Risk Centric Security delivers tools to run Monte Carlo Simulations and BetaPERT functions to effectively improve Quantitative Risk Analysis for Information Security Risk Assessment and training

The Risk Centric Security toolbox contains a variety of standalone tools and models for performing probabilistic risk, decision, opportunity, and competitive analysis. All RCS Tools and Models utilize probabilistic methods and Monte Carlo simulation.

Tools

RCS Tools

The Risk Centric Security toolbox contains a variety of standalone tools and models for performing probabilistic risk, decision, opportunity, and competitive analysis. All RCS Tools and Models utilize probabilistic methods and Monte Carlo simulation.

Tools

  • BetaPERT calculator
  • Binomial Distribution calculator
  • Poisson Distribution calculator
  • Gamma Distribution calculator
  • Beta Distribution Calculator
  • Normal Distribution Calculator
  • Lognormal Distribution Calculator

Models

General Purpose

  • Two-factor BetaPERT calculator
  • Loss Distribution Analysis: frequency x loss magnitude
  • Sales Projections: number of sales x size of sales
  • Any set of estimates x any other set of estimates
  • Bayesian True Positive / False Positive Calculator
  • Decision Tree Analysis

Risk Analysis

  • Complex two-factor risk analysis by type of Threat and Confidentiality, Integrity, and Availability
  • Quantitative Cost of Data Breach Analysis
  • Quantitative Cost of Data Breach Analysis - HIPAA / HITECH
  • Quantitative Cost of Data Breach Analysis - FTC fines
  • Quantitative Frequency of Loss Events Analysis

Sales and Opportunity

  • Opportunity Model for Multiple Sales and Markets - the "Opportunity" Model
  • Opportunity Model for Sales from cold calls to closing
  • Pain, Claim, Gain Analysis - Operational costs, risks, efficiencies - the "PCG" model
  • Competitive analysis - Solution "A" versus Solution "B"

Attend an RCS Webinar

Risk Centric Security would like to introduce you to the world of quantitative risk and decision analysis.

Our webinars will provide you with a glimpse of the power and credibility that quantitative methods can bring to the problems that Information Security Professionals face every day.

Topics covered include:

  • What is a breach?
  • What causes a breach?
  • What kinds of data can be exposed?
  • What costs are we talking about?
  • Whose costs are we talking about?
  • How do we estimate costs / impact?
  • How do we prevent, detect, and mitigate a breach?

Please click the “Attend Webinar Now” button to sign up.

Attend Webinar Now