SlideShare a Scribd company logo
Omnia AI Factory – Cyber AI Product Suite
March 2021
Copyright © 2021 Deloitte Development LLC. All rights reserved. 2
Artificial Intelligence (AI) is no longer on the horizon. It’s here, and it is already having a profound
impact on how we live, work, and do business.
AI can and will transform organizational decision-making, drive efficiencies, build new capabilities and
businesses, and power sustainable, value-driving activities.
AI only succeeds when organizations see the big picture in a new, holistic way. There also needs to be
an understanding of the change that will need to be managed across the organization to sustain the
new value. Deloitte’s Omnia AI leads all others in starting, enabling, accelerating, and sustaining the
journey.
Omnia AI Factory
The Omnia AI Factory is where strategy meets intelligent design. We coordinate and synthesize the
powers of Omnia AI to create unique and targeted products that optimize the way a business works.
Combining machine-learning capabilities with deep business and industry acumen allows us to solve
complex problems and build tangible, enterprising solutions. The AI Factory is a creation engine that is
continually learning, evolving and driving change. It’s built into our DNA and it informs our approach
to product design.
Copyright © 2021 Deloitte Development LLC. All rights reserved. 3
The Cyber AI product suite provides businesses with artificial intelligence (AI)-enabled cybersecurity solutions that protect your
most critical assets against emerging threats through predictive threat analysis and enhanced threat detection capabilities.
Cyber AI product suite incorporates advanced analytics techniques to empower you to proactively protect your organization from
both internal and external cybersecurity threats. Utilizing the power of AI, both products provide recommendations for remediation
and risk mitigation, showing how each action will positively affect your overall risk exposure.
Cyber AI APM
(Attack Path Modeling)
An AI-enabled solution that provides
a graphical visualization of your
network showing quantifiable risk
exposures via attack paths designed
to complement your crown jewel
protection strategy
Cyber AI IAM
(Identity Access Management)
An AI enabled role maintenance / role
mining solution that closely monitors
how end users consume the IAM
recommendations
Cyber AI Hunter
Cyber AI Hunter is an end-to-end
solution that leverages Artificial
Intelligence to help organizations
detect, monitor and prioritize
risks arising from User and Entity
Behavior
Cyber AI Phishing
Analytics
An AI enabled solution for
proactive detection of phishing
attacks that enables
organizations to augment their
security operations teams
more efficiently
Omnia Cyber AI Product Suite
Copyright © 2021 Deloitte Development LLC. All rights reserved. 4
Cyber AI APM is an AI-enabled solution for predictive, pre-emptive &
proactive threat identification and cyber risk management
4
Cyber AI APM (Attack Path Modelling) is an AI-led graph-based solution that
provides unified visualization of enterprise attack surface and ongoing cyber
risk assessment on organization’s critical assets/crown jewels.
Cyber AI APM uses advanced machine learning algorithms to predict potential
exposures and generates intelligent, prioritized recommendations to mitigate
these cyber risks. It can also augment existing vulnerability management and breach
assessment/simulation platforms. Cyber AI APM is a critical capability in your
cybersecurity toolkit to move from security of today to tomorrow—allowing you to
protect the organization from cyber threats before they occur.
Superior IT/OT Visibility
Correlation of multiple IT/OT data sources
with threat intelligence to provide unified
view of the enterprise IT/OT cyber risk
Predict Vulnerable Entry Points,
Compute Attack Paths, and Calculate
Risk Scores
Enhanced Risk Assessment
by aggregating safety and operational risk into risk
score models
Optimized Remediation Strategy
Actionable intelligence by providing the most
impactful recommendations
Integration with ticketing and orchestration
platforms for threat prevention
Differentiated offering addressing a market gap
C y b e r A I A P M
Copyright © 2021 Deloitte Development LLC. All rights reserved. 5
Cyber AI Hunter is an AI-enabled solution for monitoring and
detecting advanced cyber treats, NextGen SIEM and UEBA
5
Cyber AI Hunter is Deloitte’s AI-enabled cyber threat detection and behavior
Analytics UEBA Workbench that enables end-to-end detection, monitoring and
prioritization of insider threats by correlating organization’s data sources.
Cyber AI Hunter leverages native cloud capability to provide high performance
data streaming and batching for threats arising from threats on customers’ premises
or on the cloud. It also leverages Artificial Intelligence to identify known and
unknown threats, including data exfiltration, privilege misuse and fraud, via multi-
dimensional user and entity behavior analytics and detect anomalies in
user behaviour.
Cyber AI Hunter provides integrated cases management and investigation
workbench augmenting threat hunting teams with the ability to search for threat
actors or indicators of compromise with visual pivoting available on any entity in
order to develop valuable threat context.
C y b e r A I H u n t e r
Differentiated offering addressing a market gap
AI-enabled Behavior
Analytics
Risk-centered Approach to User
and Entity Behavior Analytics
Flexibility to assess the overall risk
of the organization by building a
comprehensive entity risk profile
Efficient, effective security
operations
Intelligent Investigation
Workbench
Rapid investigation of incidents by
pivoting on anomalous entities
and tracing associated events
Proactive detection of
abnormal user activities using
Machine Learning algorithms
De-prioritization of false
positives that aren’t
corroborated through risk-
based priority algorithms
Copyright © 2021 Deloitte Development LLC. All rights reserved. 6
Cyber AI Phishing Analytics is an AI-enabled solution for proactive
detection and prevention of phishing attacks, enabling effective and
timely mitigation strategies
6
Cyber AI Phishing Analytics is an Artificial Intelligence enabled solution for proactive
detection and prevention of phishing attacks which helps organizations better simulate,
detect, and respond to phishing attacks within their environment by leveraging
Natural Language Processing and Machine Learning.
Cyber AI Phishing Analytics leverages Artificial Intelligence to identify potential phishing
emails by analyzing sender fingerprint, detecting anomalies in user behaviour and
processing the content of emails. Cyber AI Phishing Analytics goes beyond detecting
threats and takes a risk-based approach to better understanding the behavior of users
and identifies the training and awareness efforts required for employees.
Proactive Defense
Robust risk based approach for detecting and
preventing phishing threats using Natural
Language Processing before users can engage
with them.
Effective Security Operations
Management
Seamless connectivity to enterprise
ticketing system, augmenting operations
teams with near real time visibility into high-
risk phishing threats.
Enable Targeted Security Awareness
Programs
Integration with security awareness
programs to train high-risk end users to
recognize and avoid phishing emails.
Differentiated offering addressing a market gap
6
6
C y b e r A I P h i s h i n g
Copyright © 2021 Deloitte Development LLC. All rights reserved. 7
Cyber AI IAM is an AI-enabled role maintenance solution delivering
data-driven insights to reduce access-based risk
7
Differentiated offering addressing a market gap
C y b e r A I I A M
Cyber AI IAM is Deloitte’s AI-enabled role maintenance solution that generates
informed and intelligent data-driven decisions to deliver role maintenance
recommendations and optimize pre-defined roles.
Cyber AI IAM performs dynamic calculation and evaluation of risk based on
identity, entitlement and usage data to generate proprietary impact scores as a
measure of the strength of recommendations relative to one another.
Our state of the art advanced analytics engine is powered with a closed loop
feedback mechanism to enable machine learning as we scale operations and is
configurable to deliver results tailored to your organization.
Data driven
recommendations
Provide recommendations for
entitlement level changes required
to existing role definitions
Enhanced
reporting
Generate real-time impact reporting
on high priority KPI’s and synthesize
accepted recommendations into
decision reports
Integration &
Automation
Couple with and ingest batch data
from leading IAM solutions to
automate role analysis and
definition
Impact scoring &
KPI analysis
Configure and tailor algorithms to
high priority KPI’s to analyze impact
on roles, users and overall system

More Related Content

PDF
Gebundelde Krachten. Vier veelbelovende voorbeelden ikn de coordinatie van zo...
PPTX
AI-900 Slides.pptx
PDF
sap fiori architecture
PDF
Rise with sap s 4 hana cloud, private edition service description guide
PDF
Sap S4 HANA Everything You Need To Know
PDF
Building Your Enterprise Data Marketplace with DMX-h
PDF
Artificial intelligence for dummies margo
PDF
20100430 introduction to business objects data services
Gebundelde Krachten. Vier veelbelovende voorbeelden ikn de coordinatie van zo...
AI-900 Slides.pptx
sap fiori architecture
Rise with sap s 4 hana cloud, private edition service description guide
Sap S4 HANA Everything You Need To Know
Building Your Enterprise Data Marketplace with DMX-h
Artificial intelligence for dummies margo
20100430 introduction to business objects data services

What's hot (20)

PPTX
Future of Data and AI in Retail - NRF 2023
PPTX
Robotic process automation
PDF
ServiceNow Governance, Risk, and Compliance
PDF
SAP S/4HANA Finance and the Digital Core
PDF
S4510_EN_Col17 Inventory Management and Physical Inventory in SAP S4HANA.pdf
PPTX
RPA Uipath Presentation.pptx
PPTX
Regulatory Reporting Dashboard
PPTX
Ui path online training ppt
PDF
Introduction to RPA and Document Understanding
PPTX
AI & Robotic Process Automation (RPA) to Digitally Transform Your Environment
PPT
sap-overview.ppt
PPTX
What is RPA?
PPTX
Presentation introduction to sap
PDF
Introduction to Asset Tracking technology
PDF
Procurement Transformation with S/4 HANA Sourcing and Procurement
PDF
Revenue assurance 101
PPTX
SAP Fiori ppt
PPTX
阿里巴巴中台架构设计与实践(NBF)_ArchSummit2021_冯微峰
PPTX
Sap architecture
Future of Data and AI in Retail - NRF 2023
Robotic process automation
ServiceNow Governance, Risk, and Compliance
SAP S/4HANA Finance and the Digital Core
S4510_EN_Col17 Inventory Management and Physical Inventory in SAP S4HANA.pdf
RPA Uipath Presentation.pptx
Regulatory Reporting Dashboard
Ui path online training ppt
Introduction to RPA and Document Understanding
AI & Robotic Process Automation (RPA) to Digitally Transform Your Environment
sap-overview.ppt
What is RPA?
Presentation introduction to sap
Introduction to Asset Tracking technology
Procurement Transformation with S/4 HANA Sourcing and Procurement
Revenue assurance 101
SAP Fiori ppt
阿里巴巴中台架构设计与实践(NBF)_ArchSummit2021_冯微峰
Sap architecture
Ad

Similar to Omnia AI Factory – Cyber AI Product Suite (20)

PDF
BIZGrowth Strategies — Cybersecurity Special Edition 2023
PDF
The Role Of Artificial Intelligence In Cybersecurity.pdf
PPTX
Artificial Intelligence in Cybersecurity
PDF
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
PDF
cybersecurity-for-ai-and-genai-updated.pdf
PDF
Digital marketing revolution in 2025 for business people
PDF
AI in Cybersecurity_ Attacks, Protection, and Trends in 2025.pdf
PPTX
AI - Driven Cybersecurity algorithms for proactive threat detection_20250106_...
PPTX
Cybersecurity artificial intelligence presentation
PDF
Cybersecurity AI Assistants – The Future of Digital Defense
PDF
From Paper to Pixels: The Rise of E-Filing Systems
PDF
AI's Role in the Future of Cybersecurity
PDF
How AI can help with cybersecurity
PDF
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
PDF
How AI is Fighting and Fueling Cyber Threats in 2025.
PDF
Top 10 AI-Powered Cybersecurity Tools Protecting Businesses in 2025.pdf
PDF
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
PDF
Unleashing the Power of AI in Cybersecurity.pdf
PDF
presentazione informatica per sito web scuola
PDF
How AI is Changing the World of Cybersecurity.pdf
BIZGrowth Strategies — Cybersecurity Special Edition 2023
The Role Of Artificial Intelligence In Cybersecurity.pdf
Artificial Intelligence in Cybersecurity
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
cybersecurity-for-ai-and-genai-updated.pdf
Digital marketing revolution in 2025 for business people
AI in Cybersecurity_ Attacks, Protection, and Trends in 2025.pdf
AI - Driven Cybersecurity algorithms for proactive threat detection_20250106_...
Cybersecurity artificial intelligence presentation
Cybersecurity AI Assistants – The Future of Digital Defense
From Paper to Pixels: The Rise of E-Filing Systems
AI's Role in the Future of Cybersecurity
How AI can help with cybersecurity
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
How AI is Fighting and Fueling Cyber Threats in 2025.
Top 10 AI-Powered Cybersecurity Tools Protecting Businesses in 2025.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Unleashing the Power of AI in Cybersecurity.pdf
presentazione informatica per sito web scuola
How AI is Changing the World of Cybersecurity.pdf
Ad

More from Neo4j (20)

PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
PDF
Jin Foo - Prospa GraphSummit Sydney Presentation.pdf
PDF
GraphSummit Singapore Master Deck - May 20, 2025
PPTX
Graphs & GraphRAG - Essential Ingredients for GenAI
PPTX
Neo4j Knowledge for Customer Experience.pptx
PPTX
GraphTalk New Zealand - The Art of The Possible.pptx
PDF
Neo4j: The Art of the Possible with Graph
PDF
Smarter Knowledge Graphs For Public Sector
PDF
GraphRAG and Knowledge Graphs Exploring AI's Future
PDF
Matinée GenAI & GraphRAG Paris - Décembre 24
PDF
ANZ Presentation: GraphSummit Melbourne 2024
PDF
Google Cloud Presentation GraphSummit Melbourne 2024: Building Generative AI ...
PDF
Telstra Presentation GraphSummit Melbourne: Optimising Business Outcomes with...
PDF
Hands-On GraphRAG Workshop: GraphSummit Melbourne 2024
PDF
Démonstration Digital Twin Building Wire Management
PDF
Swiss Life - Les graphes au service de la détection de fraude dans le domaine...
PDF
Démonstration Supply Chain - GraphTalk Paris
PDF
The Art of Possible - GraphTalk Paris Opening Session
PPTX
How Siemens bolstered supply chain resilience with graph-powered AI insights ...
PDF
Knowledge Graphs for AI-Ready Data and Enterprise Deployment - Gartner IT Sym...
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Jin Foo - Prospa GraphSummit Sydney Presentation.pdf
GraphSummit Singapore Master Deck - May 20, 2025
Graphs & GraphRAG - Essential Ingredients for GenAI
Neo4j Knowledge for Customer Experience.pptx
GraphTalk New Zealand - The Art of The Possible.pptx
Neo4j: The Art of the Possible with Graph
Smarter Knowledge Graphs For Public Sector
GraphRAG and Knowledge Graphs Exploring AI's Future
Matinée GenAI & GraphRAG Paris - Décembre 24
ANZ Presentation: GraphSummit Melbourne 2024
Google Cloud Presentation GraphSummit Melbourne 2024: Building Generative AI ...
Telstra Presentation GraphSummit Melbourne: Optimising Business Outcomes with...
Hands-On GraphRAG Workshop: GraphSummit Melbourne 2024
Démonstration Digital Twin Building Wire Management
Swiss Life - Les graphes au service de la détection de fraude dans le domaine...
Démonstration Supply Chain - GraphTalk Paris
The Art of Possible - GraphTalk Paris Opening Session
How Siemens bolstered supply chain resilience with graph-powered AI insights ...
Knowledge Graphs for AI-Ready Data and Enterprise Deployment - Gartner IT Sym...

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
Teaching material agriculture food technology
PDF
cuic standard and advanced reporting.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
KodekX | Application Modernization Development
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
MYSQL Presentation for SQL database connectivity
Spectral efficient network and resource selection model in 5G networks
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Teaching material agriculture food technology
cuic standard and advanced reporting.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
KodekX | Application Modernization Development
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto

Omnia AI Factory – Cyber AI Product Suite

  • 1. Omnia AI Factory – Cyber AI Product Suite March 2021
  • 2. Copyright © 2021 Deloitte Development LLC. All rights reserved. 2 Artificial Intelligence (AI) is no longer on the horizon. It’s here, and it is already having a profound impact on how we live, work, and do business. AI can and will transform organizational decision-making, drive efficiencies, build new capabilities and businesses, and power sustainable, value-driving activities. AI only succeeds when organizations see the big picture in a new, holistic way. There also needs to be an understanding of the change that will need to be managed across the organization to sustain the new value. Deloitte’s Omnia AI leads all others in starting, enabling, accelerating, and sustaining the journey. Omnia AI Factory The Omnia AI Factory is where strategy meets intelligent design. We coordinate and synthesize the powers of Omnia AI to create unique and targeted products that optimize the way a business works. Combining machine-learning capabilities with deep business and industry acumen allows us to solve complex problems and build tangible, enterprising solutions. The AI Factory is a creation engine that is continually learning, evolving and driving change. It’s built into our DNA and it informs our approach to product design.
  • 3. Copyright © 2021 Deloitte Development LLC. All rights reserved. 3 The Cyber AI product suite provides businesses with artificial intelligence (AI)-enabled cybersecurity solutions that protect your most critical assets against emerging threats through predictive threat analysis and enhanced threat detection capabilities. Cyber AI product suite incorporates advanced analytics techniques to empower you to proactively protect your organization from both internal and external cybersecurity threats. Utilizing the power of AI, both products provide recommendations for remediation and risk mitigation, showing how each action will positively affect your overall risk exposure. Cyber AI APM (Attack Path Modeling) An AI-enabled solution that provides a graphical visualization of your network showing quantifiable risk exposures via attack paths designed to complement your crown jewel protection strategy Cyber AI IAM (Identity Access Management) An AI enabled role maintenance / role mining solution that closely monitors how end users consume the IAM recommendations Cyber AI Hunter Cyber AI Hunter is an end-to-end solution that leverages Artificial Intelligence to help organizations detect, monitor and prioritize risks arising from User and Entity Behavior Cyber AI Phishing Analytics An AI enabled solution for proactive detection of phishing attacks that enables organizations to augment their security operations teams more efficiently Omnia Cyber AI Product Suite
  • 4. Copyright © 2021 Deloitte Development LLC. All rights reserved. 4 Cyber AI APM is an AI-enabled solution for predictive, pre-emptive & proactive threat identification and cyber risk management 4 Cyber AI APM (Attack Path Modelling) is an AI-led graph-based solution that provides unified visualization of enterprise attack surface and ongoing cyber risk assessment on organization’s critical assets/crown jewels. Cyber AI APM uses advanced machine learning algorithms to predict potential exposures and generates intelligent, prioritized recommendations to mitigate these cyber risks. It can also augment existing vulnerability management and breach assessment/simulation platforms. Cyber AI APM is a critical capability in your cybersecurity toolkit to move from security of today to tomorrow—allowing you to protect the organization from cyber threats before they occur. Superior IT/OT Visibility Correlation of multiple IT/OT data sources with threat intelligence to provide unified view of the enterprise IT/OT cyber risk Predict Vulnerable Entry Points, Compute Attack Paths, and Calculate Risk Scores Enhanced Risk Assessment by aggregating safety and operational risk into risk score models Optimized Remediation Strategy Actionable intelligence by providing the most impactful recommendations Integration with ticketing and orchestration platforms for threat prevention Differentiated offering addressing a market gap C y b e r A I A P M
  • 5. Copyright © 2021 Deloitte Development LLC. All rights reserved. 5 Cyber AI Hunter is an AI-enabled solution for monitoring and detecting advanced cyber treats, NextGen SIEM and UEBA 5 Cyber AI Hunter is Deloitte’s AI-enabled cyber threat detection and behavior Analytics UEBA Workbench that enables end-to-end detection, monitoring and prioritization of insider threats by correlating organization’s data sources. Cyber AI Hunter leverages native cloud capability to provide high performance data streaming and batching for threats arising from threats on customers’ premises or on the cloud. It also leverages Artificial Intelligence to identify known and unknown threats, including data exfiltration, privilege misuse and fraud, via multi- dimensional user and entity behavior analytics and detect anomalies in user behaviour. Cyber AI Hunter provides integrated cases management and investigation workbench augmenting threat hunting teams with the ability to search for threat actors or indicators of compromise with visual pivoting available on any entity in order to develop valuable threat context. C y b e r A I H u n t e r Differentiated offering addressing a market gap AI-enabled Behavior Analytics Risk-centered Approach to User and Entity Behavior Analytics Flexibility to assess the overall risk of the organization by building a comprehensive entity risk profile Efficient, effective security operations Intelligent Investigation Workbench Rapid investigation of incidents by pivoting on anomalous entities and tracing associated events Proactive detection of abnormal user activities using Machine Learning algorithms De-prioritization of false positives that aren’t corroborated through risk- based priority algorithms
  • 6. Copyright © 2021 Deloitte Development LLC. All rights reserved. 6 Cyber AI Phishing Analytics is an AI-enabled solution for proactive detection and prevention of phishing attacks, enabling effective and timely mitigation strategies 6 Cyber AI Phishing Analytics is an Artificial Intelligence enabled solution for proactive detection and prevention of phishing attacks which helps organizations better simulate, detect, and respond to phishing attacks within their environment by leveraging Natural Language Processing and Machine Learning. Cyber AI Phishing Analytics leverages Artificial Intelligence to identify potential phishing emails by analyzing sender fingerprint, detecting anomalies in user behaviour and processing the content of emails. Cyber AI Phishing Analytics goes beyond detecting threats and takes a risk-based approach to better understanding the behavior of users and identifies the training and awareness efforts required for employees. Proactive Defense Robust risk based approach for detecting and preventing phishing threats using Natural Language Processing before users can engage with them. Effective Security Operations Management Seamless connectivity to enterprise ticketing system, augmenting operations teams with near real time visibility into high- risk phishing threats. Enable Targeted Security Awareness Programs Integration with security awareness programs to train high-risk end users to recognize and avoid phishing emails. Differentiated offering addressing a market gap 6 6 C y b e r A I P h i s h i n g
  • 7. Copyright © 2021 Deloitte Development LLC. All rights reserved. 7 Cyber AI IAM is an AI-enabled role maintenance solution delivering data-driven insights to reduce access-based risk 7 Differentiated offering addressing a market gap C y b e r A I I A M Cyber AI IAM is Deloitte’s AI-enabled role maintenance solution that generates informed and intelligent data-driven decisions to deliver role maintenance recommendations and optimize pre-defined roles. Cyber AI IAM performs dynamic calculation and evaluation of risk based on identity, entitlement and usage data to generate proprietary impact scores as a measure of the strength of recommendations relative to one another. Our state of the art advanced analytics engine is powered with a closed loop feedback mechanism to enable machine learning as we scale operations and is configurable to deliver results tailored to your organization. Data driven recommendations Provide recommendations for entitlement level changes required to existing role definitions Enhanced reporting Generate real-time impact reporting on high priority KPI’s and synthesize accepted recommendations into decision reports Integration & Automation Couple with and ingest batch data from leading IAM solutions to automate role analysis and definition Impact scoring & KPI analysis Configure and tailor algorithms to high priority KPI’s to analyze impact on roles, users and overall system