SlideShare a Scribd company logo
1 of 31
Download to read offline
Osprey
About Osprey


      TechSMART has developed eMite
      Analytics, a real time Dashboard solution
      with a data engine that integrates,
      correlates and reports in real time on
      large volumes of data from disparate
      sources.
      Using eMite as a platform, TechSMART
      has created Osprey to manage and report
      on the risks associated with the physical
      protection of bank branches and ATM’s.
About Physical Risk


       Financial Institutions face many
       physical risks in managing branches
       and ATM’s
       Over time, the methods of fraud have
       changed with physical risk
       The cost of managing physical risk and
       the manual means by which this is
       measured is creating additional risk in
       itself
The Problem


      As methods of fraud have grown with technology,
      banks have created a sophisticated sets of data to
      measure the factors of risk. These include;
           Risk assessment spreadsheets
       ●

           Large directories of photograph’s
       ●

           Asset tools for individual locations
       ●

           Event entry and management solutions
       ●

      Data is not easily accessible
      Risk assessments are not able to be made in near
      real-time.
      Risk analysis methods are increasing the factor of
      risk itself.
Markets


      Banking Sector
              Branch and ATM Facilities
          ●


      Government
              Publicly Accessed and Corporate Offices
          ●


      Retail
              Shops
          ●
About eMite for Risk


       eMite Analytics is a hybrid data analysis
       solution capable of;
            Extracting data from various sources in
        ●

            multiple formats
            Correlating the data into a single source of
        ●

            truth
            Converting data into information
        ●

            Reporting on physical risk of multiple facilities
        ●

            Reducing Risk in managing physical facilities.
        ●
One Solution Set


                                                  Raw Data
              Trend, Predict




                                   Data Base


                                                             Processed data
            Dashboard
                           Physical Risk Assessment and
                                    Management
                                      Solution




              Map to Business                    Thresholds, KPI’s, SLA’s
Set Risk

           Osprey provides an
           application that allows for
           the physical assessment
           and monitoring of facility
           security.
           Initial risk assessment
           determines the security
           that is required in any
           facility to meet the
           minimum risk requirements
           of an organisation.
Assess

         Facilities are assessed for
         the security that is
         implemented within each
         location
         Components are assessed
         as being compliant or non-
         compliant according to
         internal risk standards.
Assess


         Areas for Assessment include
             CCTV
         ●

                  Type/Number/etc
              ●

             Security Guards
         ●

                  Required, armed, etc
              ●

             Physical location
         ●

                  Inside Shopping Centre, Street Facing
              ●

                  Proximity to Police/Hotel/Park
              ●

                  Number of Entrances
              ●

             Amount of Cash held
         ●

                  In safe, In ATM,
              ●

             Alarm Systems
         ●

             Internal Security
         ●

                  Rising Screens
              ●

                  Under counter alarms
              ●

                  Locked Cash Draws
              ●
Calculate

            Risk levels are calculated
            for each facility
            Facilities are then assessed
            according to their level of
            risk.
Correlate

            Osprey correlates all data
            to determine if there is a
            trend across all facilities.
            Any automation to systems
            is created
            Data is turned into
            information
Present

          eMite provides various
          dashboards (presentation
          layers) that are configured
          for the different
          management layers.
              High Level geographic
          ●

              Dashboard
              Facility manager view
          ●

              etc
          ●
Analyze

          Osprey provides various
          analytical functions that
          deliver high end benefits to
          users.
              Correlation analysis shows
          ●

              where one metric may be
              impacting the risk
              assessment of many facilities
              Alert analysis pin-points
          ●

              where the majority of
              problems occur.
Benefits


       Facilities have many components that make up its
       risk rating
               Managing those components and their incidents is
           ●
               handled via a Web Based interface.
       Centralises Reporting
               Rating components reside in various different
           ●
               locations including databases, spreadsheets and log
               files
       Single Source of Truth
               Multiple data feeds means duplication of data
           ●

       Automated Assessment
               Predefined and calculated rules automatically update
           ●
               facility risk assessment.
ROI


      ROI through decrease in staff
      Reduced insurance premiums through
      better risk management
      Better reporting compliance to
      standards such as Sarbanes
Benefits


       A central incident management system
       records all incidents of any type across
       the bank into a single system
       As incidents are entered, appropriate
       staff are warned and re-assessment of
       risk occurs automatically
Incident Management Facility


       Web based access
       Trend and analysis reports
       automatically changed as alerts are
       reported.
       Reports with all key metrics and trends
       automatically generated
       Paper based reports also generated for
       distribution to management.
Incident Management
        Incident Management Data Entry
Osprey Dashboard


      Map based dashboard that integrates
      with Google Maps
      Automatically Highlights any ATM or
      branch that breaches risk compliance.
Osprey Dashboard
Osprey Dashboard
Osprey Dashboard
Osprey Dashboard
Osprey Dashboard
Osprey Dashboard
Osprey Dashboard
Osprey Trending
Reporting
Osprey Bank Risk
Osprey Bank Risk

More Related Content

What's hot

Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanTripwire
 
2005 issa journal-simsevaluation
2005 issa journal-simsevaluation2005 issa journal-simsevaluation
2005 issa journal-simsevaluationasundaram1
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessTim Bass
 
The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architect...
The “Predictive” Battlespace:  Leveraging the Power of Event-Driven Architect...The “Predictive” Battlespace:  Leveraging the Power of Event-Driven Architect...
The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architect...Nathaniel Palmer
 
To situation awareness theory
To situation awareness theoryTo situation awareness theory
To situation awareness theoryengineerteju
 
Icaap assessment
Icaap assessmentIcaap assessment
Icaap assessmenttemo1212
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceStephen Tsuchiyama
 
Use Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyUse Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyJonathanPritchard12
 
Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwgJohn M. Kennedy
 
Continuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing RiskContinuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing RiskTripwire
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Riskphanleson
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
Processing Patterns for Predictive Business
Processing Patterns for Predictive BusinessProcessing Patterns for Predictive Business
Processing Patterns for Predictive BusinessTim Bass
 
ISACA Complied Arabic English Glossary for use in Governance applications and...
ISACA Complied Arabic English Glossary for use in Governance applications and...ISACA Complied Arabic English Glossary for use in Governance applications and...
ISACA Complied Arabic English Glossary for use in Governance applications and...Tamer Shoukry
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 

What's hot (20)

Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
2005 issa journal-simsevaluation
2005 issa journal-simsevaluation2005 issa journal-simsevaluation
2005 issa journal-simsevaluation
 
what is security
what is securitywhat is security
what is security
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusiness
 
The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architect...
The “Predictive” Battlespace:  Leveraging the Power of Event-Driven Architect...The “Predictive” Battlespace:  Leveraging the Power of Event-Driven Architect...
The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architect...
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
To situation awareness theory
To situation awareness theoryTo situation awareness theory
To situation awareness theory
 
Icaap assessment
Icaap assessmentIcaap assessment
Icaap assessment
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC Convergence
 
Use Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyUse Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiency
 
Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwg
 
Continuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing RiskContinuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing Risk
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Risk
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Risks in cc
Risks in ccRisks in cc
Risks in cc
 
Processing Patterns for Predictive Business
Processing Patterns for Predictive BusinessProcessing Patterns for Predictive Business
Processing Patterns for Predictive Business
 
Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01
 
ISACA Complied Arabic English Glossary for use in Governance applications and...
ISACA Complied Arabic English Glossary for use in Governance applications and...ISACA Complied Arabic English Glossary for use in Governance applications and...
ISACA Complied Arabic English Glossary for use in Governance applications and...
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 

Viewers also liked

Services of united bank limited pakistan
Services of united bank limited pakistanServices of united bank limited pakistan
Services of united bank limited pakistanAjwa Mart
 
Bank's Liabilities (Comparison of UBL, HBL, Standard Chartered Bank and Citib...
Bank's Liabilities (Comparison of UBL, HBL, Standard Chartered Bank and Citib...Bank's Liabilities (Comparison of UBL, HBL, Standard Chartered Bank and Citib...
Bank's Liabilities (Comparison of UBL, HBL, Standard Chartered Bank and Citib...Mitsui & Co., Ltd.
 
Binghamton Bank Risk Analysis
Binghamton Bank Risk Analysis Binghamton Bank Risk Analysis
Binghamton Bank Risk Analysis Sharon Han
 
United Bank limited Pakistan a brief overview, group project..!!!!!!!!!!!
United Bank limited Pakistan a brief overview, group project..!!!!!!!!!!!United Bank limited Pakistan a brief overview, group project..!!!!!!!!!!!
United Bank limited Pakistan a brief overview, group project..!!!!!!!!!!!Sartaj Afridi
 
52224246 ubl-annual-accounts-dec-2010-final
52224246 ubl-annual-accounts-dec-2010-final52224246 ubl-annual-accounts-dec-2010-final
52224246 ubl-annual-accounts-dec-2010-finalAtta Shah
 
Proposed topic of the res an emperical analysis on interest rate risk managem...
Proposed topic of the res an emperical analysis on interest rate risk managem...Proposed topic of the res an emperical analysis on interest rate risk managem...
Proposed topic of the res an emperical analysis on interest rate risk managem...tesfatsion tefera
 
A Project Of Strategic Financial Management On Maximizing Return by minimizin...
A Project Of Strategic Financial Management On Maximizing Return by minimizin...A Project Of Strategic Financial Management On Maximizing Return by minimizin...
A Project Of Strategic Financial Management On Maximizing Return by minimizin...Avinash Advani
 
porter five forces for UBL bank
porter five forces for UBL bankporter five forces for UBL bank
porter five forces for UBL bankAli Khan
 
United Bank Limited
United Bank LimitedUnited Bank Limited
United Bank Limitedsalihaasad
 
United bank ltd. by Qamar Farooq HCC lahore
United bank ltd.   by Qamar Farooq HCC lahoreUnited bank ltd.   by Qamar Farooq HCC lahore
United bank ltd. by Qamar Farooq HCC lahoreQamar Farooq
 
Marketing Organization, Implementation and Control
Marketing Organization, Implementation and ControlMarketing Organization, Implementation and Control
Marketing Organization, Implementation and ControlAjwa Mart
 
U.B.L Bank internship report
U.B.L Bank internship reportU.B.L Bank internship report
U.B.L Bank internship reportMudasra Amjad
 
Rashid's portfolio 2015
Rashid's portfolio 2015Rashid's portfolio 2015
Rashid's portfolio 2015Rashid Ahmed
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentationmmagario
 
Powerpoint Risk Assessment
Powerpoint Risk AssessmentPowerpoint Risk Assessment
Powerpoint Risk AssessmentSteve Bishop
 

Viewers also liked (20)

Services of united bank limited pakistan
Services of united bank limited pakistanServices of united bank limited pakistan
Services of united bank limited pakistan
 
Bank's Liabilities (Comparison of UBL, HBL, Standard Chartered Bank and Citib...
Bank's Liabilities (Comparison of UBL, HBL, Standard Chartered Bank and Citib...Bank's Liabilities (Comparison of UBL, HBL, Standard Chartered Bank and Citib...
Bank's Liabilities (Comparison of UBL, HBL, Standard Chartered Bank and Citib...
 
Binghamton Bank Risk Analysis
Binghamton Bank Risk Analysis Binghamton Bank Risk Analysis
Binghamton Bank Risk Analysis
 
Ubl theater presentation smx west 11
Ubl theater presentation smx west 11Ubl theater presentation smx west 11
Ubl theater presentation smx west 11
 
United Bank limited Pakistan a brief overview, group project..!!!!!!!!!!!
United Bank limited Pakistan a brief overview, group project..!!!!!!!!!!!United Bank limited Pakistan a brief overview, group project..!!!!!!!!!!!
United Bank limited Pakistan a brief overview, group project..!!!!!!!!!!!
 
52224246 ubl-annual-accounts-dec-2010-final
52224246 ubl-annual-accounts-dec-2010-final52224246 ubl-annual-accounts-dec-2010-final
52224246 ubl-annual-accounts-dec-2010-final
 
Proposed topic of the res an emperical analysis on interest rate risk managem...
Proposed topic of the res an emperical analysis on interest rate risk managem...Proposed topic of the res an emperical analysis on interest rate risk managem...
Proposed topic of the res an emperical analysis on interest rate risk managem...
 
UBL Mutual Funds Report
UBL Mutual Funds Report UBL Mutual Funds Report
UBL Mutual Funds Report
 
A Project Of Strategic Financial Management On Maximizing Return by minimizin...
A Project Of Strategic Financial Management On Maximizing Return by minimizin...A Project Of Strategic Financial Management On Maximizing Return by minimizin...
A Project Of Strategic Financial Management On Maximizing Return by minimizin...
 
porter five forces for UBL bank
porter five forces for UBL bankporter five forces for UBL bank
porter five forces for UBL bank
 
United Bank Limited
United Bank LimitedUnited Bank Limited
United Bank Limited
 
UBL bank
UBL bankUBL bank
UBL bank
 
United bank ltd. by Qamar Farooq HCC lahore
United bank ltd.   by Qamar Farooq HCC lahoreUnited bank ltd.   by Qamar Farooq HCC lahore
United bank ltd. by Qamar Farooq HCC lahore
 
Marketing Organization, Implementation and Control
Marketing Organization, Implementation and ControlMarketing Organization, Implementation and Control
Marketing Organization, Implementation and Control
 
Ubl internship report 2016
Ubl internship report 2016Ubl internship report 2016
Ubl internship report 2016
 
Financial Analysis of BOP
Financial Analysis of BOPFinancial Analysis of BOP
Financial Analysis of BOP
 
U.B.L Bank internship report
U.B.L Bank internship reportU.B.L Bank internship report
U.B.L Bank internship report
 
Rashid's portfolio 2015
Rashid's portfolio 2015Rashid's portfolio 2015
Rashid's portfolio 2015
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
 
Powerpoint Risk Assessment
Powerpoint Risk AssessmentPowerpoint Risk Assessment
Powerpoint Risk Assessment
 

Similar to Osprey Bank Risk

Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …Andris Soroka
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementTim Bass
 
What is Enterprise Security Architecture (ESA)?
What is Enterprise Security Architecture (ESA)?What is Enterprise Security Architecture (ESA)?
What is Enterprise Security Architecture (ESA)?John Gardner, CMC
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer OverviewScott Suhy
 
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Smart Assessment
 
Data Security Metricsa Value Based Approach
Data Security Metricsa Value Based ApproachData Security Metricsa Value Based Approach
Data Security Metricsa Value Based ApproachFlaskdata.io
 
Siem solutions R&E
Siem solutions R&ESiem solutions R&E
Siem solutions R&EOwais Ahmad
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™CPaschal
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityRapid7
 
User Guide for Risk Insight 1.1
User Guide for Risk Insight 1.1User Guide for Risk Insight 1.1
User Guide for Risk Insight 1.1Protect724gopi
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draftEoin Keary
 
Devasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar
 

Similar to Osprey Bank Risk (20)

Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk Management
 
What is Enterprise Security Architecture (ESA)?
What is Enterprise Security Architecture (ESA)?What is Enterprise Security Architecture (ESA)?
What is Enterprise Security Architecture (ESA)?
 
Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Intellica evam summary
Intellica evam summaryIntellica evam summary
Intellica evam summary
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer Overview
 
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
 
Data Security Metricsa Value Based Approach
Data Security Metricsa Value Based ApproachData Security Metricsa Value Based Approach
Data Security Metricsa Value Based Approach
 
Siem solutions R&E
Siem solutions R&ESiem solutions R&E
Siem solutions R&E
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
Cloud security part two
Cloud security part twoCloud security part two
Cloud security part two
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
tarunidhar
tarunidhartarunidhar
tarunidhar
 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization Security
 
User Guide for Risk Insight 1.1
User Guide for Risk Insight 1.1User Guide for Risk Insight 1.1
User Guide for Risk Insight 1.1
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
 
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידעטכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
 
Devasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar Mahato - Resume
Devasis Kumar Mahato - Resume
 

Recently uploaded

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 

Recently uploaded (20)

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

Osprey Bank Risk

  • 2. About Osprey TechSMART has developed eMite Analytics, a real time Dashboard solution with a data engine that integrates, correlates and reports in real time on large volumes of data from disparate sources. Using eMite as a platform, TechSMART has created Osprey to manage and report on the risks associated with the physical protection of bank branches and ATM’s.
  • 3. About Physical Risk Financial Institutions face many physical risks in managing branches and ATM’s Over time, the methods of fraud have changed with physical risk The cost of managing physical risk and the manual means by which this is measured is creating additional risk in itself
  • 4. The Problem As methods of fraud have grown with technology, banks have created a sophisticated sets of data to measure the factors of risk. These include; Risk assessment spreadsheets ● Large directories of photograph’s ● Asset tools for individual locations ● Event entry and management solutions ● Data is not easily accessible Risk assessments are not able to be made in near real-time. Risk analysis methods are increasing the factor of risk itself.
  • 5. Markets Banking Sector Branch and ATM Facilities ● Government Publicly Accessed and Corporate Offices ● Retail Shops ●
  • 6. About eMite for Risk eMite Analytics is a hybrid data analysis solution capable of; Extracting data from various sources in ● multiple formats Correlating the data into a single source of ● truth Converting data into information ● Reporting on physical risk of multiple facilities ● Reducing Risk in managing physical facilities. ●
  • 7. One Solution Set Raw Data Trend, Predict Data Base Processed data Dashboard Physical Risk Assessment and Management Solution Map to Business Thresholds, KPI’s, SLA’s
  • 8. Set Risk Osprey provides an application that allows for the physical assessment and monitoring of facility security. Initial risk assessment determines the security that is required in any facility to meet the minimum risk requirements of an organisation.
  • 9. Assess Facilities are assessed for the security that is implemented within each location Components are assessed as being compliant or non- compliant according to internal risk standards.
  • 10. Assess Areas for Assessment include CCTV ● Type/Number/etc ● Security Guards ● Required, armed, etc ● Physical location ● Inside Shopping Centre, Street Facing ● Proximity to Police/Hotel/Park ● Number of Entrances ● Amount of Cash held ● In safe, In ATM, ● Alarm Systems ● Internal Security ● Rising Screens ● Under counter alarms ● Locked Cash Draws ●
  • 11. Calculate Risk levels are calculated for each facility Facilities are then assessed according to their level of risk.
  • 12. Correlate Osprey correlates all data to determine if there is a trend across all facilities. Any automation to systems is created Data is turned into information
  • 13. Present eMite provides various dashboards (presentation layers) that are configured for the different management layers. High Level geographic ● Dashboard Facility manager view ● etc ●
  • 14. Analyze Osprey provides various analytical functions that deliver high end benefits to users. Correlation analysis shows ● where one metric may be impacting the risk assessment of many facilities Alert analysis pin-points ● where the majority of problems occur.
  • 15. Benefits Facilities have many components that make up its risk rating Managing those components and their incidents is ● handled via a Web Based interface. Centralises Reporting Rating components reside in various different ● locations including databases, spreadsheets and log files Single Source of Truth Multiple data feeds means duplication of data ● Automated Assessment Predefined and calculated rules automatically update ● facility risk assessment.
  • 16. ROI ROI through decrease in staff Reduced insurance premiums through better risk management Better reporting compliance to standards such as Sarbanes
  • 17. Benefits A central incident management system records all incidents of any type across the bank into a single system As incidents are entered, appropriate staff are warned and re-assessment of risk occurs automatically
  • 18. Incident Management Facility Web based access Trend and analysis reports automatically changed as alerts are reported. Reports with all key metrics and trends automatically generated Paper based reports also generated for distribution to management.
  • 19. Incident Management Incident Management Data Entry
  • 20. Osprey Dashboard Map based dashboard that integrates with Google Maps Automatically Highlights any ATM or branch that breaches risk compliance.