It was an honour to speak at the 4th Annual CFO Africa Conference alongside CFO of ESKOM South Africa, Finance Director of Unilever Kenya, CEO of Botswana Stock Exchange, Finance Director of Cadbury Nigeria amongst others.
I spoke on “Cyber and the CFO” and in this thread I will do a summary of my major talking points.
Many people wonder if there is any correlation between the role of a CFO and a company’s cyber security processes and procedures.
Before digital disruption, CFOs had a clear focus on accounting and bookkeeping, treasury management, budget planning and control, tax and some aspects of strategy planning and execution. But today the boundary and technical goal post of the CFO has changed due to
advance in technology and also changes in the way of work or the way of doing business.
The following are the major talking points:
Why Cyber Security is important today
Why CFO must take a leading role in Cyber Security
How to identify cyber exposure gaps
How to mitigate cyber risk
Common types of cyber attacks
Cyber security policies and procedures
Why is cyber security important today?
A cyberattack is inevitable. It is no longer a question of “IF” but “When” and “How”
Weakness in cyber security is a significant business risk across all organisations
A new organisation falls victim to ransomware attack every 14 seconds
It affects all sizes of companies – from SMEs to multinationals
Work from home has increased the possibility of cyber attack
Why should CFOs take a leading role in Cyber Security?
FINANCIAL DATA is the primary target of cyber criminals and impact of other losses will either be financial or have impact on share value
To QUANTIFY and manage risk of cyber attack
CFO will take a broader view of cyber security as a COMMERCIAL AND BUSINESS RISK rather than a technical issue
To fully UNDERSTAND technical assessment done by IT specialists
To BALANCE the risk against significant cost of cyber security measures
To COMMUNICATE accurate assessment of potential damage to relevant stakeholders like supply chain actors, shareholders, investors etc.
How to identify cyber exposure gaps
•identify the assets that require protection
•Identify relevant threats and weaknesses
•assess the level of threat posed by those accessing the organization’s systems remotely
•determine business impacts if the threats are realized
•develop a security-risk assessment
•assess the level of risk acceptance that is appropriate to the organisation; and
•identify suitable control mechanisms to implement
How to mitigate cyber risk
•User education and training
•Patching and inventory
•Network and application security
•Cloud security
•Devices and data
•Remote access - Consider multi-stage authorization instead of passwords
•Manage access
•Report and test
•Penetration testing (Ethical hacking)
•Cyber Insurance
•Acceptable use: what company equipment can and cannot be used for
•Access control: who gets access to what, and when and where they can access it.
•Change management: procedures to ensure that the impact of IT software or hardware changes on security is monitored and communicated.
•Information security: the rules governing the sensitivity of data and the accountability of employees.
•Disaster recovery: how business continuity will be maintained in the event of a successful attack, or in the wake of actions being taken to respond to an attack.
•Passwords: rules covering the format and updating of passwords and their reuse.
•Incident response: how the company will respond to an incident and recover from it and who will take responsibility for remedial actions.
•Remote Access policy: how employees will connect to the organization's systems remotely.
•Bring Your Own Device (BYOD): how employees should use, connect, and encrypt personal devices they use for company business.
•Email/communication: acceptable use of email, social media, blogs and telephone.
Conclusion
Identification, mitigation of cyber risk is very important. Also important however is the preparedness and skillset required to manage a successful attack
With proper planning and precise execution, cybersecurity can become a competitive advantage
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Here is the most recent ARM's stock recommendation. Don't be too scared to take risk. YOLO!
Personal Note: 1. Don't buy stocks if you can't keep the money away for at least 1 year. If you invest your rent money that is due on 1st January in stocks, it MAY end in premium tears.
2. No amount is too small, just start from somewhere N50K, N100Ketc
3. It is important that you understand the concept behind the investment house's rating. Most times, they rate a stock for a BUY because of a significant UPSIDE POTENTIAL (UPP) that they have estimated could be
realized in one year. So if you buy based on the recommendation, you must be willing to wait for 1 year. Also, their recommendation may change as it is not cast in stone. So they could have recommended a stock for BUY 2 months ago and now recommend for a HOLD or SELL today. Know
Last week, one of our vendors sent an email challenging the WHT deduction on his invoice. Even though the transaction seemed straight forward to me and didn’t quite expect any challenge from the vendor, he insisted we were wrong.
I asked my payable accountant to respond and explain why the deduction was right. He did but the vendor countered his argument in another email. The Accountant then responded again with a simple analogy and so the matter was laid to rest.
Minutes after he sent the final email to this vendor, he came to me and said “I think this knowledge that will so often take for granted is not so common after all”
There’s someone reading this post that feels he/she is not adding value at work. You see, you are adding value,
On Monday, I wrote an exam that required a lot of calculations. But guess what? All formulae required to do the calculations were provided in the formula sheet. Just turn to the formula page and apply them.
Does it now mean everyone that wrote the exam would pass? NO! What was being tested was the application of the answer that you just calculated! So, the answer is -1.63%, that's fine! But what does it mean? What decision can you make from the answer you just got?
Can you tweak a little bit to get 2.5% and what will that mean?
Application! Application!! Application!!!
We can't over emphasize this. The examiner knows that in real life, there are software/ERPs that will calculate that answer for you in seconds,
On 14th September 2009, exactly 10 Years ago, I walked into Golden Gate Restaurant, the venue of KPMG Audit Trainee Program. We used to call it KBAC back then.
We were there for three weeks and it was an awesome experience. For a graduate of Chemistry, everything taught was
Greek at first but the instructors were amazing. Instructors like Yomi Ajijola, Chineme Nwigbo really did their best to impart accounting knowledge. They made the program really worthwhile.
I am here this morning to celebrate my 10th anniversary of work. It has been wonderful, explosive, powerful and life changing.
Like the debt puzzle, we should debate the current World Bank's 2019 doing business report as it concerns Nigeria.
Did Nigeria improve or deteriorate?
Five-year summary of Doing Business scores and rankings for Nigeria.
Steady increase in the DTF (Distance To Frontier) score since 2017 means that the country has embarked on some reforms. Nigeria has also witnessed improved ranking from 169 in 2017 to 145 in 2018 and 146 in the latest report
So the question is, did the total debt increase by $9,401,490,000 (or $10 Billion if you want to over-roundup😁) between May 2015 and June 2018 as claimed by the VP? On the face of it, it appears so but the answer is NO!