SlideShare a Scribd company logo
Business Oriented Risk
Assessment & Management
Methodology
BRIAN KEITH SEITZ
INTELLECTUAL ARBITRAGE GROUP
Approach
Address elements of risk:
 Likelihood of Failure
 Consequence of Failure
To aid in prioritizing mitigation and avoidance
strategies.
Brian Keith Seitz
Intellectual Arbitrage Group.
Risk Elements
 Likelihood of Failure
 Complexity
 Probability
 Consequence of Failure
 Catastrophic (Human loss or injury)
 Critical (degrades business system beyond acceptable
limits, create shut-down or significant business loss )
 Major (degrades business system beyond acceptable
limits, create business loss)
 Minor (doe not degrade business system beyond
acceptable limits)
Brian Keith Seitz
Intellectual Arbitrage Group.
Determine Criticality
Brian Keith Seitz
Intellectual Arbitrage Group.
When does a process failure become critical ?
• Time to critical effect to business
• Time to repair and recover
What are the core Business processes ?
• What must keep operating and when ?
Identify technology failure’s
organizational effect
Brian Keith Seitz
Intellectual Arbitrage Group.
• Map Technology to processes
• Determine technology path fitness
• Determine technology network risk
Risk Assessment Methodology
Brian Keith Seitz
Intellectual Arbitrage Group.
Effect
Priority
Identify
Business Processes
Determine
Critical Processes
Identify
Supporting Technology
Determine
Technology’
Organizational Impact
Characterize
Business Processes
Risk Assessment Methodology
Brian Keith Seitz
Intellectual Arbitrage Group.
Effect
Priority
Identify
Business Processes
Determine
Critical Processes
Identify
Supporting Technology
Determine
Technology’
Organizational Impact
Characterize
Business Processes

More Related Content

Viewers also liked

Ontology and taxonomy creation presented dc 3day
Ontology and taxonomy creation presented dc 3dayOntology and taxonomy creation presented dc 3day
Ontology and taxonomy creation presented dc 3day
Brian K. Seitz
 
Writing a value proposition using the value proposition
Writing a value proposition using the value propositionWriting a value proposition using the value proposition
Writing a value proposition using the value proposition
Brian K. Seitz
 
Analysing business risks; management quality
Analysing business risks; management qualityAnalysing business risks; management quality
Analysing business risks; management quality
Geoff Burton
 
Analysing business risks; resources
Analysing business risks; resourcesAnalysing business risks; resources
Analysing business risks; resources
Geoff Burton
 
Business risk assessment
Business risk assessmentBusiness risk assessment
Business risk assessmentUzair Khan
 
Risk management in business analysis the great differentiator
Risk management in business analysis   the great differentiatorRisk management in business analysis   the great differentiator
Risk management in business analysis the great differentiatorChristian Kobsa
 
Business plan and presentation iii - financials and risk
Business plan and presentation   iii - financials and riskBusiness plan and presentation   iii - financials and risk
Business plan and presentation iii - financials and riskPrawesh Shrestha
 
Analysing business risks; market environment
Analysing business risks; market environmentAnalysing business risks; market environment
Analysing business risks; market environment
Geoff Burton
 
Business Plan: Risks & Challenges
Business Plan: Risks & ChallengesBusiness Plan: Risks & Challenges
Business Plan: Risks & Challenges
Kofi Kafui Kornu
 
Supply Chain Risk Management
Supply Chain Risk ManagementSupply Chain Risk Management
Supply Chain Risk Management
Anand Subramaniam
 

Viewers also liked (11)

Ontology and taxonomy creation presented dc 3day
Ontology and taxonomy creation presented dc 3dayOntology and taxonomy creation presented dc 3day
Ontology and taxonomy creation presented dc 3day
 
Writing a value proposition using the value proposition
Writing a value proposition using the value propositionWriting a value proposition using the value proposition
Writing a value proposition using the value proposition
 
Analysing business risks; management quality
Analysing business risks; management qualityAnalysing business risks; management quality
Analysing business risks; management quality
 
Analysing business risks; resources
Analysing business risks; resourcesAnalysing business risks; resources
Analysing business risks; resources
 
Business risk assessment
Business risk assessmentBusiness risk assessment
Business risk assessment
 
Risk asssessment
Risk asssessmentRisk asssessment
Risk asssessment
 
Risk management in business analysis the great differentiator
Risk management in business analysis   the great differentiatorRisk management in business analysis   the great differentiator
Risk management in business analysis the great differentiator
 
Business plan and presentation iii - financials and risk
Business plan and presentation   iii - financials and riskBusiness plan and presentation   iii - financials and risk
Business plan and presentation iii - financials and risk
 
Analysing business risks; market environment
Analysing business risks; market environmentAnalysing business risks; market environment
Analysing business risks; market environment
 
Business Plan: Risks & Challenges
Business Plan: Risks & ChallengesBusiness Plan: Risks & Challenges
Business Plan: Risks & Challenges
 
Supply Chain Risk Management
Supply Chain Risk ManagementSupply Chain Risk Management
Supply Chain Risk Management
 

Similar to Business Oriented risk assessment methodology iag

Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique SingerLet's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
SaraPia5
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
Stacy Willis
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
 
CONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptxCONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptx
Pandiya Rajan
 
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
Levi Shapiro
 
Critical Success Factors (CSFs) for Effective IT Governance Implementations
Critical Success Factors (CSFs) for Effective IT Governance ImplementationsCritical Success Factors (CSFs) for Effective IT Governance Implementations
Critical Success Factors (CSFs) for Effective IT Governance Implementations
Rachid Meziani, PhD, CGEIT, PMP
 
IT Project Success through Corporate Profiling
IT Project Success through Corporate ProfilingIT Project Success through Corporate Profiling
IT Project Success through Corporate Profiling
ITPSB Pty Ltd
 
Minimizing Business Risk in IT Projects
Minimizing Business Risk in IT ProjectsMinimizing Business Risk in IT Projects
Minimizing Business Risk in IT ProjectsITPSB Pty Ltd
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
accenture
 
It Assessment
It AssessmentIt Assessment
It Assessment
Craig Miller
 
Cyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineCyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated Discipline
Graeme Parker
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
MichaelSadeghiPhDABD
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
goreankush1
 
Challenges of Vulnerability Management
 Challenges of Vulnerability Management Challenges of Vulnerability Management
Challenges of Vulnerability Management
Rahul Neel Mani
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
Rod Davis
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
Lisa Niles
 
Industrial Control Systems and Incident Response
Industrial Control Systems and Incident Response Industrial Control Systems and Incident Response
Industrial Control Systems and Incident Response
Yugal Pathak
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
centralohioissa
 
Crossland Advisors Services
Crossland Advisors ServicesCrossland Advisors Services
Crossland Advisors Services
Jay Crossland
 
Building Organizational Resilience Presentation - ISSA Special Interest Group...
Building Organizational Resilience Presentation - ISSA Special Interest Group...Building Organizational Resilience Presentation - ISSA Special Interest Group...
Building Organizational Resilience Presentation - ISSA Special Interest Group...
Bryghtpath LLC
 

Similar to Business Oriented risk assessment methodology iag (20)

Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique SingerLet's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
CONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptxCONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptx
 
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
 
Critical Success Factors (CSFs) for Effective IT Governance Implementations
Critical Success Factors (CSFs) for Effective IT Governance ImplementationsCritical Success Factors (CSFs) for Effective IT Governance Implementations
Critical Success Factors (CSFs) for Effective IT Governance Implementations
 
IT Project Success through Corporate Profiling
IT Project Success through Corporate ProfilingIT Project Success through Corporate Profiling
IT Project Success through Corporate Profiling
 
Minimizing Business Risk in IT Projects
Minimizing Business Risk in IT ProjectsMinimizing Business Risk in IT Projects
Minimizing Business Risk in IT Projects
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
 
It Assessment
It AssessmentIt Assessment
It Assessment
 
Cyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineCyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated Discipline
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
Challenges of Vulnerability Management
 Challenges of Vulnerability Management Challenges of Vulnerability Management
Challenges of Vulnerability Management
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
 
Industrial Control Systems and Incident Response
Industrial Control Systems and Incident Response Industrial Control Systems and Incident Response
Industrial Control Systems and Incident Response
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Crossland Advisors Services
Crossland Advisors ServicesCrossland Advisors Services
Crossland Advisors Services
 
Building Organizational Resilience Presentation - ISSA Special Interest Group...
Building Organizational Resilience Presentation - ISSA Special Interest Group...Building Organizational Resilience Presentation - ISSA Special Interest Group...
Building Organizational Resilience Presentation - ISSA Special Interest Group...
 

More from Brian K. Seitz

Enterprise Architecture Governance
Enterprise Architecture GovernanceEnterprise Architecture Governance
Enterprise Architecture Governance
Brian K. Seitz
 
Mszifa96 01
Mszifa96 01Mszifa96 01
Mszifa96 01
Brian K. Seitz
 
Cio workbench01
Cio workbench01Cio workbench01
Cio workbench01
Brian K. Seitz
 
1996 Enterprise Architecture Praxis Presenation @ ZIFA
1996 Enterprise Architecture Praxis Presenation @ ZIFA1996 Enterprise Architecture Praxis Presenation @ ZIFA
1996 Enterprise Architecture Praxis Presenation @ ZIFA
Brian K. Seitz
 
Market process success
Market process successMarket process success
Market process success
Brian K. Seitz
 
Case study development of share point service business architecture 2010 08-0...
Case study development of share point service business architecture 2010 08-0...Case study development of share point service business architecture 2010 08-0...
Case study development of share point service business architecture 2010 08-0...
Brian K. Seitz
 

More from Brian K. Seitz (6)

Enterprise Architecture Governance
Enterprise Architecture GovernanceEnterprise Architecture Governance
Enterprise Architecture Governance
 
Mszifa96 01
Mszifa96 01Mszifa96 01
Mszifa96 01
 
Cio workbench01
Cio workbench01Cio workbench01
Cio workbench01
 
1996 Enterprise Architecture Praxis Presenation @ ZIFA
1996 Enterprise Architecture Praxis Presenation @ ZIFA1996 Enterprise Architecture Praxis Presenation @ ZIFA
1996 Enterprise Architecture Praxis Presenation @ ZIFA
 
Market process success
Market process successMarket process success
Market process success
 
Case study development of share point service business architecture 2010 08-0...
Case study development of share point service business architecture 2010 08-0...Case study development of share point service business architecture 2010 08-0...
Case study development of share point service business architecture 2010 08-0...
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Business Oriented risk assessment methodology iag

  • 1. Business Oriented Risk Assessment & Management Methodology BRIAN KEITH SEITZ INTELLECTUAL ARBITRAGE GROUP
  • 2. Approach Address elements of risk:  Likelihood of Failure  Consequence of Failure To aid in prioritizing mitigation and avoidance strategies. Brian Keith Seitz Intellectual Arbitrage Group.
  • 3. Risk Elements  Likelihood of Failure  Complexity  Probability  Consequence of Failure  Catastrophic (Human loss or injury)  Critical (degrades business system beyond acceptable limits, create shut-down or significant business loss )  Major (degrades business system beyond acceptable limits, create business loss)  Minor (doe not degrade business system beyond acceptable limits) Brian Keith Seitz Intellectual Arbitrage Group.
  • 4. Determine Criticality Brian Keith Seitz Intellectual Arbitrage Group. When does a process failure become critical ? • Time to critical effect to business • Time to repair and recover What are the core Business processes ? • What must keep operating and when ?
  • 5. Identify technology failure’s organizational effect Brian Keith Seitz Intellectual Arbitrage Group. • Map Technology to processes • Determine technology path fitness • Determine technology network risk
  • 6. Risk Assessment Methodology Brian Keith Seitz Intellectual Arbitrage Group. Effect Priority Identify Business Processes Determine Critical Processes Identify Supporting Technology Determine Technology’ Organizational Impact Characterize Business Processes
  • 7. Risk Assessment Methodology Brian Keith Seitz Intellectual Arbitrage Group. Effect Priority Identify Business Processes Determine Critical Processes Identify Supporting Technology Determine Technology’ Organizational Impact Characterize Business Processes