INFLUENCE OF IT AND CYBERBUCK – RISKS ON BANK ACTIVITY
Abstract
Purpose is tо influence of the IT and cyber risk in the banks and outline the major trends in cyber security; study the international practice of proactive protection against cyber-risk and offer basic steps in building a cyber-defense based on international guidelines. Methodology of research. The basis of the research work assigned as general (analysis, observation) and special methods of cognition. Methods of analysis and observation used to study the basic trends of cyber-security. Methods of knowledge used to study the impact of IT and cyber risks for banks. Findings. Proved that issues relating to cyber-security bank that covers all that protects against intentional attacks, breaches, IT incidents and their consequences, and areas of improvement at this stage is particularly important. Proved that the banks must not only respond to incidents that happen to them directly, but also consider the impact of key companies in their supply chain. One of the options for management of IT risk management is to transfer this type of risk insurance companies. Found that insurance plays an important role, but does not cover the real damage from cyber threats. Consistent and expanded application of risk analysis to identify and take necessary measures, designed to save a substantial amount of costs provoked by cyber risk. It was concluded that despite the leisurely introduction in Ukraine of Basel II and III, capital requirements, which would include part of the capital in cyber risks - domestic banks are not immune from this risk, unless their own initiative will not meet these requirements. In terms of practical application, selected 10 key steps that should take the organization to implement effective information security management that is required for implementation in banking institutions, as they are exposed to cyber risks to the greatest extent. Originality. Grounded based methods of learning impact of IT and cyber risk in the banks and outlines the major trends in cyber security. Practical value. Research results can be offered for introduction in activity of banks, which will be instrumental in an effective management informative safety.
References
Richard Anderson Cyber Risk Executive Summary // Institute of Risk Management [Електронний ресурс]. – Режим доступу : https://www.theirm.org/media/883443/Final_IRM_Cyber-Risk_Exec- Summ_A5_low-res.pdf
Вяткин В.Н. Риск-менеджмент / В.Н. Вяткин, И.В. Вяткин, В.А. Гамза. – М. : Издательско- торговая корпорация "Дашков и К", 2012 – 512 с.
Грабовой П.Г. Риски в современном бизнесе / П.Г. Грабовой. – М. : Аланс, 2014. – 240 c.
Joanne Duffer ISACA Identifies Five Cyber Risk Trends for 2016 [Електронний ресурс]. – Режим доступу : http://www.isaca.org/About-ISACA/Press-room/NewsReleases/2015/Pages/ISACA- Identifies-Five-Cyber-Risk-Trends-for-2016.aspx
Adrian Ladbury Risk managers seek to buy more cyber cover finds // Commercial RiskEurope [Електронний ресурс]. – Режим доступу : http://www.commercialriskeurope.com/cre/3317/56/Risk- managers-seek-to-buy-more-cyber-cover-finds-Munich-Re-survey/
Недосекин А.О. Стратегический подход к управлению рисками корпорации / А.О. Недосекин, К.Е. Павлов, З.И. Абдулаева // Стратегический менеджмент. – 2008. – № 4. – С. 94-97.
Reducing the Cyber Risk in 10 Critical Areas [Електронний ресурс]. – Режим доступу : https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/395716/10_steps_ten_critical_areas.pdf
2014 ISACA Annual Report [Електронний ресурс]. – Режим доступу : http://www.isaca.org/About-ISACA/annual-report/Pages/default.aspx.
Anderson, Richard (2015), “Cyber Risk Executive Summary”, available at: https://www.theirm.org/media/883443/Final_IRM_Cyber-Risk_Exec-Summ_A5_low-res.pdf (access date May 10, 2016).
Viatkin, V.N., Viatkin, I.V. and Gamza, V.A. (2012), Risk-menedzhment [Risk-management], Izdatelsko-torgovaia korporatsiia "Dashkov i K", Moscow, Russia, 512 p.
Grabovoy, P.G. (2014), Riski v sovremennom biznese [Risks are in modern business], Alans, Moscow, Russia, 240 p.
Duffer, Joanne (2016), “ISACA Identifies Five Cyber Risk Trends for 2016”, available at: http://www.isaca.org/About-ISACA/Press-room/News-Releases/2015/Pages/ISACA-Identifies-Five-Cyber- Risk-Trends-for-2016.aspx (access date May 11, 2016).
Ladbury, Adrian (2016), “Risk managers seek to buy more cyber cover finds”, available at: http://www.commercialriskeurope.com/cre/3317/56/Risk-managers-seek-to-buy-more-cyber-cover-finds- Munich-Re-survey/ (access date May 10, 2016).
Nedosekin, A.O., Pavlov, K.E and Abdulaeva, Z.I. (2008), “A strategic approach to corporate risk management”, Strategicheskiy menedzhment, no. 4, p. 94-97.
Reducing the Cyber Risk in 10 Critical Areas (2016), available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/395716/10_steps_ten_critical_ areas.pdf (access date May 10, 2016).
2014 ISACA Annual Report, (2015), available at: http://www.isaca.org/About-ISACA/annual- report/Pages/default.aspx (access date May 10, 2016).