It was an honour to speak at the 4th Annual CFO Africa Conference alongside CFO of ESKOM South Africa, Finance Director of Unilever Kenya, CEO of Botswana Stock Exchange, Finance Director of Cadbury Nigeria amongst others.
I spoke on “Cyber and the CFO” and in this thread I will do a summary of my major talking points.

Many people wonder if there is any correlation between the role of a CFO and a company’s cyber security processes and procedures.
Before digital disruption, CFOs had a clear focus on accounting and bookkeeping, treasury management, budget planning and control, tax and some aspects of strategy planning and execution. But today the boundary and technical goal post of the CFO has changed due to
advance in technology and also changes in the way of work or the way of doing business.
The following are the major talking points:

Why Cyber Security is important today

Why CFO must take a leading role in Cyber Security

How to identify cyber exposure gaps

How to mitigate cyber risk

Common types of cyber attacks
Cyber security policies and procedures
Why is cyber security important today?

A cyberattack is inevitable. It is no longer a question of “IF” but “When” and “How”
Weakness in cyber security is a significant business risk across all organisations
A new organisation falls victim to ransomware attack every 14 seconds
It affects all sizes of companies – from SMEs to multinationals
Work from home has increased the possibility of cyber attack
Why should CFOs take a leading role in Cyber Security?

FINANCIAL DATA is the primary target of cyber criminals and impact of other losses will either be financial or have impact on share value
To QUANTIFY and manage risk of cyber attack
CFO will take a broader view of cyber security as a COMMERCIAL AND BUSINESS RISK rather than a technical issue
To fully UNDERSTAND technical assessment done by IT specialists
To BALANCE the risk against significant cost of cyber security measures
To COMMUNICATE accurate assessment of potential damage to relevant stakeholders like supply chain actors, shareholders, investors etc.
How to identify cyber exposure gaps
•identify the assets that require protection
•Identify relevant threats and weaknesses
•assess the level of threat posed by those accessing the organization’s systems remotely
•determine business impacts if the threats are realized
•develop a security-risk assessment
•assess the level of risk acceptance that is appropriate to the organisation; and
•identify suitable control mechanisms to implement
How to mitigate cyber risk

•User education and training
•Patching and inventory
•Network and application security
•Cloud security
•Devices and data
•Remote access - Consider multi-stage authorization instead of passwords
•Manage access
•Report and test
•Penetration testing (Ethical hacking)
•Cyber Insurance
Common types of cyber attacks
•Data Theft
•Data Manipulation
•Malware (Malicious Software)
•Ransomware (Colonial Pipeline, Kaseya)
•Business Email Compromise (BECS) – {Hushpuppi🙂}
•Web application attack
Cyber security policies and procedures

•Acceptable use: what company equipment can and cannot be used for
•Access control: who gets access to what, and when and where they can access it.
•Change management: procedures to ensure that the impact of IT software or hardware changes on security is monitored and communicated.
•Information security: the rules governing the sensitivity of data and the accountability of employees.
•Disaster recovery: how business continuity will be maintained in the event of a successful attack, or in the wake of actions being taken to respond to an attack.
•Passwords: rules covering the format and updating of passwords and their reuse.
•Incident response: how the company will respond to an incident and recover from it and who will take responsibility for remedial actions.
•Remote Access policy: how employees will connect to the organization's systems remotely.
•Bring Your Own Device (BYOD): how employees should use, connect, and encrypt personal devices they use for company business.
•Email/communication: acceptable use of email, social media, blogs and telephone.
Conclusion

Identification, mitigation of cyber risk is very important. Also important however is the preparedness and skillset required to manage a successful attack

With proper planning and precise execution, cybersecurity can become a competitive advantage

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with L'bookie🌍

L'bookie🌍 Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ooyeboade

31 Oct 20
Here is the most recent ARM's stock recommendation. Don't be too scared to take risk. YOLO!

Personal Note:
1. Don't buy stocks if you can't keep the money away for at least 1 year. If you invest your rent money that is due on 1st January in stocks, it MAY end in premium tears. Image
2. No amount is too small, just start from somewhere N50K, N100Ketc

3. It is important that you understand the concept behind the investment house's rating. Most times, they rate a stock for a BUY because of a significant UPSIDE POTENTIAL (UPP) that they have estimated could be
realized in one year. So if you buy based on the recommendation, you must be willing to wait for 1 year. Also, their recommendation may change as it is not cast in stone. So they could have recommended a stock for BUY 2 months ago and now recommend for a HOLD or SELL today. Know
Read 15 tweets
18 Mar 20
Dear Accountants,

Last week, one of our vendors sent an email challenging the WHT deduction on his invoice. Even though the transaction seemed straight forward to me and didn’t quite expect any challenge from the vendor, he insisted we were wrong.
I asked my payable accountant to respond and explain why the deduction was right. He did but the vendor countered his argument in another email. The Accountant then responded again with a simple analogy and so the matter was laid to rest.
Minutes after he sent the final email to this vendor, he came to me and said “I think this knowledge that will so often take for granted is not so common after all”

There’s someone reading this post that feels he/she is not adding value at work. You see, you are adding value,
Read 5 tweets
6 Dec 19
Dear Accountants,

On Monday, I wrote an exam that required a lot of calculations. But guess what? All formulae required to do the calculations were provided in the formula sheet. Just turn to the formula page and apply them.
Does it now mean everyone that wrote the exam would pass? NO! What was being tested was the application of the answer that you just calculated! So, the answer is -1.63%, that's fine! But what does it mean? What decision can you make from the answer you just got?
Can you tweak a little bit to get 2.5% and what will that mean?

Application! Application!! Application!!!

We can't over emphasize this. The examiner knows that in real life, there are software/ERPs that will calculate that answer for you in seconds,
Read 5 tweets
14 Sep 19
On 14th September 2009, exactly 10 Years ago, I walked into Golden Gate Restaurant, the venue of KPMG Audit Trainee Program. We used to call it KBAC back then.
We were there for three weeks and it was an awesome experience. For a graduate of Chemistry, everything taught was
Greek at first but the instructors were amazing. Instructors like Yomi Ajijola, Chineme Nwigbo really did their best to impart accounting knowledge. They made the program really worthwhile.
I am here this morning to celebrate my 10th anniversary of work. It has been wonderful, explosive, powerful and life changing.
Read 21 tweets
1 Nov 18
Like the debt puzzle, we should debate the current World Bank's 2019 doing business report as it concerns Nigeria.
Did Nigeria improve or deteriorate?
Five-year summary of Doing Business scores and rankings for Nigeria.
Steady increase in the DTF (Distance To Frontier) score since 2017 means that the country has embarked on some reforms. Nigeria has also witnessed improved ranking from 169 in 2017 to 145 in 2018 and 146 in the latest report
Read 7 tweets
30 Oct 18
More accurate than Premium times. Someone needs to fact-check the fact-checker too though. Will do a thread later this evening.
So the question is, did the total debt increase by $9,401,490,000 (or $10 Billion if you want to over-roundup😁) between May 2015 and June 2018 as claimed by the VP? On the face of it, it appears so but the answer is NO!
Read 13 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(