SlideShare a Scribd company logo
1 of 34
Download to read offline
Transforming the
Way We Learn.
Mahesh
1
2 Agenda
Trends in Learning
3
IT Risk Pro Game
2
Welcome to the latest
pedagogy!
1
3 Emerging Trends in Learning
MOOCs
3
Personalized Learning
2
Flipped Classrooms
4 MOOCs - Challenges
<5% completion
rate on average!
Content Access
Experience??
Coursera Completion Rate
5 In Summary…
KNOWLEDGE SKILL
ACTION ??
6 Before Flying…
Diminishing Attention Spans…7
8 Maslow’s Hierarchy
TRADITIONAL
Maslow’s Hierarchy
THE CURRENT MODEL…
9
So, what’s the solution…?
Gamifying learning?11
Gamifying learning?12
…No, Context is crucial!13
What we came up with…
IT Risk Pro Simulation15
Organizational ‘Thinking’16
IT Risk Pro Simulation17
Ready to Manage Risks of a Company?
18
19
Feels Familiar?19
Risk / Reward Ratios
20
PROCESS IMPROVEMENT EXPERIMENTS
RENEWAL TRANSFORMATION
Short-term profitability Long term growth
Shared
Infrastructure
Business
Solutions
20
Characterizing IT investments
21
Investment Type Drivers Sample initiatives
Transformation A core infrastructure that is
inadequate for desired business
model
- ERP implementation
- Building data warehouses
- Implementing middleware
layer
Renewal Opportunity to reduce cost or
raise quality of IT service
Upgrading technology standards
Retiring outdated systems and
technologies
Process improvement Opportunity to improve
operational performance
Employee self serve
Streamlining IT processes
Experiments New technologies, new ideas,
new processes, new business
models
Testing demand for new
products
Testing pricing strategy
21
22
Risks in an IT environment22
Value of Information
23
The value of information comes from the characteristics it possesses:
• Availability
• Accuracy
• Authenticity
• Confidentiality
• Integrity
• Utility
• Possession
23
Valuing Information
24
• Information value grows with use
• Information value is not stable
•
Information value grows with accuracy
•
Information increases in value when combined with other
information
•
Information value does not drop with use
24
25
Risk Assessment
Qualitative Risk Assessment
Risk is defined in subjective, qualitative terms due to the uncertainty in likelihood and impact
values.
Difficulties
1.Evaluating likelihood and impact of risks qualitatively, without bias.
2.Same scales to be used in the assessment of multiple risks
25
Risk Management Strategies
26
Mitigation
Fix the flaw or provide compensatory control to reduce the likelihood or impact associated
with the flaw.
Transference
Transference is the process of allowing another party to accept the risk on your behalf.
This does not decrease the likelihood or fix any flaws, but it does reduce the overall impact
on the organization.
Acceptance
Acceptance is the practice of simply allowing the system to operate with known risks.
Avoidance
Avoidance is the practice of removing the vulnerability of the system or remove the
system itself.
26
Summary
• Risk / Reward Ratio
• Create a portfolio of risks
• Develop a risk management plan
27
• MOOCs and e-learning good for democratizing content but
lack experience
• Use Experience to motivate
• Immersive gamification to engage with audience better
• Provides a safe learning environment for managers
• Converting a 2x2 matrix into an immersive game that
managers can play and learn at the same time
Key Takeaways28
Thank You
“To Experience is to Learn. Everything else is
just information.”
Our Philosophy
29
Appendix
30
Co{de}tective!31
Our Offerings
32
We have three core experiential learning offerings -
1 2 3
Products Programs Pillars
32
Our Products
33
We enable continuous learning through a portfolio of experiential learning products
1
3
2
4
Business Simulation Animated Video Based Learning
Casestudy Platforms Gamified e-Learning Capsules
33
Our Programs
34
We offer 20+ off the shelf experiential learning training programs
Some of our simulation based training programs run by us under the four major themes -
• Leading Successful Change
• The Adaptive Leadership Program
• Leading Without Authority
• Influencing Skills
• Big Picture Thinking
• Achieving Excellence in Strategy Execution
Leadership and Strategy
• Managing Projects for High Impact
• Technology Risk Management
• Managing Technology Transformation
• Governing IT for Value Maximization
Technology Management
• Financial Acumen for Non-finance
Managers
Finance and Accounting • Leading successful Sales Teams
• Consultative Selling
• Advance B2B Marketing
Sales and Marketing
34

More Related Content

What's hot

Microsoft Risk Management
Microsoft Risk ManagementMicrosoft Risk Management
Microsoft Risk ManagementUlukman Mamytov
 
Security risk management
Security risk managementSecurity risk management
Security risk managementbrijesh singh
 
The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in businessr2financial
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentBradley Susser
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk managementG3 intelligence Ltd
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachPECB
 
How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsResolver Inc.
 
Risk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsRisk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsIT-Toolkits.org
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
The Purpose of Holistic Risk Management
The Purpose of Holistic Risk ManagementThe Purpose of Holistic Risk Management
The Purpose of Holistic Risk ManagementCorporater
 
Operational Risk Management and Bpm
Operational Risk Management and BpmOperational Risk Management and Bpm
Operational Risk Management and BpmNathaniel Palmer
 
Directory: Regulatory & Risk Data
Directory: Regulatory & Risk DataDirectory: Regulatory & Risk Data
Directory: Regulatory & Risk DataConor Coughlan
 
Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000PECB
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk managementSubhendu Datta
 
Introduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsIntroduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsToño Herrera
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field Resolver Inc.
 

What's hot (20)

IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Microsoft Risk Management
Microsoft Risk ManagementMicrosoft Risk Management
Microsoft Risk Management
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in business
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
Risk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsRisk Management & Information Security Management Systems
Risk Management & Information Security Management Systems
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
The Purpose of Holistic Risk Management
The Purpose of Holistic Risk ManagementThe Purpose of Holistic Risk Management
The Purpose of Holistic Risk Management
 
Operational Risk Management and Bpm
Operational Risk Management and BpmOperational Risk Management and Bpm
Operational Risk Management and Bpm
 
Directory: Regulatory & Risk Data
Directory: Regulatory & Risk DataDirectory: Regulatory & Risk Data
Directory: Regulatory & Risk Data
 
Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk management
 
Integrated risk management
Integrated risk managementIntegrated risk management
Integrated risk management
 
Risk management
Risk managementRisk management
Risk management
 
Introduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsIntroduction to Risk Management Fundamentals
Introduction to Risk Management Fundamentals
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field
 

Similar to Technology Risk Management Simulation - Mahesh

Lscon16 414 Gaining Executive Buy-in For Your Learning Ecosystem
Lscon16 414 Gaining Executive Buy-in For Your Learning EcosystemLscon16 414 Gaining Executive Buy-in For Your Learning Ecosystem
Lscon16 414 Gaining Executive Buy-in For Your Learning EcosystemJohn Delano
 
Trainers Matter: Making the Case for VILT
Trainers Matter: Making the Case for VILTTrainers Matter: Making the Case for VILT
Trainers Matter: Making the Case for VILTCynthia Clay
 
How to integrate learning in my daily (working) life
How to integrate learning in my daily (working) lifeHow to integrate learning in my daily (working) life
How to integrate learning in my daily (working) lifeJoël Krapf
 
Training for Results Webinar 2016
Training for Results Webinar 2016Training for Results Webinar 2016
Training for Results Webinar 2016KineoPacific
 
Are we Prepared for Scrum Master’s Role in COVID-19 Outbreak?
Are we Prepared for Scrum Master’s Role in COVID-19 Outbreak?Are we Prepared for Scrum Master’s Role in COVID-19 Outbreak?
Are we Prepared for Scrum Master’s Role in COVID-19 Outbreak?Invensis Learning
 
Fundamentals of Agile
Fundamentals of AgileFundamentals of Agile
Fundamentals of Agilesparkagility
 
2012 catalog-no-pricing
2012 catalog-no-pricing2012 catalog-no-pricing
2012 catalog-no-pricingISTAdmin
 
Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017Alexei Sidorenko, CRMP
 
EMERGING TRENDS IN TRAINING AND DEVELOPMENT
EMERGING TRENDS IN TRAINING AND DEVELOPMENT EMERGING TRENDS IN TRAINING AND DEVELOPMENT
EMERGING TRENDS IN TRAINING AND DEVELOPMENT Ashley D
 
Learn iT 2016 Catalog
Learn iT 2016 CatalogLearn iT 2016 Catalog
Learn iT 2016 CatalogJamie Tadlock
 
Transition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the DeskTransition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the DeskCynthia Clay
 
Transition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the DeskTransition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the DeskCynthia Clay
 
Skilldom corporate
Skilldom corporateSkilldom corporate
Skilldom corporateSkilldom
 
L&D Needs to Build Ecosystems for the Future of Work
L&D Needs to Build Ecosystems for the Future of WorkL&D Needs to Build Ecosystems for the Future of Work
L&D Needs to Build Ecosystems for the Future of WorkLearningCafe
 
How Modernized Training Is Influencing the Banking Industry
How Modernized Training Is Influencing the Banking IndustryHow Modernized Training Is Influencing the Banking Industry
How Modernized Training Is Influencing the Banking IndustryColleen Beck-Domanico
 
Strategies to adapt to the new normal in higher education
Strategies to adapt to the new normal in higher educationStrategies to adapt to the new normal in higher education
Strategies to adapt to the new normal in higher educationCollegiate Project Services
 
Data Science and Artificial Intelligence course offered by Securium Academy ...
Data Science and Artificial Intelligence  course offered by Securium Academy ...Data Science and Artificial Intelligence  course offered by Securium Academy ...
Data Science and Artificial Intelligence course offered by Securium Academy ...Securium Academy
 
ITSM BKK #2: Business Simulation and Gamification for ITSM
ITSM BKK #2: Business Simulation and Gamification for ITSMITSM BKK #2: Business Simulation and Gamification for ITSM
ITSM BKK #2: Business Simulation and Gamification for ITSMGonzague PATINIER
 

Similar to Technology Risk Management Simulation - Mahesh (20)

Lscon16 414 Gaining Executive Buy-in For Your Learning Ecosystem
Lscon16 414 Gaining Executive Buy-in For Your Learning EcosystemLscon16 414 Gaining Executive Buy-in For Your Learning Ecosystem
Lscon16 414 Gaining Executive Buy-in For Your Learning Ecosystem
 
Trainers Matter: Making the Case for VILT
Trainers Matter: Making the Case for VILTTrainers Matter: Making the Case for VILT
Trainers Matter: Making the Case for VILT
 
How to integrate learning in my daily (working) life
How to integrate learning in my daily (working) lifeHow to integrate learning in my daily (working) life
How to integrate learning in my daily (working) life
 
Training for Results Webinar 2016
Training for Results Webinar 2016Training for Results Webinar 2016
Training for Results Webinar 2016
 
Are we Prepared for Scrum Master’s Role in COVID-19 Outbreak?
Are we Prepared for Scrum Master’s Role in COVID-19 Outbreak?Are we Prepared for Scrum Master’s Role in COVID-19 Outbreak?
Are we Prepared for Scrum Master’s Role in COVID-19 Outbreak?
 
Fundamentals of Agile
Fundamentals of AgileFundamentals of Agile
Fundamentals of Agile
 
2012 catalog-no-pricing
2012 catalog-no-pricing2012 catalog-no-pricing
2012 catalog-no-pricing
 
Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017
 
Cooplexity Institute Training Games Brochure
Cooplexity Institute Training Games BrochureCooplexity Institute Training Games Brochure
Cooplexity Institute Training Games Brochure
 
EMERGING TRENDS IN TRAINING AND DEVELOPMENT
EMERGING TRENDS IN TRAINING AND DEVELOPMENT EMERGING TRENDS IN TRAINING AND DEVELOPMENT
EMERGING TRENDS IN TRAINING AND DEVELOPMENT
 
Learn iT 2016 Catalog
Learn iT 2016 CatalogLearn iT 2016 Catalog
Learn iT 2016 Catalog
 
Transition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the DeskTransition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the Desk
 
Transition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the DeskTransition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the Desk
 
Corporate Offerings - Brochure
Corporate Offerings - BrochureCorporate Offerings - Brochure
Corporate Offerings - Brochure
 
Skilldom corporate
Skilldom corporateSkilldom corporate
Skilldom corporate
 
L&D Needs to Build Ecosystems for the Future of Work
L&D Needs to Build Ecosystems for the Future of WorkL&D Needs to Build Ecosystems for the Future of Work
L&D Needs to Build Ecosystems for the Future of Work
 
How Modernized Training Is Influencing the Banking Industry
How Modernized Training Is Influencing the Banking IndustryHow Modernized Training Is Influencing the Banking Industry
How Modernized Training Is Influencing the Banking Industry
 
Strategies to adapt to the new normal in higher education
Strategies to adapt to the new normal in higher educationStrategies to adapt to the new normal in higher education
Strategies to adapt to the new normal in higher education
 
Data Science and Artificial Intelligence course offered by Securium Academy ...
Data Science and Artificial Intelligence  course offered by Securium Academy ...Data Science and Artificial Intelligence  course offered by Securium Academy ...
Data Science and Artificial Intelligence course offered by Securium Academy ...
 
ITSM BKK #2: Business Simulation and Gamification for ITSM
ITSM BKK #2: Business Simulation and Gamification for ITSMITSM BKK #2: Business Simulation and Gamification for ITSM
ITSM BKK #2: Business Simulation and Gamification for ITSM
 

More from Knowledge Group

Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengKnowledge Group
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Knowledge Group
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...Knowledge Group
 
Suresh - Mobile Banking (Corporate Banking Stream)
Suresh - Mobile Banking (Corporate Banking Stream) Suresh - Mobile Banking (Corporate Banking Stream)
Suresh - Mobile Banking (Corporate Banking Stream) Knowledge Group
 
Leonard - (Security & Risk Stream) Discovering Optimum Risk Solution for Banks
Leonard - (Security & Risk Stream)  Discovering Optimum Risk Solution for BanksLeonard - (Security & Risk Stream)  Discovering Optimum Risk Solution for Banks
Leonard - (Security & Risk Stream) Discovering Optimum Risk Solution for BanksKnowledge Group
 
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...
Daryl Pereira(Compliance & Regulations Stream)  Learning From The Expert – Mo...Daryl Pereira(Compliance & Regulations Stream)  Learning From The Expert – Mo...
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...Knowledge Group
 
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce FraudLisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce FraudKnowledge Group
 
Harry Singh (Security & Risk Management Stream)- Managing Technology Risk in...
Harry Singh (Security & Risk Management Stream)-  Managing Technology Risk in...Harry Singh (Security & Risk Management Stream)-  Managing Technology Risk in...
Harry Singh (Security & Risk Management Stream)- Managing Technology Risk in...Knowledge Group
 
Steven Gan - Signifying The Need for Speed Banking
Steven Gan - Signifying The Need for Speed BankingSteven Gan - Signifying The Need for Speed Banking
Steven Gan - Signifying The Need for Speed BankingKnowledge Group
 
David Wortley - Gamification Is Not Funny!
David Wortley - Gamification Is Not Funny!David Wortley - Gamification Is Not Funny!
David Wortley - Gamification Is Not Funny!Knowledge Group
 
Andrew Fell, Harnessing the Customer Experience via New Technology
Andrew Fell, Harnessing the Customer Experience via New TechnologyAndrew Fell, Harnessing the Customer Experience via New Technology
Andrew Fell, Harnessing the Customer Experience via New TechnologyKnowledge Group
 
Aman Narain, Viva La Revolution -How Banking Should and Will be Disrupted an...
Aman Narain,  Viva La Revolution -How Banking Should and Will be Disrupted an...Aman Narain,  Viva La Revolution -How Banking Should and Will be Disrupted an...
Aman Narain, Viva La Revolution -How Banking Should and Will be Disrupted an...Knowledge Group
 

More from Knowledge Group (16)

Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
 
Suresh - Mobile Banking (Corporate Banking Stream)
Suresh - Mobile Banking (Corporate Banking Stream) Suresh - Mobile Banking (Corporate Banking Stream)
Suresh - Mobile Banking (Corporate Banking Stream)
 
Leonard - (Security & Risk Stream) Discovering Optimum Risk Solution for Banks
Leonard - (Security & Risk Stream)  Discovering Optimum Risk Solution for BanksLeonard - (Security & Risk Stream)  Discovering Optimum Risk Solution for Banks
Leonard - (Security & Risk Stream) Discovering Optimum Risk Solution for Banks
 
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...
Daryl Pereira(Compliance & Regulations Stream)  Learning From The Expert – Mo...Daryl Pereira(Compliance & Regulations Stream)  Learning From The Expert – Mo...
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...
 
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce FraudLisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
 
Harry Singh (Security & Risk Management Stream)- Managing Technology Risk in...
Harry Singh (Security & Risk Management Stream)-  Managing Technology Risk in...Harry Singh (Security & Risk Management Stream)-  Managing Technology Risk in...
Harry Singh (Security & Risk Management Stream)- Managing Technology Risk in...
 
Steven Gan - Signifying The Need for Speed Banking
Steven Gan - Signifying The Need for Speed BankingSteven Gan - Signifying The Need for Speed Banking
Steven Gan - Signifying The Need for Speed Banking
 
David Wortley - Gamification Is Not Funny!
David Wortley - Gamification Is Not Funny!David Wortley - Gamification Is Not Funny!
David Wortley - Gamification Is Not Funny!
 
Andrew Fell, Harnessing the Customer Experience via New Technology
Andrew Fell, Harnessing the Customer Experience via New TechnologyAndrew Fell, Harnessing the Customer Experience via New Technology
Andrew Fell, Harnessing the Customer Experience via New Technology
 
Aman Narain, Viva La Revolution -How Banking Should and Will be Disrupted an...
Aman Narain,  Viva La Revolution -How Banking Should and Will be Disrupted an...Aman Narain,  Viva La Revolution -How Banking Should and Will be Disrupted an...
Aman Narain, Viva La Revolution -How Banking Should and Will be Disrupted an...
 

Technology Risk Management Simulation - Mahesh

  • 1. Transforming the Way We Learn. Mahesh
  • 2. 1 2 Agenda Trends in Learning 3 IT Risk Pro Game 2 Welcome to the latest pedagogy!
  • 3. 1 3 Emerging Trends in Learning MOOCs 3 Personalized Learning 2 Flipped Classrooms
  • 4. 4 MOOCs - Challenges <5% completion rate on average! Content Access Experience?? Coursera Completion Rate
  • 5. 5 In Summary… KNOWLEDGE SKILL ACTION ??
  • 10. So, what’s the solution…?
  • 13. …No, Context is crucial!13
  • 14. What we came up with…
  • 15. IT Risk Pro Simulation15
  • 17. IT Risk Pro Simulation17
  • 18. Ready to Manage Risks of a Company? 18
  • 20. Risk / Reward Ratios 20 PROCESS IMPROVEMENT EXPERIMENTS RENEWAL TRANSFORMATION Short-term profitability Long term growth Shared Infrastructure Business Solutions 20
  • 21. Characterizing IT investments 21 Investment Type Drivers Sample initiatives Transformation A core infrastructure that is inadequate for desired business model - ERP implementation - Building data warehouses - Implementing middleware layer Renewal Opportunity to reduce cost or raise quality of IT service Upgrading technology standards Retiring outdated systems and technologies Process improvement Opportunity to improve operational performance Employee self serve Streamlining IT processes Experiments New technologies, new ideas, new processes, new business models Testing demand for new products Testing pricing strategy 21
  • 22. 22 Risks in an IT environment22
  • 23. Value of Information 23 The value of information comes from the characteristics it possesses: • Availability • Accuracy • Authenticity • Confidentiality • Integrity • Utility • Possession 23
  • 24. Valuing Information 24 • Information value grows with use • Information value is not stable • Information value grows with accuracy • Information increases in value when combined with other information • Information value does not drop with use 24
  • 25. 25 Risk Assessment Qualitative Risk Assessment Risk is defined in subjective, qualitative terms due to the uncertainty in likelihood and impact values. Difficulties 1.Evaluating likelihood and impact of risks qualitatively, without bias. 2.Same scales to be used in the assessment of multiple risks 25
  • 26. Risk Management Strategies 26 Mitigation Fix the flaw or provide compensatory control to reduce the likelihood or impact associated with the flaw. Transference Transference is the process of allowing another party to accept the risk on your behalf. This does not decrease the likelihood or fix any flaws, but it does reduce the overall impact on the organization. Acceptance Acceptance is the practice of simply allowing the system to operate with known risks. Avoidance Avoidance is the practice of removing the vulnerability of the system or remove the system itself. 26
  • 27. Summary • Risk / Reward Ratio • Create a portfolio of risks • Develop a risk management plan 27
  • 28. • MOOCs and e-learning good for democratizing content but lack experience • Use Experience to motivate • Immersive gamification to engage with audience better • Provides a safe learning environment for managers • Converting a 2x2 matrix into an immersive game that managers can play and learn at the same time Key Takeaways28
  • 29. Thank You “To Experience is to Learn. Everything else is just information.” Our Philosophy 29
  • 32. Our Offerings 32 We have three core experiential learning offerings - 1 2 3 Products Programs Pillars 32
  • 33. Our Products 33 We enable continuous learning through a portfolio of experiential learning products 1 3 2 4 Business Simulation Animated Video Based Learning Casestudy Platforms Gamified e-Learning Capsules 33
  • 34. Our Programs 34 We offer 20+ off the shelf experiential learning training programs Some of our simulation based training programs run by us under the four major themes - • Leading Successful Change • The Adaptive Leadership Program • Leading Without Authority • Influencing Skills • Big Picture Thinking • Achieving Excellence in Strategy Execution Leadership and Strategy • Managing Projects for High Impact • Technology Risk Management • Managing Technology Transformation • Governing IT for Value Maximization Technology Management • Financial Acumen for Non-finance Managers Finance and Accounting • Leading successful Sales Teams • Consultative Selling • Advance B2B Marketing Sales and Marketing 34