SlideShare une entreprise Scribd logo
1  sur  55
RISKWATCH SOFTWARE STREAMLINES  RISK ASSESSMENTS FOR GLBA,  RED FLAG, NCUA PART 748, BSA and FFIEC REQUIREMENTS RiskWatch for Credit Unions
RiskWatch for  Credit Unions CUNA & NCUA approved Software for Risk Assessments to meet NCUA 748 & FFIEC Guidelines
BECOME A CHARTER MEMBER of the Risk Assessment Service Group ,[object Object],[object Object],[object Object],[object Object]
The Environment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Current/Changing View of IT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Companies Need ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Compliance Regulations,  Standards and Guidelines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Action Summary from the FFIEC IT Examination Handbook, July 2006 and  NCUA Part 748   ,[object Object],[object Object],[object Object],[object Object],[object Object],FFIEC – July 2006
Red Flag - Identity Theft
Red Flag Deadline: November 2008 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NEW FFIEC Guidance, July 27, 2006  Applies to Credit Unions
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What  Is  Risk Assessment ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RiskWatch Clients
NCUA 12 CFR 7 Subchapter A,  Part 748, Sections 353.1-353.3   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RiskWatch Software Meets all New Compliance Requirements   ,[object Object],[object Object],[object Object],[object Object]
Data Aggregation & Analysis Financial Data Software Automatically Analyses  Over 3 Million  Linking Relationships Risk = Asset    Loss    Threat    Vulnerability Loss Delays & Denials Fines Disclosure Modification Direct Loss Asset Applications Database Financial Data Hardware System Software Threat Disclosure Hackers Fraud Viruses Network Attack Loss of Data Embezzlement Vulnerability Acceptable Use Disaster Recovery Authentication Network Controls No Security Plan Accountability Privacy Access Control Fines Disclosure Modification Fraud Loss of Data Acceptable Use Authentication Privacy Access Control
WHAT’S RISKWATCH?   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RiskWatch is The First Choice in Security Risk Assessment Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RiskWatch Products 9.3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
From the Gartner Group Report “ RiskWatch, Inc., is positioned as the leading "rescuer" of a massive private and public market constrained by fear of loss in terms of dollars and human life. Its unique form of rescue is in its before-the-fact nature. The RiskWatch tools credibly guide the users through a process to qualify its security situation concerning threats, assets, potential loss, vulnerabilities, and safeguards.  The client has the opportunity to establish its own image and foundation of security through RiskWatch's regulatory and quality compliance and accreditation tools and functions .  Through its quantitative methods and automated functions, RiskWatch arms the analysts and decision-makers with a solid risk management analysis based on the ALE balanced with the ROI. Once the client establishes the security policies—the plan is deployed and its life cycle managed within the framework of RiskWatch.  RiskWatch brings financially realized value to the client and the management vehicle and standards to follow”.
RISKWATCH ®  Value ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why RiskWatch Stays Number One ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ELEMENTS OF A METRICS-BASED  RISK ASSESSMENT APPROACH ASSETS THREATS VULNERABILITIES LOSSES SAFEGUARDS
RISKWATCH ®  Risk Assessment Process Automated Survey Management Process Management Data Aggregation &  Analysis Content (Rules & Data) Risk Analysis Customization Reporting Respondents Analyst(s)
Progress at a Glance – Tracks the Case
Data Aggregation & Analysis Financial Data Software Automatically Analyses  Over 3 Million  Linking Relationships Risk = Asset    Loss    Threat    Vulnerability Loss Delays & Denials Fines Disclosure Modification Direct Loss Asset Applications Database Financial Data Hardware System Software Threat Disclosure Hackers Fraud Viruses Network Attack Loss of Data Embezzlement Vulnerability Acceptable Use Disaster Recovery Authentication Network Controls No Security Plan Accountability Privacy Access Control Fines Disclosure Modification Fraud Loss of Data Acceptable Use Authentication Privacy Access Control
Valuing Assets – RiskWatch Auto- Populates Asset Values
RISKWATCH PROVIDES AGGREGATED THREAT DATA OR YOU CAN OVERWRITE STANDARD AVERAGES WITH YOUR OWN ORGANIZATIONAL DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THREAT FREQUENCIES ARE PROVIDED AND CAN ALSO BE TAILORED WITH CUSTOMER DATA SUCH AS PENETRATION TEST DATA
Web-Based Surveys Facilitate Respondent  Answers Automated Survey Management
YOU CAN SELECT QUESTIONS THAT MAP  EXACTLY TO THE FFIEC, ISO-17799, GLBA or SB 1386 STANDARD
Each question uses actual security regulations as control standards and is linked to appropriate Functional Areas
Respondents Can Answer Questions over the Web with full ASP functionality
Fully Automated Web-based Surveys make it Easy to Involve Key Employees ,[object Object],[object Object],[object Object],[object Object],[object Object],USERS DON’T HAVE TO HAVE RISKWATCH TO ANSWER ELECTRONIC SURVEYS
Pre-selects Appropriate Loss Categories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INCLUDES ALL IT-REQUIRED SAFEGUARD CATEGORIES
EACH POTENTIAL SAFEGUARD INCLUDES DEFAULT VALUES FOR COST, MAINTENANCE AND LIFE CYCLE
Reports Results From Dozens Of Employees Are Instantly Aggregated And Analyzed.
RESULTS FROM THE RISK ASSESSMENTS ,[object Object],[object Object],[object Object],[object Object]
MITIGATION STRATEGIES 1.  Accept Risk 2.  Transfer Risk 2.  Mitigate Risk 3.  Better Risk Reactions 5.  Dealing with Residual Risk
The Case Summary Report Is  Pre-Written for Management
EASY TO UNDERSTAND  GRAPHS ILLUSTRATE OVERALL COMPLIANCE VS. NON-COMPLIANCE
Vulnerability Distribution Report Shows the Weak Compliance/ Security Areas
Vulnerability Distribution Report Shows the Weak Compliance/ Security Areas
Track Compliance by Individual
Vulnerability reports include complete audit trails and powerful analysis tools
Looking at Loss Expectancy by Type of Loss
RiskWatch Calculates the Return on Investment &  Recommends Cost Effective Security Controls. In this example, finishing and updating the Disaster Recovery Plan  had a 2000-1 ROI – that means for every dollar spent on updating the plan  (estimated at $1000)– the organization saves $2,000,000   ,[object Object],[object Object],[object Object]
SAFEGUARD REPORT -- RECOMMENDED CONTROLS BY RETURN ON INVESTMENT
Demonstrates Reduction in Loss Expectancy by  Applying Overlapping Layers of Protection from Implementing Top Recommended Controls
THE BOTTOM LINE ,[object Object],[object Object],[object Object],[object Object]
www.riskwatch.com

Contenu connexe

Tendances

2012 10 19 risk analysis training deck
2012 10 19 risk analysis training deck2012 10 19 risk analysis training deck
2012 10 19 risk analysis training deck
Elaine Axum
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
Samuel Loomis
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
Ben Browning
 
Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0
stevemeltzer
 

Tendances (20)

Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
 
Ch4 cism 2014
Ch4 cism 2014Ch4 cism 2014
Ch4 cism 2014
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management Overview
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response Plan
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Management
 
2012 10 19 risk analysis training deck
2012 10 19 risk analysis training deck2012 10 19 risk analysis training deck
2012 10 19 risk analysis training deck
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Cyber security reguations: The shape of things to come for captives?
Cyber security reguations: The shape of things to come for captives?Cyber security reguations: The shape of things to come for captives?
Cyber security reguations: The shape of things to come for captives?
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
PECB Webinar: Risk Treatment according to ISO 27005
PECB Webinar: Risk Treatment according to ISO 27005PECB Webinar: Risk Treatment according to ISO 27005
PECB Webinar: Risk Treatment according to ISO 27005
 

En vedette

ಮುಸ್ಲಿಮರಾಗಿರುವ ಸ್ಥಿತಿಯಲ್ಲಿ ನಮ್ಮನ್ನು ಈ ಲೊಕದಿಂದ ಎತ್ತಿಕೋ
ಮುಸ್ಲಿಮರಾಗಿರುವ ಸ್ಥಿತಿಯಲ್ಲಿ ನಮ್ಮನ್ನು ಈ ಲೊಕದಿಂದ ಎತ್ತಿಕೋಮುಸ್ಲಿಮರಾಗಿರುವ ಸ್ಥಿತಿಯಲ್ಲಿ ನಮ್ಮನ್ನು ಈ ಲೊಕದಿಂದ ಎತ್ತಿಕೋ
ಮುಸ್ಲಿಮರಾಗಿರುವ ಸ್ಥಿತಿಯಲ್ಲಿ ನಮ್ಮನ್ನು ಈ ಲೊಕದಿಂದ ಎತ್ತಿಕೋ
FAHIM AKTHAR ULLAL
 
Molecular dermatology
Molecular dermatologyMolecular dermatology
Molecular dermatology
Springer
 
La enseñanza por medio de competencias del manejo
La enseñanza por medio de competencias del manejoLa enseñanza por medio de competencias del manejo
La enseñanza por medio de competencias del manejo
guest3fbdc1e
 
Tipos de diapositivas
Tipos de diapositivasTipos de diapositivas
Tipos de diapositivas
Dario Recalde
 
Sequential experimentation in clinical trials
Sequential experimentation in clinical trialsSequential experimentation in clinical trials
Sequential experimentation in clinical trials
Springer
 
certificate of completion_ops analytics
certificate of completion_ops analyticscertificate of completion_ops analytics
certificate of completion_ops analytics
dionkhoo
 
Reactive power management of power networks with wind generation
Reactive power management of power networks with wind generationReactive power management of power networks with wind generation
Reactive power management of power networks with wind generation
Springer
 

En vedette (20)

R2J Mój start na rynku pracy
R2J Mój start na rynku pracyR2J Mój start na rynku pracy
R2J Mój start na rynku pracy
 
ಮುಸ್ಲಿಮರಾಗಿರುವ ಸ್ಥಿತಿಯಲ್ಲಿ ನಮ್ಮನ್ನು ಈ ಲೊಕದಿಂದ ಎತ್ತಿಕೋ
ಮುಸ್ಲಿಮರಾಗಿರುವ ಸ್ಥಿತಿಯಲ್ಲಿ ನಮ್ಮನ್ನು ಈ ಲೊಕದಿಂದ ಎತ್ತಿಕೋಮುಸ್ಲಿಮರಾಗಿರುವ ಸ್ಥಿತಿಯಲ್ಲಿ ನಮ್ಮನ್ನು ಈ ಲೊಕದಿಂದ ಎತ್ತಿಕೋ
ಮುಸ್ಲಿಮರಾಗಿರುವ ಸ್ಥಿತಿಯಲ್ಲಿ ನಮ್ಮನ್ನು ಈ ಲೊಕದಿಂದ ಎತ್ತಿಕೋ
 
Molecular dermatology
Molecular dermatologyMolecular dermatology
Molecular dermatology
 
La enseñanza por medio de competencias del manejo
La enseñanza por medio de competencias del manejoLa enseñanza por medio de competencias del manejo
La enseñanza por medio de competencias del manejo
 
Tipos de diapositivas
Tipos de diapositivasTipos de diapositivas
Tipos de diapositivas
 
Sequential experimentation in clinical trials
Sequential experimentation in clinical trialsSequential experimentation in clinical trials
Sequential experimentation in clinical trials
 
Ei dec. 2015 tech trends (1)
Ei dec. 2015 tech trends (1)Ei dec. 2015 tech trends (1)
Ei dec. 2015 tech trends (1)
 
вплив алкоголю на дітей та підлітків
вплив алкоголю на дітей та підлітківвплив алкоголю на дітей та підлітків
вплив алкоголю на дітей та підлітків
 
certificate of completion_ops analytics
certificate of completion_ops analyticscertificate of completion_ops analytics
certificate of completion_ops analytics
 
Family Rentals Info Graph
Family Rentals Info GraphFamily Rentals Info Graph
Family Rentals Info Graph
 
Портфоліо
ПортфоліоПортфоліо
Портфоліо
 
Chatran
ChatranChatran
Chatran
 
Presentacion doc energetico
Presentacion doc energeticoPresentacion doc energetico
Presentacion doc energetico
 
Determining and demonstrating value rebecca jones and moe hosseini
Determining and demonstrating value   rebecca jones and moe hosseiniDetermining and demonstrating value   rebecca jones and moe hosseini
Determining and demonstrating value rebecca jones and moe hosseini
 
Sonar platform
Sonar platformSonar platform
Sonar platform
 
Contrastive analysis on structure of passive sentence
Contrastive analysis on structure of passive sentenceContrastive analysis on structure of passive sentence
Contrastive analysis on structure of passive sentence
 
Reactive power management of power networks with wind generation
Reactive power management of power networks with wind generationReactive power management of power networks with wind generation
Reactive power management of power networks with wind generation
 
Liver Transplantation in U.S, Scenario Evaluation
Liver Transplantation in U.S, Scenario EvaluationLiver Transplantation in U.S, Scenario Evaluation
Liver Transplantation in U.S, Scenario Evaluation
 
Agile Architect as Servant Leader
Agile Architect as Servant LeaderAgile Architect as Servant Leader
Agile Architect as Servant Leader
 
How to improve order picking efficiency
How to improve order picking efficiencyHow to improve order picking efficiency
How to improve order picking efficiency
 

Similaire à RiskWatch for Credit Unions™

u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
Beji Jacob
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
lneut03
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docx
mydrynan
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
IPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
IPPAI
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 

Similaire à RiskWatch for Credit Unions™ (20)

u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
The IT Analysis Paralysis
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
FFIEC Cybersecurity Assessment Report CAR Example .pdf
FFIEC Cybersecurity Assessment Report CAR Example .pdfFFIEC Cybersecurity Assessment Report CAR Example .pdf
FFIEC Cybersecurity Assessment Report CAR Example .pdf
 
File000170
File000170File000170
File000170
 
Ffiec cat may_2017
Ffiec cat may_2017Ffiec cat may_2017
Ffiec cat may_2017
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docx
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
ISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochureISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochure
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
SEC Guidance on Cybersecurity
SEC Guidance on CybersecuritySEC Guidance on Cybersecurity
SEC Guidance on Cybersecurity
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptx
 
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachThe 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 

Dernier

一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书
一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书
一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书
atedyxc
 
一比一原版(UCSD毕业证书)加利福尼亚大学圣迭戈分校毕业证成绩单学位证书
一比一原版(UCSD毕业证书)加利福尼亚大学圣迭戈分校毕业证成绩单学位证书一比一原版(UCSD毕业证书)加利福尼亚大学圣迭戈分校毕业证成绩单学位证书
一比一原版(UCSD毕业证书)加利福尼亚大学圣迭戈分校毕业证成绩单学位证书
atedyxc
 
a study on customer perception towards mutual funds
a study on customer perception towards mutual fundsa study on customer perception towards mutual funds
a study on customer perception towards mutual funds
ShivangiChaurasiya3
 
一比一原版(UCSB毕业证书)圣塔芭芭拉社区大学毕业证成绩单学位证书
一比一原版(UCSB毕业证书)圣塔芭芭拉社区大学毕业证成绩单学位证书一比一原版(UCSB毕业证书)圣塔芭芭拉社区大学毕业证成绩单学位证书
一比一原版(UCSB毕业证书)圣塔芭芭拉社区大学毕业证成绩单学位证书
atedyxc
 
NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...
NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...
NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...
Amil baba
 
Prezentacja Q1 2024 EN strona www relacji
Prezentacja Q1 2024  EN strona www relacjiPrezentacja Q1 2024  EN strona www relacji
Prezentacja Q1 2024 EN strona www relacji
klaudiafilka
 
ASSESSING HRM EFFECTIVENESS AND PERFORMANCE ENHANCEMENT MEASURES IN THE BANKI...
ASSESSING HRM EFFECTIVENESS AND PERFORMANCE ENHANCEMENT MEASURES IN THE BANKI...ASSESSING HRM EFFECTIVENESS AND PERFORMANCE ENHANCEMENT MEASURES IN THE BANKI...
ASSESSING HRM EFFECTIVENESS AND PERFORMANCE ENHANCEMENT MEASURES IN THE BANKI...
indexPub
 
快速制作(otago毕业证书)新西兰奥塔哥大学毕业证 毕业文凭证书-国外文凭
快速制作(otago毕业证书)新西兰奥塔哥大学毕业证 毕业文凭证书-国外文凭快速制作(otago毕业证书)新西兰奥塔哥大学毕业证 毕业文凭证书-国外文凭
快速制作(otago毕业证书)新西兰奥塔哥大学毕业证 毕业文凭证书-国外文凭
vytqf
 

Dernier (20)

Pitch-deck CopyFinancial and MemberForex.ppsx
Pitch-deck CopyFinancial and MemberForex.ppsxPitch-deck CopyFinancial and MemberForex.ppsx
Pitch-deck CopyFinancial and MemberForex.ppsx
 
Big developments in Lesotho Butha-Buthe.
Big developments in Lesotho Butha-Buthe.Big developments in Lesotho Butha-Buthe.
Big developments in Lesotho Butha-Buthe.
 
Production and Cost of the firm with curves
Production and Cost of the firm with curvesProduction and Cost of the firm with curves
Production and Cost of the firm with curves
 
STRATEGIC MANAGEMENT VIETTEL TELECOM GROUP
STRATEGIC MANAGEMENT VIETTEL TELECOM GROUPSTRATEGIC MANAGEMENT VIETTEL TELECOM GROUP
STRATEGIC MANAGEMENT VIETTEL TELECOM GROUP
 
一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书
一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书
一比一原版(Cornell毕业证书)康奈尔大学毕业证成绩单学位证书
 
amil baba kala jadu expert uk amil baba kala jadu removal uk amil baba in mal...
amil baba kala jadu expert uk amil baba kala jadu removal uk amil baba in mal...amil baba kala jadu expert uk amil baba kala jadu removal uk amil baba in mal...
amil baba kala jadu expert uk amil baba kala jadu removal uk amil baba in mal...
 
一比一原版(UCSD毕业证书)加利福尼亚大学圣迭戈分校毕业证成绩单学位证书
一比一原版(UCSD毕业证书)加利福尼亚大学圣迭戈分校毕业证成绩单学位证书一比一原版(UCSD毕业证书)加利福尼亚大学圣迭戈分校毕业证成绩单学位证书
一比一原版(UCSD毕业证书)加利福尼亚大学圣迭戈分校毕业证成绩单学位证书
 
20240514-Calibre-Q1-2024-Conference-Call-Presentation.pdf
20240514-Calibre-Q1-2024-Conference-Call-Presentation.pdf20240514-Calibre-Q1-2024-Conference-Call-Presentation.pdf
20240514-Calibre-Q1-2024-Conference-Call-Presentation.pdf
 
a study on customer perception towards mutual funds
a study on customer perception towards mutual fundsa study on customer perception towards mutual funds
a study on customer perception towards mutual funds
 
Tourism attractions in Lesotho katse dam
Tourism attractions in Lesotho katse damTourism attractions in Lesotho katse dam
Tourism attractions in Lesotho katse dam
 
GIFT City Overview India's Gateway to Global Finance
GIFT City Overview  India's Gateway to Global FinanceGIFT City Overview  India's Gateway to Global Finance
GIFT City Overview India's Gateway to Global Finance
 
一比一原版(UCSB毕业证书)圣塔芭芭拉社区大学毕业证成绩单学位证书
一比一原版(UCSB毕业证书)圣塔芭芭拉社区大学毕业证成绩单学位证书一比一原版(UCSB毕业证书)圣塔芭芭拉社区大学毕业证成绩单学位证书
一比一原版(UCSB毕业证书)圣塔芭芭拉社区大学毕业证成绩单学位证书
 
Slideshare - ONS Economic Forum Slidepack - 13 May 2024.pptx
Slideshare - ONS Economic Forum Slidepack - 13 May 2024.pptxSlideshare - ONS Economic Forum Slidepack - 13 May 2024.pptx
Slideshare - ONS Economic Forum Slidepack - 13 May 2024.pptx
 
Amil baba australia kala jadu in uk black magic in usa
Amil baba australia kala jadu in uk black magic in usaAmil baba australia kala jadu in uk black magic in usa
Amil baba australia kala jadu in uk black magic in usa
 
NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...
NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...
NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...
 
Prezentacja Q1 2024 EN strona www relacji
Prezentacja Q1 2024  EN strona www relacjiPrezentacja Q1 2024  EN strona www relacji
Prezentacja Q1 2024 EN strona www relacji
 
1. Elemental Economics - Introduction to mining
1. Elemental Economics - Introduction to mining1. Elemental Economics - Introduction to mining
1. Elemental Economics - Introduction to mining
 
Managing personal finances wisely for financial stability and
Managing personal finances wisely for financial stability  andManaging personal finances wisely for financial stability  and
Managing personal finances wisely for financial stability and
 
ASSESSING HRM EFFECTIVENESS AND PERFORMANCE ENHANCEMENT MEASURES IN THE BANKI...
ASSESSING HRM EFFECTIVENESS AND PERFORMANCE ENHANCEMENT MEASURES IN THE BANKI...ASSESSING HRM EFFECTIVENESS AND PERFORMANCE ENHANCEMENT MEASURES IN THE BANKI...
ASSESSING HRM EFFECTIVENESS AND PERFORMANCE ENHANCEMENT MEASURES IN THE BANKI...
 
快速制作(otago毕业证书)新西兰奥塔哥大学毕业证 毕业文凭证书-国外文凭
快速制作(otago毕业证书)新西兰奥塔哥大学毕业证 毕业文凭证书-国外文凭快速制作(otago毕业证书)新西兰奥塔哥大学毕业证 毕业文凭证书-国外文凭
快速制作(otago毕业证书)新西兰奥塔哥大学毕业证 毕业文凭证书-国外文凭
 

RiskWatch for Credit Unions™

  • 1. RISKWATCH SOFTWARE STREAMLINES RISK ASSESSMENTS FOR GLBA, RED FLAG, NCUA PART 748, BSA and FFIEC REQUIREMENTS RiskWatch for Credit Unions
  • 2. RiskWatch for Credit Unions CUNA & NCUA approved Software for Risk Assessments to meet NCUA 748 & FFIEC Guidelines
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Red Flag - Identity Theft
  • 10.
  • 11. NEW FFIEC Guidance, July 27, 2006 Applies to Credit Unions
  • 12.  
  • 13.
  • 14.
  • 16.
  • 17.
  • 18.
  • 19. Data Aggregation & Analysis Financial Data Software Automatically Analyses Over 3 Million Linking Relationships Risk = Asset  Loss  Threat  Vulnerability Loss Delays & Denials Fines Disclosure Modification Direct Loss Asset Applications Database Financial Data Hardware System Software Threat Disclosure Hackers Fraud Viruses Network Attack Loss of Data Embezzlement Vulnerability Acceptable Use Disaster Recovery Authentication Network Controls No Security Plan Accountability Privacy Access Control Fines Disclosure Modification Fraud Loss of Data Acceptable Use Authentication Privacy Access Control
  • 20.
  • 21.
  • 22.
  • 23. From the Gartner Group Report “ RiskWatch, Inc., is positioned as the leading "rescuer" of a massive private and public market constrained by fear of loss in terms of dollars and human life. Its unique form of rescue is in its before-the-fact nature. The RiskWatch tools credibly guide the users through a process to qualify its security situation concerning threats, assets, potential loss, vulnerabilities, and safeguards. The client has the opportunity to establish its own image and foundation of security through RiskWatch's regulatory and quality compliance and accreditation tools and functions . Through its quantitative methods and automated functions, RiskWatch arms the analysts and decision-makers with a solid risk management analysis based on the ALE balanced with the ROI. Once the client establishes the security policies—the plan is deployed and its life cycle managed within the framework of RiskWatch. RiskWatch brings financially realized value to the client and the management vehicle and standards to follow”.
  • 24.
  • 25.
  • 26. ELEMENTS OF A METRICS-BASED RISK ASSESSMENT APPROACH ASSETS THREATS VULNERABILITIES LOSSES SAFEGUARDS
  • 27. RISKWATCH ® Risk Assessment Process Automated Survey Management Process Management Data Aggregation & Analysis Content (Rules & Data) Risk Analysis Customization Reporting Respondents Analyst(s)
  • 28. Progress at a Glance – Tracks the Case
  • 29. Data Aggregation & Analysis Financial Data Software Automatically Analyses Over 3 Million Linking Relationships Risk = Asset  Loss  Threat  Vulnerability Loss Delays & Denials Fines Disclosure Modification Direct Loss Asset Applications Database Financial Data Hardware System Software Threat Disclosure Hackers Fraud Viruses Network Attack Loss of Data Embezzlement Vulnerability Acceptable Use Disaster Recovery Authentication Network Controls No Security Plan Accountability Privacy Access Control Fines Disclosure Modification Fraud Loss of Data Acceptable Use Authentication Privacy Access Control
  • 30. Valuing Assets – RiskWatch Auto- Populates Asset Values
  • 31.
  • 32. THREAT FREQUENCIES ARE PROVIDED AND CAN ALSO BE TAILORED WITH CUSTOMER DATA SUCH AS PENETRATION TEST DATA
  • 33. Web-Based Surveys Facilitate Respondent Answers Automated Survey Management
  • 34. YOU CAN SELECT QUESTIONS THAT MAP EXACTLY TO THE FFIEC, ISO-17799, GLBA or SB 1386 STANDARD
  • 35. Each question uses actual security regulations as control standards and is linked to appropriate Functional Areas
  • 36. Respondents Can Answer Questions over the Web with full ASP functionality
  • 37.
  • 38.
  • 39. INCLUDES ALL IT-REQUIRED SAFEGUARD CATEGORIES
  • 40. EACH POTENTIAL SAFEGUARD INCLUDES DEFAULT VALUES FOR COST, MAINTENANCE AND LIFE CYCLE
  • 41. Reports Results From Dozens Of Employees Are Instantly Aggregated And Analyzed.
  • 42.
  • 43. MITIGATION STRATEGIES 1. Accept Risk 2. Transfer Risk 2. Mitigate Risk 3. Better Risk Reactions 5. Dealing with Residual Risk
  • 44. The Case Summary Report Is Pre-Written for Management
  • 45. EASY TO UNDERSTAND GRAPHS ILLUSTRATE OVERALL COMPLIANCE VS. NON-COMPLIANCE
  • 46. Vulnerability Distribution Report Shows the Weak Compliance/ Security Areas
  • 47. Vulnerability Distribution Report Shows the Weak Compliance/ Security Areas
  • 48. Track Compliance by Individual
  • 49. Vulnerability reports include complete audit trails and powerful analysis tools
  • 50. Looking at Loss Expectancy by Type of Loss
  • 51.
  • 52. SAFEGUARD REPORT -- RECOMMENDED CONTROLS BY RETURN ON INVESTMENT
  • 53. Demonstrates Reduction in Loss Expectancy by Applying Overlapping Layers of Protection from Implementing Top Recommended Controls
  • 54.