SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
EMPOWERING A WORLD AT RISK!
Veratect  
                Situational Risk Intelligence 
A proven system that detects the earliest indicators of emerging threats

            enabling corporations, governments and NGO’s

 the ability to readily apply the proprietary risk information, data and
 metrics to their specific risk intelligence and management capabilities.
Background 
•  Initially a prototype was incubated by the U.S. DoD and IC  with a  
    goal of detecting and identifying WMD – B and other CBRN  
    instances earlier than available through other means. 

•  Recognizing commercial viability Veratect privatized with the 
    ability to provide advance warning of emerging and endemic 
    communicable disease risks worldwide in many cases days, weeks, 
    and months before any governmental warnings were issued 

•  The core Veratect analytic team as the subject matter experts within  
      the prototype were first to…  
    −  Identify the expansion of H5N1 from Southern China to Russia and then to Eastern Europe  
    −  Notify US government of outbreak of FMD in UK in 2007  
    −  Identify Ebola in DRC in August 2007  
    −  Provide early warning of vaccine drift of H3N2, a virus mutation that went undetected by CDC 
        and resulted in 170 percent increase in seasonal deaths since 2004‐5 in United States  
BOOM
                                                                                  event
  Left of Boom                                                                   realized
        Prepare 
        Protect 
        Mitigate 
                                                         Outbreaks* 
                                               Terrorist Action                              Right of Boom 
                 
                     
                                                                              
                                            Epidemics*                                                 React  
                                        Pandemics*                                                     Respond 
                                          Anarchy                                                      Recover 
                                          Famine 
                                   Genocid 
                            Civil Unrest               Veratect enables the global 
                                                       operator every opportunity 
                                                         to stay “left of boom”
Left of Boom Timeliness 



‐    ~1‐2 weeks in advance of the European Influenza 
     Surveillance Scheme reporting 
‐    ~1 week to infinity in advance of WHO FluNET reporting 
‐    1 to 2 days in advance of HealthMap 
‐    Hours to infinity in advance of ProMED 
‐    75 days in advance of incursion into Georgia 
‐    2+ weeks in advance of Orissa disruptions 
•     Disease  ‐   Foreshadow™ 
          −     Human, animal and plant disease 
          −     Food and pharmaceutical safety 
          −     Agricultural production (environment or pathogen) 


•     Civil Unrest  ‐   Shadowstream™   
          −     Anarchy, tribalism, militarism, radicalism, ethno sectarian 
          −     violence, jihadism, organized crime, domestic and inter‐ 
          −     national terrorism, natural resource contention 


All events determined at lat / long specificity, provided with a proprietary risk metric and considered within 

Three levels of proximity to each clients specific location (whether a facility, or an op’s team on the move) and 

All risk metrics, whether emerging, abating, advancing or receding are applied to constant surveillance and  

Redetermination and posted in the client real time interface every 15 minutes.  The earliest, spot on 

quantified risk surveillance and intelligence envelopment in nearest real time with commercial access. 
Veratect: The Intersection of Human and Artificial Intelligence 
                                           The Human 
                                           Analytical 
                                           Component 
• Software and Communications ‐            • Subject matter experts investigate 
Open and proprietary data from             changes in social indicators to determine 
targeted sources                           if disruptions have probable disease 
                                           origins 
• Software and modeling 
                                           • Ground truth validation to confirm 
• The system “listens” to the voices 
                                           and assess events  
of local and regional communities for 
key indicators of social disruption and    • Veratect analysts report to the user 
sorts and correlates millions of data      community 
points daily 
                                           • Integrated with Computer System 
• Integrated with Human System ‐           Component ‐ Humans are superior to 
Computer Systems are superior to           computer systems for detecting nuanced 
human for the gathering and indexing       changes in the earliest indicators of event 
of massive amounts of data                 emergence 
Overview: Veratect Foreshadow™                                   


       Data                                        Information                         Intelligence 
• Source Identification
           • Query Formulation
                                                             • Geospatial Visualization
       Data                          Information                   Intelligence 
• Source Management
              • Internal/External
                                    Search
                  • Integration with
• Native-Language                 • Veratect                   Customer Data
  Indexing
                                    Methodology
             • Product Design and
• Natural Language                • Regional                   Refinement 
 Processing
                          Conceptualization
                                                                          • Access to Enterprise
• Systems Security
                 • Geospatial Analysis
                  Risk Management Tools
                                    • Temporal Analysis
• Multi-Source
                                                           • Advanced Filtering
                                    • Translocation
                                      Potential
Veratect risk surveillance, identification and earliest quantified
           knowledge flows to the user in two means:




           Customized User 
                                       Direct Data Feed 
               Interface 
METHODOLOGY,
  EVENT QUANTIFICATION AND
RESULTING RISK INTELLIGENCE
Information Components 



                              Earliest Intelligence
                                   Indicators
                Timeliness




                               Tactical Reports




                                                          Veratect Users
                                 Full Reports

                                 Assessments
&Credibility
 Specificity




                                 Anticipation
COMMERCIAL APPLICATIONS FOR SECURITY,
EMPLOYEE HEALTH AND SAFETY, SUPPLY CHAIN
    MANAGEMENT, PROCUREMENT AND
            STAKEHOLDERS
Supply Chain Management                                  ERM and Governance
                                                                 Disciplines
    Supply chain, foreign market/logistics threat         Differentiator in Executive Risk/Fiduciary
               alert and assessment
                                                          Liability Risk Profile and Rating Agency /
   IN OBVERSE – act in advance of price/supply                        Analyst Perceptions
   chain disruption; monitor industry peers for
        impending stress and market share
                   opportunity




                                                                    Treasury and Finance
                                                                            Powerful Investment
                                                                      Management /Arbitrage Tool;
                                                                    Facilitation Tool in Capital Project
                                                                              Finance Settings




                                                                        Risk Finance
                                                               Key to improved cost-of-risk /
Operational Risk Management                                     access to new markets and
                                                             coverage grants; improved captive
  Product integrity and 3rd party liability buffer;              or retention management
human capital; infrastructure crisis readiness and
business continuity “fire alarm”, threat valuation
         and counter-measures trigger
Supply Chain @ Risk::                 Ingress / Egress @ Risk: 
     Employees @ Risk :  
                                    Enables the commercial client to      Enables commercial customer to 
Risk assessment applied to all        identify strategic supply chain     target strategic points of ingress / 
of the commercial customer’s 
   employees, at a lat / long          partners for risk assessment         egress for risk surveillance and 
 attachment point, by line of           surveillance. Each discreet         assessment with each discreet 
     business, operational            supplier is monitored at a lat /        port, air facility, rail facility 
 functionality, level of risk of    long attachment for emerging or       tracked at a lat / long attachment 
   pathogen, and proximity 
   measures of emerging or                abating risk attributes.
        profile for emerging or abating 
          abating risk                                                               risk attributes. 
Geo‐Locations @ Risk:                 Captive @ Risk:
      Markets  @ Risk:  

   Users can identify critical     This allows the commercial       This tool allows for a detailed
global markets for assessment      customer to monitor a wide          review of individual and
       and monitoring.            range of risks or opportunity      aggregate risk profiles, based
    Determination of these           scenarios based on their        on the client’s input data for
 markets is customer specific      unique needs for pinpoint risk     their captive insurer. Applies
    based on appetite and 
          exposure.                        assessment.              insurance specific metrics and
                                                                                 output.
PEERview™
                 (Proprietary Economic Exposure Reference view)




•  Veratect‐developed corporate economic exposure index 
•  Applies user‐specified cost parameters (medical and insurance costs, 
   workers’ comp, evacuation costs, etc.), weighted by industry and geo‐
   location and facility type against Veratect identified disease risk level.  
•  Provides exposure relative to gross revenues, net income and 
   shareholder equity.  

Más contenido relacionado

Similar a general

Mar 5 6 Internal Controls
Mar 5 6 Internal ControlsMar 5 6 Internal Controls
Mar 5 6 Internal ControlsTommy Seah
 
Data Aggregation, Curation and analytics for security and situational awareness
Data Aggregation, Curation and analytics for security and situational awarenessData Aggregation, Curation and analytics for security and situational awareness
Data Aggregation, Curation and analytics for security and situational awarenessDataWorks Summit/Hadoop Summit
 
RW Keynote IDM2009
RW Keynote IDM2009RW Keynote IDM2009
RW Keynote IDM2009racingsnake
 
What is Quantum Risk Analysis_ - Bahaa Abdul Hussein.pdf
What is Quantum Risk Analysis_ - Bahaa Abdul Hussein.pdfWhat is Quantum Risk Analysis_ - Bahaa Abdul Hussein.pdf
What is Quantum Risk Analysis_ - Bahaa Abdul Hussein.pdfBahaa Abdul Hussein
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisFraudBusters
 
Sf2nd
Sf2ndSf2nd
Sf2ndEKH
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management OverviewNaresh Rao
 
Risk management overview
Risk management overviewRisk management overview
Risk management overviewNaresh Rao
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessmentaeaguinot
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessmentaeaguinot
 
Rhd + Visual Risk Iq Presentation On Continuous Auditing District Conferenc...
Rhd + Visual Risk Iq Presentation On Continuous Auditing   District Conferenc...Rhd + Visual Risk Iq Presentation On Continuous Auditing   District Conferenc...
Rhd + Visual Risk Iq Presentation On Continuous Auditing District Conferenc...Joe Oringel
 
LINKIES. NEWS II / 2009
LINKIES. NEWS II / 2009LINKIES. NEWS II / 2009
LINKIES. NEWS II / 2009LINKIES.
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 
Redwert Healthcare / Hospital Incident Management
Redwert Healthcare / Hospital Incident ManagementRedwert Healthcare / Hospital Incident Management
Redwert Healthcare / Hospital Incident ManagementRedwertEngineeringLa
 
Webinar | Risk management in asset management
Webinar | Risk management in asset managementWebinar | Risk management in asset management
Webinar | Risk management in asset managementStork
 

Similar a general (20)

OMSI BCP (sample risks)
OMSI BCP (sample risks)OMSI BCP (sample risks)
OMSI BCP (sample risks)
 
Mar 5 6 Internal Controls
Mar 5 6 Internal ControlsMar 5 6 Internal Controls
Mar 5 6 Internal Controls
 
Factoring the human into Patient Safety
Factoring the human into Patient SafetyFactoring the human into Patient Safety
Factoring the human into Patient Safety
 
Data Aggregation, Curation and analytics for security and situational awareness
Data Aggregation, Curation and analytics for security and situational awarenessData Aggregation, Curation and analytics for security and situational awareness
Data Aggregation, Curation and analytics for security and situational awareness
 
RW Keynote IDM2009
RW Keynote IDM2009RW Keynote IDM2009
RW Keynote IDM2009
 
Icm Kl Ls
Icm Kl LsIcm Kl Ls
Icm Kl Ls
 
What is Quantum Risk Analysis_ - Bahaa Abdul Hussein.pdf
What is Quantum Risk Analysis_ - Bahaa Abdul Hussein.pdfWhat is Quantum Risk Analysis_ - Bahaa Abdul Hussein.pdf
What is Quantum Risk Analysis_ - Bahaa Abdul Hussein.pdf
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Sf2nd
Sf2ndSf2nd
Sf2nd
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management Overview
 
Risk management overview
Risk management overviewRisk management overview
Risk management overview
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Rhd + Visual Risk Iq Presentation On Continuous Auditing District Conferenc...
Rhd + Visual Risk Iq Presentation On Continuous Auditing   District Conferenc...Rhd + Visual Risk Iq Presentation On Continuous Auditing   District Conferenc...
Rhd + Visual Risk Iq Presentation On Continuous Auditing District Conferenc...
 
ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2
 
LINKIES. NEWS II / 2009
LINKIES. NEWS II / 2009LINKIES. NEWS II / 2009
LINKIES. NEWS II / 2009
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Redwert Healthcare / Hospital Incident Management
Redwert Healthcare / Hospital Incident ManagementRedwert Healthcare / Hospital Incident Management
Redwert Healthcare / Hospital Incident Management
 
Webinar | Risk management in asset management
Webinar | Risk management in asset managementWebinar | Risk management in asset management
Webinar | Risk management in asset management
 

general

  • 2. Veratect   Situational Risk Intelligence  A proven system that detects the earliest indicators of emerging threats enabling corporations, governments and NGO’s the ability to readily apply the proprietary risk information, data and metrics to their specific risk intelligence and management capabilities.
  • 3. Background  •  Initially a prototype was incubated by the U.S. DoD and IC  with a    goal of detecting and identifying WMD – B and other CBRN    instances earlier than available through other means.  •  Recognizing commercial viability Veratect privatized with the   ability to provide advance warning of emerging and endemic   communicable disease risks worldwide in many cases days, weeks,   and months before any governmental warnings were issued  •  The core Veratect analytic team as the subject matter experts within         the prototype were first to…   −  Identify the expansion of H5N1 from Southern China to Russia and then to Eastern Europe   −  Notify US government of outbreak of FMD in UK in 2007   −  Identify Ebola in DRC in August 2007   −  Provide early warning of vaccine drift of H3N2, a virus mutation that went undetected by CDC   and resulted in 170 percent increase in seasonal deaths since 2004‐5 in United States  
  • 4. BOOM event Left of Boom  realized Prepare  Protect   Mitigate                                                           Outbreaks*                                                Terrorist Action  Right of Boom                                                    Epidemics*  React                                 Pandemics*         Respond                              Anarchy        Recover                    Famine          Genocid   Civil Unrest  Veratect enables the global operator every opportunity to stay “left of boom”
  • 5. Left of Boom Timeliness  ‐  ~1‐2 weeks in advance of the European Influenza  Surveillance Scheme reporting  ‐  ~1 week to infinity in advance of WHO FluNET reporting  ‐  1 to 2 days in advance of HealthMap  ‐  Hours to infinity in advance of ProMED  ‐  75 days in advance of incursion into Georgia  ‐  2+ weeks in advance of Orissa disruptions 
  • 6. •  Disease  ‐   Foreshadow™  −  Human, animal and plant disease  −  Food and pharmaceutical safety  −  Agricultural production (environment or pathogen)  •  Civil Unrest  ‐   Shadowstream™    −  Anarchy, tribalism, militarism, radicalism, ethno sectarian  −  violence, jihadism, organized crime, domestic and inter‐  −  national terrorism, natural resource contention  All events determined at lat / long specificity, provided with a proprietary risk metric and considered within  Three levels of proximity to each clients specific location (whether a facility, or an op’s team on the move) and  All risk metrics, whether emerging, abating, advancing or receding are applied to constant surveillance and   Redetermination and posted in the client real time interface every 15 minutes.  The earliest, spot on  quantified risk surveillance and intelligence envelopment in nearest real time with commercial access. 
  • 7. Veratect: The Intersection of Human and Artificial Intelligence  The Human  Analytical  Component  • Software and Communications ‐  • Subject matter experts investigate  Open and proprietary data from  changes in social indicators to determine  targeted sources  if disruptions have probable disease  origins  • Software and modeling  • Ground truth validation to confirm  • The system “listens” to the voices  and assess events   of local and regional communities for  key indicators of social disruption and  • Veratect analysts report to the user  sorts and correlates millions of data  community  points daily  • Integrated with Computer System  • Integrated with Human System ‐  Component ‐ Humans are superior to  Computer Systems are superior to  computer systems for detecting nuanced  human for the gathering and indexing  changes in the earliest indicators of event  of massive amounts of data   emergence 
  • 8. Overview: Veratect Foreshadow™   Data                                        Information                         Intelligence  • Source Identification • Query Formulation • Geospatial Visualization Data                          Information                   Intelligence  • Source Management • Internal/External Search • Integration with • Native-Language • Veratect Customer Data Indexing Methodology • Product Design and • Natural Language • Regional Refinement Processing Conceptualization • Access to Enterprise • Systems Security • Geospatial Analysis Risk Management Tools • Temporal Analysis • Multi-Source • Advanced Filtering • Translocation Potential
  • 9. Veratect risk surveillance, identification and earliest quantified knowledge flows to the user in two means: Customized User  Direct Data Feed   Interface 
  • 10. METHODOLOGY, EVENT QUANTIFICATION AND RESULTING RISK INTELLIGENCE
  • 11. Information Components  Earliest Intelligence Indicators Timeliness Tactical Reports Veratect Users Full Reports Assessments &Credibility Specificity Anticipation
  • 12. COMMERCIAL APPLICATIONS FOR SECURITY, EMPLOYEE HEALTH AND SAFETY, SUPPLY CHAIN MANAGEMENT, PROCUREMENT AND STAKEHOLDERS
  • 13. Supply Chain Management ERM and Governance Disciplines Supply chain, foreign market/logistics threat Differentiator in Executive Risk/Fiduciary alert and assessment Liability Risk Profile and Rating Agency / IN OBVERSE – act in advance of price/supply Analyst Perceptions chain disruption; monitor industry peers for impending stress and market share opportunity Treasury and Finance Powerful Investment Management /Arbitrage Tool; Facilitation Tool in Capital Project Finance Settings Risk Finance Key to improved cost-of-risk / Operational Risk Management access to new markets and coverage grants; improved captive Product integrity and 3rd party liability buffer; or retention management human capital; infrastructure crisis readiness and business continuity “fire alarm”, threat valuation and counter-measures trigger
  • 14. Supply Chain @ Risk::  Ingress / Egress @ Risk:  Employees @ Risk :   Enables the commercial client to  Enables commercial customer to  Risk assessment applied to all  identify strategic supply chain  target strategic points of ingress /  of the commercial customer’s  employees, at a lat / long  partners for risk assessment  egress for risk surveillance and  attachment point, by line of  surveillance. Each discreet  assessment with each discreet  business, operational  supplier is monitored at a lat /  port, air facility, rail facility  functionality, level of risk of  long attachment for emerging or  tracked at a lat / long attachment  pathogen, and proximity  measures of emerging or  abating risk attributes. profile for emerging or abating  abating risk  risk attributes. 
  • 15. Geo‐Locations @ Risk:  Captive @ Risk: Markets  @ Risk:   Users can identify critical  This allows the commercial  This tool allows for a detailed global markets for assessment  customer to monitor a wide  review of individual and and monitoring.  range of risks or opportunity  aggregate risk profiles, based Determination of these  scenarios based on their  on the client’s input data for markets is customer specific  unique needs for pinpoint risk  their captive insurer. Applies based on appetite and  exposure.     assessment.  insurance specific metrics and output.
  • 16. PEERview™ (Proprietary Economic Exposure Reference view) •  Veratect‐developed corporate economic exposure index  •  Applies user‐specified cost parameters (medical and insurance costs,  workers’ comp, evacuation costs, etc.), weighted by industry and geo‐ location and facility type against Veratect identified disease risk level.   •  Provides exposure relative to gross revenues, net income and  shareholder equity.