SlideShare a Scribd company logo
IT’S SCIENTIFIC - YOUR
ORGANIZATION NEEDS
DATA SCIENCE!
Adam Harting, ISP® | Manager, Data Sciences & Analysis
Global Security Services |Raytheon Company
Resolver Int:rsect 2018 |San Diego, CA
WHAT IS DATA SCIENCE & ANALYSIS?
 The use of scientific methods, processes,
algorithms, and systems to extract knowledge
and insights from various data sources to create
actionable business intelligence.
 Intersection of fields in mathematics, social
science, computer science, and business
analysis.
 Applying the practice of hypothesis testing,
modeling, and machine learning methodologies
to business processes.
 Deepen understanding of phenomena ranging
from physical and biological systems to human
social and economical behavior.
Mathematics
& Statistics
Computer
Science
Business Domain
Knowledge
Data
Analytics
Data
Science
Advanced
Analytics
Machine
Learning
"This hot new field promises to revolutionize industries from
business to government, health care to academia."
— The New York Times —
DSA JOB LANDSCAPE
Source: https://blogs-images.forbes.com/louiscolumbus/files/2017/05/Data-science-and-analytics-landscape-graphic-from-IBM-1.jpg
Data Sciences is the number one growing career in the United States and the Best
Job In America according to Glassdoor’s 2018 Rankings.
IBM predicts the demand for Data Scientists will soar 28% by 2020.
Source: https://www.forbes.com/sites/louiscolumbus/2018/01/29/data-scientist-is-the-best-job-in-america-according-glassdoors-2018-rankings/#1a20a3a75535
BIG DATA CAUSES BIG PROBLEMS
 Virtually every sector in the world market has
access to more data than a decade ago.
 Data is being collected at an alarming rate
that exceeds the capacity to extract value
from it.
 There is a cascade of overwhelming data on
everything.
 The pressing question for every organization is
how to use data effectively – organization
situational awareness, company risk,
sustainability, process improvement,
compliance…
Big Data Scale = Terabytes (10^12) and Petabytes (10^15 - 1 million gigs)
THE SCALE OF DATA
WHAT CAN DSA DO?
Operational Metrics & Process Improvement
•Day-to-day visualizations to measure overall health of operations and status of work
items throughout each global discipline
•Situational awareness
•Data support for process improvements and sustainability measures
Business Intelligence
•Business development & risk assessment intelligence packages
•Foreign posture analysis
•Information system and network analysis
•Employee behavioral analysis
•Risk methodologies and mitigation strategies
Predictive & Prescriptive Analytics
•Risk based methodology analyses & intelligence packages
•Behavioral analysis
•Threat Management
•Insider Threat analysis
THE POWER OF DSA WITHIN AN ORGANIZATION
 Empowers your company leaders to make data-
driven business decisions through the use of data
sciences and analytics.
 Companies need a data science platform to
overcome barriers to reproducibility and
collaboration.
 Explores data, shares analyses, and deploys predictive
models for business decision making.
 Optimized leadership metrics and measures to ensure
timely and effective reports are used to influence
business.
Design &
Construction
Insight &
Reporting
Transforming
& Action
BUSINESS INTELLIGENCE
“In God we trust; all others must bring data.”
– William Edwards Deming –
WHAT IS BUSINESS INTELLIGENCE (BI)?
 The exploration of business information.
 Common BI tools and methodologies:
 reporting
 analytical processing
 data and process mining
 organizational and business performance
management
 baseline and benchmarking
 predictive and prescriptive analytics
BI at “the click of a button”
ANALYZING BUSINESS INTELLIGENCE
Business Intelligence
External
Sources
Other
Company
Sources
Incident/Risk
Management
Systems
• Reactive Intelligence
• Proactive Intelligence
• Predictive Intelligence
EVOLUTION OF DATA ANALYSIS
CompetitiveAdvantage
Analytics Maturity Driving Risk Decision Making
Optimization &
Automation
Predictive &
Prescriptive
Modeling
Predictive
Analytics
Raw Data
Visualizations &
DashboardsStandard
Reports/Metrics
React & Respond Predict & Act
MEASURING AND
MANAGING RISK USING
DATA SCIENCE
“Risk comes from not knowing what you’re doing.”
– Warren Buffett –
WHAT IS RISK?
LikelihoodofOccurrence
Severity of Occurrence
 The increased likelihood or
probability that a given undesirable
or detrimental event will occur
causing damage, liability, loss or
collective negative impact on
operations.
 The probability or threat of loss or
damage that could occur due to
lack of mitigations and/or protective
measures by company or customer
requirements.
Risk
Mitigation
Strategies
ADVANCING RISK MANAGEMENT
Data
Analysis
Risk
Assessment
Risk Baseline for
a specific area
of interest
Un-mitigated Threat Profile
• Areas of interest that has
measured and
validated risks without
mitigations
• Organization(s) can
apply concentrated
attention on specific
areas of risk
• Strategic planning on
resource allocation
Validates Risk
Baseline/Mitigations/
Identifies Additional Risks
Currently Applied
to Area(s) of Risk
Identifies
Additional Risks
INFLUENCING THE
BUSINESS – CASE STUDIES
“What gets measured, gets managed.”
- Peter Drucker -
MEASURING THE BUSINESS ENVIRONMENT
 Enterprise Security Incident Summaries
 daily investigation metrics : case load : time management : investigation performance : root cause analysis
 security incidents by organization : organization analysis : impacted programs
 physical security case load : incident categorization by officer
 Business Continuity & Preparedness Threat and Vulnerability Assessments
 facility threat and vulnerability assessments : risk score : business continuity
 Cyber Security
 IS posture : IS status : locations : certifications : accreditations
 Company’s Global Exposure to Terrorism and Acts of Violence
 location proximities : attack trends : attack methodologies : target types : historical trends
 Monitoring Internal Risk Assessments
 assessment trends : organizational health
 Global Event Identification Tool
 facility location identifier : estimates of impact to global event
 Human Behavior Analysis
 insider Threat : threat management : human/event indicators
CASE STUDY 1
Human Behavior Analysis
WHERE’S WALDO?
• Workplace Violence and Insider Threat incidents
are on the rise
• Used scientific methodologies and processes to
compare events/incidents to indicators
• Utilized network theory and analysis to visually
show nodal cluster connections and patterns
• Established monitoring and mitigation strategies
to minimize or eliminate the threats of espionage
and acts of violence
CASE STUDY 2
International Growth and Risk
WHERE TO BUILD NEXT?
• Company was looking to establish a new facility in a
non-us country to improve market share
• Area(s) of interested had significant risks
• Data Science team was asked to measure and
evaluate historical risk data (violence and acts of
terrorism) and evaluate the levels of risk
• DSA used open source data from esteemed
University and internal company locations to
establish risk baselines for each prospect
• Analysis gave leaders a unique lens on where to
establish the new facility
HEAT MAP
• Intelligence products have historically
been high level static reports that
provide general threats and risks in
certain countries and/or regions
• Good place to start, but misleading –
entire countries and/or regions do not
have the same risks/threats throughout
• Requires a significant amount of text to
explain the details risks/threats for each
country
• Does not relate risks and threats back to
the businesses and networks in scope
• Does not provide the level of detail
needed in order to make well-informed
business decisions
• Strictly a data visualization – NOT
providing strategic information
SCATTER ANALYSIS
• Level of granularity significantly
increased and begins to show a
truer distribution of risks/threats
• We now start to see that not all
areas of countries and/or regions
have the same level and/or types
of risks/threats
• We still do not see how the
risks/threats relate to our
business/network
• Scatters with this many nodes are
very noisy and do not provide
clear enough information to make
well informed business decisions
• Strictly a data visualization – NOT
providing strategic information
BLENDED SCATTER ANALYSIS
• New start getting a sense of the
risks/threats as they relate to our
specific network when we overlay
the nodes of our network over the
historical threat events
• This visualization still requires a
significant amount of analysis to
interpret the data and draw out
specific that will allow us to make
well informed business decisions
• Strictly a data visualization – NOT
providing strategic information
BASIC INTEL PACKAGE
• Intel packages should not just visualize
data, they should provide information
• This intel package tells us how many
incidents there were within range (100
miles) of our facilities – the range is
determined by whatever your org’s
comfort zone is
• It also tells us what types of attacks and
what the targets were of those attacks
within range of our network and its
individual nodes
• We also get a historical 5 year trend
• Package still requires further analysis
• What are the trends by site?
• What are the distances of incidents from
our facilities? Are they more than 50 miles
or are they within 5 miles?
ADVANCED INTEL PACKAGE
• We now see which facilities have
risks/threats within varying ranges
• We also see the risk/threat types and
the target types within each range
for each facility
• We are able to start making better
informed business decisions from an
intel package like this, but it is
historically focused
• We do not know what is projected for
the future
FORECASTING RISK
• Done through the development of
algorithms / forecasting models
• Determines whether we project risks
to increase or decrease in the
coming days/weeks/months/years
• Allows us to pinpoint the specific
risk/threat areas which we need to
mitigate against or avoid
• Allows for better allocation of
resources to properly address areas
of concern
COMPLETE AND VALUE-ADDED INTEL PACKAGE
FORECASTING
MODELS
ADVANCED ANALYSIS
BLENDEDSCATTER
ANALYSIS
DATASCIENCE
TECHNOLOGYECOSYSTEM
SOURCE:http://mattturck.com/wp-content/uploads/2017/05/Matt-Turck-FirstMark-2017-Big-Data-Landscape.pngz
Questions?
“If you torture the data long enough, it will confess.”
- Ronal Coase -

More Related Content

What's hot

The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field
Resolver Inc.
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
Resolver Inc.
 
Improving Security Metrics
Improving Security MetricsImproving Security Metrics
Improving Security Metrics
Doug Copley
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
JoAnna Cheshire
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the risk
Sarah Clarke
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
Resolver Inc.
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
Marcelo Martins
 
How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
Resolver Inc.
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101
Resolver Inc.
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk program
Priyanka Aash
 
Pitfalls of Cyber Data
Pitfalls of Cyber DataPitfalls of Cyber Data
Pitfalls of Cyber Data
Phil Huggins FBCS CITP
 
Integrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: BenchmarkingIntegrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: Benchmarking
Resolver Inc.
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
Resolver Inc.
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
ishan parikh production
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
Resolver Inc.
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive Action
Mighty Guides, Inc.
 
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
South Tyrol Free Software Conference
 
Technology leadership driving business innovation
Technology leadership driving business innovationTechnology leadership driving business innovation
Technology leadership driving business innovation
JoAnna Cheshire
 

What's hot (20)

The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
 
Improving Security Metrics
Improving Security MetricsImproving Security Metrics
Improving Security Metrics
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the risk
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
 
How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk program
 
Pitfalls of Cyber Data
Pitfalls of Cyber DataPitfalls of Cyber Data
Pitfalls of Cyber Data
 
Integrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: BenchmarkingIntegrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: Benchmarking
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive Action
 
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
 
Cyber-Risk-Management-Assessment (1)
Cyber-Risk-Management-Assessment (1)Cyber-Risk-Management-Assessment (1)
Cyber-Risk-Management-Assessment (1)
 
Technology leadership driving business innovation
Technology leadership driving business innovationTechnology leadership driving business innovation
Technology leadership driving business innovation
 

Similar to Why Your Organization Should Leverage Data Science for Risk Intelligence and Business Decision Making

How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
SurfWatch Labs
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
Ernest Staats
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
FirstMutualHoldings
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
Kabul Education University
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
Phil Huggins FBCS CITP
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
MapR Technologies
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
Lalith Kumar Vemali
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
PECB
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
George Goodall
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
MichaelSadeghiPhDABD
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
Info-Tech Research Group
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
John D. Johnson
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018
Open Security Summit
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
McKonly & Asbury, LLP
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
Accounting_Whitepapers
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
TheWalkerGroup1
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
Stephen Cobb
 

Similar to Why Your Organization Should Leverage Data Science for Risk Intelligence and Business Decision Making (20)

How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 

More from Resolver Inc.

ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
Resolver Inc.
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
Resolver Inc.
 
Terrorism in a Corporate Setting
Terrorism in a Corporate SettingTerrorism in a Corporate Setting
Terrorism in a Corporate Setting
Resolver Inc.
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
Resolver Inc.
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk Management
Resolver Inc.
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver Core
Resolver Inc.
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses Resolver
Resolver Inc.
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social Engineering
Resolver Inc.
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management Strategy
Resolver Inc.
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
Resolver Inc.
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
Resolver Inc.
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data Clean
Resolver Inc.
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Resolver Inc.
 
Leveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramLeveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM Program
Resolver Inc.
 
Int:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will AndersonInt:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will Anderson
Resolver Inc.
 
How to Use Storytelling to Communicate with Executives
How to Use Storytelling to Communicate with ExecutivesHow to Use Storytelling to Communicate with Executives
How to Use Storytelling to Communicate with Executives
Resolver Inc.
 
Planning a move from Perspective to CORE
Planning a move from Perspective to COREPlanning a move from Perspective to CORE
Planning a move from Perspective to CORE
Resolver Inc.
 
Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Creating an Enterprise-Wide Workplace Violence & Threat Assessment TeamCreating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Resolver Inc.
 
Lessons Learned in the Aftermath of Hurricanes Harvey & Irma
Lessons Learned in the Aftermath of Hurricanes Harvey & IrmaLessons Learned in the Aftermath of Hurricanes Harvey & Irma
Lessons Learned in the Aftermath of Hurricanes Harvey & Irma
Resolver Inc.
 

More from Resolver Inc. (19)

ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Terrorism in a Corporate Setting
Terrorism in a Corporate SettingTerrorism in a Corporate Setting
Terrorism in a Corporate Setting
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk Management
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver Core
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses Resolver
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social Engineering
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management Strategy
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data Clean
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
Leveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramLeveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM Program
 
Int:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will AndersonInt:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will Anderson
 
How to Use Storytelling to Communicate with Executives
How to Use Storytelling to Communicate with ExecutivesHow to Use Storytelling to Communicate with Executives
How to Use Storytelling to Communicate with Executives
 
Planning a move from Perspective to CORE
Planning a move from Perspective to COREPlanning a move from Perspective to CORE
Planning a move from Perspective to CORE
 
Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Creating an Enterprise-Wide Workplace Violence & Threat Assessment TeamCreating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
 
Lessons Learned in the Aftermath of Hurricanes Harvey & Irma
Lessons Learned in the Aftermath of Hurricanes Harvey & IrmaLessons Learned in the Aftermath of Hurricanes Harvey & Irma
Lessons Learned in the Aftermath of Hurricanes Harvey & Irma
 

Recently uploaded

Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
Rob Healy
 
Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
Pinta Partners
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
gcljeuzdu
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
tdt5v4b
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
tdt5v4b
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
A. F. M. Rubayat-Ul Jannat
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
Muhammad Adil Jamil
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
tdt5v4b
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
Jim Smith
 
Protected Workmen required today for growth
Protected Workmen required today for growthProtected Workmen required today for growth
Protected Workmen required today for growth
rivaraj2711
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
Tata Consultancy Services
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
William (Bill) H. Bender, FCSI
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
tdt5v4b
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
EUS+ Management & Consulting Excellence
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
William (Bill) H. Bender, FCSI
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
juniourjohnstone
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
akaash13
 

Recently uploaded (17)

Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
 
Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
 
Protected Workmen required today for growth
Protected Workmen required today for growthProtected Workmen required today for growth
Protected Workmen required today for growth
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
 

Why Your Organization Should Leverage Data Science for Risk Intelligence and Business Decision Making

  • 1. IT’S SCIENTIFIC - YOUR ORGANIZATION NEEDS DATA SCIENCE! Adam Harting, ISP® | Manager, Data Sciences & Analysis Global Security Services |Raytheon Company Resolver Int:rsect 2018 |San Diego, CA
  • 2. WHAT IS DATA SCIENCE & ANALYSIS?  The use of scientific methods, processes, algorithms, and systems to extract knowledge and insights from various data sources to create actionable business intelligence.  Intersection of fields in mathematics, social science, computer science, and business analysis.  Applying the practice of hypothesis testing, modeling, and machine learning methodologies to business processes.  Deepen understanding of phenomena ranging from physical and biological systems to human social and economical behavior. Mathematics & Statistics Computer Science Business Domain Knowledge Data Analytics Data Science Advanced Analytics Machine Learning "This hot new field promises to revolutionize industries from business to government, health care to academia." — The New York Times —
  • 3. DSA JOB LANDSCAPE Source: https://blogs-images.forbes.com/louiscolumbus/files/2017/05/Data-science-and-analytics-landscape-graphic-from-IBM-1.jpg Data Sciences is the number one growing career in the United States and the Best Job In America according to Glassdoor’s 2018 Rankings. IBM predicts the demand for Data Scientists will soar 28% by 2020. Source: https://www.forbes.com/sites/louiscolumbus/2018/01/29/data-scientist-is-the-best-job-in-america-according-glassdoors-2018-rankings/#1a20a3a75535
  • 4. BIG DATA CAUSES BIG PROBLEMS  Virtually every sector in the world market has access to more data than a decade ago.  Data is being collected at an alarming rate that exceeds the capacity to extract value from it.  There is a cascade of overwhelming data on everything.  The pressing question for every organization is how to use data effectively – organization situational awareness, company risk, sustainability, process improvement, compliance… Big Data Scale = Terabytes (10^12) and Petabytes (10^15 - 1 million gigs)
  • 6. WHAT CAN DSA DO? Operational Metrics & Process Improvement •Day-to-day visualizations to measure overall health of operations and status of work items throughout each global discipline •Situational awareness •Data support for process improvements and sustainability measures Business Intelligence •Business development & risk assessment intelligence packages •Foreign posture analysis •Information system and network analysis •Employee behavioral analysis •Risk methodologies and mitigation strategies Predictive & Prescriptive Analytics •Risk based methodology analyses & intelligence packages •Behavioral analysis •Threat Management •Insider Threat analysis
  • 7. THE POWER OF DSA WITHIN AN ORGANIZATION  Empowers your company leaders to make data- driven business decisions through the use of data sciences and analytics.  Companies need a data science platform to overcome barriers to reproducibility and collaboration.  Explores data, shares analyses, and deploys predictive models for business decision making.  Optimized leadership metrics and measures to ensure timely and effective reports are used to influence business. Design & Construction Insight & Reporting Transforming & Action
  • 8. BUSINESS INTELLIGENCE “In God we trust; all others must bring data.” – William Edwards Deming –
  • 9. WHAT IS BUSINESS INTELLIGENCE (BI)?  The exploration of business information.  Common BI tools and methodologies:  reporting  analytical processing  data and process mining  organizational and business performance management  baseline and benchmarking  predictive and prescriptive analytics BI at “the click of a button”
  • 10. ANALYZING BUSINESS INTELLIGENCE Business Intelligence External Sources Other Company Sources Incident/Risk Management Systems • Reactive Intelligence • Proactive Intelligence • Predictive Intelligence
  • 11. EVOLUTION OF DATA ANALYSIS CompetitiveAdvantage Analytics Maturity Driving Risk Decision Making Optimization & Automation Predictive & Prescriptive Modeling Predictive Analytics Raw Data Visualizations & DashboardsStandard Reports/Metrics React & Respond Predict & Act
  • 12. MEASURING AND MANAGING RISK USING DATA SCIENCE “Risk comes from not knowing what you’re doing.” – Warren Buffett –
  • 13. WHAT IS RISK? LikelihoodofOccurrence Severity of Occurrence  The increased likelihood or probability that a given undesirable or detrimental event will occur causing damage, liability, loss or collective negative impact on operations.  The probability or threat of loss or damage that could occur due to lack of mitigations and/or protective measures by company or customer requirements.
  • 14. Risk Mitigation Strategies ADVANCING RISK MANAGEMENT Data Analysis Risk Assessment Risk Baseline for a specific area of interest Un-mitigated Threat Profile • Areas of interest that has measured and validated risks without mitigations • Organization(s) can apply concentrated attention on specific areas of risk • Strategic planning on resource allocation Validates Risk Baseline/Mitigations/ Identifies Additional Risks Currently Applied to Area(s) of Risk Identifies Additional Risks
  • 15. INFLUENCING THE BUSINESS – CASE STUDIES “What gets measured, gets managed.” - Peter Drucker -
  • 16. MEASURING THE BUSINESS ENVIRONMENT  Enterprise Security Incident Summaries  daily investigation metrics : case load : time management : investigation performance : root cause analysis  security incidents by organization : organization analysis : impacted programs  physical security case load : incident categorization by officer  Business Continuity & Preparedness Threat and Vulnerability Assessments  facility threat and vulnerability assessments : risk score : business continuity  Cyber Security  IS posture : IS status : locations : certifications : accreditations  Company’s Global Exposure to Terrorism and Acts of Violence  location proximities : attack trends : attack methodologies : target types : historical trends  Monitoring Internal Risk Assessments  assessment trends : organizational health  Global Event Identification Tool  facility location identifier : estimates of impact to global event  Human Behavior Analysis  insider Threat : threat management : human/event indicators
  • 17. CASE STUDY 1 Human Behavior Analysis
  • 18. WHERE’S WALDO? • Workplace Violence and Insider Threat incidents are on the rise • Used scientific methodologies and processes to compare events/incidents to indicators • Utilized network theory and analysis to visually show nodal cluster connections and patterns • Established monitoring and mitigation strategies to minimize or eliminate the threats of espionage and acts of violence
  • 19. CASE STUDY 2 International Growth and Risk
  • 20. WHERE TO BUILD NEXT? • Company was looking to establish a new facility in a non-us country to improve market share • Area(s) of interested had significant risks • Data Science team was asked to measure and evaluate historical risk data (violence and acts of terrorism) and evaluate the levels of risk • DSA used open source data from esteemed University and internal company locations to establish risk baselines for each prospect • Analysis gave leaders a unique lens on where to establish the new facility
  • 21. HEAT MAP • Intelligence products have historically been high level static reports that provide general threats and risks in certain countries and/or regions • Good place to start, but misleading – entire countries and/or regions do not have the same risks/threats throughout • Requires a significant amount of text to explain the details risks/threats for each country • Does not relate risks and threats back to the businesses and networks in scope • Does not provide the level of detail needed in order to make well-informed business decisions • Strictly a data visualization – NOT providing strategic information
  • 22. SCATTER ANALYSIS • Level of granularity significantly increased and begins to show a truer distribution of risks/threats • We now start to see that not all areas of countries and/or regions have the same level and/or types of risks/threats • We still do not see how the risks/threats relate to our business/network • Scatters with this many nodes are very noisy and do not provide clear enough information to make well informed business decisions • Strictly a data visualization – NOT providing strategic information
  • 23. BLENDED SCATTER ANALYSIS • New start getting a sense of the risks/threats as they relate to our specific network when we overlay the nodes of our network over the historical threat events • This visualization still requires a significant amount of analysis to interpret the data and draw out specific that will allow us to make well informed business decisions • Strictly a data visualization – NOT providing strategic information
  • 24. BASIC INTEL PACKAGE • Intel packages should not just visualize data, they should provide information • This intel package tells us how many incidents there were within range (100 miles) of our facilities – the range is determined by whatever your org’s comfort zone is • It also tells us what types of attacks and what the targets were of those attacks within range of our network and its individual nodes • We also get a historical 5 year trend • Package still requires further analysis • What are the trends by site? • What are the distances of incidents from our facilities? Are they more than 50 miles or are they within 5 miles?
  • 25. ADVANCED INTEL PACKAGE • We now see which facilities have risks/threats within varying ranges • We also see the risk/threat types and the target types within each range for each facility • We are able to start making better informed business decisions from an intel package like this, but it is historically focused • We do not know what is projected for the future
  • 26. FORECASTING RISK • Done through the development of algorithms / forecasting models • Determines whether we project risks to increase or decrease in the coming days/weeks/months/years • Allows us to pinpoint the specific risk/threat areas which we need to mitigate against or avoid • Allows for better allocation of resources to properly address areas of concern
  • 27. COMPLETE AND VALUE-ADDED INTEL PACKAGE FORECASTING MODELS ADVANCED ANALYSIS BLENDEDSCATTER ANALYSIS
  • 29. Questions? “If you torture the data long enough, it will confess.” - Ronal Coase -