3. Introduction
• “Risk management is the process of identifying, evaluating,
assessing and controlling threats to an organization's capital
and earnings” [TechTarget.com]
3
10. Data Mining
• Pattern search
• Failure prediction of components or
machinery
• Fraud identification
• Analyzing past events
10
11. Cloud Computing
• Risk management applications as a service
• On demand use
• Lower cost
• More flexibility
• Higher resources
11
12. Internet of things
• RFID tags
• Assets monitoring
• Unlimited number of sources
• Collecting huge volumes of data
• Analyzing Data in real-time
• Reporting
12
13. Digital Image processing
• Convert into digital form and perform some operations
• Risk assessment for medical concerns (Cancer prediction)
• Predict natural disasters (Forest Fire)
13
14. Cyber Security
• Fast evolution of security risks
• Latest threats and malware
• Virus definitions
• Informations provided by leading providers
14
15. Artificial Intelligence
• Thinking, learning and predicting
• Freely available from Google, IBM, Microsoft
• Merging policies, procedures, controls,
regulators
• Improve compilance
15
16. Challenges
• Information technologies are risky
• Risk assessment for used technologies
• IT specialists assistance
• Privacy issues
• Higher cost
16
17. Summary
• Risk management: identify, evaluate, assess, control risks
• Highly influenced by the rise of information technologies
• Image processing, applications, IOT, Big Data, …
• Information technologies can be risky
• Risk of using IT in risk management
17
19. References(1/3)
• OCEG, “GRC Capability Model”, URL: https://go.oceg.org/grc-capability-model-red-book,Date accessed: 2017-12-25
• Thomas H. Stanton, “Enterprise Risk Management”, URL: https://www.youtube.com/watch?v=voGyHN-tWMg, Date accessed:
2017-12-25
• Beatrix Knopjes, “Why IoT is the future of integrated risk management”, URL:https://www.isometrix.com/iot-in-risk-management/,
Date accessed: 2017-12-25
• Hein Koen, “How the Internet of Things Benefits Risk Management”, URL: http://www.riskmanagementmonitor.com/how-the-
internet-of-things-benefits-risk-management/, Date accessed: 2017-12-25
• Margaret Rouse, “What is cybersecurity?”, URL: http://whatis.techtarget.com/definition/cybersecurity, Date accessed: 2017-12-25
• Martin Brown, “Data mining techniques”, URL: https://www.ibm.com/developerworks/library/ba-data-mining-techniques/, Date
accessed: 2017-12-23
• John Spacey, “7 types of risk inventory”, URL: https://simplicable.com/new/inventory-risk, Date accessed: 2017-12-24
• OCEG, “Risk Management is at the heart of GRC and Principled Performance”, URL: https://www.oceg.org/about/people-like-you-
risk/, Date accessed: 2017-12-26
• Tom Patterson, “The Use of Information Technology in Risk Management”, Date Published: Septembet-2015
• Michael Thoits, “Enterprise Risk Management Technology Solutions” , Date Published: 2009
19
20. References(2/3)
• Maryam Teymouria and Maryam Ashoori, “The impact of information technology on risk management”, Date Published: 2010
• Hamidi Tohidi, “The Role of Risk Management in IT systems of organizations” , Date Published: 2010
• ISO organization , “ISO 31000 - Risk management”, URL: https://www.iso.org/iso-31000-risk-management.html, Date accessed:
2017-12-26
• Douglas Stow, “Role of Remote Sensing and Image Processing for Fire Management”, URL: http://map.sdsu.edu/Notes/stow-
remotesensing.htm, Date accessed: 2017-12-26
• PRIYADARSHINI M HANAMARADDI, “A Literature Study on Image Processing for Forest Fire Detection” , Date Published: December-
2016
• C.A. Lipari and J.F. Head, “Advanced infrared image processing for breast cancer risk assessment”, Date Published: 1997-10-30
• EngineersGarage, “Introduction to image processing”, URL: https://www.engineersgarage.com/articles/image-processing-tutorial-
applications, Date accessed: 2017-12-26
• Margaret Rouse, “What is risk Management?”, URL: http://searchcompliance.techtarget.com/definition/risk-management , Date
accessed: 2017-12-23
• CORAS website, The CORAS method, URL: http://coras.sourceforge.net/, Date accessed: 2017-12-26
• Microsoft, “Microsoft Threat Modeling Tool 2016” , URL: https://www.microsoft.com/en-us/download/details.aspx?id=49168,
Date accessed: 2017-12-26
20
21. References(3/3)
• ICAR, “How does Big Data help with financial risk management?”, URL: https://www.icarvision.com/en/how-does-big-data-help-
with-financial-risk-management- , Date accessed: 2017-12-25
• CEPIS, “Cloud Computing Security and Privacy Issues”, URL: https://www.cepis.org/index.jsp?p=641&n=825&a=4758, Date
accessed: 2017-12-26
• Auer, S. R. and Bizer, C. and Kobilarov, G. and Lehmann, J. and Cyganiak, R. and Ives, Z. "DBpedia: A Nucleus for a Web of Open
Data", Date Published: 2007
• Enterprise Risk, “ARTIFICIAL INTELLIGENCE AND RISK MANAGEMENT”, URL: https://enterpriseriskmag.com/artificial-intelligence-
risk-management, Date accessed: 2017-12-27
• Bloomberg, “Artificial Intelligence is a game changer for risk management in finance”, URL:
https://www.bloomberg.com/professional/blog/artificial-intelligence-game-changer-risk-management-finance, Date accessed:
2017-12-27
21