Society For Risk Analysis Annual Meeting 2017

Session Schedule & Abstracts


* Disclaimer: All presentations represent the views of the authors, and not the organizations that support their research. Please apply the standard disclaimer that any opinions, findings, and conclusions or recommendations in abstracts, posters, and presentations at the meeting are those of the authors and do not necessarily reflect the views of any other organization or agency. Meeting attendees and authors should be aware that this disclaimer is intended to apply to all abstracts contained in this document. Authors who wish to emphasize this disclaimer should do so in their presentation or poster. In an effort to make the abstracts as concise as possible and easy for meeting participants to read, the abstracts have been formatted such that they exclude references to papers, affiliations, and/or funding sources. Authors who wish to provide attendees with this information should do so in their presentation or poster.

Common abbreviations

M3-G
Applied Risk Management: Disruptive Technologies, AI and Cyber

Room: Salon H   1:30 pm–3:00 pm

Chair(s): Dan Hudson   dhudson6@jhu.edu

Sponsored by Applied Risk Management Specialty Group



M3-G.1  1:30 pm  Disruptive technologies and physical security - good, bad, or indifferent? Canjar HA*; X   helen.canjar@sympatico.ca

Abstract: The physical security world is historically thought to be concerned with the protection of bricks and mortar structures and VIPs from relatively known bad guys. Although still true, this world is now more realistically defined by the trillions upon trillions of data files, unimaginable amounts of video surveillance, and constant evolution of risks and threats to previously "safe" entities, such as cargo shipments and electricity grids. Disruptive technologies, such as artificial intelligence and autonomous vehicles, have the potential to change how physical security risk analysis is conducted in fields ranging from border security to critical infrastructure protection. Ideally, an arsenal of tools will be created that helps analysts bridge the gap between their efforts and the rapid growth of threats impacting the world today. This presentation seeks to explore the potential benefits and consequences of several game changing technologies and provide insight into their possible usefulness in practical applications.

M3-G.2  1:50 pm  New game,new rules: Responding to disruptive trends in Financial Services. Hall IS*; University of Northampton   Ian.hall@northampton.ac.uk

Abstract: Traditional Financial Services providers have increased levels of competition from innovators who are able to enter the market through the creation of new operating models. Innovation in six core functions (payments, market provisioning, investment management, insurance, deposits & lending and capital raising), when combined with big data and advances in technologies such as AI allow new entrants to the market who are able to change the 'rules of the game' How then should incumbents and regulators react to these trends? This presentation seeks to explore several of the game changers and provide strategies for the identification, management and mitigation of risk.

M3-G.4  2:10 pm  Multidisciplinary Risk Management in Cybersecurity: Course Development. Tatar U*, Keskin OF, Poyraz OI, Pinto CA, Kucukkaya G; Old Dominion University   utatar@odu.edu

Abstract: Cybersecurity is an ever increasingly critical issue for all states and a skilled and knowledgeable workforce is vital to the continued security of the nations, across social, economic and political domains. The National Security Agency funded several curriculum development projects on cybersecurity to meet the future workforce demands of the U.S. Federal Government. We will share the findings from requirements analysis of a funded project, “Multidisciplinary Risk Management in Cybersecurity”. The aim of the project is to develop a modular course in Multidisciplinary Risk Management in Cybersecurity, and to create a common understanding of risk for a diverse set of experts which are coming from different disciplines such as technical, social, economics, law, politics, etc. In the first step of the project, the requirements analysis, we aimed to identify which topics should be covered to what extent and what soft and hard skills are required to be qualified in cybersecurity risk management. To answer these questions, we (1) analyzed federal job postings related with cybersecurity risk management, (2) examined the syllabi of previously taught courses in other institutions, and (3) organized a focus group meeting which is composed of a diverse set of professionals, academics, and students to elicit information and validate our findings from job posting and syllabi analysis. Results showed that current cyber risk management courses do not provide enough knowledge and skills to satisfy the need of the job market. The detailed results will be delivered in the presentation.



[back to schedule]