SlideShare a Scribd company logo
An Intro to Resolver’s
Incident Management
Application
An Intro to Resolver's Incident Management Application
Hello!
I am Jamie Burr
Application Manager at Resolver
jamie.burr@resolver.com
And,
I am Daryn Duliba
Solution Consultant at Resolver
daryn.duliba@resolver.com
RESOLVER APPLICATIONS
AN INTEGRATED
PLATFORM JOURNEY
2017 Prototyping of Use Cases including ESRM and Security Audit
Evolution of new IRM base model
Acquisitions in the space of Business Resilience and
Information Security
2018 Focus on complimentary applications instead of point solutions.
2016 New platform has initial release.
Point solutions initiated on Risk Management, NERC
Compliance, ,SOX, Internal Audit, Loss Prevention, Workplace
Threat Assessment
The Integrated Risk Management (IRM) framework is Resolver’s vision for an end to end
system for all risk focused applications allowing organizations to break down the silos of
internal departments and teams and provide a continuous feedback loop from what is
impacting the organization to how we can be better prepared and protected for the future.
INTEGRATED RISK MANAGEMENT
Analyze
Incident
Report InvestigateResponse
INCIDENT MANAGEMENT
MonitorAudit
Risk &
Regulation
Incident
Report Investigate
SECURITY RISK MANAGEMENTRISK MANAGEMENT
Monitor
Policy &
Control
Risk &
Regulation
Purpose-Built
Each application embraces a
targeted user journey for the
Industry and/or Business line
that is embracing it.
Rotated screens of all Applications
INCIDENT MANAGEMENTCOMPLIANCE MANAGEMENTRISK MANAGEMENTINTERNAL CONTROLINTERNAL AUDITINFORMATION SECURITYBUSINESS CONTINUITY
INCIDENT MANAGEMENT
APPLICATION
Pains
LACK OF HOLISTIC VIEW
Not knowing how particulars of incidents are related to others can lead to
missed opportunities to provide best possible response to situations, or for
proactively managing incident count. Where am I at risk most?
FEELING OF FRUSTATION
When reworking inconsistencies and inaccuracies in incident reports and
collateral. Let’s get it right the first time, and have the type of incident drive the
logical presentation of relevant data.
INSUFFICIENT TIME
Submission and creation forms take too long to fill out based on who is tasked
with doing it in the field. Data entry needs to be quick and to the point without
any training needed.
Gains
INCIDENT-CENTRIC INVESTIGATIONS
Investigators can share outcomes and findings, track time spent on tasks,
document evidence collected, and record interviews conducted.
IMPROVED ACCURACY OF INCIDENT CAPTURE
Documenting the Who What Where When in an easy to follow, streamlined,
and guided approach, from any source or incident type.
RISK AWARENESS & CULTURE
Better understanding of the relationship of incident data to your risks – enabling
you to make data-driven decisions and investments to further reduce your
organization’s security risk.
SITUATIONAL UNDERSTANDING
Related people, places, and incidents create a network to enable quick and
effective identification of trends.
WITH SECURITY RISK APPLICATION
RISK AND COMPLIANCE
PROFESSIONALS
INFORMATION SECURITY
PROFESSIONALS
CORPORATE SECURITY
PROFESSIONALS
How Incident Management Helps…
• Detailed Risk/Loss Event Capture
• Privacy Violation reporting
• Insider Threat reporting
• Event Root Cause Analysis
• Automated KRI based on Incident
Frequency
• Privacy Breach Tracking
• Prioritization and investigation of
events of interest
• Contain damage of an incident
• Orchestrate a coordinated cross-
departmental incident response
• Standardized Incident Capture
• Multiple portal designs for targeted
audiences
• Flexible form design based on Incident
Classification
• Document all investigative activities
related to an incident including chain of
custody
• Isolate trends in physical security risks
FEATURE UPDATE & DEMO
Incident Management - Feature Overview
INCIDENT REPORTING
Flexible Portals. Dynamic Triage.
Simple Capture.
REPORTS & METRICS
By Location. By People. By Risk.
INCIDENT INVESTIGATION
Evidence. Root Cause. Industry Use
Cases.
SECURITY RISK
Location and Asset Profiling. Security
Risk Identification. Risk Dashboards.
WITH SECURITY RISK APPLICATION
Use Cases
Physical
Security
Brand
Protection
Loss Prevention Internal
Fraud
Incident Types have use cases built into
their definition for easy deployment
ROADMAP
An Intro to Resolver's Incident Management Application
DASHBOARD
REPORTS
Choose a report and
have it be your primary
dashboard. Flag key
incidents and have
them front and center.
REPORT
IMPROVEMENTS
Polished
presentation of
detailed incident
reports with related
involvements.
LISTS AND VIEW
IMPROVEMENTS
Detailed filtering and
Sorting within critical
views, including photo
and card display -
ideal for BOLOs
COMMAND
CENTER
Command Center
product (Dispatch)
integrated with
Resolver’s platform
Q3 Q3 Q4 2019June
All information is confidential and subject to change.
CASE & THREAT
MANAGEMENT
Major release of
Industry better
practices around
investigative cases
and threat analysis
Incident Management: The Road Ahead
Platform Goals
2018
Reduce Time and Cost to Deliver Software to Customers
Fast, efficient migrations and/or application expansion.
Visualize a Changing Risk Environment Over Time
Phase III of Assessments: Data that tells a story and supports cross organization
decision making.
Minimize Efforts to get Board (or meeting) Ready
Clean, concise, branded. Reduced time and effort to prepare shared reports.
A Tailored Experience to You - Personalization
Continuously tailored experience based of previous behavior.
Efficient and Supportive Communication that inspires Collaboration
Software that encourages collaboration and clear communication between all user types.
All information is confidential and subject to change.
MIGRATIONS
IM Application
Standard Incident
Management App
with minimal
changes. Standard
migration of PSV
data into the App.
IM + More
Incident
Management
Application and
migration, along
with blueprinted
adjustments.
IM + ERM
IM Application with
standard migration,
plus ERM
Application (not
ESRM)
Full Redesign
Fully custom
configuration from
the ground up.
PERSPECTIVE MIGRATION PATHS
PSV to IM Application
OTHER APPLICATIONS
Thanks!
Any questions?
jamie.burr@resolver.com
daryn.duliba@resolver.com

More Related Content

PDF
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
PDF
Int:rsect: CEO Address with Will Anderson
PDF
An Intro to Resolver's Risk Application
PDF
Why Corporate Security Professionals Should Care About Information Security
PDF
An Intro to Core
PDF
An Intro to Resolver's InfoSec Application (RiskVision)
PDF
Integrated Security & Risk Management: Benchmarking
PDF
Planning a move from Perspective to CORE
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Int:rsect: CEO Address with Will Anderson
An Intro to Resolver's Risk Application
Why Corporate Security Professionals Should Care About Information Security
An Intro to Core
An Intro to Resolver's InfoSec Application (RiskVision)
Integrated Security & Risk Management: Benchmarking
Planning a move from Perspective to CORE

What's hot (20)

PDF
The Journey to Integrated Risk Management: Lessons from the Field
PDF
An Intro to Resolver's Compliance Application
PDF
Risk Intelligence: Threats are the New Risk
PDF
App Showcase: Compliance
PDF
Integrated Risk Management 101
PDF
Data Driven Risk Assessment
PDF
Bring Better Data to the Office Opinion Party
PDF
Integrated risk management
PDF
How to Prove the Value of Security Investments
PDF
Relating Risk to Vulnerability
PPTX
Information Security Risk Management
PDF
Spreadsheets vs Software for SOX Compliance
PDF
Building an Effective AML Program
PDF
Scammed: Defend Against Social Engineering
PDF
Taking a Data-Driven Approach to Business Continuity
PDF
Reporting to the Board on Corporate Compliance
PDF
Infographic - Critical Capabilities of a Good Risk Management Solution
PDF
Improve Your Risk Assessment Process in 4 Steps
PDF
Integrating-Cyber-Security-for-Increased-Effectiveness
PDF
Information Security Best Practices: Keeping Your Company's Data Safe
The Journey to Integrated Risk Management: Lessons from the Field
An Intro to Resolver's Compliance Application
Risk Intelligence: Threats are the New Risk
App Showcase: Compliance
Integrated Risk Management 101
Data Driven Risk Assessment
Bring Better Data to the Office Opinion Party
Integrated risk management
How to Prove the Value of Security Investments
Relating Risk to Vulnerability
Information Security Risk Management
Spreadsheets vs Software for SOX Compliance
Building an Effective AML Program
Scammed: Defend Against Social Engineering
Taking a Data-Driven Approach to Business Continuity
Reporting to the Board on Corporate Compliance
Infographic - Critical Capabilities of a Good Risk Management Solution
Improve Your Risk Assessment Process in 4 Steps
Integrating-Cyber-Security-for-Increased-Effectiveness
Information Security Best Practices: Keeping Your Company's Data Safe
Ad

Similar to An Intro to Resolver's Incident Management Application (20)

PDF
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
PPTX
Wasn't expecting that! Now what?
PPTX
Online Training Information Security Management
PPTX
Enterprise security management II
PPTX
Intelligence and investigation management
PDF
INCIDENT RESPONSE CONCEPTS
PDF
Integrated Security, Safety and Surveillance Solution i3S
PPTX
Mastering Incident Threat Detection and Response: Strategies and Best Practices
PDF
Security managment risks, controls and incidents
PPTX
INCIDENT-RESPONSE_093004 (1).pdtffyghgptx
PPTX
Comprehensive Incident Management System for Enhanced Safety Reporting
PPTX
Module 6 - Insider Risk.pptx
PPTX
Splunk Enterprise Security
PPTX
Exploring Frameworks of Splunk Enterprise Security
PPTX
Exploring Frameworks of Splunk Enterprise Security
PDF
011918 incident analytics_service_fact_sheet_rs
PPTX
Enterprise security incident management
PPTX
Risk Management Approach to Cyber Security
PPTX
Enterprise incident response 2017
PPTX
Generic siem how_2017
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Wasn't expecting that! Now what?
Online Training Information Security Management
Enterprise security management II
Intelligence and investigation management
INCIDENT RESPONSE CONCEPTS
Integrated Security, Safety and Surveillance Solution i3S
Mastering Incident Threat Detection and Response: Strategies and Best Practices
Security managment risks, controls and incidents
INCIDENT-RESPONSE_093004 (1).pdtffyghgptx
Comprehensive Incident Management System for Enhanced Safety Reporting
Module 6 - Insider Risk.pptx
Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
011918 incident analytics_service_fact_sheet_rs
Enterprise security incident management
Risk Management Approach to Cyber Security
Enterprise incident response 2017
Generic siem how_2017
Ad

More from Resolver Inc. (16)

PDF
ERM Benchmarking Survey Results
PPTX
Best Practices and ROI for Risk-based Vulnerability Management
PDF
Terrorism in a Corporate Setting
PDF
Security Trends: From "Silos" to Integrated Risk Management
PDF
Modelling your Business Processes with Resolver Core
PDF
How Resolver Uses Resolver
PDF
A Peek at adidas Group's Integrated Risk & Security Management Strategy
PDF
An Intro to Resolver's Resilience Application
PDF
How to Achieve a Fully Integrated Approach to Business Resilience
PDF
Keeping Your Data Clean
PDF
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
PDF
Leveraging Change Leadership to Find Success in your IRM Program
PDF
How to Use Storytelling to Communicate with Executives
PDF
Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
PDF
Lessons Learned in the Aftermath of Hurricanes Harvey & Irma
PDF
Planning a move from GRC Cloud to CORE
ERM Benchmarking Survey Results
Best Practices and ROI for Risk-based Vulnerability Management
Terrorism in a Corporate Setting
Security Trends: From "Silos" to Integrated Risk Management
Modelling your Business Processes with Resolver Core
How Resolver Uses Resolver
A Peek at adidas Group's Integrated Risk & Security Management Strategy
An Intro to Resolver's Resilience Application
How to Achieve a Fully Integrated Approach to Business Resilience
Keeping Your Data Clean
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Leveraging Change Leadership to Find Success in your IRM Program
How to Use Storytelling to Communicate with Executives
Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Lessons Learned in the Aftermath of Hurricanes Harvey & Irma
Planning a move from GRC Cloud to CORE

Recently uploaded (20)

PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
AI in Product Development-omnex systems
PDF
Digital Strategies for Manufacturing Companies
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
history of c programming in notes for students .pptx
PDF
medical staffing services at VALiNTRY
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Transform Your Business with a Software ERP System
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
top salesforce developer skills in 2025.pdf
PPTX
Introduction to Artificial Intelligence
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
2025 Textile ERP Trends: SAP, Odoo & Oracle
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
How Creative Agencies Leverage Project Management Software.pdf
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Wondershare Filmora 15 Crack With Activation Key [2025
AI in Product Development-omnex systems
Digital Strategies for Manufacturing Companies
Odoo POS Development Services by CandidRoot Solutions
history of c programming in notes for students .pptx
medical staffing services at VALiNTRY
Design an Analysis of Algorithms II-SECS-1021-03
VVF-Customer-Presentation2025-Ver1.9.pptx
Transform Your Business with a Software ERP System
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Internet Downloader Manager (IDM) Crack 6.42 Build 41
top salesforce developer skills in 2025.pdf
Introduction to Artificial Intelligence
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Navsoft: AI-Powered Business Solutions & Custom Software Development

An Intro to Resolver's Incident Management Application

  • 1. An Intro to Resolver’s Incident Management Application
  • 3. Hello! I am Jamie Burr Application Manager at Resolver jamie.burr@resolver.com
  • 4. And, I am Daryn Duliba Solution Consultant at Resolver daryn.duliba@resolver.com
  • 6. AN INTEGRATED PLATFORM JOURNEY 2017 Prototyping of Use Cases including ESRM and Security Audit Evolution of new IRM base model Acquisitions in the space of Business Resilience and Information Security 2018 Focus on complimentary applications instead of point solutions. 2016 New platform has initial release. Point solutions initiated on Risk Management, NERC Compliance, ,SOX, Internal Audit, Loss Prevention, Workplace Threat Assessment
  • 7. The Integrated Risk Management (IRM) framework is Resolver’s vision for an end to end system for all risk focused applications allowing organizations to break down the silos of internal departments and teams and provide a continuous feedback loop from what is impacting the organization to how we can be better prepared and protected for the future. INTEGRATED RISK MANAGEMENT Analyze Incident Report InvestigateResponse INCIDENT MANAGEMENT MonitorAudit Risk & Regulation Incident Report Investigate SECURITY RISK MANAGEMENTRISK MANAGEMENT Monitor Policy & Control Risk & Regulation
  • 8. Purpose-Built Each application embraces a targeted user journey for the Industry and/or Business line that is embracing it. Rotated screens of all Applications INCIDENT MANAGEMENTCOMPLIANCE MANAGEMENTRISK MANAGEMENTINTERNAL CONTROLINTERNAL AUDITINFORMATION SECURITYBUSINESS CONTINUITY
  • 10. Pains LACK OF HOLISTIC VIEW Not knowing how particulars of incidents are related to others can lead to missed opportunities to provide best possible response to situations, or for proactively managing incident count. Where am I at risk most? FEELING OF FRUSTATION When reworking inconsistencies and inaccuracies in incident reports and collateral. Let’s get it right the first time, and have the type of incident drive the logical presentation of relevant data. INSUFFICIENT TIME Submission and creation forms take too long to fill out based on who is tasked with doing it in the field. Data entry needs to be quick and to the point without any training needed.
  • 11. Gains INCIDENT-CENTRIC INVESTIGATIONS Investigators can share outcomes and findings, track time spent on tasks, document evidence collected, and record interviews conducted. IMPROVED ACCURACY OF INCIDENT CAPTURE Documenting the Who What Where When in an easy to follow, streamlined, and guided approach, from any source or incident type. RISK AWARENESS & CULTURE Better understanding of the relationship of incident data to your risks – enabling you to make data-driven decisions and investments to further reduce your organization’s security risk. SITUATIONAL UNDERSTANDING Related people, places, and incidents create a network to enable quick and effective identification of trends. WITH SECURITY RISK APPLICATION
  • 12. RISK AND COMPLIANCE PROFESSIONALS INFORMATION SECURITY PROFESSIONALS CORPORATE SECURITY PROFESSIONALS How Incident Management Helps… • Detailed Risk/Loss Event Capture • Privacy Violation reporting • Insider Threat reporting • Event Root Cause Analysis • Automated KRI based on Incident Frequency • Privacy Breach Tracking • Prioritization and investigation of events of interest • Contain damage of an incident • Orchestrate a coordinated cross- departmental incident response • Standardized Incident Capture • Multiple portal designs for targeted audiences • Flexible form design based on Incident Classification • Document all investigative activities related to an incident including chain of custody • Isolate trends in physical security risks
  • 14. Incident Management - Feature Overview INCIDENT REPORTING Flexible Portals. Dynamic Triage. Simple Capture. REPORTS & METRICS By Location. By People. By Risk. INCIDENT INVESTIGATION Evidence. Root Cause. Industry Use Cases. SECURITY RISK Location and Asset Profiling. Security Risk Identification. Risk Dashboards. WITH SECURITY RISK APPLICATION
  • 15. Use Cases Physical Security Brand Protection Loss Prevention Internal Fraud Incident Types have use cases built into their definition for easy deployment
  • 18. DASHBOARD REPORTS Choose a report and have it be your primary dashboard. Flag key incidents and have them front and center. REPORT IMPROVEMENTS Polished presentation of detailed incident reports with related involvements. LISTS AND VIEW IMPROVEMENTS Detailed filtering and Sorting within critical views, including photo and card display - ideal for BOLOs COMMAND CENTER Command Center product (Dispatch) integrated with Resolver’s platform Q3 Q3 Q4 2019June All information is confidential and subject to change. CASE & THREAT MANAGEMENT Major release of Industry better practices around investigative cases and threat analysis Incident Management: The Road Ahead
  • 19. Platform Goals 2018 Reduce Time and Cost to Deliver Software to Customers Fast, efficient migrations and/or application expansion. Visualize a Changing Risk Environment Over Time Phase III of Assessments: Data that tells a story and supports cross organization decision making. Minimize Efforts to get Board (or meeting) Ready Clean, concise, branded. Reduced time and effort to prepare shared reports. A Tailored Experience to You - Personalization Continuously tailored experience based of previous behavior. Efficient and Supportive Communication that inspires Collaboration Software that encourages collaboration and clear communication between all user types. All information is confidential and subject to change.
  • 21. IM Application Standard Incident Management App with minimal changes. Standard migration of PSV data into the App. IM + More Incident Management Application and migration, along with blueprinted adjustments. IM + ERM IM Application with standard migration, plus ERM Application (not ESRM) Full Redesign Fully custom configuration from the ground up. PERSPECTIVE MIGRATION PATHS PSV to IM Application