Not Just A Question Of Money: Cybersecurity And The CFO

Cybersecurity is a matter of concern for every company no matter its size and available resources. As cyber criminals become increasingly complex and challenging to identify, the financial sector is left vulnerable due to direct access to capital and personal identity information.

In 2013, US financial services companies lost an average $23.6 million from cybersecurity breaches, according to a Deloitte report. This number is 43.9 percent higher than in 2012, when the industry was ranked third on a list of industries that cyber criminals most targeted. Similarly, an Agari study from 2014 found that the payments industry, including credit-card and digital-wallet companies, saw a 23-fold increase in malicious email attacks against its customers between the second and fourth quarters of 2014.

Despite common knowledge of verifying and evaluating sources of information, nearly 95 percent of all cyber-attacks are carried out via email messages. In an attempt to acquire employee information such as usernames, passwords, and credit card details, cyber criminals trick employees into sharing sensitive information, leading to identity theft, money laundering and other crimes.

Even with a dynamic and continuously optimized cyber defense system, it takes only a single point of entry to gain access to all the information stored by a corporation. With so much at stake, the need for C-level tools and education that allow for increased security are crucial. While CFOs may not be entirely familiar with the technology around cybersecurity solutions, they understand the inner workings of the most targeted financial data and systems, leaving them the most qualified candidates to protect them.

Here are some ways CFOs can support the company’s cybersecurity policy and execution:

Education

A PwC study found that Cybercrime risk appears to be increasing – however, risk awareness can differ greatly depending on an individual’s role and function. The first step in understanding what these risks are is education. CFOs understand what is at stake if there is a financial breach, therefore it is essential that the C-suite and relevant managers receive training on assets that are subject to a breach. Understanding cybersecurity trends and threats as well as parlaying that knowledge to board members should become one of the CFO’s key roles.

For example, make sure individual employees across the organization understand what a phishing attack could look like, and educate them on what is considered to be sensitive information. With the right knowledge to inform their decision making, corporate directors will be aware of what is vulnerable and what cybersecurity risks to be aware of.

Strategy

Even though corporate directors are concerned and aware of cybersecurity threats, they often have no one to turn to when informed decisions need to be made. The best way to insure the financial health of the organization is to identity vulnerabilities in the data supply chain within the organization. CFOs have the opportunity to establish a formal task force to help implement the strategic objectives of the organization’s cybersecurity mission. By reaching out and creating a task force of leaders in IT, legal, and finance, awareness of cybersecurity practices can spread enterprise-wide.

Implementation

According to a survey conducted by Protiviti, IT security does not get a lot of time on C-suite agendas. However, CFOs should take it upon themselves to determine what the organization is invested in most heavily and if the current level of protection is appropriate to that area’s level of importance. With so much at stake, organizations should tackle security measures from the top down. It’s crucial for C-level executives to discuss what intellectual property, and potential loss thereof, would be severely detrimental to the organization. This way CFOs can optimize cybersecurity risk management and protect their organization in the best way possible.

In today’s digital economy, it is more important than ever to ensure that the right protection is in place at all levels of engagement. As a CFO, protecting financial data is critical in steering the company towards success. The cost of a cyber-attack, whether it’s financial or reputational, can be astounding.

For CFOs, information security must become a top priority in defending their organization’s future. And off course taking care of cyber security is just a piece of the puzzle and risk management processes have to be enhanced with risk resilience to anticipate the degree of uncertainty.

Financial Executive: http://bit.ly/1r07Cnf

« Cybercrime Economy: The Business Of Hacking
Ethical Hackers: We Want You For A New Recruit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clifford Chance

Clifford Chance

Clifford Chance are one of the world's pre-eminent law firms with resources across five continents. Practice areas include Cyber Security & Information Protection

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

Phosphorous Cybersecurity

Phosphorous Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

Cyber Resilience

Cyber Resilience

Cyber Resilience offer an intensive program designed to help you create strategies to quickly become cyber resilient and to manage cyber risks in a measurable and predictable way.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Sentor Managed Security Services

Sentor Managed Security Services

Sentor Managed Security Services is a cybersecurity company that enables organizations to exist in a digitally connected world.

Nostra

Nostra

Nostra are a next generation managed services provider with a constant focus on Security and Business Continuity.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

Tech Data

Tech Data

Tech Data, a TD Synnex company, is a leading global distributor and solutions aggregator for the IT ecosystem.

NetSfere

NetSfere

NetSfere provides next-generation messaging and mobility solutions to carriers and enterprises globally including its enterprise-grade, secure mobile messaging platform NetSfere Enterprise.