SlideShare a Scribd company logo
1 of 21
How Information Technologies influenced
Risk Management
Plan
2
Summary
Challenges
Risk Management and IT technologies
Risk Informations
Introduction
Introduction
• “Risk management is the process of identifying, evaluating,
assessing and controlling threats to an organization's capital
and earnings” [TechTarget.com]
3
Risk informations
4
Inputs Tools and Techniques Outputs
- Policies
- Assets
- Threats
- Customers
- Market
- Goals
- Failures
…
- Plan
- Treatments
- Real-Time
Decisions
…
- Analysis
- Reporting
…
Risk Management and IT
5
Basic Risk visualization programs
6
Social Media
• Customer service
• Product quality
• Service delivery issues
• Customer feedback
• Competitors products
7
Open Data
8
Data Integration and Analytics
• ETL
• Integration
• Apply algorithms
• Calculate Risk score
• Predictive Models
• Details analysis
9
Data Mining
• Pattern search
• Failure prediction of components or
machinery
• Fraud identification
• Analyzing past events
10
Cloud Computing
• Risk management applications as a service
• On demand use
• Lower cost
• More flexibility
• Higher resources
11
Internet of things
• RFID tags
• Assets monitoring
• Unlimited number of sources
• Collecting huge volumes of data
• Analyzing Data in real-time
• Reporting
12
Digital Image processing
• Convert into digital form and perform some operations
• Risk assessment for medical concerns (Cancer prediction)
• Predict natural disasters (Forest Fire)
13
Cyber Security
• Fast evolution of security risks
• Latest threats and malware
• Virus definitions
• Informations provided by leading providers
14
Artificial Intelligence
• Thinking, learning and predicting
• Freely available from Google, IBM, Microsoft
• Merging policies, procedures, controls,
regulators
• Improve compilance
15
Challenges
• Information technologies are risky
• Risk assessment for used technologies
• IT specialists assistance
• Privacy issues
• Higher cost
16
Summary
• Risk management: identify, evaluate, assess, control risks
• Highly influenced by the rise of information technologies
• Image processing, applications, IOT, Big Data, …
• Information technologies can be risky
• Risk of using IT in risk management
17
Thank You
References(1/3)
• OCEG, “GRC Capability Model”, URL: https://go.oceg.org/grc-capability-model-red-book,Date accessed: 2017-12-25
• Thomas H. Stanton, “Enterprise Risk Management”, URL: https://www.youtube.com/watch?v=voGyHN-tWMg, Date accessed:
2017-12-25
• Beatrix Knopjes, “Why IoT is the future of integrated risk management”, URL:https://www.isometrix.com/iot-in-risk-management/,
Date accessed: 2017-12-25
• Hein Koen, “How the Internet of Things Benefits Risk Management”, URL: http://www.riskmanagementmonitor.com/how-the-
internet-of-things-benefits-risk-management/, Date accessed: 2017-12-25
• Margaret Rouse, “What is cybersecurity?”, URL: http://whatis.techtarget.com/definition/cybersecurity, Date accessed: 2017-12-25
• Martin Brown, “Data mining techniques”, URL: https://www.ibm.com/developerworks/library/ba-data-mining-techniques/, Date
accessed: 2017-12-23
• John Spacey, “7 types of risk inventory”, URL: https://simplicable.com/new/inventory-risk, Date accessed: 2017-12-24
• OCEG, “Risk Management is at the heart of GRC and Principled Performance”, URL: https://www.oceg.org/about/people-like-you-
risk/, Date accessed: 2017-12-26
• Tom Patterson, “The Use of Information Technology in Risk Management”, Date Published: Septembet-2015
• Michael Thoits, “Enterprise Risk Management Technology Solutions” , Date Published: 2009
19
References(2/3)
• Maryam Teymouria and Maryam Ashoori, “The impact of information technology on risk management”, Date Published: 2010
• Hamidi Tohidi, “The Role of Risk Management in IT systems of organizations” , Date Published: 2010
• ISO organization , “ISO 31000 - Risk management”, URL: https://www.iso.org/iso-31000-risk-management.html, Date accessed:
2017-12-26
• Douglas Stow, “Role of Remote Sensing and Image Processing for Fire Management”, URL: http://map.sdsu.edu/Notes/stow-
remotesensing.htm, Date accessed: 2017-12-26
• PRIYADARSHINI M HANAMARADDI, “A Literature Study on Image Processing for Forest Fire Detection” , Date Published: December-
2016
• C.A. Lipari and J.F. Head, “Advanced infrared image processing for breast cancer risk assessment”, Date Published: 1997-10-30
• EngineersGarage, “Introduction to image processing”, URL: https://www.engineersgarage.com/articles/image-processing-tutorial-
applications, Date accessed: 2017-12-26
• Margaret Rouse, “What is risk Management?”, URL: http://searchcompliance.techtarget.com/definition/risk-management , Date
accessed: 2017-12-23
• CORAS website, The CORAS method, URL: http://coras.sourceforge.net/, Date accessed: 2017-12-26
• Microsoft, “Microsoft Threat Modeling Tool 2016” , URL: https://www.microsoft.com/en-us/download/details.aspx?id=49168,
Date accessed: 2017-12-26
20
References(3/3)
• ICAR, “How does Big Data help with financial risk management?”, URL: https://www.icarvision.com/en/how-does-big-data-help-
with-financial-risk-management- , Date accessed: 2017-12-25
• CEPIS, “Cloud Computing Security and Privacy Issues”, URL: https://www.cepis.org/index.jsp?p=641&n=825&a=4758, Date
accessed: 2017-12-26
• Auer, S. R. and Bizer, C. and Kobilarov, G. and Lehmann, J. and Cyganiak, R. and Ives, Z. "DBpedia: A Nucleus for a Web of Open
Data", Date Published: 2007
• Enterprise Risk, “ARTIFICIAL INTELLIGENCE AND RISK MANAGEMENT”, URL: https://enterpriseriskmag.com/artificial-intelligence-
risk-management, Date accessed: 2017-12-27
• Bloomberg, “Artificial Intelligence is a game changer for risk management in finance”, URL:
https://www.bloomberg.com/professional/blog/artificial-intelligence-game-changer-risk-management-finance, Date accessed:
2017-12-27
21

More Related Content

What's hot

IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)Priya Tomar
 
Risk identification
Risk identificationRisk identification
Risk identificationmurukkada
 
Project Risk Management - PMBOK5
Project Risk Management - PMBOK5Project Risk Management - PMBOK5
Project Risk Management - PMBOK5pankajsh10
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesSlideTeam
 
Information Technology Risk Management
Information Technology Risk ManagementInformation Technology Risk Management
Information Technology Risk ManagementGlen Alleman
 
PMP Training - 11 project risk management
PMP Training - 11 project risk managementPMP Training - 11 project risk management
PMP Training - 11 project risk managementejlp12
 
Risk Identification.ppt
Risk Identification.pptRisk Identification.ppt
Risk Identification.pptAvicenna6
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Shashi Kumar
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk ManagementPYA, P.C.
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Information Technology Project Management - part 02
Information Technology Project Management - part 02Information Technology Project Management - part 02
Information Technology Project Management - part 02Rizwan Khurram
 
Risk Management
Risk ManagementRisk Management
Risk Managementcgeorgeo
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Step by step guide on project risk management
Step by step guide on project risk managementStep by step guide on project risk management
Step by step guide on project risk managementPMC Mentor
 

What's hot (20)

IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Risk identification
Risk identificationRisk identification
Risk identification
 
Project Risk Management - PMBOK5
Project Risk Management - PMBOK5Project Risk Management - PMBOK5
Project Risk Management - PMBOK5
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation Slides
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 
Information Technology Risk Management
Information Technology Risk ManagementInformation Technology Risk Management
Information Technology Risk Management
 
PMP Training - 11 project risk management
PMP Training - 11 project risk managementPMP Training - 11 project risk management
PMP Training - 11 project risk management
 
Risk Identification.ppt
Risk Identification.pptRisk Identification.ppt
Risk Identification.ppt
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Information Technology Project Management - part 02
Information Technology Project Management - part 02Information Technology Project Management - part 02
Information Technology Project Management - part 02
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Step by step guide on project risk management
Step by step guide on project risk managementStep by step guide on project risk management
Step by step guide on project risk management
 

Similar to Risk management and IT technologies

Crowdsourcing Approaches to Big Data Curation - Rio Big Data Meetup
Crowdsourcing Approaches to Big Data Curation - Rio Big Data MeetupCrowdsourcing Approaches to Big Data Curation - Rio Big Data Meetup
Crowdsourcing Approaches to Big Data Curation - Rio Big Data MeetupEdward Curry
 
The Analytics and Data Science Landscape
The Analytics and Data Science LandscapeThe Analytics and Data Science Landscape
The Analytics and Data Science LandscapePhilip Bourne
 
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Joanne Luciano
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES.eu
 
poem_presentation_v5_linkedIn_version
poem_presentation_v5_linkedIn_versionpoem_presentation_v5_linkedIn_version
poem_presentation_v5_linkedIn_versionIliada Eleftheriou
 
Fixing data science & Accelerating Artificial Super Intelligence Development
 Fixing data science & Accelerating Artificial Super Intelligence Development Fixing data science & Accelerating Artificial Super Intelligence Development
Fixing data science & Accelerating Artificial Super Intelligence DevelopmentManojKumarR41
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...Aggregage
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Driven Innovation
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksLiming Zhu
 
Minne analytics presentation 2018 12 03 final compressed
Minne analytics presentation 2018 12 03 final   compressedMinne analytics presentation 2018 12 03 final   compressed
Minne analytics presentation 2018 12 03 final compressedBonnie Holub
 
Opportunities and methodological challenges of Big Data for official statist...
Opportunities and methodological challenges of  Big Data for official statist...Opportunities and methodological challenges of  Big Data for official statist...
Opportunities and methodological challenges of Big Data for official statist...Piet J.H. Daas
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Issue challenges and future scope of big data.pptx
Issue challenges and future scope of big data.pptxIssue challenges and future scope of big data.pptx
Issue challenges and future scope of big data.pptxEsmailRahmani1
 
Minne analytics presentation 2018 12 03 final compressed
Minne analytics presentation 2018 12 03 final   compressedMinne analytics presentation 2018 12 03 final   compressed
Minne analytics presentation 2018 12 03 final compressedBonnie Holub
 
Data Governance in the Big Data Era
Data Governance in the Big Data EraData Governance in the Big Data Era
Data Governance in the Big Data EraPieter De Leenheer
 
Algorithmic Systems Transparency and Accountability in Big Data & Cognitive Era
Algorithmic Systems Transparency and Accountability in Big Data & Cognitive EraAlgorithmic Systems Transparency and Accountability in Big Data & Cognitive Era
Algorithmic Systems Transparency and Accountability in Big Data & Cognitive EraNozha Boujemaa
 

Similar to Risk management and IT technologies (20)

Crowdsourcing Approaches to Big Data Curation - Rio Big Data Meetup
Crowdsourcing Approaches to Big Data Curation - Rio Big Data MeetupCrowdsourcing Approaches to Big Data Curation - Rio Big Data Meetup
Crowdsourcing Approaches to Big Data Curation - Rio Big Data Meetup
 
The Analytics and Data Science Landscape
The Analytics and Data Science LandscapeThe Analytics and Data Science Landscape
The Analytics and Data Science Landscape
 
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
 
poem_presentation_v5_linkedIn_version
poem_presentation_v5_linkedIn_versionpoem_presentation_v5_linkedIn_version
poem_presentation_v5_linkedIn_version
 
Fixing data science & Accelerating Artificial Super Intelligence Development
 Fixing data science & Accelerating Artificial Super Intelligence Development Fixing data science & Accelerating Artificial Super Intelligence Development
Fixing data science & Accelerating Artificial Super Intelligence Development
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security Intelligence
 
Big Data in FinTech
Big Data in FinTechBig Data in FinTech
Big Data in FinTech
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risks
 
Minne analytics presentation 2018 12 03 final compressed
Minne analytics presentation 2018 12 03 final   compressedMinne analytics presentation 2018 12 03 final   compressed
Minne analytics presentation 2018 12 03 final compressed
 
Opportunities and methodological challenges of Big Data for official statist...
Opportunities and methodological challenges of  Big Data for official statist...Opportunities and methodological challenges of  Big Data for official statist...
Opportunities and methodological challenges of Big Data for official statist...
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Issue challenges and future scope of big data.pptx
Issue challenges and future scope of big data.pptxIssue challenges and future scope of big data.pptx
Issue challenges and future scope of big data.pptx
 
Minne analytics presentation 2018 12 03 final compressed
Minne analytics presentation 2018 12 03 final   compressedMinne analytics presentation 2018 12 03 final   compressed
Minne analytics presentation 2018 12 03 final compressed
 
Data Governance in the Big Data Era
Data Governance in the Big Data EraData Governance in the Big Data Era
Data Governance in the Big Data Era
 
Algorithmic Systems Transparency and Accountability in Big Data & Cognitive Era
Algorithmic Systems Transparency and Accountability in Big Data & Cognitive EraAlgorithmic Systems Transparency and Accountability in Big Data & Cognitive Era
Algorithmic Systems Transparency and Accountability in Big Data & Cognitive Era
 

More from Hadi Fadlallah

RaDEn : A Scalable and Efficient Platform for Engineering Radiation Data
RaDEn :  A Scalable and Efficient Platform for Engineering Radiation DataRaDEn :  A Scalable and Efficient Platform for Engineering Radiation Data
RaDEn : A Scalable and Efficient Platform for Engineering Radiation DataHadi Fadlallah
 
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...Hadi Fadlallah
 
What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?Hadi Fadlallah
 
Introduction to Data Engineering
Introduction to Data EngineeringIntroduction to Data Engineering
Introduction to Data EngineeringHadi Fadlallah
 
An introduction to Business intelligence
An introduction to Business intelligenceAn introduction to Business intelligence
An introduction to Business intelligenceHadi Fadlallah
 
Big data lab as a service
Big data lab as a serviceBig data lab as a service
Big data lab as a serviceHadi Fadlallah
 
Cloud computing pricing models
Cloud computing pricing modelsCloud computing pricing models
Cloud computing pricing modelsHadi Fadlallah
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challengesHadi Fadlallah
 
Secure Aware Routing Protocol
Secure Aware Routing ProtocolSecure Aware Routing Protocol
Secure Aware Routing ProtocolHadi Fadlallah
 
Penetration testing in wireless network
Penetration testing in wireless networkPenetration testing in wireless network
Penetration testing in wireless networkHadi Fadlallah
 
Dhcp authentication using certificates
Dhcp authentication using certificatesDhcp authentication using certificates
Dhcp authentication using certificatesHadi Fadlallah
 
Introduction to Data mining
Introduction to Data miningIntroduction to Data mining
Introduction to Data miningHadi Fadlallah
 
Sql parametrized queries
Sql parametrized queriesSql parametrized queries
Sql parametrized queriesHadi Fadlallah
 
Introduction to software testing
Introduction to software testingIntroduction to software testing
Introduction to software testingHadi Fadlallah
 

More from Hadi Fadlallah (20)

RaDEn : A Scalable and Efficient Platform for Engineering Radiation Data
RaDEn :  A Scalable and Efficient Platform for Engineering Radiation DataRaDEn :  A Scalable and Efficient Platform for Engineering Radiation Data
RaDEn : A Scalable and Efficient Platform for Engineering Radiation Data
 
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
 
What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?
 
Introduction to Data Engineering
Introduction to Data EngineeringIntroduction to Data Engineering
Introduction to Data Engineering
 
An introduction to Business intelligence
An introduction to Business intelligenceAn introduction to Business intelligence
An introduction to Business intelligence
 
Big data lab as a service
Big data lab as a serviceBig data lab as a service
Big data lab as a service
 
Fog computing
Fog computingFog computing
Fog computing
 
Inertial sensors
Inertial sensors Inertial sensors
Inertial sensors
 
Big Data Integration
Big Data IntegrationBig Data Integration
Big Data Integration
 
Cloud computing pricing models
Cloud computing pricing modelsCloud computing pricing models
Cloud computing pricing models
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
 
Marketing Mobile
Marketing MobileMarketing Mobile
Marketing Mobile
 
Secure Aware Routing Protocol
Secure Aware Routing ProtocolSecure Aware Routing Protocol
Secure Aware Routing Protocol
 
Bhopal disaster
Bhopal disasterBhopal disaster
Bhopal disaster
 
Penetration testing in wireless network
Penetration testing in wireless networkPenetration testing in wireless network
Penetration testing in wireless network
 
Cyber propaganda
Cyber propagandaCyber propaganda
Cyber propaganda
 
Dhcp authentication using certificates
Dhcp authentication using certificatesDhcp authentication using certificates
Dhcp authentication using certificates
 
Introduction to Data mining
Introduction to Data miningIntroduction to Data mining
Introduction to Data mining
 
Sql parametrized queries
Sql parametrized queriesSql parametrized queries
Sql parametrized queries
 
Introduction to software testing
Introduction to software testingIntroduction to software testing
Introduction to software testing
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Risk management and IT technologies

  • 1. How Information Technologies influenced Risk Management
  • 2. Plan 2 Summary Challenges Risk Management and IT technologies Risk Informations Introduction
  • 3. Introduction • “Risk management is the process of identifying, evaluating, assessing and controlling threats to an organization's capital and earnings” [TechTarget.com] 3
  • 4. Risk informations 4 Inputs Tools and Techniques Outputs - Policies - Assets - Threats - Customers - Market - Goals - Failures … - Plan - Treatments - Real-Time Decisions … - Analysis - Reporting …
  • 7. Social Media • Customer service • Product quality • Service delivery issues • Customer feedback • Competitors products 7
  • 9. Data Integration and Analytics • ETL • Integration • Apply algorithms • Calculate Risk score • Predictive Models • Details analysis 9
  • 10. Data Mining • Pattern search • Failure prediction of components or machinery • Fraud identification • Analyzing past events 10
  • 11. Cloud Computing • Risk management applications as a service • On demand use • Lower cost • More flexibility • Higher resources 11
  • 12. Internet of things • RFID tags • Assets monitoring • Unlimited number of sources • Collecting huge volumes of data • Analyzing Data in real-time • Reporting 12
  • 13. Digital Image processing • Convert into digital form and perform some operations • Risk assessment for medical concerns (Cancer prediction) • Predict natural disasters (Forest Fire) 13
  • 14. Cyber Security • Fast evolution of security risks • Latest threats and malware • Virus definitions • Informations provided by leading providers 14
  • 15. Artificial Intelligence • Thinking, learning and predicting • Freely available from Google, IBM, Microsoft • Merging policies, procedures, controls, regulators • Improve compilance 15
  • 16. Challenges • Information technologies are risky • Risk assessment for used technologies • IT specialists assistance • Privacy issues • Higher cost 16
  • 17. Summary • Risk management: identify, evaluate, assess, control risks • Highly influenced by the rise of information technologies • Image processing, applications, IOT, Big Data, … • Information technologies can be risky • Risk of using IT in risk management 17
  • 19. References(1/3) • OCEG, “GRC Capability Model”, URL: https://go.oceg.org/grc-capability-model-red-book,Date accessed: 2017-12-25 • Thomas H. Stanton, “Enterprise Risk Management”, URL: https://www.youtube.com/watch?v=voGyHN-tWMg, Date accessed: 2017-12-25 • Beatrix Knopjes, “Why IoT is the future of integrated risk management”, URL:https://www.isometrix.com/iot-in-risk-management/, Date accessed: 2017-12-25 • Hein Koen, “How the Internet of Things Benefits Risk Management”, URL: http://www.riskmanagementmonitor.com/how-the- internet-of-things-benefits-risk-management/, Date accessed: 2017-12-25 • Margaret Rouse, “What is cybersecurity?”, URL: http://whatis.techtarget.com/definition/cybersecurity, Date accessed: 2017-12-25 • Martin Brown, “Data mining techniques”, URL: https://www.ibm.com/developerworks/library/ba-data-mining-techniques/, Date accessed: 2017-12-23 • John Spacey, “7 types of risk inventory”, URL: https://simplicable.com/new/inventory-risk, Date accessed: 2017-12-24 • OCEG, “Risk Management is at the heart of GRC and Principled Performance”, URL: https://www.oceg.org/about/people-like-you- risk/, Date accessed: 2017-12-26 • Tom Patterson, “The Use of Information Technology in Risk Management”, Date Published: Septembet-2015 • Michael Thoits, “Enterprise Risk Management Technology Solutions” , Date Published: 2009 19
  • 20. References(2/3) • Maryam Teymouria and Maryam Ashoori, “The impact of information technology on risk management”, Date Published: 2010 • Hamidi Tohidi, “The Role of Risk Management in IT systems of organizations” , Date Published: 2010 • ISO organization , “ISO 31000 - Risk management”, URL: https://www.iso.org/iso-31000-risk-management.html, Date accessed: 2017-12-26 • Douglas Stow, “Role of Remote Sensing and Image Processing for Fire Management”, URL: http://map.sdsu.edu/Notes/stow- remotesensing.htm, Date accessed: 2017-12-26 • PRIYADARSHINI M HANAMARADDI, “A Literature Study on Image Processing for Forest Fire Detection” , Date Published: December- 2016 • C.A. Lipari and J.F. Head, “Advanced infrared image processing for breast cancer risk assessment”, Date Published: 1997-10-30 • EngineersGarage, “Introduction to image processing”, URL: https://www.engineersgarage.com/articles/image-processing-tutorial- applications, Date accessed: 2017-12-26 • Margaret Rouse, “What is risk Management?”, URL: http://searchcompliance.techtarget.com/definition/risk-management , Date accessed: 2017-12-23 • CORAS website, The CORAS method, URL: http://coras.sourceforge.net/, Date accessed: 2017-12-26 • Microsoft, “Microsoft Threat Modeling Tool 2016” , URL: https://www.microsoft.com/en-us/download/details.aspx?id=49168, Date accessed: 2017-12-26 20
  • 21. References(3/3) • ICAR, “How does Big Data help with financial risk management?”, URL: https://www.icarvision.com/en/how-does-big-data-help- with-financial-risk-management- , Date accessed: 2017-12-25 • CEPIS, “Cloud Computing Security and Privacy Issues”, URL: https://www.cepis.org/index.jsp?p=641&n=825&a=4758, Date accessed: 2017-12-26 • Auer, S. R. and Bizer, C. and Kobilarov, G. and Lehmann, J. and Cyganiak, R. and Ives, Z. "DBpedia: A Nucleus for a Web of Open Data", Date Published: 2007 • Enterprise Risk, “ARTIFICIAL INTELLIGENCE AND RISK MANAGEMENT”, URL: https://enterpriseriskmag.com/artificial-intelligence- risk-management, Date accessed: 2017-12-27 • Bloomberg, “Artificial Intelligence is a game changer for risk management in finance”, URL: https://www.bloomberg.com/professional/blog/artificial-intelligence-game-changer-risk-management-finance, Date accessed: 2017-12-27 21