SlideShare a Scribd company logo
ASIS
Data-driven crime prediction
Rotterdam 2019-03-28
Viking Johansson
Director of Product Management
Security decisions are often made based on experience, local understanding and
standard mitigations
• Previous experience
• Country and local knowledge
• Standard mitigations and
actions
• What can happen?
• When and how will it happen?
• What should I do and what
impact will it have?
Being data-driven in security is the ability collect, analyze and act on data rather than
individual experience
Being data-driven is about enabling us to make the
right decision, at the right moment, to mitigate or
reduce the impact of an incident
One example of this is Insights, a localized risk assessment tool
Transform incident records to
predictive risk assessments
Example use of real-time risk assessment: Early warning for burglaries by predicting
on crime waves
Real-time operation example: Utilizing early indicators real-time to reduce or avoid
the impact of an ongoing incident
Statistics Heat map Specific countermeasures Business caseRealtime risk
AI technology is being commoditized and the key asset is high volumes
of detailed data
Incident volumes Location Time Modus operandi Business impact
Where do you start?
Use the data you have. It is likely not tailored for machine learning but
it will get you started.
1
Create a vision on what you want to achieve. Make changes to your
processes to capture the needed data.
2
Partner with others – combining your data with others can be
beneficial to all parties
3

More Related Content

What's hot

Best Practices for Data at Scale - Global Data Science Conference
Best Practices for Data at Scale - Global Data Science ConferenceBest Practices for Data at Scale - Global Data Science Conference
Best Practices for Data at Scale - Global Data Science Conference
Carolyn Duby
 
The Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning CybersecurityThe Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning Cybersecurity
Interset
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
Interset
 
Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment
Rick van der Kleij
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
Phil Huggins FBCS CITP
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Hernan Huwyler, MBA CPA
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the Government
VidSys, Inc.
 
Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk Management
Social Tables
 
Vulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security ControlsVulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security Controls
Tripwire
 
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteOperationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Interset
 
The Missing Approach for Threat Detection
The Missing Approach for Threat DetectionThe Missing Approach for Threat Detection
The Missing Approach for Threat Detection
CDXAdmin
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
Laura Vanassche
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
zapp0
 
Metric stream elevating your compliance program with technology
Metric stream elevating your compliance program with technologyMetric stream elevating your compliance program with technology
Metric stream elevating your compliance program with technology
Hernan Huwyler, MBA CPA
 
LDITSITAM WebinarSept2016
LDITSITAM WebinarSept2016LDITSITAM WebinarSept2016
LDITSITAM WebinarSept2016Yvette Mathews
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
Hernan Huwyler, MBA CPA
 
Data Protection Top Ten Concerns
Data Protection Top Ten ConcernsData Protection Top Ten Concerns
Data Protection Top Ten Concernshealthcareisi
 
Information Security Project
Information Security ProjectInformation Security Project
Information Security Projectnovemberchild
 
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Internetwork Engineering (IE)
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster RecoveryRishu Mehra
 

What's hot (20)

Best Practices for Data at Scale - Global Data Science Conference
Best Practices for Data at Scale - Global Data Science ConferenceBest Practices for Data at Scale - Global Data Science Conference
Best Practices for Data at Scale - Global Data Science Conference
 
The Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning CybersecurityThe Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning Cybersecurity
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 
Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the Government
 
Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk Management
 
Vulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security ControlsVulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security Controls
 
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteOperationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
 
The Missing Approach for Threat Detection
The Missing Approach for Threat DetectionThe Missing Approach for Threat Detection
The Missing Approach for Threat Detection
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Metric stream elevating your compliance program with technology
Metric stream elevating your compliance program with technologyMetric stream elevating your compliance program with technology
Metric stream elevating your compliance program with technology
 
LDITSITAM WebinarSept2016
LDITSITAM WebinarSept2016LDITSITAM WebinarSept2016
LDITSITAM WebinarSept2016
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
 
Data Protection Top Ten Concerns
Data Protection Top Ten ConcernsData Protection Top Ten Concerns
Data Protection Top Ten Concerns
 
Information Security Project
Information Security ProjectInformation Security Project
Information Security Project
 
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 

Similar to Data-driven crime prevention using AI

Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
zapp0
 
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasOperationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Interset
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
Anton Chuvakin
 
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxLogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
CNSHacking
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
Resilient Systems
 
Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security Officer
Dirk Cipido
 
Safety Observation Through Digital Lens.pdf
Safety Observation Through Digital Lens.pdfSafety Observation Through Digital Lens.pdf
Safety Observation Through Digital Lens.pdf
ASK EHS Engineering & Consultants
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
TI Safe
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
Kaspersky
 
Belnet events management
Belnet events managementBelnet events management
Belnet events managementXavier Mertens
 
Events Management or How to Survive Security Incidents
Events Management or How to Survive Security IncidentsEvents Management or How to Survive Security Incidents
Events Management or How to Survive Security Incidents
guest6fd3c2f9
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
IBM Security
 
Combating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingCombating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event Processing
Tim Bass
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
thinkASG
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
SurfWatch Labs
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Sirius
 
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecXavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Laura Tibbo
 
Protect Your Digital Privacy | Cyberroot Risk Advisory
Protect Your Digital Privacy | Cyberroot Risk AdvisoryProtect Your Digital Privacy | Cyberroot Risk Advisory
Protect Your Digital Privacy | Cyberroot Risk Advisory
CR Group
 
2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote
John D. Johnson
 

Similar to Data-driven crime prevention using AI (20)

Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasOperationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum Dallas
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxLogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 
Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security Officer
 
Safety Observation Through Digital Lens.pdf
Safety Observation Through Digital Lens.pdfSafety Observation Through Digital Lens.pdf
Safety Observation Through Digital Lens.pdf
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
Belnet events management
Belnet events managementBelnet events management
Belnet events management
 
Events Management or How to Survive Security Incidents
Events Management or How to Survive Security IncidentsEvents Management or How to Survive Security Incidents
Events Management or How to Survive Security Incidents
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
Combating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingCombating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event Processing
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecXavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
 
Protect Your Digital Privacy | Cyberroot Risk Advisory
Protect Your Digital Privacy | Cyberroot Risk AdvisoryProtect Your Digital Privacy | Cyberroot Risk Advisory
Protect Your Digital Privacy | Cyberroot Risk Advisory
 
2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote
 

More from Doreen Loeber

The growth of young professionals into the security industry (a live case study)
The growth of young professionals into the security industry (a live case study)The growth of young professionals into the security industry (a live case study)
The growth of young professionals into the security industry (a live case study)
Doreen Loeber
 
Burnout: When bad things happen to good security professionals
Burnout: When bad things happen to good security professionalsBurnout: When bad things happen to good security professionals
Burnout: When bad things happen to good security professionals
Doreen Loeber
 
The New APP Certification
The New APP CertificationThe New APP Certification
The New APP Certification
Doreen Loeber
 
How to Secure an Open Campus
How to Secure an Open CampusHow to Secure an Open Campus
How to Secure an Open Campus
Doreen Loeber
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
Doreen Loeber
 
True or False in the Age of Fake News
True or False in the Age of Fake NewsTrue or False in the Age of Fake News
True or False in the Age of Fake News
Doreen Loeber
 
Sharing is caring: Duty of Care and the Sharing Economy
Sharing is caring: Duty of Care and the Sharing EconomySharing is caring: Duty of Care and the Sharing Economy
Sharing is caring: Duty of Care and the Sharing Economy
Doreen Loeber
 
Video Surveillance in Marine Environments
Video Surveillance in Marine EnvironmentsVideo Surveillance in Marine Environments
Video Surveillance in Marine Environments
Doreen Loeber
 
How Access Control is impacted by cloud, mobile and GDPR
How Access Control is impacted by cloud, mobile and GDPRHow Access Control is impacted by cloud, mobile and GDPR
How Access Control is impacted by cloud, mobile and GDPR
Doreen Loeber
 
Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...
Doreen Loeber
 
Vendor Partnering. The A to Z of Developing Great Relationships
Vendor Partnering. The A to Z of Developing Great RelationshipsVendor Partnering. The A to Z of Developing Great Relationships
Vendor Partnering. The A to Z of Developing Great Relationships
Doreen Loeber
 
The competitive advantage of holding a professional certification
The competitive advantage of holding a professional certificationThe competitive advantage of holding a professional certification
The competitive advantage of holding a professional certification
Doreen Loeber
 
Career Development Workshop
Career Development WorkshopCareer Development Workshop
Career Development Workshop
Doreen Loeber
 
The ESRM Skills Cocktail
The ESRM Skills CocktailThe ESRM Skills Cocktail
The ESRM Skills Cocktail
Doreen Loeber
 
Research revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationalsResearch revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationals
Doreen Loeber
 
Artificial Intelligence and Automation in Mobility Risk Management
Artificial Intelligence and Automation in Mobility Risk ManagementArtificial Intelligence and Automation in Mobility Risk Management
Artificial Intelligence and Automation in Mobility Risk Management
Doreen Loeber
 
Your building is talking. Are you listening?
Your building is talking. Are you listening?Your building is talking. Are you listening?
Your building is talking. Are you listening?
Doreen Loeber
 
The weakest link in today’s physical security … and no, it’s not people
The weakest link in today’s physical security … and no, it’s not peopleThe weakest link in today’s physical security … and no, it’s not people
The weakest link in today’s physical security … and no, it’s not people
Doreen Loeber
 
Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...
Doreen Loeber
 
Case Study: Digitalization of Systems Brings Smarter Buildings
Case Study: Digitalization of Systems Brings Smarter BuildingsCase Study: Digitalization of Systems Brings Smarter Buildings
Case Study: Digitalization of Systems Brings Smarter Buildings
Doreen Loeber
 

More from Doreen Loeber (20)

The growth of young professionals into the security industry (a live case study)
The growth of young professionals into the security industry (a live case study)The growth of young professionals into the security industry (a live case study)
The growth of young professionals into the security industry (a live case study)
 
Burnout: When bad things happen to good security professionals
Burnout: When bad things happen to good security professionalsBurnout: When bad things happen to good security professionals
Burnout: When bad things happen to good security professionals
 
The New APP Certification
The New APP CertificationThe New APP Certification
The New APP Certification
 
How to Secure an Open Campus
How to Secure an Open CampusHow to Secure an Open Campus
How to Secure an Open Campus
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
True or False in the Age of Fake News
True or False in the Age of Fake NewsTrue or False in the Age of Fake News
True or False in the Age of Fake News
 
Sharing is caring: Duty of Care and the Sharing Economy
Sharing is caring: Duty of Care and the Sharing EconomySharing is caring: Duty of Care and the Sharing Economy
Sharing is caring: Duty of Care and the Sharing Economy
 
Video Surveillance in Marine Environments
Video Surveillance in Marine EnvironmentsVideo Surveillance in Marine Environments
Video Surveillance in Marine Environments
 
How Access Control is impacted by cloud, mobile and GDPR
How Access Control is impacted by cloud, mobile and GDPRHow Access Control is impacted by cloud, mobile and GDPR
How Access Control is impacted by cloud, mobile and GDPR
 
Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...
 
Vendor Partnering. The A to Z of Developing Great Relationships
Vendor Partnering. The A to Z of Developing Great RelationshipsVendor Partnering. The A to Z of Developing Great Relationships
Vendor Partnering. The A to Z of Developing Great Relationships
 
The competitive advantage of holding a professional certification
The competitive advantage of holding a professional certificationThe competitive advantage of holding a professional certification
The competitive advantage of holding a professional certification
 
Career Development Workshop
Career Development WorkshopCareer Development Workshop
Career Development Workshop
 
The ESRM Skills Cocktail
The ESRM Skills CocktailThe ESRM Skills Cocktail
The ESRM Skills Cocktail
 
Research revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationalsResearch revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationals
 
Artificial Intelligence and Automation in Mobility Risk Management
Artificial Intelligence and Automation in Mobility Risk ManagementArtificial Intelligence and Automation in Mobility Risk Management
Artificial Intelligence and Automation in Mobility Risk Management
 
Your building is talking. Are you listening?
Your building is talking. Are you listening?Your building is talking. Are you listening?
Your building is talking. Are you listening?
 
The weakest link in today’s physical security … and no, it’s not people
The weakest link in today’s physical security … and no, it’s not peopleThe weakest link in today’s physical security … and no, it’s not people
The weakest link in today’s physical security … and no, it’s not people
 
Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...
 
Case Study: Digitalization of Systems Brings Smarter Buildings
Case Study: Digitalization of Systems Brings Smarter BuildingsCase Study: Digitalization of Systems Brings Smarter Buildings
Case Study: Digitalization of Systems Brings Smarter Buildings
 

Recently uploaded

April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 

Recently uploaded (20)

April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 

Data-driven crime prevention using AI

  • 1. ASIS Data-driven crime prediction Rotterdam 2019-03-28 Viking Johansson Director of Product Management
  • 2. Security decisions are often made based on experience, local understanding and standard mitigations • Previous experience • Country and local knowledge • Standard mitigations and actions
  • 3. • What can happen? • When and how will it happen? • What should I do and what impact will it have? Being data-driven in security is the ability collect, analyze and act on data rather than individual experience
  • 4. Being data-driven is about enabling us to make the right decision, at the right moment, to mitigate or reduce the impact of an incident
  • 5. One example of this is Insights, a localized risk assessment tool
  • 6.
  • 7. Transform incident records to predictive risk assessments Example use of real-time risk assessment: Early warning for burglaries by predicting on crime waves
  • 8. Real-time operation example: Utilizing early indicators real-time to reduce or avoid the impact of an ongoing incident
  • 9. Statistics Heat map Specific countermeasures Business caseRealtime risk AI technology is being commoditized and the key asset is high volumes of detailed data Incident volumes Location Time Modus operandi Business impact
  • 10. Where do you start? Use the data you have. It is likely not tailored for machine learning but it will get you started. 1 Create a vision on what you want to achieve. Make changes to your processes to capture the needed data. 2 Partner with others – combining your data with others can be beneficial to all parties 3