SlideShare a Scribd company logo
1 of 20
1
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
RAPID RISK ASSESSMENT
A NEW APPROACH TO IT RISK MANAGEMENT
SECURITY:ServicesSolutionsSupport
Biography
• Andrew Plato, CISSP, CISM, QSA 
• President / CEO – Anitian Enterprise Security
• 20 years of experience in IT & security
• Completed thousands of security assessments & projects
• Discovered SQL injection attack tactic in 1995
• Helped develop first in‐line IPS engine (BlackICE) 
• Championed movement toward practical, pragmatic 
information security solutions 
2
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
Anitian Overview
• Compliance PCI, NERC, HIPAA, FFIEC
• Services Penetration testing, web application testing,
code review, incident response, risk 
assessment
• Technologies UTM/NGFW, IPS, SIEM, MDM
• Support Managed security, staff augmentation 
• Leadership Industry analysis, CIO advisory services 
SECURITY:ServicesSolutionsSupport
Why Anitian?
• Anitian is the only security firm…
• Focused on practical, pragmatic information security
• Able to deliver compliance quickly & affordably
• That does not push products
• Who rejects using fear to sell
• Dedicates research efforts  to benefit our clients, not our 
press‐releases
• Implements business‐friendly security
• Remains honest and independent
3
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
Presentation Outline
• The Risk Assessment Environment
• Failure of Current Risk Assessment Practices
• Preparing for a Rapid Risk Assessment
• The Rapid Risk Assessment Process
SECURITY:ServicesSolutionsSupport
THE RISK ASSESSMENT 
ENVIRONMENT
Rapid Risk Assessment
4
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
What is Risk Assessment?
• Systematic and objective determination of the seriousness of 
threats. 
• Good risk assessment aims to: 
• Identify the threats that affect an entity (company, network, 
systems, application, etc.) 
• Qualify and quantify those threats 
• Craft reasonable remedies to reduce, eliminate, accept or 
transfer the risk
• Help protect the business/organization and its assets 
• Empower leadership to make sensible investments in 
security controls and processes 
SECURITY:ServicesSolutionsSupport
Increasing Emphasis on Risk Assessment
• Always been a PCI requirement (12.1.2)
• HIPAA Omnibus reinforces need for risk assessment
• Assessment to define risk management program (which in 
turn defines the controls that meet the standard)
• Breach notification now require risk analysis of any 
suspected breach to determine if notification is necessary
• FFIEC 2011 Supplement mandated new things to assess
• Defines specific issues to analyze concerning authentication
• Reinforced the need for annual assessments 
• Mandated assessments on banking applications 
• Outlined requirements to reperform assessments when 
there are changes 
5
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
Increased Scrutiny 
• From HIPAA Omnibus:
“…we expect these risk assessments to be thorough, completed 
in good faith, and for the conclusions reached to be 
reasonable.”
• Regulations are demanding more risk assessments 
• Regulators are shifting focus to look at risk assessments
• Business leaders are demanding better risk analysis
• So what’s the problem? 
SECURITY:ServicesSolutionsSupport
THE FAILURE OF CURRENT RISK 
ASSESSMENT PRACTICES
Rapid Risk Assessment
6
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
Something Is Not Right Here
• Companies were consistently complaining about their IT risk 
assessments: 
• “Why does this take so long?”
• “This is just a paperwork exercise”
• “What am I supposed to do with this?”
• “Where are the problems?
• “How do I fix the problems?” 
• “Are we in danger?”
• “What do all these numbers, charts and worksheets mean?”
• “This is just a meaningless regulatory requirement!” 
• We were not the only ones…
SECURITY:ServicesSolutionsSupport
Practitioners are Questioning Risk Assessment 
Source: http://www.networkworld.com/news/tech/2012/101512‐risk‐management‐
263379.html
7
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
With Mixed Results
For any risk management method 
… we must ask …“How do we know 
it works?” If we can’t answer that 
question, then our most important 
risk management strategy should 
be to find a way to answer it and 
adopt a risk assessment and risk 
mitigation method that does work.
Hubbard, Douglas W. (2009‐04‐06). The Failure 
of Risk Management: Why It's Broken and How 
to Fix It. John Wiley and Sons. Kindle Edition. 
SECURITY:ServicesSolutionsSupport
The Problem
• Current practices are…
• Slow
• Complex 
• Incomprehensible to management 
• Fail to provide clear actionable steps to reduce risk
• Why?  
8
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
Arcane Language
• Language affects not only comprehension, but also acceptance
• Overly complex, arcane language is inefficient and inaccessible 
• Risk management theories devolve into nitpicking paperwork 
exercises that nobody reads
• Consider this definition from OCTAVE for Defined Evaluation 
Activities: 
Implementing defined evaluation activities helps to 
institutionalize the evaluation process in the organization, 
ensuring some level of consistency in the application of the 
process. It also provides a basis upon which the activities can be 
tailored to fit the needs of a particular business line or group.
SECURITY:ServicesSolutionsSupport
The Fallacy of Numbers
• Using numbers does not make analysis more “true”
• If a number is arrived at from a subjective assessment, then its 
use in any calculations is equally subjective 
• Charts full of numbers may “feel” empirical, but they’re not
• Its impossible to establish true value for IT asset
• Misleading, creates a false sense of accuracy 
• Creates a false scale that does not translate into real‐world 
thinking 
9
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
Time Consuming
• IT risk is volatile, dynamic and has a short shelf life 
• Any risk assessment over 90‐180 days old is stale 
• NIST, OCTAVE, FAIR are nice ideas, but too time consuming
• Spending a year on a risk assessment is too long
• A good enterprise risk assessment should be done in under 30 
days 
• Documentation is time consuming
• Risk assessment is not a consensus of opinions, it’s an 
assessment from a single person or group that understands risk 
SECURITY:ServicesSolutionsSupport
Probability Can Be Flawed
• On a long enough time line, the survival rate for everybody 
drops to zero.  Jack, Fight Club, 1999
• Lack of time context makes any assessment of probability 
fundamentally flawed. 
• Humans are naturally bad at assessing the probability of risks.
• Fallacy of backtesting
10
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
Lack of Evidence
• Risk assessment methodologies focus heavily on process, and 
very little on evidence 
• Custodians and business process owners withhold information
• The security of an environment can be tested in a controlled, 
rational manner
• Without testing, the entire analysis is one‐sided
• Testing can cut through conjecture and prove (or disprove) the 
severity of a threat
SECURITY:ServicesSolutionsSupport
The Challenge
• Risk assessment needs to be more useful.
• How can this process produce tangible ways to reduce risk? 
• The volatility of modern IT makes IT risk assessment a 
fundamentally qualitative effort
• Since the effort is qualitative, the skill of the assessor is 
paramount to obtaining accurate assessments
• How do we improve risk assessment to make it:
• More accurate
• More responsive to business needs
• More actionable
• Quicker 
11
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
PREPARATION
Rapid Risk Assessment
SECURITY:ServicesSolutionsSupport
Features of Rapid Risk Assessment
• Aims to speed up the risk assessment process & make it more 
useful to the business
• Trades precision and some accuracy for efficiency and usability 
• Focuses on simplicity and clarity 
• Dismisses theory and conjecture in place of decisive action
• Explains risk in simple, business‐friendly terminology
• Uses a set time frame for probability 
• Simplifies the assignment of value
• Uses a “lens” that focuses and frames assessment effort
• Establishes authority to make risk judgments 
• Leverages new technologies such as Allgress
12
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
Rapid Risk Assessment Outline
• Prerequisites
• Advanced writing skills
• Hands on IT skills
• Authority 
1. Establish Scope & Lens
2. Interview Stakeholders
3. Test the Environment
4. Define Threats & Correlate Data
5. Define Probability & Impact Scale 
6. Document Risks
7. Develop Action Plan
SECURITY:ServicesSolutionsSupport
Prerequisite: Advanced Writing Skills
• No theories, no complex worksheets, no “risk management” 
terms
• Simple, business language that states risk in plain, matter‐of‐
fact way
• Establishes authority 
• States risk as it *is* without conjecture or indecisiveness
• Active voice 
• Should be able to sum up the entire assessment effort in a few 
bullet points 
13
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
Prerequisite: Hands‐on IT Skills
• Must have in‐depth understanding of IT operations
• Systems administration
• Network design, architecture, management 
• Security analysis 
• Application lifecycle management 
• Database administration
• IT practices, procedures, policies development
• Must know how an IT department runs, if you ever hope to 
identify its weaknesses
SECURITY:ServicesSolutionsSupport
Prerequisite: Authority
• Management must definitively endorse and support risk 
assessment 
• Must have access to stakeholders 
• Ability to scan, test and evaluate technology 
• Authority to decisively analyze technologies 
• Ability to built credibility and authority through experience, 
language, and engagement 
14
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
THE PROCESS
Rapid Risk Assessment
SECURITY:ServicesSolutionsSupport
#1 ‐ Establish Scope & Lens
• Scope – what assets are in scope (hopefully all of them)
• Lens – how will you look at the assets?
• Data types – customer, internal, security, etc.
• System – server, workstation, infrastructure
• Application – user, customer, financial, etc. 
• Lens creates the context for analysis.
• It helps focus the effort 
15
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
#2 ‐ Interview Stakeholders
• Develop a set of questions specific to the business role: 
• IT custodians – technical questions
• Business process owners – criticality & usage 
• Define value in context of the entire business using simple 
terms: critical, high, medium, low, none
• Focus on current state 
• Be careful with “forward looking” data – chasing a moving 
target
• Catalog results
SECURITY:ServicesSolutionsSupport
#3 – Test the Environment
• Vulnerability scans of all in‐scope systems, apps or locations of 
data 
• Conduct penetration tests
• Web application testing
• Database testing 
• Configuration analysis (sample as needed)
• AV / IPS / Firewall logs (sample and spot check)
• Risk determination must be based on REAL data, not feelings, 
ideas, theories, or personal interpretations 
• This is where hands‐on IT experience is a must 
16
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
#4 – Define Threats & Correlate Data
• Organize threats into simplified categories
• Technical – threat to systems, hardware, applications, etc. 
• Operational – threats that affect practices, procedures, or 
business functions
• Relational – threat to a relationship between groups, people 
or third parties 
• Physical – threats to facilities, offices, etc. 
• Reputational (optional) – threats to the organization’s 
reputation, perception, or public opinion 
• Correlate threats to assessment data
• Keep threats simple
SECURITY:ServicesSolutionsSupport
Threat Samples
• Good Threat Definitions
• Theft of confidential data
• Malware infection
• Denial of service attack 
• Theft of sensitive authentication data
• Bad Threat Definitions
• Lack of alignment to organizational policies with guidelines 
set forth by the security committee means staff is not 
properly implementing security controls. 
• Use of telnet among staff is threatening PCI compliance 
requirements. 
• Missing patches on systems
17
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
#5 ‐ Define Probability & Impact Scale
Probability 
Impact 
Metric  Description
Certain <95% likelihood of occurrence within the next 12 months.  
High 50‐95% likelihood of occurrence within the next 12 months.  
Medium 20‐49% likelihood of occurrence within the next 12 months.  
Low 1‐20% likelihood of occurrence within the next 12 months.  
Negligible >1% likelihood of occurrence within the next 12 months.  
Metric  Description
Critical Catastrophic effect on the Data Asset. 
High Serious impact on the Data Asset's functionality. 
Medium Threat may cause some intermittent impact on the Data Asset, but would 
not lead to extended problems. 
Low Impact on the Data Asset is small and limited. Would not cause any 
disruption in core functions. 
Negligible Data Asset remains functional for the business with no noticeable slowness 
or downtime. 
SECURITY:ServicesSolutionsSupport
#6 ‐ Document Risks
• Condense, simplify and focus on the problem
• Threat – How the asset is at risk
• Vulnerabilities – The vulnerabilities relevant to the risk 
• Recommendation – Tangible actions to remediate the risk 
• Impact – Simplified 5 point score (critical, high, medium, low, 
none) 
• Probability – Simplified 5 point score (certain, high, medium, 
low, negligible) 
• Risk – Simplified product of Impact * Probability (critical, high, 
medium, low, negligible) 
18
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
Documentation Sample
Threat Vulnerabilities Recommendation
Impact
Probability
Risk
Malware 
infection
 Outdated anti‐
virus
 Lack of anti‐
virus on 36% of 
servers
 32 high ranked 
vulnerabilities 
on in‐scope 
systems 
 Lack of virus 
scanning at the 
network layer
 Endpoint antivirus must be installed on all hosts.
 All endpoint antivirus must be updated daily
 All systems must have new patches applied within 
30 days of release.
 Company must deploy a more robust patch 
management platform. 
 Implement a core firewall that can perform virus 
scanning at the network layer. 
H C H
SECURITY:ServicesSolutionsSupport
Online Version Using Allgress
19
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
#7 – Develop an Action Plan
• Summarize all the recommendations into a single, prioritized list 
• Simplify into tangible tasks
• GOOD: Implement third party patch management. IBM BigFix, 
Dell Kace, and GFI Languard are all viable products to consider. 
Require solution to patch all systems within 30 days of a new 
patch. 
• BAD: IT management procedures need updating to align with 
best practices. 
SECURITY:ServicesSolutionsSupport
Don’t
• Try to change the culture of the business 
• Let perfection become the enemy of good
• Cite any kind of risk management theory – nobody cares
• Use a lot of risk terminology
• Say more than you need to
• Document indecision
• Add complexity when it offers no improvement in clarity
• Use inaccessible matrices, worksheets, or process flows
• Insert charts or graphs when they don’t aid in comprehension
20
www.anitian.com | info@anitian.com
SECURITY:ServicesSolutionsSupport
Do
• Use simple language. Plain English descriptions
• Establish authority with experience, language, and presence 
• Simplify, condense, clarify
• Identify tangible, actionable recommendations
• Help management make decisions about risk 
• Focus on the likely
SECURITY:ServicesSolutionsSupport
Thank You
EMAIL:  info@anitian.com for a
copy of the presentation
WEB: www.anitian.com
BLOG:  blog.anitian.com
CONTACT: Andrew Plato, CISSP, CISM, QSA
President  / CEO
andrew.plato@anitian.com
888‐ANITIAN

More Related Content

Viewers also liked

Innovation Overload – Technology, Jobs and the Future
Innovation Overload – Technology, Jobs and the FutureInnovation Overload – Technology, Jobs and the Future
Innovation Overload – Technology, Jobs and the FutureInnoTech
 
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
 The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New... The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...InnoTech
 
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...InnoTech
 
A next generation introduction to data science and its potential to change bu...
A next generation introduction to data science and its potential to change bu...A next generation introduction to data science and its potential to change bu...
A next generation introduction to data science and its potential to change bu...InnoTech
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2InnoTech
 

Viewers also liked (6)

Innovation Overload – Technology, Jobs and the Future
Innovation Overload – Technology, Jobs and the FutureInnovation Overload – Technology, Jobs and the Future
Innovation Overload – Technology, Jobs and the Future
 
Nmbs in Society30
Nmbs in Society30Nmbs in Society30
Nmbs in Society30
 
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
 The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New... The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
 
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
 
A next generation introduction to data science and its potential to change bu...
A next generation introduction to data science and its potential to change bu...A next generation introduction to data science and its potential to change bu...
A next generation introduction to data science and its potential to change bu...
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2
 

Similar to Rapid Risk Assessment

Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementEnergySec
 
Why information security is becoming the most important for mid size business...
Why information security is becoming the most important for mid size business...Why information security is becoming the most important for mid size business...
Why information security is becoming the most important for mid size business...Ajay p
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a ShoestringNCC Group
 
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity FrameworkAchieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity FrameworkKevin Fealey
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesJeff Miller
 
What your scanner isn't telling you
What your scanner isn't telling youWhat your scanner isn't telling you
What your scanner isn't telling youCore Security
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Reddy Marri
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Emrah Alpa, CISSP CEH CCSK
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 

Similar to Rapid Risk Assessment (20)

Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
 
Why information security is becoming the most important for mid size business...
Why information security is becoming the most important for mid size business...Why information security is becoming the most important for mid size business...
Why information security is becoming the most important for mid size business...
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Esguf Profile Short V34
Esguf Profile Short V34Esguf Profile Short V34
Esguf Profile Short V34
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
 
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity FrameworkAchieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
 
What your scanner isn't telling you
What your scanner isn't telling youWhat your scanner isn't telling you
What your scanner isn't telling you
 
Data Protection: An Approach to Privacy
Data Protection: An Approach to PrivacyData Protection: An Approach to Privacy
Data Protection: An Approach to Privacy
 
Conquest capabilities q2 2015 v2
Conquest capabilities q2 2015 v2Conquest capabilities q2 2015 v2
Conquest capabilities q2 2015 v2
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Tim Nolan
Tim NolanTim Nolan
Tim Nolan
 
IT security consultancy company profile
IT security consultancy company profileIT security consultancy company profile
IT security consultancy company profile
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 

More from InnoTech

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"InnoTech
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is MaturingInnoTech
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?InnoTech
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostInnoTech
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering StormInnoTech
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the fieldInnoTech
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implicationsInnoTech
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged InfrastructureInnoTech
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365InnoTech
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studiesInnoTech
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential InnoTech
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?InnoTech
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...InnoTech
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeInnoTech
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacyInnoTech
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio InnoTech
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumInnoTech
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionInnoTech
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentationInnoTech
 
Using rest to create responsive html 5 share point intranets
Using rest to create responsive html 5 share point intranetsUsing rest to create responsive html 5 share point intranets
Using rest to create responsive html 5 share point intranetsInnoTech
 

More from InnoTech (20)

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is Maturing
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters Most
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering Storm
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the field
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged Infrastructure
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to Life
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacy
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - Quorum
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner session
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentation
 
Using rest to create responsive html 5 share point intranets
Using rest to create responsive html 5 share point intranetsUsing rest to create responsive html 5 share point intranets
Using rest to create responsive html 5 share point intranets
 

Recently uploaded

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Rapid Risk Assessment