Sheikh Towhid

Sheikh Towhid Engr. Sheikh Towhid is a dedicated Cybersecurity Specialist with expertise in securing IT infrastructure, risk management, and cyber defense strategies.

Masters in Information & Cyber Security from University of Dhaka.

28/09/2025

পৃথিবীর সর্বশ্রেষ্ঠ সম্পদ আমার প্রানপ্রিয় মমতাময়ী মা কিছুক্ষণ আগে মহান আল্লাহ তায়ালার জিম্মায় চলে গেলেন। 🤲
আমার আম্মাজানকে আমি হারিয়ে ফেলেছি 😭😭😭

28/09/2025

Set your mindset for CISSP:

1. Think Like a Manager (Not an Engineer)
• Don’t focus only on technical fixes.
• Prioritize policies, processes, governance, and risk.
• Always ask: How does this impact the business?

2. Security Starts with Risk Management
• Identify → Assess → Treat (mitigate, transfer, avoid, accept).
• You can’t secure everything — focus on highest risk first.
• Risk = Threat × Vulnerability × Impact.

3. People, Process, Technology (In that order)
• Policies, awareness, and training usually come before tools.
• Technical controls are the last line, not the first.

4. CIA Triad
• Confidentiality, Integrity, Availability — keep this lens for all security problems.
• Balance them, don’t assume confidentiality is always the priority.

5. Defense in Depth
• Multiple layers of control (administrative, technical, physical).
• No single control is perfect.

6. Due Care & Due Diligence
• Due care = Doing what a reasonable person would do.
• Due diligence = Ongoing effort to maintain security.

7. Security Is for Business Enablement
• Security supports the mission — it’s not the mission itself.
• Choose solutions that align with organizational goals, not just “best tech.”

8. Prevent > Detect > Correct
• Prefer preventive controls first (policies, access control).
• Detective controls (logs, IDS) and corrective (backups, patches) are fallback.

9. Policy First
• Policies drive everything.
• Procedures and standards enforce policies.

05/09/2025

২০৩০ সাল নাগাদ ঢাকা হয়তো পরিণত হবে হাসপাতাল আর ক্লিনিকের শহরে।
ওরা আসছে বছরে শতকে। আর দিন দিন বেড়েই চলেছে। যেন উৎসব লেগেছে।
স্বাস্থ্য সচেতনতার কোনো বালাই নেই, স্বাস্থ্য রক্ষার জন্য সরকারি বাজেটও তেমন একটা নেই। কিন্তু সবার উৎসাহ নতুন নতুন হাসপাতাল তৈরি করার দিকে। হাসপাতালে কেনাবেচা হবে, ব্যবসা হবে, বাণিজ্য হবে, আর সবার লাভই লাভ।

আমি-আপনি সুস্থ থাকলে তো আর কারো কোনো লাভ নেই, বরং এটা সবার জন্য ক্ষতি!

​তবে এই চিত্রটা বদলানো সম্ভব। এর জন্য আমাদেরকেই স্বাস্থ্য রক্ষার আন্দোলন গড়ে তুলতে হবে।

- ​স্বাস্থ্যকর জীবনযাপন: নিয়মিত শরীরচর্চা করুন, পুষ্টিকর খাবার খান এবং পর্যাপ্ত ঘুমান।

-​জনসচেতনতা বৃদ্ধি: সামাজিক যোগাযোগ মাধ্যম এবং অন্য প্ল্যাটফর্ম ব্যবহার করে স্বাস্থ্যকর জীবনযাপনের গুরুত্ব সম্পর্কে মানুষকে জানান।

- স্বাস্থ্য শিক্ষা: স্কুল-কলেজ এবং কর্মক্ষেত্রে স্বাস্থ্য শিক্ষা কার্যক্রম শুরু করা যেতে পারে।

- ​সরকারের উপর চাপ: স্বাস্থ্য খাতে বাজেট বাড়ানোর জন্য এবং স্বাস্থ্যকর পরিবেশ সৃষ্টির জন্য সরকারের উপর চাপ সৃষ্টি করতে হবে।

​এই পদক্ষেপগুলো অনুসরণ করলে আমরা হয়তো হাসপাতাল আর ক্লিনিকের শহর নয়, বরং একটি সুস্থ ও সুন্দর ঢাকা গড়তে পারব।

ভবিষ্যতের স্বাস্থ্যমন্ত্রী এটা করবেন কি?

আপনারা কি মনে করেন?

22/08/2025

𝗭𝗲𝗿𝗼 𝗧𝗿𝘂𝘀𝘁 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆: 𝗔 𝗠𝗼𝗱𝗲𝗿𝗻 𝗔𝗽𝗽𝗿𝗼𝗮𝗰𝗵 𝘁𝗼 𝗖𝘆𝗯𝗲𝗿 𝗗𝗲𝗳𝗲𝗻𝘀𝗲

In today’s evolving threat landscape, traditional perimeter-based security is no longer enough. Enter Zero Trust Security — a framework based on the principle:

𝗛𝗲𝗿𝗲’𝘀 𝗵𝗼𝘄 𝘁𝗵𝗲 𝗭𝗲𝗿𝗼 𝗧𝗿𝘂𝘀𝘁 𝗲𝗰𝗼𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝘀𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗲𝗱 𝗮𝗰𝗿𝗼𝘀𝘀 𝗺𝘂𝗹𝘁𝗶𝗽𝗹𝗲 𝗹𝗮𝘆𝗲𝗿𝘀:

🛡️ 𝗘𝗻𝗱𝗽𝗼𝗶𝗻𝘁 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 – EDR, MDM, DLP, Patch Management, Threat Intel
🌐 𝗡𝗲𝘁𝘄𝗼𝗿𝗸 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 – IDS/IPS, NAC, VPN, Segmentation, TLS/SSL
📊 𝗗𝗮𝘁𝗮 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 – Encryption, Data Masking, Tokenization, Access Contro🔌 𝗜𝗼𝗧 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 – Device Authentication, Firmware Security, Anomaly Detection
☁️ 𝗖𝗹𝗼𝘂𝗱 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 – CASB, IAM, Compliance Monitoring, Shared Responsibility
🔁 𝗔𝗣𝗜 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 – Gateways, Rate Limiting, Token Management, Secure Dev
💻 𝗔𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 – Code Review, Web Firewalls, SAST/DAST, App Shielding
✅ 𝗭𝗲𝗿𝗼 𝗧𝗿𝘂𝘀𝘁 𝗶𝘀 𝗻𝗼𝘁 𝗮 𝗽𝗿𝗼𝗱𝘂𝗰𝘁 — it's a strategy. It ensures that every request is verified, every access is justified, and every session is monitored.

🟦 DRIVERS

◾ Rapid adoption of cloud and surge in digital transformation
◾Rising regulatory compliance demands
◾Diminishing popularity of perimeter-based security
◾Rising threat of sophisticated cyberattacks

🟦 OPPORTUNITIES

◾Improved visibility into networks and robust security
◾Development of new zero trust security products and services
◾Surge in awareness about zero trust security
















































🚨𝗢𝗽𝗲𝗿𝗮𝘁𝗶𝗼𝗻𝗮𝗹 𝗧𝗲𝗰𝗵𝗻𝗼𝗹𝗼𝗴𝘆 (𝗢𝗧) 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 : 𝗔 𝗩𝗶𝘀𝘂𝗮𝗹 𝗕𝗿𝗲𝗮𝗸𝗱𝗼𝘄𝗻 🛡️The rapid adoption of Industrial Internet of Things (IIoT) ...
22/08/2025

🚨𝗢𝗽𝗲𝗿𝗮𝘁𝗶𝗼𝗻𝗮𝗹 𝗧𝗲𝗰𝗵𝗻𝗼𝗹𝗼𝗴𝘆 (𝗢𝗧) 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 : 𝗔 𝗩𝗶𝘀𝘂𝗮𝗹 𝗕𝗿𝗲𝗮𝗸𝗱𝗼𝘄𝗻 🛡️

The rapid adoption of Industrial Internet of Things (IIoT) devices is driving the need for enhanced OT security. As organizations deploy more smart sensors and connected equipment to optimize operations, the number of entry points for cyber threats grows. This expansion necessitates advanced security frameworks to monitor, manage, and protect these diverse and distributed assets across industrial environments

𝗧𝗵𝗶𝘀 𝗽𝗼𝘄𝗲𝗿𝗳𝘂𝗹 𝘃𝗶𝘀𝘂𝗮𝗹 𝗯𝗿𝗲𝗮𝗸𝘀 𝗱𝗼𝘄𝗻 𝘁𝗵𝗲 𝗸𝗲𝘆 𝗽𝗶𝗹𝗹𝗮𝗿𝘀 𝗼𝗳 𝗢𝗧 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆:

🔸 𝗡𝗲𝘁𝘄𝗼𝗿𝗸 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 – IDS/IPS, Firewall, VPNs, Microsegmentation
🔸 𝗘𝗻𝗱𝗽𝗼𝗶𝗻𝘁 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 – EDR, MDM, Patch Management
🔸 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 – Scanning, Risk Prioritization, Remediation
🔸 𝗜𝗔𝗠 & 𝗔𝗰𝗰𝗲𝘀𝘀 𝗖𝗼𝗻𝘁𝗿𝗼𝗹 – MFA, SSO, PAM
🔸 𝗦𝗜𝗘𝗠 – Threat Detection, Log Management, Forensics
🔸 𝗗𝗮𝘁𝗮 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 – Encryption, DLP, Access Control
🔸 𝗔𝘀𝘀𝗲𝘁 𝗗𝗶𝘀𝗰𝗼𝘃𝗲𝗿𝘆 & 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 – Visibility, Tracking, Compliance
🔸 𝗗𝗼𝗺𝗮𝗶𝗻-𝗦𝗽𝗲𝗰𝗶𝗳𝗶𝗰 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 – For Transportation, Manufacturing, Energy, and more

𝗢𝗣𝗣𝗢𝗥𝗧𝗨𝗡𝗜𝗧𝗜𝗘𝗦

🔷 Technological advancements in cybersecurity
🔷Digital transformation across organizations
🔷Rising demand for Industry 4.0 and smart infrastructure
🔷Lack of trained security analysts
































22/08/2025

🚀 𝗕𝘂𝗶𝗹𝗱𝗶𝗻𝗴 𝗦𝗰𝗮𝗹𝗮𝗯𝗹𝗲 𝗔𝗜 𝗔𝗴𝗲𝗻𝘁𝘀: 𝗧𝗵𝗲 𝗙𝘂𝘁𝘂𝗿𝗲 𝗼𝗳 𝗔𝘂𝘁𝗼𝗺𝗮𝘁𝗶𝗼𝗻 𝗜𝘀 𝗛𝗲𝗿𝗲! 🤖

👉 AI agents is projected to reach USD 52.62 billion by 2030 at a CAGR of 46.3% during the forecast period

Are you exploring how to build scalable and intelligent AI agents? This powerful visual breaks down the core components needed to architect modern, production-ready AI agents:

🧠 Memory Systems (Short-term, Long-term, Hybrid)
🧩 Tool Integration (OpenAI Functions, APIs, MCP)
🧠 Reasoning Frameworks (ReAct, Reflexion, Tree of Thought)
📚 Knowledge Bases (Vector DBs like Pinecone, Graphs like Neo4j)
⚙️ Ex*****on Engines (Task retries, latency optimization)
🧪 Monitoring & Governance (Langfuse, CI/CD, Kubernetes)
💻 User Interfaces (Chat UI, Slack, Dashboards)
🚀 Deployment & Flow Builders (LangFlow, Flowise)

𝗢𝗣𝗣𝗢𝗥𝗧𝗨𝗡𝗜𝗧𝗜𝗘𝗦

Tailored AI solutions for specialized industry segments to address niche use cases

Expansion of AI-powered SaaS platforms will broaden accessibility and drive adoption among small and medium-sized enterprises

Multilingual capabilities in AI agents will increase global market pe*******on and adoption

𝗗𝗥𝗜𝗩𝗘𝗥𝗦

Developments in natural language processing (NLP) technologies to enhance AI agents & understanding and interaction capabilities

Demand for hyper-personalized digital experiences across customer-facing roles

Operational value of AI agents across enterprise business process automation













22/08/2025

𝗜𝗱𝗲𝗻𝘁𝗶𝘁𝘆 𝗮𝗻𝗱 𝗔𝗰𝗰𝗲𝘀𝘀 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 (𝗜𝗔𝗠) 𝗘𝘀𝘀𝗲𝗻𝘁𝗶𝗮𝗹𝘀

The cybersecurity landscape is more complex than ever—ranging from data protection to advanced threat detection. But across all these layers, Identity and Access Management (IAM) plays a foundational role.

𝗧𝗵𝗶𝘀 𝘃𝗶𝘀𝘂𝗮𝗹 𝗳𝗿𝗮𝗺𝗲𝘄𝗼𝗿𝗸 𝗯𝗿𝗲𝗮𝗸𝘀 𝗶𝘁 𝗱𝗼𝘄𝗻 𝗶𝗻𝘁𝗼 𝟴 𝗰𝗿𝗶𝘁𝗶𝗰𝗮𝗹 𝗱𝗼𝗺𝗮𝗶𝗻𝘀:

𝗡𝗲𝘁𝘄𝗼𝗿𝗸 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆

𝗦𝘆𝘀𝘁𝗲𝗺 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆

𝗔𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆

𝗠𝗼𝗯𝗶𝗹𝗲 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆

𝗗𝗮𝘁𝗮 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆

𝗔𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝗧𝗵𝗿𝗲𝗮𝘁 𝗣𝗿𝗼𝘁𝗲𝗰𝘁𝗶𝗼𝗻

𝗥𝗶𝘀𝗸 𝗚𝗼𝘃𝗲𝗿𝗻𝗮𝗻𝗰𝗲 & 𝗖𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲

𝗜𝗔𝗠 – 𝗘𝗺𝗯𝗲𝗱𝗱𝗲𝗱 𝗔𝗰𝗿𝗼𝘀𝘀 𝗔𝗹𝗹

🎯 𝗜𝗔𝗠 𝗽𝗼𝘄𝗲𝗿𝘀:

✔ Secure access through MFA & biometric authentication
✔ Controlled data access & encryption policies
✔ Role-based privileges & privileged access monitoring
✔ Continuous compliance and audit readiness

𝗢𝗣𝗣𝗢𝗥𝗧𝗨𝗡𝗜𝗧𝗜𝗘𝗦

Cultural shift from traditional IAM to customer identity and access management

Proliferation of cloud-based IAM solutions and services and growing adoption of hybrid cloud model

Increasing integration of technologies into IAM

𝗗𝗥𝗜𝗩𝗘𝗥𝗦

Rising instances of security breaches and identity-related fraud

Growing awareness about compliance management

Increasing need for identity access management solutions for IoT

Increased spending on cybersecurity following COVID-19 pandemic

Growing adoption of IAM solutions by SMEs































22/08/2025

🛡️ 𝗡𝗲𝘁𝘄𝗼𝗿𝗸 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆: 𝗟𝗮𝘆𝗲𝗿 𝗯𝘆 𝗟𝗮𝘆𝗲𝗿 𝗗𝗲𝗳𝗲𝗻𝘀𝗲

🔍 𝗞𝗲𝘆 𝗟𝗮𝘆𝗲𝗿𝘀 & 𝗧𝗵𝗿𝗲𝗮𝘁𝘀:

𝗔𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗟𝗮𝘆𝗲𝗿 : SQL injection, Cross-site scripting, DDoS
𝗣𝗿𝗲𝘀𝗲𝗻𝘁𝗮𝘁𝗶𝗼𝗻 𝗟𝗮𝘆𝗲𝗿 : SSL stripping, Encoding attacks
𝗦𝗲𝘀𝘀𝗶𝗼𝗻 𝗟𝗮𝘆𝗲𝗿 : Session hijacking, MITM attacks
𝗧𝗿𝗮𝗻𝘀𝗽𝗼𝗿𝘁 𝗟𝗮𝘆𝗲𝗿 : SYN/UDP floods
𝗡𝗲𝘁𝘄𝗼𝗿𝗸 𝗟𝗮𝘆𝗲𝗿 : IP spoofing, Routing attacks
𝗗𝗮𝘁𝗮 𝗟𝗶𝗻𝗸 𝗟𝗮𝘆𝗲𝗿 : MAC/ARP spoofing
𝗣𝗵𝘆𝘀𝗶𝗰𝗮𝗹 𝗟𝗮𝘆𝗲𝗿 : Eavesdropping, Cable tamperin

🔴 Network Security Industry size was valued at USD 78.2 billion in 2024 and is expected to grow at a CAGR of 7.2% from 2024 to 2029

🟦 𝗗𝗥𝗜𝗩𝗘𝗥𝗦

Increasing frequency and sophistication of cyberattacks
Growing BYOD trend necessitating network security measures
Increased cloud adoption and remote work trend

🟪 𝗢𝗣𝗣𝗢𝗥𝗧𝗨𝗡𝗜𝗧𝗜𝗘𝗦

Simplified management and enhanced protection achieved using secure access service edge framework
Implementation of zero-trust approach in network security




























22/08/2025

𝟭𝟮 𝗣𝗶𝗹𝗹𝗮𝗿𝘀 𝗼𝗳 𝗖𝘆𝗯𝗲𝗿 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 🤖
𝗛𝗲𝗿𝗲 𝗮𝗿𝗲 𝘁𝗵𝗲 𝟭𝟮 𝗣𝗶𝗹𝗹𝗮𝗿𝘀 𝗼𝗳 𝗖𝘆𝗯𝗲𝗿 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗲𝘃𝗲𝗿𝘆 𝗯𝘂𝘀𝗶𝗻𝗲𝘀𝘀 𝘀𝗵𝗼𝘂𝗹𝗱 𝘀𝘁𝗿𝗲𝗻𝗴𝘁𝗵𝗲𝗻:
1️⃣ Disaster Recovery – Ensure business continuity with backups & redundancy.
2️⃣ Authentication – Strong passwords & Multi-Factor Authentication (MFA).
3️⃣ Authorization – Control access with least-privilege principles.
4️⃣ Encryption – Protect sensitive data in transit & at rest.
5️⃣ Vulnerability Management – Regular scanning & patching.
6️⃣ Audit & Compliance – Meet regulations like GDPR & HIPAA.
7️⃣ Network Security – Firewalls, segmentation & intrusion detection.
8️⃣ Terminal Security – Protect endpoints with antivirus & encryption.
9️⃣ Emergency Response – Have a tested incident response plan.
🔟 Container Security – Secure microservices & cloud deployments.
1️⃣1️⃣ API Security – Protect APIs with OAuth, rate limiting & key management.
1️⃣2️⃣ 3rd-Party Management – Vet vendors & monitor external access.

22/08/2025

💠𝗗𝗮𝘁𝗮𝗯𝗮𝘀𝗲𝘀 – 𝗔 𝗖𝗼𝗺𝗽𝗹𝗲𝘁𝗲 𝗩𝗶𝘀𝘂𝗮𝗹 𝗚𝘂𝗶𝗱𝗲 💠

⬛ Cloud Database and DBaaS size is projected to reach USD 57.5 billion by 2028

📚 𝗗𝗮𝘁𝗮𝗯𝗮𝘀𝗲 𝗙𝘂𝗻𝗱𝗮𝗺𝗲𝗻𝘁𝗮𝗹𝘀 : Understand what a DB is, RDBMS vs NoSQL, ACID vs BASE, OLTP vs OLAP

🧩 𝗗𝗮𝘁𝗮 𝗠𝗼𝗱𝗲𝗹𝘀 & 𝗧𝘆𝗽𝗲𝘀 : Dive into relational, non-relational, and key-value/document/graph stores

🔐 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 & 𝗦𝗰𝗮𝗹𝗶𝗻𝗴 : Learn about SQL injection, backup/restore, replication, and encryption

⚙️ 𝗧𝗼𝗼𝗹𝘀 & 𝗘𝗰𝗼𝘀𝘆𝘀𝘁𝗲𝗺 : From PostgreSQL, MongoDB to GUI tools like DBeaver and pgAdmin

⚡ 𝗤𝘂𝗲𝗿𝘆𝗶𝗻𝗴 𝗠𝗮𝘀𝘁𝗲𝗿𝘆 : SQL basics, advanced SQL, and NoSQL querying (aggregation, key-value lookups)

📈 𝗜𝗻𝗱𝗲𝘅𝗶𝗻𝗴 & 𝗢𝗽𝘁𝗶𝗺𝗶𝘇𝗮𝘁𝗶𝗼𝗻: Master ex*****on plans, normalization, sharding, and more

𝗢𝗣𝗣𝗢𝗥𝗧𝗨𝗡𝗜𝗧𝗜𝗘𝗦

◾ Increase in production of database workload

◾Growing adoption of NoSQL database

◾Popularity of IoT and connected devices

𝗗𝗥𝗜𝗩𝗘𝗥𝗦

◾Rising need for self-driving cloud databases

◾Growing demand to process low-latency queries

◾Need for structured data in various enterprises

◾Increase in amount of data generated




𝗔𝗜 𝗥𝗶𝘀𝗸 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 𝗙𝗿𝗮𝗺𝗲𝘄𝗼𝗿𝗸 𝟭 — 𝗚𝗼𝘃𝗲𝗿𝗻𝗮𝗻𝗰𝗲🔹Policy & Procedures  🔹Lifecycle Standards🔹Approval & Accountability🔹Risk Ove...
13/08/2025

𝗔𝗜 𝗥𝗶𝘀𝗸 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 𝗙𝗿𝗮𝗺𝗲𝘄𝗼𝗿𝗸

𝟭 — 𝗚𝗼𝘃𝗲𝗿𝗻𝗮𝗻𝗰𝗲

🔹Policy & Procedures
🔹Lifecycle Standards
🔹Approval & Accountability
🔹Risk Oversight
🔹Change Management

𝟮 — 𝗜𝗻𝘃𝗲𝗻𝘁𝗼𝗿𝘆 & 𝗥𝗶𝘀𝗸 𝗔𝘀𝘀𝗲𝘀𝘀𝗺𝗲𝗻𝘁

🔹AI Identification
🔹AI Inventory
🔹Applicability
🔹Risk Assessments
🔹Risk Ratings
🔹Model Impact Assessment (Risk Scoring)

𝟯 — 𝗗𝗮𝘁𝗮 𝗔𝗴𝗴𝗿𝗲𝗴𝗮𝘁𝗶𝗼𝗻 & 𝗤𝘂𝗮𝗹𝗶𝘁𝘆

Data Architecture
Data Infrastructure
Data Privacy
Feature Engineering

𝟰 — 𝗜𝗻𝘁𝗲𝗴𝗿𝗮𝘁𝗲𝗱 𝗗𝗲𝘃𝗲𝗹𝗼𝗽𝗺𝗲𝗻𝘁 & 𝗜𝗺𝗽𝗹𝗲𝗺𝗲𝗻𝘁𝗮𝘁𝗶𝗼𝗻

Data Quality Assessment
Testing & Analysis
Control Framework
Secure Data Model
Training
Pre-Implementation Validation
Hyperparameters
Production Readiness
Model Input Change Management

𝟱 — 𝗢𝗻𝗴𝗼𝗶𝗻𝗴 𝗣𝗲𝗿𝗳𝗼𝗿𝗺𝗮𝗻𝗰𝗲 𝗠𝗼𝗻𝗶𝘁𝗼𝗿𝗶𝗻𝗴

Testing Program
Effective Challenge
Stress Testing
Real-Time Monitoring and Bias
Output Reporting
Dynamic Model Calibration
Results & Output Based Testing
Proactive Trend, Concentration & Correlation Identification
Benchmarking
Continuous Automated Exception Identification & Reporting

𝟲 — 𝗜𝗻𝗱𝗲𝗽𝗲𝗻𝗱𝗲𝗻𝘁 𝗩𝗮𝗹𝗶𝗱𝗮𝘁𝗶𝗼𝗻

Output Analysis
Interpretability
Bias Testing
Operational Issues
Review of Performance Indicators
Review of Recommendations

𝟳 — 𝗣𝗼𝘀𝘁-𝗠𝗼𝗿𝘁𝗲𝗺 𝗥𝗲𝘃𝗶𝗲𝘄

Analysis of Findings
Findings Prioritization
Roadmap for Implementation
Redesign/Recalibration for Continuous Improvement

🟣 𝗖𝗼𝗺𝗺𝗼𝗻 𝗧𝗲𝗰𝗵𝗻𝗼-𝗖𝗼𝗺𝗺𝗲𝗿𝗰𝗶𝗮𝗹 𝗥𝗶𝘀𝗸𝘀 𝗼𝗳 𝗔𝗜

◾ 𝗦𝘁𝗿𝗮𝘁𝗲𝗴𝗶𝗰 𝗥𝗶𝘀𝗸

🔸 Reputational Risk
🔸Customer Experience
🔸Stakeholder Risk
🔸Resource Allocation
🔸Culture
🔸Obsolete Workforce
🔸Talent Management
🔸Brand Awareness

◾𝗥𝗲𝗴𝘂𝗹𝗮𝘁𝗼𝗿𝘆 𝗮𝗻𝗱 𝗖𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲 𝗥𝗶𝘀𝗸

🔸Legal Risk
🔸Consumer Protection
🔸Know Your Customer (KYC)
🔸Consumer Privacy
🔸Disparate Impact
🔸Unfair, Deceptive, or Abusive Acts or Practices
🔸Fair Credit & Lending
🔸Sales Practices/Incentive Comp

◾𝗢𝗽𝗲𝗿𝗮𝘁𝗶𝗼𝗻𝗮𝗹 𝗥𝗶𝘀𝗸

🔸Business Disruption
🔸System Failures
🔸Process Failures
🔸Internal Control Environment
🔸Third-Party Risk/Vendor Management
🔸Change Management
🔸Operational Errors

◾𝗧𝗲𝗰𝗵𝗻𝗼𝗹𝗼𝗴𝘆 𝗥𝗶𝘀𝗸

🔸Software/Application Failure
🔸Information & Cyber Risk
🔸Identity & Access Management
🔸Availability & Accessibility
🔸Black-Box Issues
🔸Data Management
🔸Data Security

◾𝗙𝗶𝗻𝗮𝗻𝗰𝗶𝗮𝗹 𝗥𝗶𝘀𝗸

🔸Credit Risk
🔸Liquidity Risk
🔸Market Risk
🔸Underwriting Risk
🔸Financial Reporting Risk

পুরো জাতির গ্যাস্ট্রিক!
30/12/2024

পুরো জাতির গ্যাস্ট্রিক!

Address

Muradpur

Telephone

+8801818322770

Website

Alerts

Be the first to know and let us send you an email when Sheikh Towhid posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Sheikh Towhid:

Share