Not Just A Question Of Money: Cybersecurity And The CFO

Cybersecurity is a matter of concern for every company no matter its size and available resources. As cyber criminals become increasingly complex and challenging to identify, the financial sector is left vulnerable due to direct access to capital and personal identity information.

In 2013, US financial services companies lost an average $23.6 million from cybersecurity breaches, according to a Deloitte report. This number is 43.9 percent higher than in 2012, when the industry was ranked third on a list of industries that cyber criminals most targeted. Similarly, an Agari study from 2014 found that the payments industry, including credit-card and digital-wallet companies, saw a 23-fold increase in malicious email attacks against its customers between the second and fourth quarters of 2014.

Despite common knowledge of verifying and evaluating sources of information, nearly 95 percent of all cyber-attacks are carried out via email messages. In an attempt to acquire employee information such as usernames, passwords, and credit card details, cyber criminals trick employees into sharing sensitive information, leading to identity theft, money laundering and other crimes.

Even with a dynamic and continuously optimized cyber defense system, it takes only a single point of entry to gain access to all the information stored by a corporation. With so much at stake, the need for C-level tools and education that allow for increased security are crucial. While CFOs may not be entirely familiar with the technology around cybersecurity solutions, they understand the inner workings of the most targeted financial data and systems, leaving them the most qualified candidates to protect them.

Here are some ways CFOs can support the company’s cybersecurity policy and execution:

Education

A PwC study found that Cybercrime risk appears to be increasing – however, risk awareness can differ greatly depending on an individual’s role and function. The first step in understanding what these risks are is education. CFOs understand what is at stake if there is a financial breach, therefore it is essential that the C-suite and relevant managers receive training on assets that are subject to a breach. Understanding cybersecurity trends and threats as well as parlaying that knowledge to board members should become one of the CFO’s key roles.

For example, make sure individual employees across the organization understand what a phishing attack could look like, and educate them on what is considered to be sensitive information. With the right knowledge to inform their decision making, corporate directors will be aware of what is vulnerable and what cybersecurity risks to be aware of.

Strategy

Even though corporate directors are concerned and aware of cybersecurity threats, they often have no one to turn to when informed decisions need to be made. The best way to insure the financial health of the organization is to identity vulnerabilities in the data supply chain within the organization. CFOs have the opportunity to establish a formal task force to help implement the strategic objectives of the organization’s cybersecurity mission. By reaching out and creating a task force of leaders in IT, legal, and finance, awareness of cybersecurity practices can spread enterprise-wide.

Implementation

According to a survey conducted by Protiviti, IT security does not get a lot of time on C-suite agendas. However, CFOs should take it upon themselves to determine what the organization is invested in most heavily and if the current level of protection is appropriate to that area’s level of importance. With so much at stake, organizations should tackle security measures from the top down. It’s crucial for C-level executives to discuss what intellectual property, and potential loss thereof, would be severely detrimental to the organization. This way CFOs can optimize cybersecurity risk management and protect their organization in the best way possible.

In today’s digital economy, it is more important than ever to ensure that the right protection is in place at all levels of engagement. As a CFO, protecting financial data is critical in steering the company towards success. The cost of a cyber-attack, whether it’s financial or reputational, can be astounding.

For CFOs, information security must become a top priority in defending their organization’s future. And off course taking care of cyber security is just a piece of the puzzle and risk management processes have to be enhanced with risk resilience to anticipate the degree of uncertainty.

Financial Executive: http://bit.ly/1r07Cnf

« Cybercrime Economy: The Business Of Hacking
Ethical Hackers: We Want You For A New Recruit »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

Infosec Global

Infosec Global

Infosec Global provides technology innovation, thought leadership and expertise in cryptographic life-cycle management.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

Shorebreak Security

Shorebreak Security

Shorebreak Securioty specialize in conducting highly accurate, safe, and reliable Information Security tests to determine the risks posed to your business.

MetaWeb Ventures

MetaWeb Ventures

MetaWeb Ventures is a global venture capital firm focused on pre-seed and seed investments in crypto start-ups.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

LegalByte

LegalByte

LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age.

Canadian Cyber Threat Exchange (CCTX)

Canadian Cyber Threat Exchange (CCTX)

The CCTX is Canada’s not-for-profit, private-sector cyber threat sharing hub and collaboration centre.

Concertium

Concertium

Concertium is a complete cybersecurity partner equipped with the expertise and services to deliver end-to-end visibility and protection from evolving cyber threats.