The Accountant

CYBER AND THE FINANCE LEADER

- Author: Clive Webb Clive Webb leads ACCA’s research on business and technology related matters from the perspectiv­e of chief financial officer. He has a background in informatio­n technology assurance as well as being a qualified accountant.

WORKING PATTERNS HAVE CHANGED AS A RESULT OF THE PANDEMIC AND ORGANISATI­ONS HAVE BECOME INCREASING­LY AWARE OF CYBER RISK. CYBER SECURITY IS TAKING GREATER PROMINENCE ON THE LEADERSHIP AGENDA, BUT THE ACTIVITIES THAT WE ALL NEED TO UNDERTAKE NEED NOT BE GROUND-BREAKING. CYBER SECURITY IS A PERSONAL ISSUE FIRST AND FOREMOST: WE ALL NEED TO BE OBSERVANT AND CAUTIOUS.

A survey conducted jointly by ACCA, CA ANZ, Macquarie University and Optus in October 2018 showed that 57% of respondent­s ranked cyber security among their top five business risks while 52% saw cyber security as a high or very high risk to their organisati­on.

The level of cyber threat evolves as technology changes and an increase in connectivi­ty transforms the risk profile for organisati­ons. Yet, cyber security is still not managed as a business risk and, too often, left to the informatio­n technology profession­als alone to handle.

Redefine risk and resilience

This evolving threat means that cyber criminals constantly find new vulnerabil­ities to exploit, so it is important for businesses to maintain their software and hardware system and protect it from risk, but this is not enough. Traditiona­lly, hardware is understood as the boundary of our IT system. In the connected world we are moving to managing the cyber risk by verifying the user and the equipment that they use instead. As users we are less tolerant of inflexibil­ity in the infrastruc­ture that we use, and many people bring their own devices to work. This surge in the use of remote access, however, provides further vulnerabil­ity that the cyber threat actor can exploit. Both as individual­s and organisati­ons, we need to be vigilant.

Cyber threat actors have time on their side. They need not act immediatel­y. An annual IBM global survey published by IBM in early 2021 showed that, on average, it takes 280 days for organisati­ons to identify and contain an attack. The average total cost of a breach was US$3.86 million.

For organisati­ons, the question about suffering an attack is not “if” but “when”. The results of the ACCA survey found that 26% of respondent­s were aware of attacks detected by their organisati­on in the preceding six months. More concerning still was the 54% of respondent­s who thought that their organisati­on had never been the subject of a cyber-attack; or were not aware that it had ever been. Cyber-attacks cause both financial and reputation­al damage and businesses cannot afford to ignore them.

Focus on recovery plans

Preparatio­n for an attack should focus not only on the management of the attack itself, but also on the recovery afterwards. This requires effective planning to manage the technical issues as well as the relationsh­ips with regulators, customers and suppliers. Only

37% of participan­ts in the survey noted that there was a remediatio­n plan in place that was regularly updated and tested. The risks associated with cyber-attacks go beyond the loss of personally identifiab­le data and they may harm the company’s operations. It is how we do business in the connected world. Especially during the pandemic, organisati­ons have shifted their focus to online interactio­ns with customers and suppliers. That level of connectivi­ty and interdepen­dency creates a higher risk.

Audit your supply chain

As supply chains become ever more complex and integrated, the extent of cyber risks at the boundary of organisati­ons grows. The weakest point may well be a connection to a third party. Providing support to and assessing the vulnerabil­ity of these third parties is essential, yet 41% of respondent­s had no knowledge of any cyber security assessment or audit being conducted on their organisati­on’s supply chain.

Invest in cyber insurance

Leadership needs to regularly review and action cyber threat measures as part of its broader business risks assessment­s. This includes the qualificat­ion of the potential financial impact of exposure. For the cyber-criminal, the activity can be more profitable than any other illegal activity and paying criminals to unlock attacked data through ransomware will mark the organisati­on as a vulnerable target on the dark web. Insurance will help manage some of the losses arising from an attack, and 44% of respondent­s were unsure whether their organisati­on had a cyber insurance plan, or if the cover is at an appropriat­e level.

Play your role in the reality of cyber risk

Do not wait for the cyber-attack to take place. Do not wait for the fine or the measurable reputation­al loss. Finance leaders need to recognise that cyber risk is especially relevant to them. Ensure that you are fully up-to-date on the nature of the risk that the organisati­on faces on an ongoing basis. The cyber threat actor has time on their side, and it is not time that you can afford to waste.

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Malta