Risk Assessment AFFORDABLE SOLUTION USING E XCEL AND P OWER BI.

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

1.  FHWA Climate Change Resilience Program ◦ Assessment Framework ◦ Transportation Vulnerability  Flash Flood Vulnerability project ◦ Background ◦ Objectives.
Presented by: Nick McHugh Date: 15/11/2005 Security, Safety, Confidence.
Risk Management a Case Study DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
By: Ashwin Vignesh Madhu
Managing Project Risk.
SOX & ISO Protect your data and be ready to be audited!!!
Best Practices By Gabriel Rodriguez
Risk-Based Inspection Program Best Practice – Executive Summary
1 Continuity Planning An Overview…. 2 Continuity Planning Bill Scott CBCP Contingency Planning Coordinator Great Lakes Educational Loan Services, Inc.
BYU Management Society Entrepreneurial “Idea Share” Workshop 17 April
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Using Excel, Excel Service and PerformancePoint
Chapter 11: Project Risk Management
1 Threat Modeling at Symantec OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec Edward Bonver Principal Software Engineer, Symantec Product.
EQAA 11th Session Jamil Kalat-Malho Jong Ho Lee
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
WMD & Emergency Planning Steps Session 12. Emergency Planning Steps Vulnerability Assessment Mitigation Efforts Emergency Response Planning Recovery.
Systems and Software Consortium | 2214 Rock Hill Road, Herndon, VA Phone: (703) | FAX: (703) Best.
Tingxuan Liu Risk Management in Software engineering.
Dr. Benjamin Khoo New York Institute of Technology School of Management.
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
1 DORS PROPRIETARY–SENSITIVE INFORMATION Welcome to DORS Many high volume restaurants during peak periods can experience a significant increase in inaccurate.
Project Management Documentation The Problems: 1)Many developers must share information. 2)New developers must get up to speed quickly. 3)Documentation.
Risk Assessment Richard Newman. Six Phases of Security Process 1. Identify assets 2. Analyze risk of attack 3. Establish security policy 4. Implement.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Introduction to Enterprise Risk Managment Types of Risk Impact of Risk ERM –Importance of ERM –ERM Options –Risk Profiles & Portfolios –ERM Valuation Credit.
Introduction to Project Management Chapter 9 Managing Project Risk
Rational Unified Process (RUP)
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
Taking Control Do you need a contact management system (CMS)?
31 May | SharePoint Saturday Calgary – 31 MAY 2014 About Me.
Risk Assessment What is good about the Microsoft approach to threat modeling? What is bad about it? OCTAVE…  Advantage: ___________  Disadvantage: ___________.
1 /13 Risk Management What is Risk ?. 2 /13 Risk Management What is Risk ? Risk is the possibility of suffering loss. (Carnegie Mellon SEI definition)
Networks ∙ Services ∙ People Mark Johnston SIG ISM - Copenhagen Changing GÉANT’s Security Future GÉANT Feb 22, 2016 CNOO – Head of IIS Fotis.
Consulting | Solutions | Products | Training Extending Project & Project Server.
Esri UC 2014 | Technical Workshop | Managing an Enterprise GIS Project: Key Things You Need Right from the Start Gerry Clancy Glenn Berger.
Risk Assessment AFFORDABLE SOLUTION USING E XCEL AND P OWER BI.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
IS&T Project Reviews September 9, Project Review Overview Facilitative approach that actively engages a number of key project staff and senior IS&T.
Primary Steps for Achieving ISO Certification.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
S7-1 © 2001 Carnegie Mellon University OCTAVE SM Process 7 Conduct Risk Analysis Software Engineering Institute Carnegie Mellon University Pittsburgh,
Scales Technology FZCO
Defining your requirements for a successful security (and compliance
An Overview on Risk Management
Office 365 Security Assessment Workshop
Microsoft’s shiny dashboard-tool
Grid Security Risks Mike Surridge
Figure 3: TSN Analysis Methodology
Auditing Application Controls
Risk Assessment Richard Newman
SEC 240 Education on your terms/tutorialrank.com.
IS&T Project Reviews September 9, 2004.
Information Security Risk Management
بعض النقاط التي تؤخذ في الحسبان عند تقييم الاستثمارات الزراعية
Reporting Services... A reborn product
For more information, please see our methodology at: 
SAG Infotech Private Limited
Outbound Inventory From a Vendor Managed Perspective [Luis Gil]
IS Risk Management Framework Overview
Effective Risk Management in Decision Making Process
Playing with (M)agic: Introduction to Writing M Code in Power BI
In the attack index…what number is your Company?
Action title DUMMY SLIDE DUMMY SLIDE DUMMY SLIDE Situation
Program & Project Risks and Reporting with Oracle Primavera Cloud
Presentation transcript:

Risk Assessment AFFORDABLE SOLUTION USING E XCEL AND P OWER BI

Thank you to our sponsors!

Agenda  Who am I  Why this topic  Risk assessment  Demo  Pros and cons

Who am I  Ásgeir Gunnarsson  BI architect / developer for Össur  Consultant for Capacent  In BI since

Why this topic  Enterprise risk management in Capacent  Custom made software  Disconnected Excel  Affordable solution in commonly used software Strategy Methodology Organization Risk factors Planning Risk assessment Training Controls Reporting Change management Disclamer: Some of the methods and application belongs to Capacent

Risk assessment  Different methodologies – 4 step, 5 step, ISO …  Common theme  Identify – register – react – report Risk is a function of the values of threat, consequence, and vulnerability. The objective of risk management is to create a level of protection that mitigates vulnerabilities to threats and the potential consequences, thereby reducing risk to an acceptable level. ISC 2010

Risk assessment  Risk factors – Assets  Risk Assessment – Impact and Likelihood  Actions on biggest risks  Report

“Size” of risk – Impact * Likelihood Quality of Control Risk assessment

Demo

Pros and cons  Pros  No software cost besides excel  Not very complicated code  Some traceability

Pros and cons  Cons - weaknesses  All in one document – single point of failure  Some hardcoded stuff like segments  Sensitive to changes in the data model  Power Query vs. PowerPivot  Not full traceability – Version control

@bidgeir Questions

Your feedback is important! Please let us know what you thought of this session