SlideShare a Scribd company logo
Transforming Risks into Opportunities
Victor Muntés-Mulero, CEO
Tirant Lo Blanc 35, Sant Feliu de Llobregat, Barcelona, Spain
victor.muntes@beawre.com
+34 647 471 814
Continuous Risk Control is critical to
prevent unwanted incidents
July 24th 2013 is the date for
the worse railway accident in
Spain since 1944
Nuclear fusion at ITER project
Self-driven smart vehicles
Do you know what all these pictures have in common?
July 24th 2013 is the date for the
worse railway accident in Spain
since 1944. It could have been
prevented with better risk control.
Berlin Brandenburg Airport
Original Opening Date: Oct 30th 2011. Original cost: €2.83 billion
Last opening date announcement: Oct 31st 2020. Current cost estimation: > €7 billion
ITER nuclear
fusion project
• Originally foreseen to switch on
in 2016 and cost around 5bn
euros
• Current start-up date pushed
back to 2025. Cost around 20bn
euros.
TellU: eHeath through IoT: requirements for risk management:
• No tools in the market for continuous risk management
• No risk management tools connected to DevOps tools
• Need to embed privacy into the picture​ (GDPR)
• Report for ISO 27001
Systems and processes complexity
grows, human control is the new risk
Gap between legal and
technical requirements
There are no tools to
effectively monitor
mitigation efficiency
Risk management is
multi-stakeholder
and assets need to
be understood in
context
Industry is more agile and
dynamic. Assessing risk at
design time only is
obsolete.
Continuously monitoring
risk evolution is the
challenge…
Managing risks in complex projects goes beyond human
capacity
Beyond human
skills
COMPLEX
Decision-
making is hard
DYNAMIC URGENT
Heterogeneous
data by contract
Beawre helps your teams be smarter at managing risks,
collaboratively and in real time
Simplify complexity
by automating risk
surveillance using AI
SIMPLIFY
Enhance awareness
leveraging data from
third-party tools
ENABLE
Control risks
continuously in real
time
LEARN
Disrupting risk control technology...
AI-driven Time-stamped event sequence matching
and explainable ML algorithms
Continuous Near real-time continuous risk control on
evolving business processes
Actionable Knowledge bases to support engineers being
compliant with legal obligations
Awarded two H2020 research projects (~0.5M €) by the European
Commission as leading experts on risk management.
Customer
Engineer / Client
Subcontractors
Risk Control
SaaS
SaaS-based business model
TRUSTED BY
We enable your company to execute complex projects
that may be too risky otherwise
Protect your customers and your organization through early
evidence-based detection of security and privacy issues
Prioritize work based on risk level, focus on relevant tasks
Avoid delays
Predict and control business processes performance
Avoid, monitor and predict unwanted incidents: law suits,
delays, contract violations, quality issues, ...
Reduce impact produced by incidents in your system
Protect your
budget Optimize and reduce your software development process
Prove strict compliance with continuous risk management
requirements (ISO 27001, GDPR, etc)
Facilitate auditing through automatic reports
Prove
compliance
Challenges
System complexity
increases
Architectures, DFDs, BPMN, etc
Automation becomes more relevant
Model-driven approches may facilitate risk control
Multiple ways to describe your
system/process
Define evolving risks over business
processes
Automated vulnerability detection for
security and privacy threats
Systems are not static,
but highly dynamic
Evidence-based risk assessment (both to monitor
mitigation implementation and effectiveness)
DevOps-oriented
AI-driven prediction
DevOps Risk Control
C
O
D
E
BUILD TEST
RELEASE &
DEPLOY
O
P
E
R
A
T
E
Continuous Risk Management
(business and non-functional risks)
Trustworthiness is a
multidimensional concept
Security, Privacy, Safety present contradictory
requirements too often
Example in
the
automotive
sector
Gap between legal and
technical requirements
GDPR as an example
Privacy and GDPR
GDPR discusses data
protection by design and
by default
Technologies are not consolidated yet
and mixing legal requirements with a
deep technical understanding is
challenging
GDPR introduces a risk-
based approach
An organization may fail to comply with
GDPR even if no breach happens, since
they must have taken protective
measures beforehand
Risk management involves a
growing number of stakeholders
Kanban approach
Risk management in supply chains
Federated risk management
S1: TSIS Assets Definition
(e.g. DFD, Architecture, etc)
S2: Threats Identification
S3: Risks Assessment
(includes risk analysis and
evaluation)
S4: Definition of
Treatments
S5: Residual Risk
Assessment
S6: Treatment
Implementation Control
A P
R A
R P A V
R A V
R P A
O V P
O Risk Management Owner
P Product Owner
A Architect
V Developer
R Risk Analist (QA dept, CSO, Security Expert)
Victor Muntés-Mulero, CEO
victor.muntes@beawre.com
+34 647 471 814
@BeawreRisk
TEAM
38 patents (19
granted & 19 pending)
(10+ using AI)
PATENTS
21 years of combined
experience in risk
management
EXPERIENCE
20+ years of experience
managing people to
execute IT projects
LEADERSHIP
Experience supporting
an Accelerator for
Lean Start Ups (20+)
ACCELERATOR
TEAM
TEAM
Elena
• PhD Computer Science (Large Data Management)
• Track record with technology companies & start-ups
• VP of Research at CA Technologies (2011-2019)
• 70+ scientific publications, 1 book, 5 book chapters
• Technologist with experience in architecting,
supporting and running critical systems and
applications
• 15+ years of experience in information technology
Daniel
Ramon
Victor
CEO & Co-founder
Jacek
CTO & Co-founder
Software Engineer
Senior Operations Consultant Project Manager

More Related Content

What's hot

Wp4 ws cea2020
Wp4 ws cea2020Wp4 ws cea2020
Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4
Privacy Data Protection for Engineering
 
Pdp4e IPEN-2019
Pdp4e  IPEN-2019Pdp4e  IPEN-2019
Privacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4EPrivacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineering
 
Pdp4 e privacy engineering toolkit ipen 2019
Pdp4 e privacy engineering toolkit   ipen 2019Pdp4 e privacy engineering toolkit   ipen 2019
Pdp4 e privacy engineering toolkit ipen 2019
Privacy Data Protection for Engineering
 
Granular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra RuizGranular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra Ruiz
Privacy Data Protection for Engineering
 
Ipen 2019 roma status of privacy engineering standardisation v2
Ipen 2019 roma   status of privacy engineering standardisation v2Ipen 2019 roma   status of privacy engineering standardisation v2
Ipen 2019 roma status of privacy engineering standardisation v2
Privacy Data Protection for Engineering
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
Ulf Mattsson
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
Elsa Prieto
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
Ulf Mattsson
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
Ulf Mattsson
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
Ulf Mattsson
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
Ulf Mattsson
 
Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project
DEFeND Project
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
Ulf Mattsson
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
Ulf Mattsson
 
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES.eu
 
Autopolicy module
Autopolicy moduleAutopolicy module
Autopolicy module
SerIoT project
 
Data Privacy and IP Due Diligence
Data Privacy and IP Due Diligence Data Privacy and IP Due Diligence
Data Privacy and IP Due Diligence
Knobbe Martens - Intellectual Property Law
 

What's hot (20)

Wp4 ws cea2020
Wp4 ws cea2020Wp4 ws cea2020
Wp4 ws cea2020
 
Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4
 
Pdp4e IPEN-2019
Pdp4e  IPEN-2019Pdp4e  IPEN-2019
Pdp4e IPEN-2019
 
Privacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4EPrivacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4E
 
Pdp4 e privacy engineering toolkit ipen 2019
Pdp4 e privacy engineering toolkit   ipen 2019Pdp4 e privacy engineering toolkit   ipen 2019
Pdp4 e privacy engineering toolkit ipen 2019
 
Granular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra RuizGranular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra Ruiz
 
Ipen 2019 roma status of privacy engineering standardisation v2
Ipen 2019 roma   status of privacy engineering standardisation v2Ipen 2019 roma   status of privacy engineering standardisation v2
Ipen 2019 roma status of privacy engineering standardisation v2
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
 
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
 
Autopolicy module
Autopolicy moduleAutopolicy module
Autopolicy module
 
Data Privacy and IP Due Diligence
Data Privacy and IP Due Diligence Data Privacy and IP Due Diligence
Data Privacy and IP Due Diligence
 

Similar to Beawre pitch

Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
FinTech Belgium
 
20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos
Bart Van Den Brande
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
Accenture Technology
 
Webinar: Why risk managers should look at Artificial Intelligence now?
Webinar: Why risk managers should look at Artificial Intelligence now?Webinar: Why risk managers should look at Artificial Intelligence now?
Webinar: Why risk managers should look at Artificial Intelligence now?
FERMA
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
japijapi
 
Day 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdfDay 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdf
Support for Improvement in Governance and Management SIGMA
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
SLA-Ready Network
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
The Economist Media Businesses
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
CYBERWISER .eu
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Img s position-paper_for_h2020
Img s position-paper_for_h2020Img s position-paper_for_h2020
Img s position-paper_for_h2020
Marco Manso
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
James Nesbitt
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
Rachel Anne Carter
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)
Ray Bugg
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentation
FERMA
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Rahul Neel Mani
 
Introduction to new technologies
Introduction to new technologiesIntroduction to new technologies
Introduction to new technologies
Tracey Roberts
 
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
Orange Business Services
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
segughana
 
IoT security Q3 2020 overview
IoT security Q3 2020 overview IoT security Q3 2020 overview
IoT security Q3 2020 overview
Anastasiia Konoplova
 

Similar to Beawre pitch (20)

Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Webinar: Why risk managers should look at Artificial Intelligence now?
Webinar: Why risk managers should look at Artificial Intelligence now?Webinar: Why risk managers should look at Artificial Intelligence now?
Webinar: Why risk managers should look at Artificial Intelligence now?
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Day 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdfDay 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdf
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Img s position-paper_for_h2020
Img s position-paper_for_h2020Img s position-paper_for_h2020
Img s position-paper_for_h2020
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentation
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Introduction to new technologies
Introduction to new technologiesIntroduction to new technologies
Introduction to new technologies
 
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
 
IoT security Q3 2020 overview
IoT security Q3 2020 overview IoT security Q3 2020 overview
IoT security Q3 2020 overview
 

Recently uploaded

Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 

Recently uploaded (20)

Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 

Beawre pitch

  • 1. Transforming Risks into Opportunities Victor Muntés-Mulero, CEO Tirant Lo Blanc 35, Sant Feliu de Llobregat, Barcelona, Spain victor.muntes@beawre.com +34 647 471 814
  • 2. Continuous Risk Control is critical to prevent unwanted incidents July 24th 2013 is the date for the worse railway accident in Spain since 1944 Nuclear fusion at ITER project Self-driven smart vehicles Do you know what all these pictures have in common?
  • 3. July 24th 2013 is the date for the worse railway accident in Spain since 1944. It could have been prevented with better risk control.
  • 4. Berlin Brandenburg Airport Original Opening Date: Oct 30th 2011. Original cost: €2.83 billion Last opening date announcement: Oct 31st 2020. Current cost estimation: > €7 billion
  • 5. ITER nuclear fusion project • Originally foreseen to switch on in 2016 and cost around 5bn euros • Current start-up date pushed back to 2025. Cost around 20bn euros.
  • 6. TellU: eHeath through IoT: requirements for risk management: • No tools in the market for continuous risk management • No risk management tools connected to DevOps tools • Need to embed privacy into the picture​ (GDPR) • Report for ISO 27001
  • 7. Systems and processes complexity grows, human control is the new risk
  • 8. Gap between legal and technical requirements
  • 9. There are no tools to effectively monitor mitigation efficiency
  • 10. Risk management is multi-stakeholder and assets need to be understood in context
  • 11. Industry is more agile and dynamic. Assessing risk at design time only is obsolete. Continuously monitoring risk evolution is the challenge…
  • 12. Managing risks in complex projects goes beyond human capacity Beyond human skills COMPLEX Decision- making is hard DYNAMIC URGENT Heterogeneous data by contract
  • 13. Beawre helps your teams be smarter at managing risks, collaboratively and in real time Simplify complexity by automating risk surveillance using AI SIMPLIFY Enhance awareness leveraging data from third-party tools ENABLE Control risks continuously in real time LEARN
  • 14. Disrupting risk control technology... AI-driven Time-stamped event sequence matching and explainable ML algorithms Continuous Near real-time continuous risk control on evolving business processes Actionable Knowledge bases to support engineers being compliant with legal obligations Awarded two H2020 research projects (~0.5M €) by the European Commission as leading experts on risk management.
  • 15. Customer Engineer / Client Subcontractors Risk Control SaaS SaaS-based business model TRUSTED BY
  • 16. We enable your company to execute complex projects that may be too risky otherwise Protect your customers and your organization through early evidence-based detection of security and privacy issues Prioritize work based on risk level, focus on relevant tasks Avoid delays Predict and control business processes performance Avoid, monitor and predict unwanted incidents: law suits, delays, contract violations, quality issues, ... Reduce impact produced by incidents in your system Protect your budget Optimize and reduce your software development process Prove strict compliance with continuous risk management requirements (ISO 27001, GDPR, etc) Facilitate auditing through automatic reports Prove compliance
  • 18. System complexity increases Architectures, DFDs, BPMN, etc Automation becomes more relevant Model-driven approches may facilitate risk control
  • 19. Multiple ways to describe your system/process Define evolving risks over business processes Automated vulnerability detection for security and privacy threats
  • 20. Systems are not static, but highly dynamic Evidence-based risk assessment (both to monitor mitigation implementation and effectiveness) DevOps-oriented AI-driven prediction
  • 21. DevOps Risk Control C O D E BUILD TEST RELEASE & DEPLOY O P E R A T E Continuous Risk Management (business and non-functional risks)
  • 22. Trustworthiness is a multidimensional concept Security, Privacy, Safety present contradictory requirements too often
  • 24. Gap between legal and technical requirements GDPR as an example
  • 25. Privacy and GDPR GDPR discusses data protection by design and by default Technologies are not consolidated yet and mixing legal requirements with a deep technical understanding is challenging GDPR introduces a risk- based approach An organization may fail to comply with GDPR even if no breach happens, since they must have taken protective measures beforehand
  • 26. Risk management involves a growing number of stakeholders Kanban approach Risk management in supply chains Federated risk management
  • 27. S1: TSIS Assets Definition (e.g. DFD, Architecture, etc) S2: Threats Identification S3: Risks Assessment (includes risk analysis and evaluation) S4: Definition of Treatments S5: Residual Risk Assessment S6: Treatment Implementation Control A P R A R P A V R A V R P A O V P O Risk Management Owner P Product Owner A Architect V Developer R Risk Analist (QA dept, CSO, Security Expert)
  • 29. TEAM 38 patents (19 granted & 19 pending) (10+ using AI) PATENTS 21 years of combined experience in risk management EXPERIENCE 20+ years of experience managing people to execute IT projects LEADERSHIP Experience supporting an Accelerator for Lean Start Ups (20+) ACCELERATOR
  • 30. TEAM TEAM Elena • PhD Computer Science (Large Data Management) • Track record with technology companies & start-ups • VP of Research at CA Technologies (2011-2019) • 70+ scientific publications, 1 book, 5 book chapters • Technologist with experience in architecting, supporting and running critical systems and applications • 15+ years of experience in information technology Daniel Ramon Victor CEO & Co-founder Jacek CTO & Co-founder Software Engineer Senior Operations Consultant Project Manager

Editor's Notes

  1. Every single project in any industry is subject to risks. We want to become the best at transforming risks into opportunities.
  2. Originally planned to open in October 2011, the airport has encountered a series of delays and cost overruns. These were due to poor construction planning, execution, management, as well as corruption. In particular, planning, design and execution issues were commonplace. Inspectors uncovered many examples of poor workmanship due to a lack of proper supervision and documentation.
  3. ITER is probably the most ambitious energy project in the world today. ITER aims at harnessing the nuclear reaction that powers the Sun and the stars, fusion, a potential source of safe, non-carbon emitting and virtually limitless energy. ITER builds the largest and most powerful fusion device in the world and the first to create net energy. ITER construction is underway now. In the years ahead, over 4,000 workers will be required for on-site building, assembly and installation activities. Planning is a nightmare. They have huge project Schedules, with thousands and thousands of tasks. Most tasks depend on documents. If the documents are not ready, tasks are delayed. The number of document goes over 100000 per year. Every time a single task in the doc Schedule changes the level of risk for each document changes... And they are managing this manually. In this case, it is not poor management skills. The problem is simply too complex and requires superhuman skills. Maybe you are wondering why we know these details. The answer is simple: the largest construction companyies building the main building that will contain the fusion reactor decided to trust Beawre to control risks related to their documentation.
  4. STORY-BASED: From https://medium.com/nplan/4-opportunities-for-ai-to-improve-capital-projects-and-construction-93e3ed3c4fea: 1. Projects are executed based on the collective brainpower of the project team and a handful of consultants. There isn’t a way to rapidly and seamlessly transfer knowledge within an organisation and as a result, repeated mistakes occur which costs the industry dearly. These costs often manifest themselves as liquidated damages and claims. 2. Project estimating and scheduling is often considered an art and not a quantitative science. These art pieces contain flaws in either logic or quantity and as a result, get disregarded much sooner than you’d want. 3. Risk is often allocated subjectively to schedules and estimates, which leads to inflated waste. Subjective risk often holds a large range, which means that specific items or targets are shrouded in uncertainty and are undermined because of a low credibility. If the project team doesn’t believe they have a realistic plan, it gets dismissed and overruns become increasingly likely. 4. Projects are all different and complex. The existing frameworks to manage size and complexity disconnects management from the work face, by creating layers. At each layer, information is filtered before proceeding upwards, which creates disputable awareness of how a project is actually doing. When things go off plan, two things happen, the first is that it takes forever (~30 days) before the management team learns about the deviation and the second is once discovered, they won’t know how best to react to ensure schedule/cost outcomes are maintained for the overall project. The tendency is to fight the fire, which inevitably allows 2nd or 3rd order critical path items to creep and bite back, resulting in a larger fire. Subcontractors may be late: They may not have the right resources They may not have the right expertise Client also have contractual obligations to review your documents in time: If they take extra time to review, your construction tasks may be delayed Pool of information is not easily accessible: Lack of interoperability among tools No mechanisms to continuously monitor risks Many processes handled manually or through non-shared spreadsheets COMPLEX: Risk assessment based on subjective estimations DYNAMIC: - Contractual obligations difficult to monitor URGENT: - Excel! - Lack of interoperability among tools
  5. Makes the team smarter and enables to manage Large Capital Project that would be too risky without the use of tools like Beawre’s.
  6. Group tools or more contribution
  7. (Explain the current status of your product, what the near future looks like, and how you’ll use the money you’re trying to raise. Share the details of your positive momentum and traction. Then use this slide to close with a bias toward action.)
  8. Management: Victor (10), Jacek (7), Ramon (8), Elena ()
  9. Ramon: de manager vaig estar 3 a planta i 8 com a consultor amb gent a càrrec. Des del 2014 sóc consultor sense gent a càrrec però treballant amb equips o i, des del 2017, com a freelance. Com a resum, jo diria 21 anys d'experiència amb 6 anys a l'operació, i 8 de mànager. Amb risc podríem dir que són 7 anys com a consultor de risc, de procés, de preparació operacional i de gestió d'actius, però no només fent feina en aquest àmbit.