SlideShare a Scribd company logo
1 of 19
Public
Getting better at Risk Management
through Event Driven Mesh Architecture
Raghavan Sadagopan & Lakshmi Narayana
We recognized early on that the
winners in banking will be great
technology companies
Shifted to 100% agile model
for delivering software
Began externalizing
solutions developed
internally
Completed our move to the
public cloud
Modernized our data
ecosystem on the cloud
Began to modernize our architecture
with RESTful APIs
Became Open Source first
Declared we are all in on
the public cloud
2013
2014
2015
2016
2017
2020
2021
We Are
● Tech is central to everything we do at Capital One: for
nearly a decade, we have invested and invented like
the very best technology companies
● Our world-class, in-house technology team now
numbers 12,000+ people, most of which are
engineers
● We're all in on the cloud like no other bank out there,
which enables us to create exceptional, innovative
experiences for our customers
● Advanced, automated DevOps and CI/CD approaches
mean engineers spend more time at the top of the tech
stack building new and unique digital banking
experiences
Cloud Computing
In 2020, we left our data centers to
create exceptional banking experiences
for our customers, becoming the first
bank to go all-in on the public cloud
○ Going all in on the cloud—and embracing cloud-
native services like serverless computing—
has enabled instant provisioning of
infrastructure and rapid innovation
○ Today, we're using real-time, streaming data at scale,
machine learning, and the power of the cloud to solve
unique, challenging technology problems and deliver
intelligent, personalized solutions that benefit
millions of customers
○ Capital One Shopping,
built in the cloud with
microservices
architecture and
streaming data, helps
customers save money
shopping online by
automatically finding
lower prices, coupons
and online credits
Open Source Software
Capital One made an “open source first”
declaration in 2014 and that’s when we made our
first contributions to the open source community.
○ We sponsor FINOS, Python, Continuous Delivery and the Cloud
Native Computing Foundations to help keep open source
sustainable
○ Capital One’s contributions to the open source community
have been significant and we've released more than 40 of
our own software projects
○ We’ve invested for years to build the culture and governance
required to be open source-first in a highly regulated industry
Featured Open
Source Projects:
Data Profiler,
Rubicon-ML and
Hygieia
Want to learn more?
● Want to learn more about our Tech? Check out Capital One
Tech to find out more about enterprise software solutions,
ideas and stories.
● At Capital One, we celebrate and honor the differences that
makes us all unique- inside and outside of work. Help us
create a more equitable future for all! Join us! Visit Capital
One Careers to view our open roles.
● Follow us on Twitter at CapitalOneTech
• Basics of Risk Management
• Event Mesh
• Risk Management use cases
• Point of view Architecture
Agenda
Public
What is a Risk Management?
Risk management is the process of identifying, assessing and controlling threats to an
organization's capital, earnings and operations. These risks stem from a variety of sources,
including financial uncertainties, legal liabilities, technology issues, strategic management errors,
accidents and natural disasters.
A successful risk management program helps an organization consider the full range of risks it
faces. Risk management also examines the relationship between different types of business risks
and the cascading impact they could have on an organization's strategic goals.
Source: Blog from TechTarget.com
Public
Some basics of Risk Management as defined by the International
Organization for Standardization (ISO)
Objective
result to be achieved
Organization
person or group of people that has its
own functions with responsibilities,
authorities and relationships to
achieve its objectives
Risk
effect of uncertainty on objectives
Risk Management
coordinated activities to direct and
control an organization with regard to
risk
Source: Risk management - Vocabulary (ISO 31073:2022)
Public
The first step to get better at Risk Management is to get better at
identifying the risks
Identify sources of the risk, areas of impact, events (including changes in circumstances) and their
causes and potential consequences.
In identifying the risk, consider these kinds of questions:
• What could happen?
• How could it happen?
• Where could it happen?
• Why might it happen?
• What might be the impact?
Public
What is an Event-Driven Mesh Architecture(EDMA)?
An event mesh is a communication layer
that enables the seamless exchange of
events (data/messages) between
various applications, services, and
systems in a distributed and decoupled
manner. The primary purpose of an
event mesh is to simplify and optimize
event-driven communication within a
complex ecosystem of applications.
Public
Using an event mesh for risk management can enhance the real-time
monitoring, analysis, and response to potential risks within an
organization
Event Sources
Identify various sources of events within your
organization that may be related to risks.
These sources can include financial data,
security logs, market data, IoT devices,
customer interactions, and more.
Event Routing and Processing
Implement an event mesh to efficiently route
events from different sources to the
appropriate risk management applications and
services. The event mesh can handle the
complex routing logic based on predefined
rules.
Real-time Monitoring
Use the event mesh to provide real-time
monitoring capabilities. Events related to
potential risks can be continuously streamed
to risk monitoring dashboards and analytics
systems.
Risk Detection
Implement risk detection algorithms and
models that analyze incoming events in real-
time. These algorithms can identify patterns,
anomalies, and indicators of potential risks.
The event mesh ensures that relevant events
are delivered promptly to the detection
systems.
Alerting and Notification
Set up alerting mechanisms within your event
mesh to notify risk managers or relevant
stakeholders when a potential risk is detected.
Alerts can be sent via various channels, such
as email, SMS, or integration with
collaboration tools.
Compliance and Reporting
Use the event mesh to facilitate compliance
monitoring and reporting. It can capture and
log events relevant to compliance
requirements, making it easier to demonstrate
adherence to regulations.
Public
Point of view Architecture
Public
Key Components of Event Driven Architecture
Event
Routers
Event
Consumer
Event
Consumers
Events
Event
Consumer
Public
Implementing EDMA using modern AWS Serverless Technologies
Public
Building Scalable & High Resiliency Architecture
Serverless
Technologies
Multi
Availability
Zone (AZ)
deployment
Multi Region
Active /
Active mode
Enhanced
Monitoring
Public
Benefits of Event Driven Architecture
Scalability
Fault Tolerance
Loose Coupling Modularity
Responsiveness Reduced Cost
Public
Best Practices of Event Driven Architecture
Security Measures
Event Contracts Event Sourcing Observability
Documentation
Governance Process
Public
Q & A

More Related Content

Similar to Getting Better at Risk Management Using Event Driven Mesh Architecture - Raghavan Sadagopan & Lakshmi Narayana, CapitalOne

Critical API Partners: Business and IT
Critical API Partners: Business and ITCritical API Partners: Business and IT
Critical API Partners: Business and ITAxway
 
Soluciones de Código Abierto - Perspectivas, Resultados y Soluciones de Valor
Soluciones de Código Abierto - Perspectivas, Resultados y Soluciones de ValorSoluciones de Código Abierto - Perspectivas, Resultados y Soluciones de Valor
Soluciones de Código Abierto - Perspectivas, Resultados y Soluciones de ValorWSO2
 
I-Bytes Financial services Industry
I-Bytes Financial services IndustryI-Bytes Financial services Industry
I-Bytes Financial services IndustryEGBG Services
 
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2Conf
 
Microsoft AI Innovators Greece Cyprus Malta
Microsoft AI Innovators Greece Cyprus MaltaMicrosoft AI Innovators Greece Cyprus Malta
Microsoft AI Innovators Greece Cyprus MaltaChris Papaphotis
 
Lean Digital Enterprise Evolution in a Hyper Connected World
Lean Digital Enterprise Evolution in a Hyper Connected World Lean Digital Enterprise Evolution in a Hyper Connected World
Lean Digital Enterprise Evolution in a Hyper Connected World VSR *
 
Capgemini UK - Evolution of risk_management
Capgemini UK - Evolution of risk_managementCapgemini UK - Evolution of risk_management
Capgemini UK - Evolution of risk_managementJelger Groenland
 
Athens Technology Center - Corporate profile
Athens Technology Center - Corporate profileAthens Technology Center - Corporate profile
Athens Technology Center - Corporate profileAthens Technology Center
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
Ganintegrate- Think Smart Integration brochure
Ganintegrate- Think Smart Integration brochure Ganintegrate- Think Smart Integration brochure
Ganintegrate- Think Smart Integration brochure Judith Mugeni
 
Icra Analytics limited
Icra Analytics limitedIcra Analytics limited
Icra Analytics limitedBobitaBiswas
 
FintechOS Corporate Deck 20.2
FintechOS Corporate Deck 20.2FintechOS Corporate Deck 20.2
FintechOS Corporate Deck 20.2Mariyan Dimitrov
 
What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?Jane Brewer
 
Digital Engineering: Top Three Imperatives for Banks and Financial Services C...
Digital Engineering: Top Three Imperatives for Banks and Financial Services C...Digital Engineering: Top Three Imperatives for Banks and Financial Services C...
Digital Engineering: Top Three Imperatives for Banks and Financial Services C...Cognizant
 
biid - NOAH17 London
biid - NOAH17 Londonbiid - NOAH17 London
biid - NOAH17 LondonNOAH Advisors
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxSymptai Consulting Limited
 
APIdays Singapore 2019 - Embrace transformation through FinTech collaboration...
APIdays Singapore 2019 - Embrace transformation through FinTech collaboration...APIdays Singapore 2019 - Embrace transformation through FinTech collaboration...
APIdays Singapore 2019 - Embrace transformation through FinTech collaboration...apidays
 

Similar to Getting Better at Risk Management Using Event Driven Mesh Architecture - Raghavan Sadagopan & Lakshmi Narayana, CapitalOne (20)

Critical API Partners: Business and IT
Critical API Partners: Business and ITCritical API Partners: Business and IT
Critical API Partners: Business and IT
 
Soluciones de Código Abierto - Perspectivas, Resultados y Soluciones de Valor
Soluciones de Código Abierto - Perspectivas, Resultados y Soluciones de ValorSoluciones de Código Abierto - Perspectivas, Resultados y Soluciones de Valor
Soluciones de Código Abierto - Perspectivas, Resultados y Soluciones de Valor
 
I-Bytes Financial services Industry
I-Bytes Financial services IndustryI-Bytes Financial services Industry
I-Bytes Financial services Industry
 
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
 
Microsoft AI Innovators Greece Cyprus Malta
Microsoft AI Innovators Greece Cyprus MaltaMicrosoft AI Innovators Greece Cyprus Malta
Microsoft AI Innovators Greece Cyprus Malta
 
Lean Digital Enterprise Evolution in a Hyper Connected World
Lean Digital Enterprise Evolution in a Hyper Connected World Lean Digital Enterprise Evolution in a Hyper Connected World
Lean Digital Enterprise Evolution in a Hyper Connected World
 
Capgemini UK - Evolution of risk_management
Capgemini UK - Evolution of risk_managementCapgemini UK - Evolution of risk_management
Capgemini UK - Evolution of risk_management
 
Athens Technology Center - Corporate profile
Athens Technology Center - Corporate profileAthens Technology Center - Corporate profile
Athens Technology Center - Corporate profile
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
The 10 recommended audit management solution providers, 2018
The 10 recommended audit management solution providers, 2018The 10 recommended audit management solution providers, 2018
The 10 recommended audit management solution providers, 2018
 
NGO Day 2014 歡迎辭
NGO Day 2014 歡迎辭NGO Day 2014 歡迎辭
NGO Day 2014 歡迎辭
 
Ganintegrate- Think Smart Integration brochure
Ganintegrate- Think Smart Integration brochure Ganintegrate- Think Smart Integration brochure
Ganintegrate- Think Smart Integration brochure
 
Icra Analytics limited
Icra Analytics limitedIcra Analytics limited
Icra Analytics limited
 
FintechOS Corporate Deck 20.2
FintechOS Corporate Deck 20.2FintechOS Corporate Deck 20.2
FintechOS Corporate Deck 20.2
 
What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?
 
Digital Engineering: Top Three Imperatives for Banks and Financial Services C...
Digital Engineering: Top Three Imperatives for Banks and Financial Services C...Digital Engineering: Top Three Imperatives for Banks and Financial Services C...
Digital Engineering: Top Three Imperatives for Banks and Financial Services C...
 
biid - NOAH17 London
biid - NOAH17 Londonbiid - NOAH17 London
biid - NOAH17 London
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 
APIdays Singapore 2019 - Embrace transformation through FinTech collaboration...
APIdays Singapore 2019 - Embrace transformation through FinTech collaboration...APIdays Singapore 2019 - Embrace transformation through FinTech collaboration...
APIdays Singapore 2019 - Embrace transformation through FinTech collaboration...
 

More from Nordic APIs

How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...Nordic APIs
 
The Art of API Design, by David Biesack at Apiture
The Art of API Design, by David Biesack at ApitureThe Art of API Design, by David Biesack at Apiture
The Art of API Design, by David Biesack at ApitureNordic APIs
 
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs? by Dav...
ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs? by Dav...ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs? by Dav...
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs? by Dav...Nordic APIs
 
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...Nordic APIs
 
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...Nordic APIs
 
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNLAPI Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNLNordic APIs
 
API Discovery from Crawl to Run - Rob Dickinson, Graylog
API Discovery from Crawl to Run - Rob Dickinson, GraylogAPI Discovery from Crawl to Run - Rob Dickinson, Graylog
API Discovery from Crawl to Run - Rob Dickinson, GraylogNordic APIs
 
Productizing and Monetizing APIs - Derric Gilling, Moseif
Productizing and Monetizing APIs - Derric Gilling, MoseifProductizing and Monetizing APIs - Derric Gilling, Moseif
Productizing and Monetizing APIs - Derric Gilling, MoseifNordic APIs
 
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, SipiosSecurely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, SipiosNordic APIs
 
Security of LLM APIs by Ankita Gupta, Akto.io
Security of LLM APIs by Ankita Gupta, Akto.ioSecurity of LLM APIs by Ankita Gupta, Akto.io
Security of LLM APIs by Ankita Gupta, Akto.ioNordic APIs
 
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...Nordic APIs
 
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...Nordic APIs
 
Reigniting the API Description Wars with TypeSpec and the Next Generation of ...
Reigniting the API Description Wars with TypeSpec and the Next Generation of...Reigniting the API Description Wars with TypeSpec and the Next Generation of...
Reigniting the API Description Wars with TypeSpec and the Next Generation of ...Nordic APIs
 
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAnyEstablish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAnyNordic APIs
 
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...Nordic APIs
 
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIsGoing Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIsNordic APIs
 
GenAI: Producing and Consuming APIs by Paul Dumas, Gartner
GenAI: Producing and Consuming APIs by Paul Dumas, GartnerGenAI: Producing and Consuming APIs by Paul Dumas, Gartner
GenAI: Producing and Consuming APIs by Paul Dumas, GartnerNordic APIs
 
The SAS developer portal – developer.sas.com 2.0: How we built it by Joe Furb...
The SAS developer portal –developer.sas.com 2.0: How we built it by Joe Furb...The SAS developer portal –developer.sas.com 2.0: How we built it by Joe Furb...
The SAS developer portal – developer.sas.com 2.0: How we built it by Joe Furb...Nordic APIs
 
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...Nordic APIs
 
cURL to SDK: Navigating the API Adoption Chasm - Sidney Maestre, APIMatic
cURL to SDK: Navigating the API Adoption Chasm - Sidney Maestre, APIMaticcURL to SDK: Navigating the API Adoption Chasm - Sidney Maestre, APIMatic
cURL to SDK: Navigating the API Adoption Chasm - Sidney Maestre, APIMaticNordic APIs
 

More from Nordic APIs (20)

How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
 
The Art of API Design, by David Biesack at Apiture
The Art of API Design, by David Biesack at ApitureThe Art of API Design, by David Biesack at Apiture
The Art of API Design, by David Biesack at Apiture
 
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs? by Dav...
ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs? by Dav...ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs? by Dav...
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs? by Dav...
 
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
 
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
 
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNLAPI Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
 
API Discovery from Crawl to Run - Rob Dickinson, Graylog
API Discovery from Crawl to Run - Rob Dickinson, GraylogAPI Discovery from Crawl to Run - Rob Dickinson, Graylog
API Discovery from Crawl to Run - Rob Dickinson, Graylog
 
Productizing and Monetizing APIs - Derric Gilling, Moseif
Productizing and Monetizing APIs - Derric Gilling, MoseifProductizing and Monetizing APIs - Derric Gilling, Moseif
Productizing and Monetizing APIs - Derric Gilling, Moseif
 
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, SipiosSecurely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
 
Security of LLM APIs by Ankita Gupta, Akto.io
Security of LLM APIs by Ankita Gupta, Akto.ioSecurity of LLM APIs by Ankita Gupta, Akto.io
Security of LLM APIs by Ankita Gupta, Akto.io
 
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
 
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
 
Reigniting the API Description Wars with TypeSpec and the Next Generation of ...
Reigniting the API Description Wars with TypeSpec and the Next Generation of...Reigniting the API Description Wars with TypeSpec and the Next Generation of...
Reigniting the API Description Wars with TypeSpec and the Next Generation of ...
 
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAnyEstablish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
 
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
 
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIsGoing Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
 
GenAI: Producing and Consuming APIs by Paul Dumas, Gartner
GenAI: Producing and Consuming APIs by Paul Dumas, GartnerGenAI: Producing and Consuming APIs by Paul Dumas, Gartner
GenAI: Producing and Consuming APIs by Paul Dumas, Gartner
 
The SAS developer portal – developer.sas.com 2.0: How we built it by Joe Furb...
The SAS developer portal –developer.sas.com 2.0: How we built it by Joe Furb...The SAS developer portal –developer.sas.com 2.0: How we built it by Joe Furb...
The SAS developer portal – developer.sas.com 2.0: How we built it by Joe Furb...
 
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
 
cURL to SDK: Navigating the API Adoption Chasm - Sidney Maestre, APIMatic
cURL to SDK: Navigating the API Adoption Chasm - Sidney Maestre, APIMaticcURL to SDK: Navigating the API Adoption Chasm - Sidney Maestre, APIMatic
cURL to SDK: Navigating the API Adoption Chasm - Sidney Maestre, APIMatic
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Getting Better at Risk Management Using Event Driven Mesh Architecture - Raghavan Sadagopan & Lakshmi Narayana, CapitalOne

  • 1. Public Getting better at Risk Management through Event Driven Mesh Architecture Raghavan Sadagopan & Lakshmi Narayana
  • 2. We recognized early on that the winners in banking will be great technology companies Shifted to 100% agile model for delivering software Began externalizing solutions developed internally Completed our move to the public cloud Modernized our data ecosystem on the cloud Began to modernize our architecture with RESTful APIs Became Open Source first Declared we are all in on the public cloud 2013 2014 2015 2016 2017 2020 2021
  • 3. We Are ● Tech is central to everything we do at Capital One: for nearly a decade, we have invested and invented like the very best technology companies ● Our world-class, in-house technology team now numbers 12,000+ people, most of which are engineers ● We're all in on the cloud like no other bank out there, which enables us to create exceptional, innovative experiences for our customers ● Advanced, automated DevOps and CI/CD approaches mean engineers spend more time at the top of the tech stack building new and unique digital banking experiences
  • 4. Cloud Computing In 2020, we left our data centers to create exceptional banking experiences for our customers, becoming the first bank to go all-in on the public cloud ○ Going all in on the cloud—and embracing cloud- native services like serverless computing— has enabled instant provisioning of infrastructure and rapid innovation ○ Today, we're using real-time, streaming data at scale, machine learning, and the power of the cloud to solve unique, challenging technology problems and deliver intelligent, personalized solutions that benefit millions of customers ○ Capital One Shopping, built in the cloud with microservices architecture and streaming data, helps customers save money shopping online by automatically finding lower prices, coupons and online credits
  • 5. Open Source Software Capital One made an “open source first” declaration in 2014 and that’s when we made our first contributions to the open source community. ○ We sponsor FINOS, Python, Continuous Delivery and the Cloud Native Computing Foundations to help keep open source sustainable ○ Capital One’s contributions to the open source community have been significant and we've released more than 40 of our own software projects ○ We’ve invested for years to build the culture and governance required to be open source-first in a highly regulated industry Featured Open Source Projects: Data Profiler, Rubicon-ML and Hygieia
  • 6. Want to learn more? ● Want to learn more about our Tech? Check out Capital One Tech to find out more about enterprise software solutions, ideas and stories. ● At Capital One, we celebrate and honor the differences that makes us all unique- inside and outside of work. Help us create a more equitable future for all! Join us! Visit Capital One Careers to view our open roles. ● Follow us on Twitter at CapitalOneTech
  • 7. • Basics of Risk Management • Event Mesh • Risk Management use cases • Point of view Architecture Agenda
  • 8. Public What is a Risk Management? Risk management is the process of identifying, assessing and controlling threats to an organization's capital, earnings and operations. These risks stem from a variety of sources, including financial uncertainties, legal liabilities, technology issues, strategic management errors, accidents and natural disasters. A successful risk management program helps an organization consider the full range of risks it faces. Risk management also examines the relationship between different types of business risks and the cascading impact they could have on an organization's strategic goals. Source: Blog from TechTarget.com
  • 9. Public Some basics of Risk Management as defined by the International Organization for Standardization (ISO) Objective result to be achieved Organization person or group of people that has its own functions with responsibilities, authorities and relationships to achieve its objectives Risk effect of uncertainty on objectives Risk Management coordinated activities to direct and control an organization with regard to risk Source: Risk management - Vocabulary (ISO 31073:2022)
  • 10. Public The first step to get better at Risk Management is to get better at identifying the risks Identify sources of the risk, areas of impact, events (including changes in circumstances) and their causes and potential consequences. In identifying the risk, consider these kinds of questions: • What could happen? • How could it happen? • Where could it happen? • Why might it happen? • What might be the impact?
  • 11. Public What is an Event-Driven Mesh Architecture(EDMA)? An event mesh is a communication layer that enables the seamless exchange of events (data/messages) between various applications, services, and systems in a distributed and decoupled manner. The primary purpose of an event mesh is to simplify and optimize event-driven communication within a complex ecosystem of applications.
  • 12. Public Using an event mesh for risk management can enhance the real-time monitoring, analysis, and response to potential risks within an organization Event Sources Identify various sources of events within your organization that may be related to risks. These sources can include financial data, security logs, market data, IoT devices, customer interactions, and more. Event Routing and Processing Implement an event mesh to efficiently route events from different sources to the appropriate risk management applications and services. The event mesh can handle the complex routing logic based on predefined rules. Real-time Monitoring Use the event mesh to provide real-time monitoring capabilities. Events related to potential risks can be continuously streamed to risk monitoring dashboards and analytics systems. Risk Detection Implement risk detection algorithms and models that analyze incoming events in real- time. These algorithms can identify patterns, anomalies, and indicators of potential risks. The event mesh ensures that relevant events are delivered promptly to the detection systems. Alerting and Notification Set up alerting mechanisms within your event mesh to notify risk managers or relevant stakeholders when a potential risk is detected. Alerts can be sent via various channels, such as email, SMS, or integration with collaboration tools. Compliance and Reporting Use the event mesh to facilitate compliance monitoring and reporting. It can capture and log events relevant to compliance requirements, making it easier to demonstrate adherence to regulations.
  • 13. Public Point of view Architecture
  • 14. Public Key Components of Event Driven Architecture Event Routers Event Consumer Event Consumers Events Event Consumer
  • 15. Public Implementing EDMA using modern AWS Serverless Technologies
  • 16. Public Building Scalable & High Resiliency Architecture Serverless Technologies Multi Availability Zone (AZ) deployment Multi Region Active / Active mode Enhanced Monitoring
  • 17. Public Benefits of Event Driven Architecture Scalability Fault Tolerance Loose Coupling Modularity Responsiveness Reduced Cost
  • 18. Public Best Practices of Event Driven Architecture Security Measures Event Contracts Event Sourcing Observability Documentation Governance Process

Editor's Notes

  1. https://www.techtarget.com/searchsecurity/definition/What-is-risk-management-and-why-is-it-important
  2. https://www.iso.org/obp/ui/en/#iso:std:iso:31073:ed-1:v1:en 3.1.2 objective result to be achieved Note 1 to entry: An objective can be strategic, tactical or operational. Note 2 to entry: Objectives can relate to different disciplines (such as financial, health and safety, and environmental goals) and can apply at different levels (such as strategic, organization-wide, project, product and process). Note 3 to entry: An objective can be expressed in other ways, e.g. as an intended outcome, a purpose, an operational criterion, as a management system objective, or by the use of other words with similar meaning (e.g. aim, goal, target). 3.1.1 risk effect of uncertainty (3.1.3) on objectives (3.1.2) Note 1 to entry: An effect is a deviation from the expected. It can be positive, negative or both, and can address, create or result in opportunities (3.3.23) and threats (3.3.13). Note 2 to entry: Objectives can have different aspects and categories, and can be applied at different levels. Note 3 to entry: Risk is usually expressed in terms of risk sources (3.3.10), potential events (3.3.11), their consequences (3.3.18) and their likelihood (3.3.16). 3.2.1 risk management coordinated activities to direct and control an organization (3.3.7) with regard to risk (3.1.1)
  3. Here's the image representing an event mesh for risk management in a futuristic and abstract style. It features a complex network of interconnected nodes and pathways, with neon colors highlighting the information flow and decision-making processes, set against a backdrop of cityscapes and corporate buildings. This visual captures the advanced technology and analytical insight associated with event mesh in risk management.
  4. Thanks Raghavan! As we saw in previous slides, Capital One is leveraging AWS to build modern applications. Any Event driven architecture typically consists of Event Producers, Event Routers and Event Consumers. A producer publishes an event to the router, which filters and pushes the events to consumers. Producer services and consumer services are decoupled, which allows them to be scaled, updated, and deployed independently.
  5. Implementing event driven using serverless technologies. Since we are talking about Risk Management and it’s a very complex system with several different types of users, system integrations, notifications , complex approval flow in each component. Here is the one of the ways to leverage modern serverless event driven mode using AWS event bridge as the router: Event Producers: Can be Risk Officers —> whose job is identifying Risk, Assessing Risk -> When an risk is identified, in the complex risk management eco system, we would like to have Target systems notified in certain conditions so that the systems act in a decoupled and reactive way. Rather than consumers polling data in a traditional way, now the events have become more reactive and leveraging Event bridge rules simplifies lot of boiler code and makes it easy to configure and scale the targets. IN future if we want to add a new system that listens to the High risk events —> we can pretty quick add the integration with low code solution.
  6. Serverless workloads like Fargate/ Lambdas/ Event Bridge inherently scale and handle failures gracefully. They are cost efficient, Zero server management, high availability and high performance. Global Endpoints by event bridge helps in resiliency as it maintains the replication and provides replay mechanism for our consumers Next One is Muti AZ Deployment - In an event of AZ1 failure - our application will be still operating. In case of Database write instance failure - AWS will takes care of promoting available Reader instance to master automatically. Multi Region Deployment - Active Active mode - We have deployed our infra in 2 regions and the compute layer here is taking traffic on both regions making it high availability. Enhanced Monitoring: The success of an application greatly relies on the importance of effective application monitoring. We use AWS CloudWatch - For application logs, Container insights AWS X-ray for distributed tracing w/ underlying services And Some external monitoring solutions. Given the critical nature of platforms, we conducted thorough and regular performance testing, adapting our infrastructure configurations to meet the specific requirements of our tenants.
  7. **Scalability:** EDA allows for horizontal scaling, as components can be independently scaled based on their event processing needs. This makes it easier to manage resource allocation and handle varying loads. **Loose Coupling:** Components are independent, reducing interdependence and improving system flexibility. This loose coupling facilitates easier changes, updates, and maintenance of individual components without impacting others. Simplified Communication. Modularity: The modular nature of EDA allows teams to develop, deploy, and update components independently, leading to faster iteration and innovation. **Resilience and Fault Tolerance:** The decoupled nature of EDA means that the failure of one component does not directly impact others. This isolation helps improve the overall system's resilience and fault tolerance. **Real-time Responsiveness:** EDA enables systems to respond immediately to events as they occur, making it ideal for applications that require real-time processing, such as fraud detection, IoT systems, and user interaction scenarios.Asynchronous Processing . Cost Reduction: Efficient Resource Utilization, Reduced Development and Maintenance Costs, Reduced Integration Costs, Automated Scaling
  8. Define Clear Event Contracts:** Establish well-defined contracts for events, including their structure, format, and metadata. This ensures consistency and interoperability across different components and services. Event Sourcing: Store events as a source of truth for system state. Monitoring and Logging: Implement robust monitoring and logging for effective debugging. Security Measures: Use encryption and authentication mechanisms to secure event communication. Documentation: Maintain comprehensive documentation for understanding event flows and system architecture