A free advanced Gen AI cyber threat, risk and control chat application.

Struggling with recalling risk and control terminology or interactions? Still using SME engagements to draft initial policies and standards? Can’t afford labour intensive and subjective risk response processes?

Leverage advanced Gen AI to understand cyber threats, increase cyber risk expertise, fast track assessments, and make defensible decisions.

  • General Purpose Risk and Control Queries
  • Control Assessments
  • Control Prioritisation
  • Loss History (Sept 2024)
  • Threat Intelligence (Oct 2024)
  • Start small and grow

Increase productivity and accuracy

Dedicated cyber risk and control LLM.

Adopt Gen AI use cases earlier

Benefit from our Gen AI first approach.

A free advanced Gen AI cyber threat, risk and control chat application.

General purpose risk and control queries

  • General purpose risk and control knowledge queries. Ask questions like what cyber security controls mitigate a risk, or what are the control objectives or detailed requirements of a control.
  • Leverage Cohere AI and Retrieval Augmented Generative AI (RAG) agents to interrogate the full ISM, PCI-DSS, and several books on cyber controls to get the answers, with references.
  • Documents are stored in Oracle Vector Store and updated to better satisfy answers rated by users as needing improvement.

Control assessments

  • Use advanced Cohere RAG agents to automatically assess effectiveness of a control based a control reference or objective, and a description of current design and implementation of the control.
  • Obtain an assessment of control effectiveness (weak, marginal, strong) as well as potential areas of improvement.
  • Obtain the corresponding CMMi aligned maturity rating (1-5) of the control and a rationale for the rating.

Control prioritisation

  • Control prioritisation and analytic weighting for controls. Provide the name and/or framework reference of a control and a list of mitigating controls.
  • Obtain the controls prioritised in order of efficacy and relative weighting (out of a total 100% mitigation) for each of them, as well as a rationale.
  • Weightings that are rated by users, are reviewed and the weighting algorithm adjusted.

Loss History (ETA Sept 2024)

  • External loss data (structured and non-structured).
  • Leverage Cohere AI and web agents to interrogate news sites, government and private data breach aggregation sites, as well as SEC and other regulatory data breach filings.
  • Obtain external loss data (structured and unstructured) for a given industry segment and date range – table of data industry, date, location, company name, information for each FAIR factor.
  • Drill into an individual data breach incident and obtain a detailed report outlining all known information for the data breach (from available sources).

Start small and grow

  • More skills added every month.
  • Start with the MyRISK® Chat model with or without the MyGRC® core GRC module.
  • Use additional AI-enabled modules to integrate the cyber ecosystem, aggregate siloed data, automate control assurance processes, innovate, provide business insights, and quantify risk.

Confidently leverage advanced Gen AI to understand cyber threats, increase cyber risk expertise, and fast track assessments, without mistaken terminology, forgotten controls, or labour intensive risk responses.

Module Technical Details

1 web & mobile application
Optional Integration – MyGRC™ core module
3 AI Automations – Oracle Vector Search, Cohere RAG agent, Cohere Web agent

Module Dependencies

None

Module Status

General Availability
Free Tier available

Try MyRISK® Chat now

Adopt GenAI earlier. Start using MyRISK Chat today to increase productivity and accuracy of your cyber assessments and risk responses.

Try now

We can help get started or
keep up with cyber risk

With a background as cyber risk practitioners ourselves we understand how difficult it is to manage the increasing threat environment. Schedule a call today so you can stop struggling with a shortage of skilled cyber resources and feeling unsure of your cyber posture, and your ability to deliver cyber resilience..