Risk Assessment AFFORDABLE SOLUTION USING E XCEL AND P OWER BI.

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Introduction to Risk Management 26 September 2014 Peter Fowler CPPD.
MAKING BUSINESS INTELLIGENT 19 May 2012 Multi-Tenancy vs Shared Services in SharePoint 2010 Alistair Pugin– Pragmatic
By: Ashwin Vignesh Madhu
0 What is Project Online and why should I care? Treb Gatte, MBA, MCP, MCTS, Project MVP.
SOX & ISO Protect your data and be ready to be audited!!!
Brian Markham Director, DIT Compliance and Risk Services May 1, 2014
Information Security Risk Management
BYU Management Society Entrepreneurial “Idea Share” Workshop 17 April
SharePoint 2013, customization and branding. Christian Ståhl.
SPONSORS. Microsoft PowerPivot for SQL Server, Excel 2010, and SharePoint 2010 Michael Herman Syntergy, Inc.
Branding in SharePoint #SPcincy2013 on Twitter Open wireless access is available. Feel free to Tweet (#SPcincy2013) and.
Using Microsoft ACCESS to develop small to medium applications on campus.
1 Threat Modeling at Symantec OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec Edward Bonver Principal Software Engineer, Symantec Product.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
IT Pro Day Auditing in SQL Server 2012 Charley Hanania Principal Consultant, QS2 AG – Quality Software Solutions
GDG Overview “Presentation to SMI2G Brokerage Event 2014” Presentation delivered by: Paul Doherty
Anthony Pham Product Support Manager
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
Tingxuan Liu Risk Management in Software engineering.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Doug Off Ojai Oil Company Golden State Storage May 02, 2012.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Introduction to Enterprise Risk Managment Types of Risk Impact of Risk ERM –Importance of ERM –ERM Options –Risk Profiles & Portfolios –ERM Valuation Credit.
PLEASE COMPLETE THIS SHORT SURVEY You can use the QR Code or the short URL to access the survey.
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
An Introduction to Excel Services and PowerPivot Presented by : Mark Stacey 26 February 2011.
1 I ntegrated S ite S ecurity for G rids WP2 – Site Assessment Methodology, 20 June 2007 WP2 - Methodology ISS e G Integrated Site Security.
31 May | SharePoint Saturday Calgary – 31 MAY 2014 About Me.
Networks ∙ Services ∙ People Mark Johnston SIG ISM - Copenhagen Changing GÉANT’s Security Future GÉANT Feb 22, 2016 CNOO – Head of IIS Fotis.
INTRODUCTION TO MDX. Stick around for SWAG! (Prize drawing at 5.00 p.m)  All our volunteers and organisers do not get paid for running SPS SQLSaturday.
How to create a Windows app with Project Siena, SharePoint and Office 365 Knut Relbe-Moe Office 365 MVP Chief Technical Architect.
Getting Started with Datazen Microsoft’s New Mobile Dashboard Platform.
Configure on-premises SharePoint environment for App/Add-in Koncern-it Dias 1.
Putting Your Head in the Cloud Working with SQL Azure David Postlethwaite 19/09/2015David Postlethwaite.
demo Value Profit per country $542, $56, $175, $182, $223, $324, Profit for current country Rank.
SQL Server High Availability Introduction to SQL Server high availability solutions.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
INTRODUCTION TO MDX. Stick around for RAFFLE and the AFTER EVENT!  All our volunteers and organisers do not get paid for organizing this event – If.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Shadow prediction: SQL 2014 spatial data types and astronomy well mixed.
Risk Assessment AFFORDABLE SOLUTION USING E XCEL AND P OWER BI.
Talks! GrantStation: Your Fast Track to Funding August 11, 2010 Audio is only available by calling this number: Conference Call: ; Access Code:
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
SECURING SQL AZURE DATABASE? Boris Hristov SQLSaturday #413 Copenhagen.
Scales Technology FZCO
Welcome! Microsoft Dynamics AX user Group (AXug)
An Overview on Risk Management
Office 365 Security Assessment Workshop
ISSeG Integrated Site Security for Grids WP2 - Methodology
Microsoft’s shiny dashboard-tool
Welcome! Microsoft Dynamics AX user Group (AXug)
From MDS to SSRS - a short walkthrough
Grid Security Risks Mike Surridge
Figure 3: TSN Analysis Methodology
From Navision Dynamics Nav to Power BI Dashboard in 45 minutes
Welcome! Power BI User Group (PUG)
Risk Assessment = Risky Business
Information Security Risk Management
Mobile, Paginated, KPIs, and Power BI, Oh My!
Performance tuning Tabular and PowerPivot models
Managing Content: You Need To Think About More Than Office 365
SAG Infotech Private Limited
Effective Risk Management in Decision Making Process
How To Load A Fact Table Really, Really Fast
Action title DUMMY SLIDE DUMMY SLIDE DUMMY SLIDE Situation
Program & Project Risks and Reporting with Oracle Primavera Cloud
Presentation transcript:

Risk Assessment AFFORDABLE SOLUTION USING E XCEL AND P OWER BI

Say thank you to our Sponsors :

Stick around for RAFFLE and the AFTER EVENT!  All our volunteers and organisers do not get paid for organizing this event – If you see them, please:  Give them a hug  Shake their hand  Say thank you  Spread the word  Get involved yourself  Don’t forget to thank the sponsors for their support  Thank the speakers for donating their time, energy and expenses

Agenda  Who am I  Why this topic  Risk assessment  Demo  Pros and cons

Who am I  Ásgeir Gunnarsson  BI architect / developer for Össur  Consultant for Capacent  In BI since

Why this topic  Enterprise risk management in Capacent  Custom made software  Disconnected Excel  Affordable solution in commonly used software Strategy Methodology Organization Risk factors Planning Risk assessment Training Controls Reporting Change management Disclamer: Some of the methods and application belongs to Capacent

Risk assessment  Different methodologies – 4 step, 5 step, ISO …  Common theme  Identify – register – react – report Risk is a function of the values of threat, consequence, and vulnerability. The objective of risk management is to create a level of protection that mitigates vulnerabilities to threats and the potential consequences, thereby reducing risk to an acceptable level. ISC 2010

Risk assessment  Risk factors – Assets  Risk Assessment – Impact and Likelihood  Actions on biggest risks  Report

“Size” of risk – Impact * Likelihood Quality of Control Risk assessment

Demo

Sharing the Excel workbook  Fileshare /  SharePoint  Possible version control  PowerBI  PowerUpdate  (powerpivotpro.com)

Pros and cons  Pros  No software cost besides excel  Not very complicated code  Some traceability

Pros and cons  Cons - weaknesses  All in one document – single point of failure  Some hardcoded stuff like segments  Sensitive to changes in the data model  Power Query vs. PowerPivot  Not full traceability – Version control

@bidgeir Questions