You are on page 1of 2

Nama : Indra Yolanda Pristiawati

Npm : 201910325116
Kelas : 4-B02
Matkul : Riset Operasional
Dosen : Dr. Dian Sudiantini M.Pd

RESUME WEBINAR UNIVERSITAS BHAYANGKARA JAKARTA RAYA &


UNIVERSITY OF MINDANAO

CORPORATE RISK MANAGEMENT

1. Information Technology Risk Management


Uncertainty that a foreseeable loss or damage can result for such uncertain probabilistic
events, can be in the form 1. Technical and operatonal risk 2. Data and Information
security risk 3. Organization, project and human risk (Ahlan & Arshad, 2012)

The risk in Information Technology needs to be administered in the Enterprise risk


management framework. The degree of risk sensitivity and risk appetite of the entire
enterprise should provide directions to the process of Information Technology risk
management. The enterprise risk management must deliver the necessary objectives to
IT risk management (Ramos, & Yoo, 2019)

 IT Risk Management - Risk Identification


In the information technology sector, the outcome of risk identification can be a list of
vulnerabilities that are not connected to those threats that are defined, several different
incident concerns as well as their consequences and the assets as well as networks that
are to be risk- managed (Mohammad, 2020)

IT Infrastructure identification, example :


a health check to ascertain the current state of all physical hardware, machines, office
equipment, networks (how you connect to the outside world or other offices),
models/versions, renewal dates, security (anti-virus), firewalls, disaster recovery, and
business contingencies, e.g. if there is a fire and your server is destroyed, you need a
system for getting the firm back up and running.

IT Infrastructure identification, example :


IT systems and business applications: establish whether current systems are
supported; their warranties, licences, and systems security; where they are stored.
Data security analysis: ascertain if client data is archived or backed up internally or to
an external device, when backups are carried out and how frequently

Governance: Does a governance framework exist? Are there SOPS governing IT?
Example: if a member of staff takes ho.me a laptop that has client information stored
on it, are there safety procedures in ptace to protect the client's data?

2. Gap Analysis
Three-step process may be employed when conducting a gap analysis:
a. Analyse the firm's current situation
b. Identify the desired future state the firm wishes to reach
c. Define the distance between the two situations.

3. Remediation
a. With a thorough understanding of the key topics above and having completed an
assessment and a gap analysis, the remediation phase can begin

b. The remediation phase aims to rectify any issue noted in the gap analysis phase.
This phase also includes the writing of documents including SOPs

c. Remediation involves the creation of an action plan that will bridge the
documented gaps.

4. Adherence
a. Once the remediation activities have been completed, the firm can progress to
business as usual, which incorpurates embedded IT processes.

b. When a status of compliance has been achieved, it is incumbent upon an


organisation to maintain that status. This covers the monitoring and auditing of
the IT environment.

 Governance Management Interface ISO/IEC 38502 (Juiz& Toomey, 2015)


External Factos for IT Governance :
a. Business pressure: Competitor and profit
b. Regulatory Obligations
c. Source of Authority
d. Stakeholder Expectations
e. Business Needs : Covid pandemic affect the business process that more utiilize of
IT

 Responsibility in Digital Era ?


Corporate Digital Responsibility
A new dimension of the Human - Technology Relations (Suchacka, 2020) new
initiative and part of social responsiblity

CDR means the awareness of duties binding the organisations active in the field of
technological development and using technologies to provide 2oom services

 Further Awareness Accounting Artificial Intelligence


a. Artificial intelligence in Auditing
b. Artificial Intelligence in Fraud Detection
c. Artificial Intelligence in Automating Collection Account Receviables
d. Artificial Intelligence in Accounting Database
e. Artificial Intelligence in Accounting Information System
f. Artificial intelligence in Management accounting

You might also like