
173
Business Information Risk Management
Please complete survey at https://bit.ly/birmsurvey
© Running Code Productions 2023-
https://runningcode.com.au
Risk RABI
https://riskrabi.com 10
Any Questions?
Business Information Risk Management
174
Overview
§ Overview and Introduction
§ Business Information Risk Management
§ Modelling Business Information Flows
§ Analysing Business Info Flows and Applications
§ Analytics, Insights, and Actions
§ Summary and Q&A
Business Information Risk Management
175
Analytics, Insights, and Actions
BUSINESS INFORMATION
RISK MANAGEMENT
176
Business Information Model (BIM)
SAMPL
Business Information Risk Management
177
Business Information Analytics
Business Information Risk Management
178
Analytics from Business Information Model
Applications
§ Application Risk Ratings
§ Risk Ranking of Applications
against:
§ Application Importance
§ Application Strategy
§ Application Lifecycle Status
§ Platform/OS Lifecycle Status
Information Flows
§ Risk Ranking of Information
Flow integration against:
§ Confidentiality
§ Integrity
§ Availability
§ Integration mechanism by
Business Capability
Business Information Risk Management
179
Business Information Risk Management
Please complete survey at https://bit.ly/birmsurvey
© Running Code Productions 2023-
https://runningcode.com.au
Risk RABI
https://riskrabi.com 11
1. Improved risk management,
2. Better guarantees of CIA,
3. Better understanding of organisation,
4. Significantly improved decision-making, and
5. Significantly improved mitigation or elimination.
Benefits of Business Information Risk Management
Business Information Risk Management
180
—Trace information flows – from end to end!
—Highlight redundancies / duplicates and use of SaaS
—Quantitative data to support:
– Digital transformation
– Modernisation
– Business cases
Bonus Benefit
Business Information Risk Management
181
Any Questions?
Business Information Risk Management
198
Overview
§ Overview and Introduction
§ Business Information Risk Management
§ Modelling Business Information Flows
§ Analysing Business Info Flows and Applications
§ Analytics, Insights, and Actions
§ Summary and Q&A
Business Information Risk Management
199
Summary and Q&A
BUSINESS INFORMATION
RISK MANAGEMENT
200
§ Business Information & Applications (software and manual)
§ Business Information Risk – Confidentiality • Integrity • Availability
§ Build a Business Information Model (BIM) for the Organisation
§ Analyse all Business Information Flows and Applications
§ Analytics, Insights, and Actions
Summary
Business Information Risk Management
201
Business Information Risk Management
Please complete survey at https://bit.ly/birmsurvey
© Running Code Productions 2023-
https://runningcode.com.au
Risk RABI
https://riskrabi.com 12
1. Document and understand…,
2. Identify and track risks & vulnerabilities…,
3. Guarantee the CIA…,
4. Make analytics available…, and
5. Increase controls to mitigate or eliminate business
information vulnerabilities and risks.
Jobs To Be Done – Business Information Risk Management
Business Information Risk Management
202
Any Questions?
Business Information Risk Management
204
Thank You
Please complete the short survey… http://bit.ly/birmsurvey
29/8/2023 • IIBA® Perth
Dr Ashley Aitken • @AshleyAitken • ashley.aitken@runningcode.com.au
Running Code Productions • www.runningcode.com.au
208
The End
BUSINESS INFORMATION
RISK MANAGEMENT
209

More Related Content

Similar to IIBA Perth - Not so Risky Business with Ashley Aitken

How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?PECB
 
Advanced IT Analytics: A Look at Real Adoptions in the Real World
Advanced IT Analytics: A Look at Real Adoptions in the Real WorldAdvanced IT Analytics: A Look at Real Adoptions in the Real World
Advanced IT Analytics: A Look at Real Adoptions in the Real WorldEnterprise Management Associates
 
Inventory and Discovery: How to Take Charge of “What’s Out There”
Inventory and Discovery: How to Take Charge of “What’s Out There” Inventory and Discovery: How to Take Charge of “What’s Out There”
Inventory and Discovery: How to Take Charge of “What’s Out There” Enterprise Management Associates
 
CONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptxCONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptxPandiya Rajan
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Emma Kelly
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writingtlinde
 
Accelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident InvestigationAccelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident InvestigationEnterprise Management Associates
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationSyed Azher
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
 
ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019ZIGRAM
 
Organisational Transformation Meetup 13 Dec 2018 James Price
Organisational Transformation Meetup 13 Dec 2018 James PriceOrganisational Transformation Meetup 13 Dec 2018 James Price
Organisational Transformation Meetup 13 Dec 2018 James PriceEdwin Roman
 
Steve alameda burlingame ca
Steve alameda   burlingame caSteve alameda   burlingame ca
Steve alameda burlingame caSteve Alameda
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!Emma Kelly
 
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Resolver Inc.
 
Privacy frameworks 101
Privacy frameworks 101Privacy frameworks 101
Privacy frameworks 101Saumya Vishnoi
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
 

Similar to IIBA Perth - Not so Risky Business with Ashley Aitken (20)

How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
Advanced IT Analytics: A Look at Real Adoptions in the Real World
Advanced IT Analytics: A Look at Real Adoptions in the Real WorldAdvanced IT Analytics: A Look at Real Adoptions in the Real World
Advanced IT Analytics: A Look at Real Adoptions in the Real World
 
Inventory and Discovery: How to Take Charge of “What’s Out There”
Inventory and Discovery: How to Take Charge of “What’s Out There” Inventory and Discovery: How to Take Charge of “What’s Out There”
Inventory and Discovery: How to Take Charge of “What’s Out There”
 
CONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptxCONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptx
 
Cybersecurity for Small Business
Cybersecurity for Small BusinessCybersecurity for Small Business
Cybersecurity for Small Business
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writing
 
Accelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident InvestigationAccelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident Investigation
 
bus-analytics-Jun2014
bus-analytics-Jun2014bus-analytics-Jun2014
bus-analytics-Jun2014
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019
 
Organisational Transformation Meetup 13 Dec 2018 James Price
Organisational Transformation Meetup 13 Dec 2018 James PriceOrganisational Transformation Meetup 13 Dec 2018 James Price
Organisational Transformation Meetup 13 Dec 2018 James Price
 
Steve alameda burlingame ca
Steve alameda   burlingame caSteve alameda   burlingame ca
Steve alameda burlingame ca
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!
 
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
 
Privacy frameworks 101
Privacy frameworks 101Privacy frameworks 101
Privacy frameworks 101
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
 

More from AustraliaChapterIIBA

IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...AustraliaChapterIIBA
 
IIBA Adl - Being Effective on Day 1 - Slide Deck.pdf
IIBA Adl - Being Effective on Day 1 - Slide Deck.pdfIIBA Adl - Being Effective on Day 1 - Slide Deck.pdf
IIBA Adl - Being Effective on Day 1 - Slide Deck.pdfAustraliaChapterIIBA
 
IIBA Adelaide Lean Coffee - FOBA & other Acronyms
IIBA Adelaide Lean Coffee - FOBA & other AcronymsIIBA Adelaide Lean Coffee - FOBA & other Acronyms
IIBA Adelaide Lean Coffee - FOBA & other AcronymsAustraliaChapterIIBA
 
IIBA Melbourne - Pave your Path to Success
IIBA Melbourne - Pave your Path to Success IIBA Melbourne - Pave your Path to Success
IIBA Melbourne - Pave your Path to Success AustraliaChapterIIBA
 
IIBA Adelaide - Value Prioritisation
IIBA Adelaide - Value Prioritisation IIBA Adelaide - Value Prioritisation
IIBA Adelaide - Value Prioritisation AustraliaChapterIIBA
 
IIBA® Adelaide - Demystifying SCRUM - Slide Deck
IIBA® Adelaide - Demystifying SCRUM - Slide DeckIIBA® Adelaide - Demystifying SCRUM - Slide Deck
IIBA® Adelaide - Demystifying SCRUM - Slide DeckAustraliaChapterIIBA
 
Simplifying Advanced Process Mapping - Slide Deck
Simplifying Advanced Process Mapping - Slide DeckSimplifying Advanced Process Mapping - Slide Deck
Simplifying Advanced Process Mapping - Slide DeckAustraliaChapterIIBA
 
IIBA® Sydney - From Isolation to Innovation: Effective Communities Practice
IIBA® Sydney - From Isolation to Innovation: Effective Communities PracticeIIBA® Sydney - From Isolation to Innovation: Effective Communities Practice
IIBA® Sydney - From Isolation to Innovation: Effective Communities PracticeAustraliaChapterIIBA
 
IIBA® Sydney Unlocking the Power of Low Code No Code: Why BAs Hold the Key
IIBA® Sydney Unlocking the Power of Low Code No Code: Why BAs Hold the KeyIIBA® Sydney Unlocking the Power of Low Code No Code: Why BAs Hold the Key
IIBA® Sydney Unlocking the Power of Low Code No Code: Why BAs Hold the KeyAustraliaChapterIIBA
 
IIBA® Brisbane - The Rise of ChatGPT, Chatbots and AI
IIBA® Brisbane - The Rise of ChatGPT, Chatbots and AIIIBA® Brisbane - The Rise of ChatGPT, Chatbots and AI
IIBA® Brisbane - The Rise of ChatGPT, Chatbots and AIAustraliaChapterIIBA
 
IIBA Brisbane - Business Analysis Trends 2023 Lightning talks
IIBA Brisbane - Business Analysis Trends 2023 Lightning talksIIBA Brisbane - Business Analysis Trends 2023 Lightning talks
IIBA Brisbane - Business Analysis Trends 2023 Lightning talksAustraliaChapterIIBA
 
2022 IIBA Melb - Unlock your full potential slide deck.pdf
2022 IIBA Melb - Unlock your full potential slide deck.pdf2022 IIBA Melb - Unlock your full potential slide deck.pdf
2022 IIBA Melb - Unlock your full potential slide deck.pdfAustraliaChapterIIBA
 
IIBA® Melbourne - Unlock your full potential as a BA, an EOY event
IIBA® Melbourne - Unlock your full potential as a BA, an EOY event IIBA® Melbourne - Unlock your full potential as a BA, an EOY event
IIBA® Melbourne - Unlock your full potential as a BA, an EOY event AustraliaChapterIIBA
 
BA VALUE FOR AN ESG FRAMEWORK FOR A SUSTAINABLE BUSINESS MODEL IIBA
BA VALUE FOR AN ESG FRAMEWORK FOR A SUSTAINABLE BUSINESS MODEL IIBABA VALUE FOR AN ESG FRAMEWORK FOR A SUSTAINABLE BUSINESS MODEL IIBA
BA VALUE FOR AN ESG FRAMEWORK FOR A SUSTAINABLE BUSINESS MODEL IIBAAustraliaChapterIIBA
 
(Scaling) agile through the lens of a Business Analyst using SAFe
(Scaling) agile through the lens of a Business Analyst using SAFe(Scaling) agile through the lens of a Business Analyst using SAFe
(Scaling) agile through the lens of a Business Analyst using SAFeAustraliaChapterIIBA
 
IIBA Requirements & how to find them - 27-10-22.pdf
IIBA Requirements & how to find them - 27-10-22.pdfIIBA Requirements & how to find them - 27-10-22.pdf
IIBA Requirements & how to find them - 27-10-22.pdfAustraliaChapterIIBA
 
121022 - The art of getting business analysis right - slide deck.pptx
121022 - The art of getting business analysis right - slide deck.pptx121022 - The art of getting business analysis right - slide deck.pptx
121022 - The art of getting business analysis right - slide deck.pptxAustraliaChapterIIBA
 
IIBA Sydney - How To Be The Perfect Ba (According To A Product Owner)
IIBA Sydney - How To Be The Perfect Ba (According To A Product Owner)IIBA Sydney - How To Be The Perfect Ba (According To A Product Owner)
IIBA Sydney - How To Be The Perfect Ba (According To A Product Owner)AustraliaChapterIIBA
 

More from AustraliaChapterIIBA (20)

IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
 
IIBA Adl - Being Effective on Day 1 - Slide Deck.pdf
IIBA Adl - Being Effective on Day 1 - Slide Deck.pdfIIBA Adl - Being Effective on Day 1 - Slide Deck.pdf
IIBA Adl - Being Effective on Day 1 - Slide Deck.pdf
 
IIBA Adelaide Lean Coffee - FOBA & other Acronyms
IIBA Adelaide Lean Coffee - FOBA & other AcronymsIIBA Adelaide Lean Coffee - FOBA & other Acronyms
IIBA Adelaide Lean Coffee - FOBA & other Acronyms
 
IIBA Melbourne - Pave your Path to Success
IIBA Melbourne - Pave your Path to Success IIBA Melbourne - Pave your Path to Success
IIBA Melbourne - Pave your Path to Success
 
IIBA Adelaide - Value Prioritisation
IIBA Adelaide - Value Prioritisation IIBA Adelaide - Value Prioritisation
IIBA Adelaide - Value Prioritisation
 
IIBA® Adelaide - Demystifying SCRUM - Slide Deck
IIBA® Adelaide - Demystifying SCRUM - Slide DeckIIBA® Adelaide - Demystifying SCRUM - Slide Deck
IIBA® Adelaide - Demystifying SCRUM - Slide Deck
 
Simplifying Advanced Process Mapping - Slide Deck
Simplifying Advanced Process Mapping - Slide DeckSimplifying Advanced Process Mapping - Slide Deck
Simplifying Advanced Process Mapping - Slide Deck
 
IIBA® Sydney - From Isolation to Innovation: Effective Communities Practice
IIBA® Sydney - From Isolation to Innovation: Effective Communities PracticeIIBA® Sydney - From Isolation to Innovation: Effective Communities Practice
IIBA® Sydney - From Isolation to Innovation: Effective Communities Practice
 
IIBA® Sydney Unlocking the Power of Low Code No Code: Why BAs Hold the Key
IIBA® Sydney Unlocking the Power of Low Code No Code: Why BAs Hold the KeyIIBA® Sydney Unlocking the Power of Low Code No Code: Why BAs Hold the Key
IIBA® Sydney Unlocking the Power of Low Code No Code: Why BAs Hold the Key
 
IIBA® Brisbane - The Rise of ChatGPT, Chatbots and AI
IIBA® Brisbane - The Rise of ChatGPT, Chatbots and AIIIBA® Brisbane - The Rise of ChatGPT, Chatbots and AI
IIBA® Brisbane - The Rise of ChatGPT, Chatbots and AI
 
BA Professional Development Event
BA Professional Development EventBA Professional Development Event
BA Professional Development Event
 
IIBA Brisbane - Business Analysis Trends 2023 Lightning talks
IIBA Brisbane - Business Analysis Trends 2023 Lightning talksIIBA Brisbane - Business Analysis Trends 2023 Lightning talks
IIBA Brisbane - Business Analysis Trends 2023 Lightning talks
 
2022 IIBA Melb - Unlock your full potential slide deck.pdf
2022 IIBA Melb - Unlock your full potential slide deck.pdf2022 IIBA Melb - Unlock your full potential slide deck.pdf
2022 IIBA Melb - Unlock your full potential slide deck.pdf
 
IIBA® Melbourne - Unlock your full potential as a BA, an EOY event
IIBA® Melbourne - Unlock your full potential as a BA, an EOY event IIBA® Melbourne - Unlock your full potential as a BA, an EOY event
IIBA® Melbourne - Unlock your full potential as a BA, an EOY event
 
BA VALUE FOR AN ESG FRAMEWORK FOR A SUSTAINABLE BUSINESS MODEL IIBA
BA VALUE FOR AN ESG FRAMEWORK FOR A SUSTAINABLE BUSINESS MODEL IIBABA VALUE FOR AN ESG FRAMEWORK FOR A SUSTAINABLE BUSINESS MODEL IIBA
BA VALUE FOR AN ESG FRAMEWORK FOR A SUSTAINABLE BUSINESS MODEL IIBA
 
(Scaling) agile through the lens of a Business Analyst using SAFe
(Scaling) agile through the lens of a Business Analyst using SAFe(Scaling) agile through the lens of a Business Analyst using SAFe
(Scaling) agile through the lens of a Business Analyst using SAFe
 
IIBA Requirements & how to find them - 27-10-22.pdf
IIBA Requirements & how to find them - 27-10-22.pdfIIBA Requirements & how to find them - 27-10-22.pdf
IIBA Requirements & how to find them - 27-10-22.pdf
 
SLIDE DECK - NFRs vs FRs.pptx
SLIDE DECK - NFRs vs FRs.pptxSLIDE DECK - NFRs vs FRs.pptx
SLIDE DECK - NFRs vs FRs.pptx
 
121022 - The art of getting business analysis right - slide deck.pptx
121022 - The art of getting business analysis right - slide deck.pptx121022 - The art of getting business analysis right - slide deck.pptx
121022 - The art of getting business analysis right - slide deck.pptx
 
IIBA Sydney - How To Be The Perfect Ba (According To A Product Owner)
IIBA Sydney - How To Be The Perfect Ba (According To A Product Owner)IIBA Sydney - How To Be The Perfect Ba (According To A Product Owner)
IIBA Sydney - How To Be The Perfect Ba (According To A Product Owner)
 

Recently uploaded

VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...Suhani Kapoor
 
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...Niya Khan
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士obuhobo
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012sapnasaifi408
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...shivangimorya083
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxGry Tina Tinde
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...gurkirankumar98700
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceanilsa9823
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipSoham Mondal
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证obuhobo
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
VIP Kolkata Call Girl Lake Gardens 👉 8250192130 Available With Room
VIP Kolkata Call Girl Lake Gardens 👉 8250192130  Available With RoomVIP Kolkata Call Girl Lake Gardens 👉 8250192130  Available With Room
VIP Kolkata Call Girl Lake Gardens 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
Internshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateInternshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateSoham Mondal
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Datingkojalkojal131
 
Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchSoham Mondal
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceSanjay Bokadia
 

Recently uploaded (20)

VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
 
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptx
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management Internship
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
 
VIP Kolkata Call Girl Lake Gardens 👉 8250192130 Available With Room
VIP Kolkata Call Girl Lake Gardens 👉 8250192130  Available With RoomVIP Kolkata Call Girl Lake Gardens 👉 8250192130  Available With Room
VIP Kolkata Call Girl Lake Gardens 👉 8250192130 Available With Room
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
 
Internshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateInternshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University Certificate
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
 
Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India Research
 
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector Experience
 

IIBA Perth - Not so Risky Business with Ashley Aitken

  • 1. IIBA® Perth Not So Risky Business with Ashley Aitken 29 August 2023 IIBA® Global 2022 Chapter of the Year
  • 2. IIBA® Australia acknowledges the Traditional Owners of country throughout Australia and recognise their continuing connection to land, waters and culture. We pay our respects to Elders past, present and emerging and extend our respects to all Aboriginal and Torres Strait Islander people present with us today. Acknowledgement of Country
  • 3. Thank you to our Venue and F&B Sponsor for tonight
  • 4. Festival of Business Analysis 16 – 20 of October 2023 Australia & New Zealand https://festivalofbusinessanalysis.org
  • 5. https://festivalofbusinessanalysis.org Mary Karborani Chief Technology Officer | Capricorn Eddie Zhang Founder and Managing Director Zhamatix Helen McLeish Chief Cyber Security Officer | East Metropolitan Health Service Phil Delalande Managing Director | Symphonia and Neovate Education and Founder - UXCamp IIBA® Perth Speakers Anna Rajander Senior Manager Business Analysis | RAC
  • 6. The main reference for Business Analysis in Brazil. The first Latin American CBAP in 2008, he is also certified as PMP, AAC, and CPOA. Consultant and instructor for more than 25 years working with methodology, solution development, business analysis, systems analysis, project management, business architecture, and systems architecture. Performing live, on YouTube, or in his online courses, he always explains complex things in a charming and approachable way. His online courses are appreciated by students in more than 65 different countries. https://thebrazilianba.com https://www.youtube.com/TheBrazilianBA Keynote: Fabricio Laguna The Future of Business Analysis with Artificial Intelligence IIBA Perth Business Analysis Day 2023 19 October 2023 @ Mecure Perth
  • 9. Business Information Risk Management Please complete survey at https://bit.ly/birmsurvey © Running Code Productions 2023- https://runningcode.com.au Risk RABI https://riskrabi.com 1 Not So Risky Business 29/8/2023 • IIBA® Perth Dr Ashley Aitken • @AshleyAitken • ashley.aitken@runningcode.com.au Running Code Productions • www.runningcode.com.au NSFW 8 Business Information All the information flowing throughout the organisation, between people and applications, being stored or transmitted and received or retrieved. Business Information Risk Management 9 The Problem – Business Information Risk Business Information Risk Management EXTERNAL INTERNAL 14 The Solution – Business Information Risk Management 1. Identify business information risks § Confidentiality § Integrity § Availability 2. Protect the business information ISO/IEC 27001 Information Security Management Systems Identify Protect Detect Respond Recover Lead #1 #2 US NIST Cyber Security Framework Business Information Risk Management 16 Business Information Risk Management 29/8/2023 • IIBA® Perth Dr Ashley Aitken • @AshleyAitken • ashley.aitken@runningcode.com.au Running Code Productions • www.runningcode.com.au 18 Overview and Introduction BUSINESS INFORMATION RISK MANAGEMENT 19
  • 10. Business Information Risk Management Please complete survey at https://bit.ly/birmsurvey © Running Code Productions 2023- https://runningcode.com.au Risk RABI https://riskrabi.com 2 Overview § Overview and Introduction § Business Information Risk Management § Modelling Business Information Flows § Analysing Business Info Flows and Applications § Analytics, Insights, and Actions § Summary and Q&A Business Information Risk Management 21 About Me and Running Code Productions Dr Ashley Aitken – PhD UNSW (CS/SE/AI) – Creating Business Value with IT – Enterprise Software Developer – Corporate Innovation – Ex-Academic – Startups Running Code Productions 1. Business Analysis, IS, & IT – Creating Business Value with IT 2. Full-Stack Enterprise Software – Java, .Net, Akka, CQRS,… 3. Professional Training Since 1998 Business Information Risk Management 22 Thank You to the Sponsors IIBA® Australia & Perth Talent International Business Information Risk Management 24 Any Questions? Business Information Risk Management 25 Overview § Overview and Introduction § Business Information Risk Management § Modelling Business Information Flows § Analysing Business Info Flows and Applications § Analytics, Insights, and Actions § Summary and Q&A Business Information Risk Management 26 Business Information Risk Management BUSINESS INFORMATION RISK MANAGEMENT 27
  • 11. Business Information Risk Management Please complete survey at https://bit.ly/birmsurvey © Running Code Productions 2023- https://runningcode.com.au Risk RABI https://riskrabi.com 3 Why? Business Information Risk — Business information risk puts the organisation at risk! How? Business Information Risk Management — Identify inherent vulnerabilities and risks in business information flows and applications. — Protect the business information flows and applications What? Collect Data, Analyse, and Act — Build a model of all business information flowing through systems, analyse, and act. Business Information Risk Management? Business Information Risk Management 29 WHY Business Information Risk Management? § Unknown business information information flows & applications? § Risks with legacy and current application / systems? § Before modernisation or digital transformation § Operational risk associated with § Confidential Information § Critical Information Business Information Risk Management 31 HOW Business Information Risk Management? Over Protecting? Managed Appropriately Check Appropriate? Warning: Danger! Less Confidential or Critical Information More Confidential or Critical Information Less Secure Applications (including Communications) More Secure Applications (including Communications) Business Information Risk Management 32 1. Model Business Information Flows and Applications 2. Analyse Business Information Flows and Applications 3. Analytics, Insights, and Actions WHAT Business Information Risk Management? Business Information Model Info Flow & Application Attributes 2. Analyse Info Flows & Applications 1. Model Info Flows & Applications 3. Analytics, Insights, & Action Protect Business Information Risk Management 34 A high-level model of: – All the types of information that flows through the organisation, from external sources, internally, and to external sources including – Various business and security-related attributes of the information flows and the systems / applications associated with them that we can analyse to assess business vulnerabilities and risks. Business Information Model (BIM) Business Information Risk Management 35 Business Information Model (BIM) SAMPL Business Information Risk Management 36
  • 12. Business Information Risk Management Please complete survey at https://bit.ly/birmsurvey © Running Code Productions 2023- https://runningcode.com.au Risk RABI https://riskrabi.com 4 High-Level Model Examples — Training – NOT Regional Training ,Metro Training — Diagnosis – NOT Cancer Diagnosis, Infection Diagnosis — Project Management – NOT ABC Project, DEF Project, GHI Project … — Advice & Feedback – NOT Government Advice & Feedback, Agency Advice & Feedback, … Examples —Financial Report – Not P&L Statement, Balance Sheet,… —Court Document – Not Affidavit, VRO,… —Relevant Document – NOT Legislation, Policy, … But not too high level… —NOT just Info, Data, Document WHAT, NOT WHO, WHERE, HOW TYPES OF INFO FLOWS Business Information Risk Management 37 Manual as well as Software Applications Software Applications & Systems § Desktop Applications § Enterprise Applications § SaaS / Web Applications Manual ”Applications” § Pen & Paper / Printed § Face-to-Face § … Business Information Risk Management 38 A “business capability” defines an organisation’s capacity to successfully perform a unique business activity. § Model business information flows in each business capability, NOT in each department or function § Helps minimalise modelling of the same information flow types in different department or functions… Use Business Capabilities to segment the Organisation Business Information Risk Management 41 Core and Support Business Capabilities Core Business Capabilities 1. ... 2. … 3. … 4. … 5. … 6. … depends on the organisation! Support Business Capabilities 1. General Management 2. Sales & Marketing Management 3. Human Resource Management 4. Information & Technology Management 5. Contract & Procurement Management 6. Corporate Comms & Rel. Management 7. Corporate Governance Management 8. Development Management 9. Research Management 10. Financial Management 11. Asset Management Business Information Risk Management 43 Business Capabilities at a Hospital? Core Business Capabilities 1. Diagnosis 2. Treatment Planning 3. Treatment 4. After-Treatment Care 5. Patient Administration Support Business Capabilities 1. General Management 2. Sales & Marketing Management 3. Human Resource Management 4. Information & Technology Management 5. Contract & Procurement Management 6. Corporate Comms & Rel. Management 7. Corporate Governance Management 8. Financial Management 9. Asset Management Business Information Risk Management 44 Any Questions? Business Information Risk Management 50
  • 13. Business Information Risk Management Please complete survey at https://bit.ly/birmsurvey © Running Code Productions 2023- https://runningcode.com.au Risk RABI https://riskrabi.com 5 Overview § Overview and Introduction § Business Information Risk Management § Modelling Business Information Flows § Analysing Business Info Flows and Applications § Analytics, Insights, and Actions § Summary and Q&A Business Information Risk Management 51 Modelling Business Information Flows and Applications BUSINESS INFORMATION RISK MANAGEMENT 52 1. What business capability is being modelled ? 2. What information flows are produced? 3. What information flows are required to (produce the info flows above)? 4. What are the applications (software and manual) used by the info flows? Four Key Questions Business Information Risk Management 53 Business Capability Role(s) System(s) Applications Information Flow Produced Information Flows Required Information Flows Produced and Required by a Business Capability Business Information Risk Management 55 Leave Management Manager HRM App Hardcopy Leave Approval Leave Application Employee Details Work Plan Sample Information Flows Produced and Required by a Business Capability Business Information Risk Management 56 Business Capability Role(s) System(s) Applications Applications or Systems used to produce the Information Flow Applications or Systems used to store or transmit the Info Flow Information Flow Produced Information Flows Required Information Flow Applications Business Information Risk Management 60
  • 14. Business Information Risk Management Please complete survey at https://bit.ly/birmsurvey © Running Code Productions 2023- https://runningcode.com.au Risk RABI https://riskrabi.com 6 Business Capability Role(s) System(s) Applications Producing Applications Applications for producing info flows: Office Apps Enterprise Apps Email / Web In Person / Telephone Pen & Paper… Storing / Transmitting Applications Applications for storing/transmitting info flows: Network / Cloud Drive Enterprise Apps Email / Web / Post In Person / Telephone Filing Cabinet … Information Flow Produced Information Flows Required Producing and Storing / Transmitting Applications Business Information Risk Management 62 Information Flow Applications Word, Excel, PowerPoint Local or Network Drive Microsoft Outlook Cloud Drive e.g. OneDrive Video Conference App Enterprise Content Mgmt Hardcopy (Producing) Microsoft Outlook Enterprise Applications Enterprise Applications Telephone Post (Transmit Only) Face-to-Face Telephone / Fax Face-to-Face Video Conference App Info Flow Producing Applications Info Flow Storing or Transmitting / Receiving or Reading Applications Hardcopy (Storage) Business Information Risk Management 63 Applications or Systems used to retrieve or receive the Info Flow Business Capability Role(s) System(s) Applications Receiving / Retrieving and Access / Reading Applications Information Flows Required Applications or Systems used to access the Information Flow Business Information Risk Management 64 Exercise Model A Business Information Flow BUSINESS INFORMATION RISK MANAGEMENT Business Information Risk Management 81 Answer the questions: 1. What business capability is being modelled? 2. What information flow is produced? 3. What information flows are required? 4. What is the application(s) used to produce the information flow? 5. What is the application(s) used to store or transmit the information flow? 6. What is the application(s) used to receive or access each information flow required? 7. What is the application(s) used to read each information flow required? Exercise – Model a Business Information Flow Business Information Risk Management 83 Any Questions? Business Information Risk Management 129
  • 15. Business Information Risk Management Please complete survey at https://bit.ly/birmsurvey © Running Code Productions 2023- https://runningcode.com.au Risk RABI https://riskrabi.com 7 Overview § Overview and Introduction § Business Information Risk Management § Modelling Business Information Flows § Analysing Business Info Flows and Applications § Analytics, Insights, and Actions § Summary and Q&A Business Information Risk Management 130 Analysing Business Information Flows and Applications BUSINESS INFORMATION RISK ASSESSMENT 131 Business Capability Role(s) System(s) Applications Information Flow Produced Information Flows Required Confidentiality Integrity Availability Sensitivity Frequency Integration Business and Security Information Flow Attributes NEW Business Information Risk Management 132 1. Business-Related Attributes 1. Frequency – How often on average is information flow? 2. Integration – How is the info flows required integrated to make info flow produced? 2. Security-Related Attributes 1. Confidentiality – How confidential is the information flow? 2. Integrity – How important is it to control who changes the information flow? 3. Availability – How important is it to the business that the Info flow is available? 4. Government Security / Sensitivity Classification (Optional) Business Information Flow Attributes Business Information Risk Management 133 1. Frequency – How often (on average) is information flow produced? 1. Minutely 2. Hourly 3. Daily 4. Weekly 5. Monthly 6. Yearly 2. Integration – How are the info flows required integrated to create the info flow produced? 1. Manual – you create the data, information, document 2. Automatic - Single – the data, information, document is created automatically internal to a single application 3. Automatic - Multiple – the data, information, document is created automatically by integrating multiple applications Business-Related Information Flow Attributes Business Information Risk Management 134 Confidentiality (Security Attribute) How important *to the business* is it to protect visibility of the information? Notes – Use the highest value that may apply to the information flow of this type, e.g. if most information flows are Medium but some are Very High, use Very High Possible impact on business of wrong person viewing the info flow is: — Low – little or no impact — Medium – limited adverse impact — High – serious adverse impact — Very High – severe or catastrophic — Extreme – very severe or catastrophic Business Information Risk Management 146
  • 16. Business Information Risk Management Please complete survey at https://bit.ly/birmsurvey © Running Code Productions 2023- https://runningcode.com.au Risk RABI https://riskrabi.com 8 Integrity (Security Attribute) How important *to the business* is it to protect who can change the information flow? Notes – Use the highest value that may apply to the information flow of this type, e.g. if most information flows are Medium but some are Very High, use Very High Possible impact on business of wrong person changing the info flow is: —Low – little or no impact —Medium – limited adverse impact —High – serious adverse impact —Very High – severe or catastrophic Business Information Risk Management 147 Availability (Security Attribute) How important *to the business* is it to be able to access the information flow? Notes – Use the highest value that may apply to the information flow of this type, e.g. if most information flows are Medium but some are Very High, use Very High Possible impact on business of info flow not being available is: —Low – little or no impact —Medium – limited adverse impact —High – serious adverse impact —Very High – severe or catastrophic Business Information Risk Management 148 Business Information Risk Management Information Flows – CIA Security Classification The impacts shown below are based on the affect of the unauthorised disclosure, modification or destruction, or availability of information on the organisation. Security Levels Security Objective Low Little or no adverse effect Medium Limited adverse effect High Serious adverse effect Very High Severe or catastrophic adverse effect Extreme Very severe or catastrophic adverse effect Confidentiality Preserving authorised restrictions on information access and disclosure. This includes means for protecting. Low (Official) • Data that is available to the public with minimal sensitivity E.g. Public websites, press releases, no sensitive content Medium (Restricted) • Data that requires a low safeguard with low verification E.g. Emails & documents with no sensitive data, passwords are required High (Sensitive) • Data that requires a high safeguard with high verification E.g. Financial Records, Authentication data, Intellectual Property, Employee Personal Details Very High (Classified) • Data that requires a very high safeguard with very high authentication (2 step verification) E.g. Govt & State Critical Path rollouts, Cabinet related matters, Agency classified documentation Extreme (Top Secret) • Classified information a Government body deems to be extremely sensitive that must be highly protected • Formal Security Clearance required E.g. Law Enforcement operations, Military Operations Integrity Guarding against improper information modification or destruction. Low (Unverifiable) • Low data accuracy • Low safeguarding against inappropriate or unauthorised changes E.g. Inaccurate stock available Medium (Verifiable) • Medium data accuracy • Some safeguarding against inappropriate or unauthorised changes E.g. Some accuracy around important stock availability High (Protected) • High data accuracy • Higher safeguarding against inappropriate or unauthorised change E.g. Accurate critical stock available Very High (Undisputable) • Very high data timely accuracy • Higher safeguarding against inappropriate or unauthorised change E.g. Live updates to systems to update extremely critical stock available live (System Integration) Availability Ensuring timely and reliable access to and use of information. These are determined by the business needs. Low (Transient) • Low data availability impact based on the businesses needs • Data may not be recoverable E.g. Minimal controls around to make sure the allocated person is contacted (not urgent) Medium (Recoverable ) • Medium data availability impact based on the businesses needs • Data is recoverable E.g. Controls around to make sure the allocated person is contacted High (Reliable) • High data availability impact based on the businesses needs • Data should always be available E.g. Additional Controls around to make sure the allocated person is contacted Very High (Continuous) • Very high data availability Impact based on the businesses needs • Unavailability of data could be severe or catastrophic E.g. Cause damage to the operational effectiveness or security of the organisation 149 Business Capability Role(s) System(s) Applications Business Flow Application Attributes Applications or Systems used to access the Information Flow Applications or Systems used to retrieve or receive the Info Flow Information Flows Required Business Information Risk Management Applications or Systems used to retrieve or receive the Info Flow Applications or Systems used to access the Information Flow Information Flows Produced 161 We also need to collect the following attributes for all applications: 1. Name = Formal and Internal Name(s) 2. Developer / Provider = Vendor or Responsible Party 3. Importance / Criticality of Application = Low, Medium, High, Very High, Extreme 4. Management of Application = Custom, Internal, External, SaaS, NA 5. Application Lifecycle Status = Maintained, End-of-Life, End-of-Support, Unknown, NA 6. Operating System / Platform Lifecycle Status – Maintained, EoL, EoS, Unknown, NA 7. Application Strategy = Retain, Replace, Rewrite, Retired, Retired Application Attributes Business Information Risk Management 162 How critical is the application / system to business operations? Possible values: 1. Low 2. Medium 3. High 4. Very High Criticality of the Application Business Information Risk Management 165
  • 17. Business Information Risk Management Please complete survey at https://bit.ly/birmsurvey © Running Code Productions 2023- https://runningcode.com.au Risk RABI https://riskrabi.com 9 Who manages (e.g. releases of) the application? Possible values: 1. Custom (e.g. in-house development) 2. Managed Internal (e.g. COTS) 3. Managed External (e.g. COTS) 4. SaaS (Software as a Service) Management of the Application Business Information Risk Management 166 What is the current lifecycle status of the application / system? Possible values: 1. Maintained 2. End-Of-Life (EOL) 3. End-Of-Support (EOS) 4. Unknown 5. N/A Current Application / System Lifecycle Status Business Information Risk Management 167 What is the current lifecycle status of the operating system / platform on which the application runs? Possible values: 1. Maintained 2. End-Of-Life (EOL) 3. End-Of-Support (EOS) 4. Unknown 5. N/A Current Operating System / Platform Lifecycle Status Business Information Risk Management 168 What is the current strategy with respect to the application / system going forward? Possible values: 1. Unknown 2. Replace 3. Retain 4. Retire 5. Rewrite 6. Retired Current Application / System Strategy Business Information Risk Management 169 Exercise Analyse a Business Information Flow & Application BUSINESS INFORMATION RISK MANAGEMENT Business Information Risk Management 172 Business Information Flow & Application Attributes 1. Capability 2. Name 3. Frequency 4. Confidentiality 5. Integrity 6. Availability 7. Integration 1. Name(s) 2. Vendor 3. Importance / Criticality 4. Management 5. Application Lifecycle Status 6. Platform/OS Lifecycle Status 7. Current Strategy INFORMATION FLOW ATTRIBUTES APPLICATION ATTRIBUTES Business Information Risk Management 173
  • 18. Business Information Risk Management Please complete survey at https://bit.ly/birmsurvey © Running Code Productions 2023- https://runningcode.com.au Risk RABI https://riskrabi.com 10 Any Questions? Business Information Risk Management 174 Overview § Overview and Introduction § Business Information Risk Management § Modelling Business Information Flows § Analysing Business Info Flows and Applications § Analytics, Insights, and Actions § Summary and Q&A Business Information Risk Management 175 Analytics, Insights, and Actions BUSINESS INFORMATION RISK MANAGEMENT 176 Business Information Model (BIM) SAMPL Business Information Risk Management 177 Business Information Analytics Business Information Risk Management 178 Analytics from Business Information Model Applications § Application Risk Ratings § Risk Ranking of Applications against: § Application Importance § Application Strategy § Application Lifecycle Status § Platform/OS Lifecycle Status Information Flows § Risk Ranking of Information Flow integration against: § Confidentiality § Integrity § Availability § Integration mechanism by Business Capability Business Information Risk Management 179
  • 19. Business Information Risk Management Please complete survey at https://bit.ly/birmsurvey © Running Code Productions 2023- https://runningcode.com.au Risk RABI https://riskrabi.com 11 1. Improved risk management, 2. Better guarantees of CIA, 3. Better understanding of organisation, 4. Significantly improved decision-making, and 5. Significantly improved mitigation or elimination. Benefits of Business Information Risk Management Business Information Risk Management 180 —Trace information flows – from end to end! —Highlight redundancies / duplicates and use of SaaS —Quantitative data to support: – Digital transformation – Modernisation – Business cases Bonus Benefit Business Information Risk Management 181 Any Questions? Business Information Risk Management 198 Overview § Overview and Introduction § Business Information Risk Management § Modelling Business Information Flows § Analysing Business Info Flows and Applications § Analytics, Insights, and Actions § Summary and Q&A Business Information Risk Management 199 Summary and Q&A BUSINESS INFORMATION RISK MANAGEMENT 200 § Business Information & Applications (software and manual) § Business Information Risk – Confidentiality • Integrity • Availability § Build a Business Information Model (BIM) for the Organisation § Analyse all Business Information Flows and Applications § Analytics, Insights, and Actions Summary Business Information Risk Management 201
  • 20. Business Information Risk Management Please complete survey at https://bit.ly/birmsurvey © Running Code Productions 2023- https://runningcode.com.au Risk RABI https://riskrabi.com 12 1. Document and understand…, 2. Identify and track risks & vulnerabilities…, 3. Guarantee the CIA…, 4. Make analytics available…, and 5. Increase controls to mitigate or eliminate business information vulnerabilities and risks. Jobs To Be Done – Business Information Risk Management Business Information Risk Management 202 Any Questions? Business Information Risk Management 204 Thank You Please complete the short survey… http://bit.ly/birmsurvey 29/8/2023 • IIBA® Perth Dr Ashley Aitken • @AshleyAitken • ashley.aitken@runningcode.com.au Running Code Productions • www.runningcode.com.au 208 The End BUSINESS INFORMATION RISK MANAGEMENT 209