SlideShare a Scribd company logo
1 of 32
Risk Management
by Shyam
DISCLAIMER(S)
• The opinion here represented are my personal ones
and do not necessary reflect my employers views.
• Registered brands belong to their legitimate owners.
• The information contained in this
presentation does not break any
intellectual property, nor does it
provide detailed information that may
be in conflict with any laws
(hopefully...) :)
2
3
Personal Risk Management

4
Ideal Risk Management
A Prioritization process is followed whereby

the risks with the greatest (impact) and the
greatest probability (likelihood) of occurring

are handled first, and risks with lower
probability of occurrence and lower loss are

handled in descending order.
5
Impact vs Likelihood

6
Risk management methodologies
• NIST SP 800-30 framework
• ISO 27005 framework
• ISO 31000 Risk Management principles and guidelines
• PRISM framework
•OWASP Risk rating methodology
•COSO Enterprise risk management- Integrated framework
•OCTAVE
•ISF Information risk assessment methodologies (IRAM)
•ISACA risk IT
7
Problem
• These are somebody else’s vision of what risk management should
be.
• At best they are a guideline to give you examples of what others are
doing.
•At worst they make risk management look overly complicated and
make it difficult to get started.

8
Defining Risk
• Risk is the potential that a chosen action or activity (including the
choice of inaction) will lead to a loss (an undesirable outcome).

9
Risk can apply to
• Economic risk
•Health, Safety, and Environment
•IT and InfoSec
•Insurance
•Business and management
•Finance
•Security

10
Risk formula
•Likelihood: The probability of something occurring.
•Impact: The expected loss if that event occurs.
•Classic formula
•Risk= Likelihood*Impact

11
Make your risk formula fit you
• Weighting Impact
RISK= LIKELIHOODxIMPACT+IMPACT

12
•Weighting Impact
RISK= LIKELIHOODxIMPACT+ILIKELIHOOD

13
Be Flexible!!
•Risk management needs to be a custom fit for your organization and
your formula needs to reflect that.
•Your formula can (and likely will) change.
•Wherever you are tracking risks should be able to dynamically
update risk based on the updated formula.

•No word documents
•No excel documents
•No static formats

14
Determining risks
Convince your peers that documenting risks is CYOA and you’ll have
more risks than you know what to do with.
• Network vulnerability scanners
•Application vulnerability scanners
•Security mailing lists
• Security blogs
•Code Reviews

15
Evaluating a risk
Is the risk acceptable?

Is the likelihood or impact low enough that I’m willing to simply
accept the consequences if it happens.
Is the risk transferrable?
•Could I purchase insurance or some other measure to transfer
the impact of the risk to another party.
Is the risk reducable?
• Is there some sort of mitigation that could be put in place to
reduce the impact or likelihood of the risk.
16
Determining a response

17
Risk management is cyclical

18
Risk review process
• May depend on how lean your organization is on management
structure.

• Raise the visibility of high level risks.
• High Risk =VP
•Medium Risk =Director

• Low Risk = Area Manager
•Risk should be re-reviewed regularly.
• High Risk = Monthly
•Medium Risk = Semi-Monthly
• Low Risk = Annually
19
Risk management is not
• It is not a process for avoiding risk.
•The aim of risk management is not to eliminate risk, rather to manage
the risks involved in business activities to maximize opportunities and
minimize adverse effects.
•Note: Risk management is not the management of insurable risks.

Insurance is an important way of transferring risk but most risks will be
managed by other means.

20
Deriving Value
• Order by risk level.
•Group if the mitigations are the same.
•Pass back to various teams stating that project X was approved for
consideration in next budget cycle.

21
Tools for enterprise risk management
•Most

enterprise

tools

fall

into

a

category

called

“GRC”

(Governance, Risk & Compliance). These tools are easily $100+.
•Bwise GRC Platform
•RSA Archer eGRC
•SAP GRC
•Oracle GRC
•Spreadsheets 
•Any good tools out there?

22
FixNix Risk management

23
FixNix Risk classification

24
FixNix assest risk management

25
FixNix risk exception

26
FixNix Third party risk management

27
FixNix Business unit risk management

28
29
GOOD Risk management

A good risk management is that where the risks
are easily managed , mitigated and continuously
reviewed.
30
QUESTIONS??
Sheyamselvaraj

Shyamdicaprio
or
gRc_sham
or
31
Risk managemet made easy

More Related Content

What's hot

Impact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing RiskImpact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing Risk
PECB
 

What's hot (20)

Alex Sidorenko at the 6th G31000 Risk management conference in Dubai
Alex Sidorenko at the 6th G31000 Risk management conference in DubaiAlex Sidorenko at the 6th G31000 Risk management conference in Dubai
Alex Sidorenko at the 6th G31000 Risk management conference in Dubai
 
Introductory Considerations for Enterprise Security Risk Management Programs
Introductory Considerations for Enterprise Security Risk Management ProgramsIntroductory Considerations for Enterprise Security Risk Management Programs
Introductory Considerations for Enterprise Security Risk Management Programs
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Impact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing RiskImpact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing Risk
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh
 
Employee Engagement and Your Enterprise Security Risk Management Strategy
Employee Engagement and Your Enterprise Security Risk Management StrategyEmployee Engagement and Your Enterprise Security Risk Management Strategy
Employee Engagement and Your Enterprise Security Risk Management Strategy
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
#Corpriskforum2016 - Andy Cox
#Corpriskforum2016 - Andy Cox#Corpriskforum2016 - Andy Cox
#Corpriskforum2016 - Andy Cox
 
#corpriskforum2016 - Julia Graham
#corpriskforum2016 - Julia Graham#corpriskforum2016 - Julia Graham
#corpriskforum2016 - Julia Graham
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 Steps
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
Emerging Risks
Emerging RisksEmerging Risks
Emerging Risks
 
Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101
 
#corpriskforum2016 - Erike Young
#corpriskforum2016 - Erike Young#corpriskforum2016 - Erike Young
#corpriskforum2016 - Erike Young
 
Why risk management is needed
Why risk management is neededWhy risk management is needed
Why risk management is needed
 
Enterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample PresentationEnterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample Presentation
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC Complaince
 
4 Steps to Intelligent Risk Taking
4 Steps to Intelligent Risk Taking 4 Steps to Intelligent Risk Taking
4 Steps to Intelligent Risk Taking
 

Viewers also liked

Il mattino terrore al vomero due rapine in 10 minuti
Il mattino terrore al vomero due rapine in 10 minutiIl mattino terrore al vomero due rapine in 10 minuti
Il mattino terrore al vomero due rapine in 10 minuti
ritachiliberti
 

Viewers also liked (13)

Banca IFIS: co-creazione e business nei social network
Banca IFIS: co-creazione e business nei social networkBanca IFIS: co-creazione e business nei social network
Banca IFIS: co-creazione e business nei social network
 
Tarea 3: APRENDIZAJE AUTONOMO
Tarea 3: APRENDIZAJE AUTONOMOTarea 3: APRENDIZAJE AUTONOMO
Tarea 3: APRENDIZAJE AUTONOMO
 
Model Casting
Model CastingModel Casting
Model Casting
 
FINANZIARE START UP INTERNET SENZA IL VENTURE CAPITAL Sviluppo e strategia di...
FINANZIARE START UP INTERNET SENZA IL VENTURE CAPITAL Sviluppo e strategia di...FINANZIARE START UP INTERNET SENZA IL VENTURE CAPITAL Sviluppo e strategia di...
FINANZIARE START UP INTERNET SENZA IL VENTURE CAPITAL Sviluppo e strategia di...
 
Más allá de las armas.
Más allá de las armas.Más allá de las armas.
Más allá de las armas.
 
Trabajo practico nº 2
Trabajo practico nº 2Trabajo practico nº 2
Trabajo practico nº 2
 
Quickme - коммуникации и совместная работа
Quickme - коммуникации и совместная работаQuickme - коммуникации и совместная работа
Quickme - коммуникации и совместная работа
 
BBFC
BBFCBBFC
BBFC
 
Jake resume
Jake resumeJake resume
Jake resume
 
Il mattino terrore al vomero due rapine in 10 minuti
Il mattino terrore al vomero due rapine in 10 minutiIl mattino terrore al vomero due rapine in 10 minuti
Il mattino terrore al vomero due rapine in 10 minuti
 
Unidad 2
Unidad 2Unidad 2
Unidad 2
 
Marketing Transformation: Implementing Eloqua at an Enterprise Company
Marketing Transformation: Implementing Eloqua at an Enterprise CompanyMarketing Transformation: Implementing Eloqua at an Enterprise Company
Marketing Transformation: Implementing Eloqua at an Enterprise Company
 
Tarea 3: APRENDIZAJE AUTONOMO
Tarea 3: APRENDIZAJE AUTONOMOTarea 3: APRENDIZAJE AUTONOMO
Tarea 3: APRENDIZAJE AUTONOMO
 

Similar to Risk managemet made easy

Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017
Alexei Sidorenko, CRMP
 
ppt erm.pdf
ppt erm.pdfppt erm.pdf
ppt erm.pdf
RJ231
 

Similar to Risk managemet made easy (20)

C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Trustee Conference AM4: Effectively managing risk
Trustee Conference AM4: Effectively managing riskTrustee Conference AM4: Effectively managing risk
Trustee Conference AM4: Effectively managing risk
 
Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017
 
Using Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence ProgramUsing Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence Program
 
Risk assessment facilitation guide
Risk assessment facilitation guideRisk assessment facilitation guide
Risk assessment facilitation guide
 
Risk assessment facilitation guide
Risk assessment facilitation guideRisk assessment facilitation guide
Risk assessment facilitation guide
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
ppt erm.pdf
ppt erm.pdfppt erm.pdf
ppt erm.pdf
 
IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop
 
Taking Enterprise Risk from Theoretical to Practical
Taking Enterprise Risk from Theoretical to PracticalTaking Enterprise Risk from Theoretical to Practical
Taking Enterprise Risk from Theoretical to Practical
 
Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management
 
Risk assessment and compliance 151119
Risk assessment and compliance 151119Risk assessment and compliance 151119
Risk assessment and compliance 151119
 
Getting the risk basics right, 30th November 2016
Getting the risk basics right, 30th November 2016Getting the risk basics right, 30th November 2016
Getting the risk basics right, 30th November 2016
 
Role of Enterprise Risk Management in Risk Based Capital
Role of Enterprise Risk Management in Risk Based CapitalRole of Enterprise Risk Management in Risk Based Capital
Role of Enterprise Risk Management in Risk Based Capital
 
DRIDeckFinalMar3
DRIDeckFinalMar3DRIDeckFinalMar3
DRIDeckFinalMar3
 
Risk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public SectorRisk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public Sector
 
Introduction To Risk Management Process
Introduction To Risk Management ProcessIntroduction To Risk Management Process
Introduction To Risk Management Process
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Risk managemet made easy

  • 2. DISCLAIMER(S) • The opinion here represented are my personal ones and do not necessary reflect my employers views. • Registered brands belong to their legitimate owners. • The information contained in this presentation does not break any intellectual property, nor does it provide detailed information that may be in conflict with any laws (hopefully...) :) 2
  • 3. 3
  • 5. Ideal Risk Management A Prioritization process is followed whereby the risks with the greatest (impact) and the greatest probability (likelihood) of occurring are handled first, and risks with lower probability of occurrence and lower loss are handled in descending order. 5
  • 7. Risk management methodologies • NIST SP 800-30 framework • ISO 27005 framework • ISO 31000 Risk Management principles and guidelines • PRISM framework •OWASP Risk rating methodology •COSO Enterprise risk management- Integrated framework •OCTAVE •ISF Information risk assessment methodologies (IRAM) •ISACA risk IT 7
  • 8. Problem • These are somebody else’s vision of what risk management should be. • At best they are a guideline to give you examples of what others are doing. •At worst they make risk management look overly complicated and make it difficult to get started. 8
  • 9. Defining Risk • Risk is the potential that a chosen action or activity (including the choice of inaction) will lead to a loss (an undesirable outcome). 9
  • 10. Risk can apply to • Economic risk •Health, Safety, and Environment •IT and InfoSec •Insurance •Business and management •Finance •Security 10
  • 11. Risk formula •Likelihood: The probability of something occurring. •Impact: The expected loss if that event occurs. •Classic formula •Risk= Likelihood*Impact 11
  • 12. Make your risk formula fit you • Weighting Impact RISK= LIKELIHOODxIMPACT+IMPACT 12
  • 14. Be Flexible!! •Risk management needs to be a custom fit for your organization and your formula needs to reflect that. •Your formula can (and likely will) change. •Wherever you are tracking risks should be able to dynamically update risk based on the updated formula. •No word documents •No excel documents •No static formats 14
  • 15. Determining risks Convince your peers that documenting risks is CYOA and you’ll have more risks than you know what to do with. • Network vulnerability scanners •Application vulnerability scanners •Security mailing lists • Security blogs •Code Reviews 15
  • 16. Evaluating a risk Is the risk acceptable? Is the likelihood or impact low enough that I’m willing to simply accept the consequences if it happens. Is the risk transferrable? •Could I purchase insurance or some other measure to transfer the impact of the risk to another party. Is the risk reducable? • Is there some sort of mitigation that could be put in place to reduce the impact or likelihood of the risk. 16
  • 18. Risk management is cyclical 18
  • 19. Risk review process • May depend on how lean your organization is on management structure. • Raise the visibility of high level risks. • High Risk =VP •Medium Risk =Director • Low Risk = Area Manager •Risk should be re-reviewed regularly. • High Risk = Monthly •Medium Risk = Semi-Monthly • Low Risk = Annually 19
  • 20. Risk management is not • It is not a process for avoiding risk. •The aim of risk management is not to eliminate risk, rather to manage the risks involved in business activities to maximize opportunities and minimize adverse effects. •Note: Risk management is not the management of insurable risks. Insurance is an important way of transferring risk but most risks will be managed by other means. 20
  • 21. Deriving Value • Order by risk level. •Group if the mitigations are the same. •Pass back to various teams stating that project X was approved for consideration in next budget cycle. 21
  • 22. Tools for enterprise risk management •Most enterprise tools fall into a category called “GRC” (Governance, Risk & Compliance). These tools are easily $100+. •Bwise GRC Platform •RSA Archer eGRC •SAP GRC •Oracle GRC •Spreadsheets  •Any good tools out there? 22
  • 25. FixNix assest risk management 25
  • 27. FixNix Third party risk management 27
  • 28. FixNix Business unit risk management 28
  • 29. 29
  • 30. GOOD Risk management A good risk management is that where the risks are easily managed , mitigated and continuously reviewed. 30