Struggling with recalling risk and control terminology or interactions? Still using SME engagements to draft initial policies and standards? Can’t afford labour intensive and subjective risk response processes?
Leverage advanced Gen AI to understand cyber threats, increase cyber risk expertise, fast track assessments, and make defensible decisions.
- General Purpose Risk and Control Queries
- Control Assessments
- Control Prioritisation
- Loss History (Sept 2024)
- Threat Intelligence (Oct 2024)
- Start small and grow
Increase productivity and accuracy
Dedicated cyber risk and control LLM.
Adopt Gen AI use cases earlier
Benefit from our Gen AI first approach.
A free advanced Gen AI cyber threat, risk and control chat application.
General purpose risk and control queries
- General purpose risk and control knowledge queries. Ask questions like what cyber security controls mitigate a risk, or what are the control objectives or detailed requirements of a control.
- Leverage Cohere AI and Retrieval Augmented Generative AI (RAG) agents to interrogate the full ISM, PCI-DSS, and several books on cyber controls to get the answers, with references.
- Documents are stored in Oracle Vector Store and updated to better satisfy answers rated by users as needing improvement.
Control assessments
- Use advanced Cohere RAG agents to automatically assess effectiveness of a control based a control reference or objective, and a description of current design and implementation of the control.
- Obtain an assessment of control effectiveness (weak, marginal, strong) as well as potential areas of improvement.
- Obtain the corresponding CMMi aligned maturity rating (1-5) of the control and a rationale for the rating.
Control prioritisation
- Control prioritisation and analytic weighting for controls. Provide the name and/or framework reference of a control and a list of mitigating controls.
- Obtain the controls prioritised in order of efficacy and relative weighting (out of a total 100% mitigation) for each of them, as well as a rationale.
- Weightings that are rated by users, are reviewed and the weighting algorithm adjusted.
Loss History (ETA Sept 2024)
- External loss data (structured and non-structured).
- Leverage Cohere AI and web agents to interrogate news sites, government and private data breach aggregation sites, as well as SEC and other regulatory data breach filings.
- Obtain external loss data (structured and unstructured) for a given industry segment and date range – table of data industry, date, location, company name, information for each FAIR factor.
- Drill into an individual data breach incident and obtain a detailed report outlining all known information for the data breach (from available sources).
Start small and grow
- More skills added every month.
- Start with the MyRISK® Chat model with or without the MyGRC® core GRC module.
- Use additional AI-enabled modules to integrate the cyber ecosystem, aggregate siloed data, automate control assurance processes, innovate, provide business insights, and quantify risk.
Confidently leverage advanced Gen AI to understand cyber threats, increase cyber risk expertise, and fast track assessments, without mistaken terminology, forgotten controls, or labour intensive risk responses.
Module Technical Details
1 web & mobile application
Optional Integration – MyGRC™ core module
3 AI Automations – Oracle Vector Search, Cohere RAG agent, Cohere Web agent
Module Dependencies
None
Module Status
General Availability
Free Tier available
Try MyRISK® Chat now
Adopt GenAI earlier. Start using MyRISK Chat today to increase productivity and accuracy of your cyber assessments and risk responses.
Try nowOur team has been building cyber risk tools since 2004, and building real ML/AI into the MyRISK® platform since 2021
We can help get started or
keep up with cyber risk
With a background as cyber risk practitioners ourselves we understand how difficult it is to manage the increasing threat environment. Schedule a call today so you can stop struggling with a shortage of skilled cyber resources and feeling unsure of your cyber posture, and your ability to deliver cyber resilience..