Cyber and the CFO - A report by ACCA and CAANZ together with Macquarie University and Optus - Chartered Accountants

Page created by Matthew Lane
 
CONTINUE READING
Cyber and the CFO - A report by ACCA and CAANZ together with Macquarie University and Optus - Chartered Accountants
Cyber and
              the CFO

A report by ACCA and CAANZ together with Macquarie University and Optus
Cyber and the CFO - A report by ACCA and CAANZ together with Macquarie University and Optus - Chartered Accountants
About ACCA                                                         About the Optus
       ACCA (the Association of Chartered Certified Accountants)
       is the global body for professional accountants, offering
                                                                          Macquarie University
       business-relevant, first-choice qualifications to people of
       application, ability and ambition around the world who seek        Cyber Security Hub
       a rewarding career in accountancy, finance and management.         Launched in 2016, the Optus Macquarie University Cyber
       ACCA supports its 208,000 members and 503,000 students             Security Hub is an exciting collaboration between Macquarie
       in 179 countries, helping them to develop successful careers       University and Optus. This AUD10 million joint investment is the
       in accounting and business, with the skills required by            first initiative of its kind in Australia addressing this profoundly
       employers. ACCA works through a network of 104 offices             multifaceted challenge that is cyber security by linking academics
       and centres and more than 7,300 Approved Employers                 in information security, corporate governance, financial risk,
       worldwide, who provide high standards of employee learning         criminology, intelligence, law and psychology together with
       and development. Through its public interest remit, ACCA           cyber security experts from industry and government.
       promotes appropriate regulation of accounting and conducts         The Cyber Security Hub forms a network of academic, business
       relevant research to ensure accountancy continues to grow in       and government leaders:
       reputation and influence.
                                                                          •	Providing expertise and leadership in cyber security
       ACCA is currently introducing major innovations to its flagship       regarding technology, governance, policies and
       qualification to ensure its members and future members                human factors;
       continue to be the most valued, up to date and sought-after        •	Offering a platform for exchange between academics and
       accountancy professionals globally.                                   practitioners from business and government;
       Founded in 1904, ACCA has consistently held unique                 •	Conducting cross-cutting research across several disciplines
       core values: opportunity, diversity, innovation, integrity            in the field of privacy, cyber physical systems security, secure
       and accountability.                                                   artificial intelligence and human-centric security;
                                                                          •	Training the next generation of cyber security specialists as
       More information is here:                                             well as raising awareness among our leaders and developing
       www.accaglobal.com                                                    the skills of the existing workforce.

       About CA ANZ                                                       About Optus
       Chartered Accountants Australia and New Zealand Chartered          At Optus, we’re passionate about creating compelling customer
       Accountants Australia and New Zealand is a professional body       and employee experiences, and bringing to life the spaces and
       comprised of over 120,000 diverse, talented and financially        things that make this possible.
       astute members who utilise their skills every day to make a
                                                                          It’s about empowering our customers to thrive in an age of
       difference for businesses the world over. Members are known
                                                                          unprecedented digital disruption. And it's why Optus is trusted
       for their professional integrity, principled judgment, financial
                                                                          by thousands of Australian organisations who value a partner
       discipline and a forward-looking approach to business which
                                                                          that understands the full breadth of managed technology and
       contributes to the prosperity of our nations. We focus on the
                                                                          services – from applications, security, cloud-led ICT, to
       education and lifelong learning of our members, and engage
                                                                          collaboration and contact centres. All underpinned by our smart
       in advocacy and thought leadership in areas of public interest
                                                                          and secure network.
       that impact the economy and domestic and international
       markets. We are a member of the International Federation           Backed by the international strength of the Singtel group and
       of Accountants, and are connected globally through the             the power of our mobile, fixed and satellite networks, regional
       800,000-strong Global Accounting Alliance and Chartered            strength and local expertise, Optus Business brings together
       Accountants Worldwide which brings together leading Institutes     best of breed partners to create the solution that’s right for
       in Australia, England and Wales, Ireland, New Zealand,             Australian organisations.
       Scotland and South Africa to support and promote over
                                                                          No longer is it about products and services, but a connected
       320,000 Chartered Accountants in more than 180 countries.
                                                                          digital experience that empowers people to do more.
       We also have a strategic alliance with the Association of
       Chartered Certified Accountants.

© The Association of Chartered Certified Accountants, May 2019
Cyber and the CFO - A report by ACCA and CAANZ together with Macquarie University and Optus - Chartered Accountants
Cyber and the CFO

                                   About this report
            In October 2018, ACCA and CA ANZ, together with Macquarie
            University and Optus, conducted a survey among their members
            globally to seek their views on cyber security and its implications
            for the finance function.
            This report shares the results of the global survey and draws
            insights from several interviews conducted as part of the research.
            Over 1,500 survey responses were gathered from a broad range
            of sectors, as follows.

    Employees                                 Sector                                         Role

n 0 - 9 employees, 7%             n Public practice (accountancy firm /   n Chief Financial Officer (CFO) / Finance
n 10 - 49 employees, 12%             SMP/ sole practitioner), 13%              Director, 10%

n 50 - 249 employees, 17%         n Public sector (including              n Chief Operating Officer (COO), 1%
                                       government), 17%                       n Director / Executive / Partner, 6%
n 250 - 1,000 employees, 22%
                                    n Financial services (including banks   n Accountant / Financial Accountant /
n 1,001 - 2,500 employees, 11%       or insurance companies), 17%              Management Accountant, 31%
n 2,501 - 5,000 employees, 9%     n Not-for-profit, 7%                    n Internal Auditor, 9%
n 5,000 + employees, 21%          n Corporate sector (including           n Financial Controller, 9%
                                       industry and commerce), 39%
                                                                              n Sole practitioner / self-employed, 1%
                                    n Other, 7%
                                                                              n Other, 33%

                                    Acknowledgements
    ACCA, CA ANZ, Macquarie University and Optus would like to thank all
    individuals and organisations that have contributed to producing this report.
Cyber and the CFO - A report by ACCA and CAANZ together with Macquarie University and Optus - Chartered Accountants
Foreword

Finance professionals need to understand and play their full role in managing cyber risk in their
organisations. Weakness in cyber security is a significant business risk across all organisations.
The level of threat evolves and changes as technology changes. Organisations are, however,
increasingly connected and this too transforms the risk profile.
Yet, cyber security is not seen as a business risk; we seem         also about being able to manage effectively the consequences
content to leave it to a focused group of professionals who         of a successful attack – consequences that can be measured in
have strong technical ability but may not have the financial        reputational damage and fines. Some of these instances are
awareness necessary for evaluating the potential consequences       more visible than others as media attention focuses on data
of a security breach. It cannot be left to the information          privacy issues and the majority probably get less publicity but
technology professionals alone.                                     still affect supply chains and confidence.

Finance professionals need to take advantage of the education       The finance community cannot ignore cyber risk. It is a complex
programmes available to them to ensure that they have enough        issue but one that finance professionals need to become very
up-to-date technical knowledge. They are not required to be         familiar with.
experts; rather, they need to be sufficiently competent in this
area to assess and manage the level of risk. They need to be        This report sets out the case for this and contextualises many of
able to evaluate the investment case and to support the             the cyber risks, some much less known than others but equally
necessary prevention activities. It is however not just about       plausible and potentially even more devastating for organisations.
prevention, because failure here is potentially inevitable. It is

Helen Brand                       Rick Ellis                        Professor David Wilkinson         Stuart Mort
Chief Executive                   Chief Executive                   Deputy Vice-Chancellor            Chief Technology Officer
ACCA                              CA ANZ                            (Corporate Engagement             Cyber Security & ICT Solutions
                                                                    and Advancement)                  Optus Business
                                                                    Macquarie University

                                                                                                                                      4
Cyber and the CFO - A report by ACCA and CAANZ together with Macquarie University and Optus - Chartered Accountants
Contents

Executive summary                                       6

1. Why does cyber risk management matter?               7
   1.1 A financial and operational risk                 7
   1.2 Effective cyber risk management and governance   7
   1.3 Size does not matter                             8
   1.4 This report                                      8

2. Cyber and the CFO                                     9
   2.1 Cyber security – the state of play                9
   2.2 How significant a risk?                          12
   2.3 Responsibility and accountability                14
   2.4 Cyber risk and governance                        16
   2.5 Data management                                  17
   2.6 Cyber-attacks                                    17
   2.7 Response and remediation                         20

3. What is the cyber threat?                            22
   3.1 Leaving it to IT is not enough                   22
   3.2 Nature of the threat                             24
   3.3 The unknown threat                               25
   3.4 Third-party risks                                26

4. Governance                                           30
   4.1 Importance of cyber risk governance              30
   4.2 The approach to governance                       31
   4.3 Cyber risk assessment                            33
   4.4 Cyber resilience                                 33

5. Protect, restore, recover                            34
   5.1 Identify                                         34
   5.2 Protect                                          35
   5.3 Restore                                          37
   5.4 Response                                         37
   5.5 Learning the lessons                             37

6. Managing cyber threats                               39
   6.1 Stages of a cyber-attack                         39
   6.2 The threats that we ‘know’                       41
   6.3 The threats that we might not know               51
   6.4 The connected world                              53
   6.5 The human element                                53
   6.6 Towards the quantification of cyber risk         56

7. Practical actions                                    57
   7.1 At the level of the board                        57
   7.2 For CFOs and finance teams                       57
   7.3 Key operating procedures for organisations       58
   7.4 Key messages for individuals                     58
8. Conclusion                                           59
References                                              60
Acknowledgements                                        62
Cyber and the CFO - A report by ACCA and CAANZ together with Macquarie University and Optus - Chartered Accountants
Executive
                summary

Cyber risk is one of the most talked-about business risks. In our increasingly disrupted world
it is at the forefront of our minds.

There are frequent major news stories             members conducted by ACCA and CA               One thing that can be said about the
about the theft of personal data from             ANZ showed that 54% of them were               cyber threat is that it is evolving.
large organisations. There is continued           either not aware of whether their              Chapter 6 of the report provides an
debate about the use of our data by               organisation had suffered an attack or         overview of the threats. Understanding
social media organisations and how this           thought that they had not been.                these is an important step in ensuring
should be regulated (and whether                                                                 that an organisation understands cyber
regulation itself can keep pace with the          Many see cyber security as somebody            risk and has an appropriate level of
evolving technology). Many cyber-attacks          else’s problem, and one that does not          cyber governance.
go unreported but can be just as                  have financial implications. This may in
significant to the organisations and              part be owing to a reliance on IT              Being prepared for the inevitable attack
individuals affected by them.                     specialists to provide a level of technical    is essential. But it is not only a question
                                                  and operational assurance. In a fast-          of mitigating the attack, it is also one
Yet how many of us really understand the          moving and interconnected world this is        of leading the way out of the aftermath.
nature of the risk and the full business          no longer the case. The traditional            Successful organisations recognise the
implications of it? From the results of           boundary of the organisation represented       need to maintain contact with customers
a survey conducted by ACCA and CA                 by the firewall is being replaced by one       and suppliers in the hours, rather than
ANZ, it appears that the answer for               where authenticating the user is more          the days, ahead.
most members is ‘few’. Yet it is a risk           important. The weakest link may well be
that has significant financial and                in the connected supply chain, yet our         The finance community cannot stand
reputational implications.                        survey results suggest that many do not        by and leave the issue to other people.
                                                  take an active role in addressing this risk.   It is a significant business-wide risk. It
One estimate of the cost of cyber-crime                                                          should be treated as such and regularly
globally is that it will reach US$6 trillion by   As organisations increasingly integrate        appraised and acted upon. As individuals,
2021 (Cyber Ventures 2018). Regulators            supply chains, in a ‘24/7’ world our           we need to take personal steps to ensure
are increasingly taking a tougher stance          responses to actions and reputational          that we are fully aware of the threat –
on organisations that fail to address the         damage are also a significant factor.          organisations need to do more than
risk adequately, whether through penalties        This can affect share prices and               isolated activities to address these issues,
imposed after data theft or through other         company valuations. It is also an issue        as outlined in this report. This starts with
compliance requirements. As finance               for mergers and acquisitions as well as        strong governance involving educating
professionals we need to be aware of              for day-to-day trading.                        individuals who would otherwise be too
these impacts (Clifford Chance, 2018).                                                           passive in their reactions and would
                                                  This report considers the level of             thereby expose the organisation to
Organisations frequently comment that             understanding of these risks by the            significant financial risk. It also includes
cyber security is one of the most                 members of the two bodies and                  having robust plans for managing, and
significant threats that they face, yet the       contrasts this with the level of risk that     recovering from, the inevitable.
respondents to the survey of their                organisations face.

                                                                                                                                               6
Cyber and the CFO - A report by ACCA and CAANZ together with Macquarie University and Optus - Chartered Accountants
1. Why does cyber
                risk management
                matter?

1.1 A FINANCIAL AND                             view cyber security only through their own      point through which data flows in an
OPERATIONAL RISK                                professional lenses, then the most              organisation, and is reported on; it is also
                                                significant threats may not be addressed.       responsible for some of the most
One prediction, by Cyber Ventures,
                                                                                                sensitive and valuable data the
estimates that cyber-crime will cost the        Cyber-attackers can target many areas of        organisation possesses. The CFO will play
global economy US$6 trillion annually by        an organisation, but the dangers are            a key role in identifying the information
2021, an increase from the 2015 estimate        ultimately measured in financial terms:         that it is most important to protect.
of US$3 trillion (Cyber Ventures 2018).         CFOs cannot ignore cyber security simply
This makes cyber-crime more lucrative           because it is a complex issue outside           1.2 EFFECTIVE CYBER RISK
than the total estimated global trade in        their area of expertise.                        MANAGEMENT AND GOVERNANCE
all major illegal drugs combined. For
businesses, cyber-crime represents a            Indeed, it is only with the CFO’s help that     The CFO should also be able to
significant, and potentially costly, threat.    the organisation can quantify and manage        participate fully in a robust discussion
The cost of cyber-crime includes a variety      the risk of a cyber-attack – even though        about cyber security with the board,
of techniques including the destruction of      the CFO may not be responsible in the           the wider organisation and outside
data, monetary loss, lost production, theft     organisation itself it is through their wider   stakeholders, and to position it as a
of personal and financial data, costs of        network of relationships with customers,        business and commercial risk to be
recovery after an attack and reputational       suppliers and other stakeholders that           mitigated by a range of measures, not all
damage. In its 2018 Data Breach                 they have a role to play. The CFO has the       of which are technological. Finance also
Investigations Report, Verizon suggested        skills and the oversight to be able to take     has the skills to oversee audit, inventory,
that, of the over 53,000 security incidents     a much broader and longer-term view of          testing and compliance, and will take the
that it had analysed, 76% of the breaches       the financial impact of an attack, looking      lead in the assessment and underwriting
were financially motivated (Verizon 2018).      beyond the immediate issues of data loss        of cyber insurance.
                                                and operational disturbance to
It is vital that the Chief Financial Officer    reputational and regulatory losses and          CFOs need to use their existing role in
(CFO) plays a leading, if not the leading,      the effect on shareholder value.                the organisation to promote cyber-
role in cyber security, especially in smaller                                                   security: the CFO and the finance
organisations. It is no longer permissible      As the cost of defending the organisation       department are highly trusted and
to be a bystander or simply to delegate         against cyber-attacks mounts, it is only by     experienced in explaining the business
responsibility to others. And it is             quantifying both the cyber risk and the         logic behind the financial restrictions and
potentially disastrous for the finance team     organisation’s risk appetite that the Chief     controls they implement.
to be ignorant of the cyber risk and of         Executive Officer (CEO), together with
their organisation’s ability to respond.        members of the board, can ensure that           In the event of an attack, the CFO will
                                                resources are deployed effectively.             naturally be one of those who are
While it is encouraging that boards now                                                         expected to provide accurate assessments
see cyber security as a significant business    The CFO is one of the natural custodians        of the potential damage and lead both
risk, there is a danger that this perception    of data, and increasingly responsible for       internal and external actions and
may be interpreted differently across the       assessing its value and managing its            communications to relevant stakeholders.
organisation. If IT, operations and finance     lifecycle. Finance is not only the natural

                                                                                                                                          7
Cyber and the CFO - A report by ACCA and CAANZ together with Macquarie University and Optus - Chartered Accountants
Cyber and the CFO    |   1. Why does cyber risk management matter?

                                                    Cyber security is not just an
                                                    issue for the IT department.
                                                    It is a business risk that
                                                    affects everybody.

And finance is in the front line of attack.     aware of the impact of cyber risk. Our         •	the impact of cyber-attacks (section
Not only is financial data under attack but     survey showed no area for complacency.            2.6), and
cyber-attackers will also target the finance                                                   • our response (section 2.7).
department and personnel directly in            Supply chains are becoming more
their attempts to steal and defraud. CFOs       complex and the demands placed upon            Chapters 3 to 5 consider how we manage
need to engage with IT to ensure that           small and medium-sized enterprises by          the cyber risk in organisations and the
their own vulnerabilities are both              others in the supply chain mean that they      role that finance should be playing in this.
understood and addressed.                       too need to have an appropriate level of
                                                cyber protection. It is frequently seen as a   In Chapter 6 considers a number of the
Cyber security can seem like a daunting         burden that is placed upon them yet is         elements of the cyber risk, it:
task: the technologies of both defence          now essential for conducting business.
                                                                                               •	explains the lifecycle of a cyber-attack
and attack can be complex and the jargon
                                                Smaller entities face their own issues in         (section 6.1);
can be impenetrable. But the threat only
exists in a wider context of human              maintaining effective cyber security. As the   •	considers the nature of the threats that
behaviour and corporate culture. CFOs           nature of the threat continues to evolve,         organisations currently know that they
do not need to become technical experts         keeping up with the extent of the threat          face (section 6.2) and those that are
in cyber-attacks and their prevention, but      and the increasing level of complexity of         emerging (section 6.3);
they will serve their organisations best by     attacks can be challenging from a resource
                                                                                               •	discusses risks arising from those with
being fully aware of the range of cyber         and a cost perspective. Yet, to fail to do
                                                                                                  whom we interact as we live in a
threats and promoting cyber security.           so may preclude the organisation from
                                                                                                  connected world where these contacts
                                                obtaining contracts. Collaboration and
                                                                                                  can also put us at risk (section 6.4);
Cyber security is not just an issue for the     use of available resources, such as those
IT department. It is a business risk that       provided by national authorities, are key      •	considers the overarching human
affects everybody. This fundamental issue       to addressing this for these entities.            aspect of cyber risk (section 6.5), and
is considered in Chapter 3, section 3.1.                                                       •	explores attempts to quantify cyber
Before considering the nature of the risk, in   1.4 THIS REPORT                                   risk (section 6.6).
Chapter 2 we review the results of a survey
                                                In Chapter 2 of this report we consider
undertaken in late 2018 of ACCA and CA                                                         Throughout the report we refer to
                                                how those in the finance community
ANZ members and their attitudes to cyber                                                       guidance and standards available from
                                                assess their level of understanding of:
risk and understanding of cyber threats.                                                       governments and other organisations.
                                                •	the business impact of cyber (sections      Reference is made to ISO/IEC 27001 in
1.3 SIZE DOES NOT MATTER                           2.1 and 2.2);                               Chapter 3, section 3.4 together with SOC
It would be wrong to assume that only           •	where the responsibility and                (Service Organisation Control report) 2
larger organisations are affected by               accountability lie (section 2.3);           and SOC 3 standards.
cyber-crime. The balance is shifting in that    •	the relationship of cyber risk and          Chapter 7 provides a summary of key
organisations of any size are vulnerable as        governance (section 2.4);                   practical actions for each of the board,
the threat profile evolves. Whether your
                                                •	the importance of data management           finance teams and users.
organisation is large or small, a sole trader
                                                   (section 2.5);
or a large multinational, you need to be

                                                                                                                                             8
Cyber and the CFO - A report by ACCA and CAANZ together with Macquarie University and Optus - Chartered Accountants
2. Cyber
                and the CFO

2.1 CYBER SECURITY – THE STATE                   customers and the immediate 10% drop                The survey
OF PLAY                                          in its share price and subsequent decline,          In our survey of over 1,500 ACCA and CA
                                                 leading to an eventual loss (as of March            ANZ members in late 2018, those that had
While many CFOs will comment that they
                                                 2019) of two-thirds of its pre-breach               been attacked reported an immediate
are aware of the level of cyber risk likely
                                                 market capitalisation: more than £2bn.              increase in both their awareness of the
to occur, our research suggests that CFOs
                                                                                                     issues and their investment in
need to be much more proactive. Cyber            The immediate cost of the data breach at            countermeasures: it is clearly preferable to
security is not just an issue of protecting      the Starwood division of Marriot in 2018            learn and take action before having to deal
assets, updating software and ensuring           has been estimated by catastrophe risk              with the consequences of a security breach.
that you have up-to-date virus protection        modelling firm AIR Worldwide at between
installed, it is increasingly a business issue   US$200m and US$600m (AIR Worldwide                  Consequently, CFOs and finance leaders
in its own right, one that can lead to           2018) but this only covers first- and               need to increase their awareness of the
significant reputational damage or               third-party losses such as notification costs,      threat that cyber security failure poses to
financial loss if an organisation is not         forensics, credit monitoring, or replacement        their organisations and redefine their own
prepared for the inevitable eventuality –        of credit cards. It does not include costs          role in the management of cyber security
a successful attack.                             related to fines, reputational loss, business       as a strategic business risk. Our research
                                                 interruption, and loss of shareholder               suggests that too many either see cyber
Financial and reputational implications
                                                 value or increased insurance charges.               security as an operational or IT issue or
When TalkTalk, a UK telecommunications
and internet service provider, was attacked
in 2015 the immediate impacts were
widely reported: 157,000 personal details        FIGURE 2.1: In your role, do you have any involvement in the management of cyber
were stolen. The estimated cost to TalkTalk      security in your organisation? For example, working with sensitive data, or involvement
was £77m, including a £400,000 fine levied       in setting policy in this area
by the UK Information Commissioner               60%
(Lyons 2018). Commenting on this case,
                                                                  58%
the UK Information Commissioner,
                                                 50%
Elizabeth Denham, said: ‘TalkTalk's failure
to implement the most basic cyber
security measures allowed hackers to             40%
penetrate TalkTalk's systems with ease.
Yes, hacking is wrong, but that is not an        30%
excuse for companies to abdicate [from]
their security obligations. TalkTalk should
                                                 20%                                                                           22%
and could have done more to safeguard                                                             20%
its customer information. It did not and
we have taken action.’                           10%

Less widely reported in this case were the        0%
company’s subsequent loss of 90,000                              Yes, some                  Yes, a great deal                  None

                                                                                                                                               9
Cyber and the CFO - A report by ACCA and CAANZ together with Macquarie University and Optus - Chartered Accountants
Cyber and the CFO          |   2. Cyber and the CFO

                                                                 57%
                                                                 of respondents sees cyber as
                                                                 either their most important
                                                                 or a ‘top 5’ business risk

simply do not know enough about                               While most respondents (57%, Figure                    seeing it as either their most important
how cyber-crime might affect their                            2.2a) saw cyber as either their most                   risk or at least as one of their top five
organisation, the threat level, or how it                     important or a ‘top 5’ business risk, only             risks: Figure 2.2b); with the public sector
is currently managed. IT professionals                        11% said it was the most significant risk              at 52% and the corporate sector at 54%
have a role to play and their expertise                       to their business. More worrying were                  being slightly lower.
is essential but is not the full story.                       the 7% who said they simply did not
                                                              know where to rank cyber threats and                   It is noteworthy that more respondents
For example, while over half of those who                     the 2% who thought it posed no risk at                 in Pakistan than in any other country
responded to our survey said they had                         all. In comparison, large businesses                   surveyed see it as the most significant
‘some’ involvement in cyber security                          tended to place a higher priority on                   business risk, whereas overall its
(58%, Figure 2.1), they were more likely to                   cyber risks (8% overall in comparison                  significance as a ‘top five’ business risk was
say they had ‘none’ (22%) than ‘a great                       to 5% for small businesses – defined                   lower than in the other major respondent
deal’ (20%). Those in smaller companies                       for the purposes of this survey as having              countries (Figure 2.2c). Overall in all
were more likely to be more involved and                      less than 250 employees).                              countries surveyed, more respondents
less likely not to be involved at all. Do                                                                            ranked cyber risk in their top five business
large organisations, with their ability to                    When comparisons are made across                       risks than ranked it lower than that.
multiply ‘Chief Xxx Officer’ (CxO) titles,                    industry groups, rather unsurprisingly
encourage a dangerous silo mentality                          the financial services sector sees cyber               Smaller businesses also seem marginally
around cyber security issues?                                 as a more significant business risk (67%               less concerned or aware about security

FIGURE 2.2a: How does cyber security rank as a business risk in your organisation?
50%

                                            46%
40%

30%

20%
                                                                          19%
                                                                                                    15%
10%
               11%

                                                                                                                             2%                      7%
0%
        The most significant        In top 5 business risks       In top 10 business risks      A business risk              None                 Don't know
           business risk                                                but not top 5        but not in our top 10

                                                                                                                                                                10
Cyber and the CFO             |    2. Cyber and the CFO

FIGURE 2.2b: How does cyber security rank as a business risk in your organisation? Analysis by sector
60%
                                                                                                                           n   P ublic practice (accountancy firm / SMP/ sole practitioner)
                                                   56%                                                                     n    Public sector (including government)
50%                                                                                                                        n    Financial services (including banks or insurance companies)
                                       49%                                                                                 n    Not-for-profit
                                                         45% 45%                                                           n      Corporate sector (including industry and commerce)
40%                                          41%

30%

20%                                                                        23%
                                                                                       19% 20%
                                                                     16%         17%                            17% 18%

10%   13%                                                                                        13% 14%
             11% 11% 10%
                              9%                                                                           8%                                                      9%
                                                                                                                           2% 1%           2% 1%             6%         7% 7% 6%

0%
           The most significant         In top 5 business risks       In top 10 business risks        A business risk               None                            Don't know
              business risk                                                 but not top 5          but not in our top 10

FIGURE 2.2c: How does cyber security rank as a business risk in your organisation? Analysis by geography
60%
                                                                                                                                                                        n   Australia / NZ
                                                                                                                                                                        n     UK
                                                                                                                                                                        n       Singapore
50%
                                            52%

                                                                                                                                                                        n         China
                                           51%
                                          50%

                                                               49%

                                                                                                                                                                        n           SAR Hong Kong
                                        47%

                                                                                                                                                                        n             Pakistan
40%                                                                                                                                                                                     Malaysia
                                      42%

                                                                                                                                                                        n
                                                                                                                                                                                          Rep. Ireland
                                                           39%

                                                                                                                                                                        n
30%
                                                                     29%
                                                         28%

                                                                                                            25%
                                                                                          23%

20%
                                                                                         21%
                        20%

                                                                                                         20%

                                                                                                        19%
                                                                       19%

                                                                                                      17%
                                                                                                      17%
                                                                             15%

                                                                                                                                                                   15%
             14%
             14%

                                                                            14%

                                                                            14%

                                                                                                    14%

10%
                                                                           12%

                                                                                                                                                                11%
                                                                                                                                                               10%
                                                                                                 10%
       9%

                    9%

                                                                                                 9%

                                                                                                                                                               4%
                            8%

                                                                                                                                        8%

                                                                                                                                                              8%
                                                                                                                                       2%
                           6%

                                                                                                                                                             6%
                                                                                                                                                             6%
                                                                                                                                      1%

                                                                                                                                                            5%
      5%

0%
           The most significant         In top 5 business risks       In top 10 business risks        A business risk               None                            Don't know
              business risk                                                 but not top 5          but not in our top 10

FIGURE 2.2d: How does cyber risk rank as a business risk in your organisation? Analysis by organisation size
50%
                                                     49%                                                                                                 n Small / medium               n Large

40%                                          42%

30%

20%
                                                                           21%                       20%
                                                                                    18%

10%
                       11%                                                                                      12%
            10%
                                                                                                                                                                               8%
                                                                                                                               2%          1%                      5%
0%
           The most significant         In top 5 business risks       In top 10 business risks        A business risk               None                            Don't know
              business risk                                                 but not top 5          but not in our top 10

                                                                                                                                                                                                     11
Cyber and the CFO    |   2. Cyber and the CFO

                                                  68%
                                                  of financial services sector
                                                  respondents rated their cyber
                                                  risk as very high or high

(Figure 2.2d), even though they are as          Financial services sector respondents                organisations in the UK and Ireland,
vulnerable as larger firms to both an           rated their cyber risk as greater than other         together with Australia (countries that
attack and its consequences. Cyber              industry groups, with 68% placing the risk           have implemented enhanced data
criminals are no longer respecters of           as very high or high compared with 46%               protection legislation from 2018), have a
organisational size and may well look to        in the not-for-profit sector and 44% for             higher than average appreciation of the
find a weaker link in the supply chain as a     the corporate sector. This is probably, in           level of cyber risk to their organisation.
way of accessing larger organisations.          part, because the regulators in this sector
                                                emphasise this risk (as discussed in the             Our survey results indicate that larger
Having understood that for many                 World Bank’s brief Cybersecurity, Cyber              organisations perceive themselves as
organisations cyber represents a                Risk and Financial Sector Regulation and             more threatened than smaller ones
significant business risk, are we able to       Supervision (World Bank 2018) in relation            (Figure 2.3d).
determine the relative size of that risk?       to the financial sector).
                                                                                                     If we perceive that cyber is a significant
2.2 HOW SIGNIFICANT A RISK?                     A geographic analysis (Figure 2.3c) of               business risk, where do the responsibility
                                                the same question suggested that                     and accountability in the organisation lie?
Figure 2.3a suggests that CFOs are
thinking of the risk too much in terms of
their organisation’s level of commercial
involvement with technology and data
and less about their operational exposure       FIGURE 2.3a: How significant a risk or not is cyber security to your organisation?
through the back office. A fraudulent           35%
payment to a non-existent supplier is as                                                         35%
                                                                               33%
devastating to a high street shop as to         30%
an online retailer.
                                                25%
An attack is inevitable. CFOs need to
understand that the threat is constant:         20%
attackers, often automated, are
constantly testing the defences of                          18%
                                                15%
businesses large and small. CFOs also
need to consider that they may have             10%                                                                 12%
already been attacked and not know.
The defence perimeter is changing.              5%
In the connected world the perimeter is                                                                                               2%
the device and user and not the physical        0%
network. This dramatically changes the                 5 – Very high risk   4 – High risk   3 – Moderate risk     2 – Low risk   1 – Very low risk

nature of the risk that organisations face
and how they manage it.

                                                                                                                                                     12
Cyber and the CFO                    |     2. Cyber and the CFO

FIGURE 2.3b: How significant a risk or not is cyber security to your organisation? Analysis by sector
50%
                                                                                                                                                                          n     Public practice (accountancy firm / SMP/ sole practitioner)
                                                                                                                                                                          n     Public sector (including government)
                                                                                                                                    44%                                         Financial services (including banks or insurance companies)
40%                                                           42%                                                                          42%                            n
                                                                                                                                                                          n     Not-for-profit
                                                                                    38%
                                                      36%                                             35%                                                                 n     Corporate sector (including industry and commerce)
                         34%                                             34%
30%
                                                                                           30%
                                                                                                              29%

                                                                                                                         23%
20%           21%

       15%
                                           14%
10%                                                                                                                                                   12%                                  12%

                                    8%                                                                                                                                   8%
                                                                                                                                                                  7%                7%
                                                                                                                                                                                                         2%            1%                 1%
                                                                                                                                                                                                                              3%
0%
                  5 – Very high risk                               4 – High risk                              3 – Moderate risk                                    2 – Low risk                                 1 – Very low risk

FIGURE 2.3c: How significant a risk or not is cyber security to your organisation? Analysis by geography
50%
                                                                                                                                                                                                                         n    Australia / NZ
                                                                                                                                                                                                                         n      UK
                                                                                                                        48%
                                                                                                47%

                                                                                                                  47%

                                                                                                                                                                                                                         n        Singapore
                                                                                                                              44%

                                                                                                                                          44%

40%                                                                                                                                                                                                                      n          China
                                                                                                                                                                                                                         n            SAR Hong Kong
                                                                                                                                    40%
                                                      40%

                                                                                                                                                                                                                         n              Pakistan
                                                                                          37%

                                                                                                                                                                                                                         n                Malaysia
                                                                                                      35%
                                                                                                            35%
                                                            34%

                                                                                                                                                34%

30%                                                                                                                                                                                                                      n                  Rep. Ireland
                                                                                                                                                                        29%
                                                                  29%

20%
                                                                                    22%

                                                                                                                                                                              21%
            20%

                                    19%
                              16%

                                                                              16%

                                                                                                                                                                                    15%
      15%

                  14%

                                                13%

10%
                                                                        12%

                                                                                                                                                      11%
                                                                                                                                                            11%
                                                                                                                                                                  10%
                        10%

                                          10%

                                                                                                                                                                                          9%

                                                                                                                                                                                                                         4%
                                                                                                                                                                                                                              4%
                                                                                                                                                                                                                    2%
                                                                                                                                                                                               6%

                                                                                                                                                                                                           1%

0%
              5 – Very high risk                                   4 – High risk                              3 – Moderate risk                                    2 – Low risk                                 1 – Very low risk

FIGURE 2.3d: How significant a risk or not is cyber security to your organisation? Analysis by organisation size
50%
                                                                                                                                                                                                           n Small / medium               n Large

40%                                                                                                           42%
                                                                                38%

30%
                                                                                                                                31%
                                                              28%

20%                             23%

                                                                                                                                                              15%
10%           12%
                                                                                                                                                                                    8%
                                                                                                                                                                                                                2%            1%
0%
                  5 – Very high risk                               4 – High risk                              3 – Moderate risk                                    2 – Low risk                                 1 – Very low risk

                                                                                                                                                                                                                                                       13
Cyber and the CFO            |    2. Cyber and the CFO

                                                                     10%
                                                                     of respondents did not
                                                                     know who had day-to-day
                                                                     responsibility for cyber security

2.3 RESPONSIBILITY AND                                              This should not absolve the finance team                           The responses, when analysed by
ACCOUNTABILITY                                                      from involvement. You cannot avoid                                 organisational size, revealed that for a
                                                                    responsibility for the risk by delegating,                         smaller organisation, somewhat
The survey responses indicated that the
                                                                    and it falls to the CFO to take the broader                        unsurprisingly, there was a tendency for the
strategic direction for cyber security is
                                                                    view of cyber security as a commercial                             CEO to have overall accountability (Figure
overwhelmingly set by the IT community
                                                                    and business-wide risk rather than as a                            2.4b). Respondents were asked to consider
(a combination of Chief Information
                                                                    technical issue. In many organisations IT                          who had day-to-day responsibility, and for
Security Officer (CISO), Chief Information
                                                                    reports into finance and fulfils a more                            smaller organisations this shifted to the IT
Officer (CIO), IT manager, Chief Data
                                                                    supportive and operational role, so it is                          manager. From both perspectives,
Officer (CDO)) or the CEO as an
                                                                    vital that CFOs set the strategy.                                  ultimate accountability and day-to-day
individual. In only 8% of respondent
                                                                                                                                       responsibility, the finance leadership did
organisations (Figure 2.4a) did                                     While over half of respondents said they                           not consider it to be their issue.
accountability rest with the CFO. In larger                         were fully aware of who had day-to-day
organisations it was much more likely to                            responsibility for cyber security, 30% said                        In helping to manage the risk, finance
be a C-suite responsibility, and usually                            they only thought they knew and 10%                                leaders need to help ensure that the
that of the CEO (28%), than in smaller                              said they did not know. What might this                            organisation has sufficient resources
organisations, where it tended to devolve                           mean in the immediate aftermath of a                               devoted to managing the risk. This is a
to the CISO or CIO. Day-to-day                                      breach? Often accountability spreads in                            question not only of the physical equipment
accountability rested, as you might                                 organisations in such situations.                                  and hardware but also of the technical skills
expect, with the IT manager, CISO or CIO.                                                                                              of the individuals. In many economies there

FIGURE 2.4a: Who sets the strategic direction (i.e. has ultimate accountability) for cyber security issues in your organisation?
Please select the option that most closely fits your organisation
30%

          28%
25%

20%

                                                                18%
15%

                                                                                                  13%
10%                                                                               11%

                                               8%
5%                           6%                                                                                                                                             6%
                                                                                                                   2%                 2%            4%         1%
 0%
      Chief Executive   Chief Operating   Chief Financial Chief Information Chief Information   IT manager   Chief Data Officer Accountability      Other     None       Don't know
           Officer           Officer           Officer     Security Officer       Officer                     (or equivalent) rests with external
      (or equivalent)   (or equivalent)   (or equivalent) (or equivalent) (or equivalent)                                         third party

                                                                                                                                                                                      14
Cyber and the CFO               |      2. Cyber and the CFO

FIGURE 2.4b: Who sets the strategic direction (i.e. has ultimate accountability) for cyber security issues in your organisation?
Please select the option that most closely fits your organisation. Analysis by organisation size
40%
                                                                                                                                                                          n Small / medium         n Large
35%     36%

30%

25%
                                                                      25%
              24%
20%

15%
                                                                                      15%          15%

10%                                                                                                      11%
                                             9%
                                                                 8%
5%                           7%                    7%                            7%                                                                                                                7%
                                                                                                                                                           6%
                                      5%                                                                               2% 2%             4% 1%                   2%                           4%
                                                                                                                                                                           3%
0%
      Chief Executive    Chief Operating   Chief Financial Chief Information Chief Information     IT manager      Chief Data Officer Accountability         Other           None            Don't know
           Officer            Officer           Officer     Security Officer       Officer                          (or equivalent) rests with external
      (or equivalent)    (or equivalent)   (or equivalent) (or equivalent) (or equivalent)                                              third party

FIGURE 2.4c: Who is accountable (i.e. at board or executive level) on a day-to-day basis for cyber security issues in your organisation?
Analysis by organisation size
30%
                                                                                                                                                                          n Small / medium         n Large
        27%
25%
                                                                       25%

                                                                                                   22%
20%                                                                                                      21%

15%                                                                                   16%
              14%

10%                                          11%

                                                                 8%
                             7%                                                  7%                                                                                                                7%
5%                                    6%           6%
                                                                                                                                         5%                                                   5%
                                                                                                                                                           4%
                                                                                                                       3%                      1%                1%
                                                                                                                             2%                                            2%
0%
      Chief Executive    Chief Operating   Chief Financial Chief Information Chief Information     IT manager      Chief Data Officer Accountability         Other           None            Don't know
           Officer            Officer           Officer     Security Officer       Officer                          (or equivalent) rests with external
      (or equivalent)    (or equivalent)   (or equivalent) (or equivalent) (or equivalent)                                              third party

FIGURE 2.5: And are you aware of who has day-to-day responsibility at an operational level for cyber security in your organisation?
50%
                                                               50%

40%

30%
                                                                                                     30%

20%

10%
                                                                                                                                                                                    10%
                        7%                                                                                                                     3%

0%
                 I fulfil that role                     Yes, I am fully aware       Yes, I think I know who has responsibility       Nobody has responsibility        I don’t know who has responsibility

                                                                                                                                                                                                            15
Cyber and the CFO   |   2. Cyber and the CFO

                                                 41%
                                                 of respondents said that they
                                                 had governance policies but
                                                 that they could be improved

are shortages of appropriately skilled cyber
                                               FIGURE 2.6a: In your opinion, does your organisation have sufficient governance
security professionals, but this cannot be
                                               processes over cyber security in place, such as information and guidance, staff training
an excuse for not investing in and
                                               and hiring policies?
deploying the necessary resources, either
                                               50%
in-house or hired in. Section 2.4 below
outlines the potential responses to this.
                                               40%
Given the level of risk to the organisation                                           41%
and the part of the organisation in which                   35%
the accountability lies, do our survey         30%
respondents believe that there is enough
governance in the organisation over the        20%
risk? What is the role that finance needs
to play in this?
                                               10%                                                             14%

2.4 CYBER RISK AND GOVERNANCE
                                                                                                                                       5%                     5%
Finance has a key role to play in the          0%
                                                      Yes, I consider that    Yes, I consider that we     We have informal      We do not have any    I am not aware of our
assessment and governance of risks                   we do have sufficient     do have governance       governance processes   governance processes   governance processes
across the organisation. Cyber is one of             governance processes    processes, however these
these risks, but it should be one of those                                      could be improved
upon which finance has a strong input,
given the potential for monetary loss.
                                               FIGURE 2.6b: In your opinion, does your organisation have sufficient governance
Although 35% of respondents (Figure 2.6a)
                                               processes over cyber security in place, such as information and guidance, staff training
said that they had adequate governance
                                               and hiring policies?
policies, 41% said that they had
                                               50%
governance policies but that they could                                                                                                        n Small / medium      n Large
be improved. Larger companies (Figure
2.6b) were far more likely to have policies    40%                                        43%
                                                                41%
and consider they were sufficient – as we                                         39%
shall see this may reflect a false sense of
                                               30%
security. As a matter of fact 14% said
governance policies were only informal,                 26%
while 10% said either that they were not       20%
                                                                                                           21%
aware of any or did not have any, which
must surely amount to the same thing.
                                               10%
                                                                                                                  10%
Chapter 4 considers the implications of                                                                                            8%     3%
                                                                                                                                                          6%
cyber risks on the governance and risk                                                                                                                            4%
                                               0%
management of the organisation.                       Yes, I consider that    Yes, I consider that we     We have informal      We do not have any    I am not aware of our
                                                     we do have sufficient     do have governance       governance processes   governance processes   governance processes
                                                     governance processes    processes, however these
                                                                                could be improved

                                                                                                                                                                              16
Cyber and the CFO    |   2. Cyber and the CFO

                                                51%
                                                of respondents assessed that their
                                                personal knowledge of cyber risks
                                                was for the most part average

2.5 DATA MANAGEMENT
                                                FIGURE 2.7: What controls are in place to protect the privacy of the data that you hold
Fraudulent data access is a significant risk    in your organisation? Please answer to the best of your knowledge.
for many organisations. In the survey, the      60%
respondents were asked how they                         59%                                                                                n Small / medium        n Large
protected the privacy of those whose            50%
data they held. Their responses indicated
that sensitive data is generally protected                      45%
                                                40%
                                                                                        41%
by access controls (such as user IDs)
rather than systematic encryption (where        30%
data is encoded using a program to
encode and decode the data), with small         20%                             22%
companies more likely to use encryption
(Figure 2.7).                                   10%
                                                                                                          4%                  11% 11%                  4%
Having established the extent of the risk,                                                                       1%                                            1%
                                                 0%
had organisations been attacked and were               Sensitive data is      Access to sensitive       Sensitive data is   I am unsure about    There are no such controls
our survey respondents aware of this?                  systemactically       data is restricted but    held and managed      the controls used
                                                         encrypted         the data is not encrypted     by third parties

2.6 CYBER-ATTACKS
Our survey respondents assessed that
their personal knowledge of cyber risks         FIGURE 2.8a: How would you describe your personal level of knowledge of the cyber
was for the most part average (51%,             risks faced by your organisation?
Figure 2.8a) with 35% saying ‘high’ or ‘very    60%
high’. This implies a strong awareness of
the risk among the finance community;
                                                50%
in fact, this may not be matched by a                                                                        51%
detailed understanding of the types of
threat as discussed in Chapter 3.               40%

                                                30%
                                                                                    29%

                                                20%

                                                10%                                                                               12%
                                                             6%                                                                                            2%
                                                 0%
                                                        5 – Very high              4 – High               3 – Average            2 – Low                1 – Very low

                                                                                                                                                                          17
Cyber and the CFO                 |      2. Cyber and the CFO

                                                                                           54%
                                                                                           of respondents believe that
                                                                                           they have either never been
                                                                                           the victim of a detected
                                                                                           cyber-attack or that they did
                                                                                           not know whether they had

FIGURE 2.8b: How would you describe your personal level of knowledge of the cyber risks faced by your organisation?
Analysis by geography.
80%
                                                                                                                                                                                                                                      n    Australia / NZ
                                                                                                                                                                                                                                      n      UK
70%                                                                                                                                                                                                                                   n        Singapore
                                                                                                                                                                                                                                      n          China
                                                                                                                                                                                                                                      n            SAR Hong Kong
                                                                                                                                               64%

60%
                                                                                                                                                                                                                                      n              Pakistan
                                                                                                                                                                                                                                      n                Malaysia
                                                                                                                                   56%
                                                                                                                                         54%

50%
                                                                                                                       53%

                                                                                                                                                                                                                                      n                  Rep. Ireland
                                                                                                                             52%
                                                                                                                 50%

                                                                                                                                                     49%

40%
                                                                                                           43%
                                                                                                35%
                                                            34%

30%
                                                      31%

20%
                                                                  22%

                                                                                    21%
                                                                              21%

                                                                                                                                                                                                20%
                                                                                                                                                                                    19%
                                                                                                                                                                              18%
                                                                        17%

                                                                                                                                                                                          17%
                                                                                          16%

                                                                                                                                                                                                      15%
             7%

10%
                                                                                                                                                                                                            12%
                  4%

                                       4%
                                            4%

                                                                                                                                                                                                                  4%

                                                                                                                                                                                                                                      4%
       11%

                                                                                                                                                                  11%
                                  3%

                                                                                                                                                                                                                                           3%
                       10%
                             2%

                                                                                                                                                                                                                       2%
                                                                                                                                                                                                                            2%
                                                                                                                                                                                                                                 2%

                                                                                                                                                                                                                                                  1%
                                                                                                                                                                         8%

0%
                  5 – Very high                                         4 – High                                        3 – Average                                                 2 – Low                                  1 – Very low

FIGURE 2.9: To the best of your knowledge, when was your organisation last the subject of a detected cyber-attack?
35%

                                                                                                                                                                                                                                              33%
30%

25%

20%                                                                                                                                                                                                               21%

15%

10%
             10%                                                                                  10%
                                          9%
5%                                                                 7%
                                                                                                                              5%
                                                                                                                                                              4%                            1%
 0%
      In the last month                 In the last           In the last                   In the last year             In the last                       In the last                     Other                  Never                   Don’t know
                                      three months           six months                                                  two years                         five years

                                                                                                                                                                                                                                                                    18
Cyber and the CFO           |    2. Cyber and the CFO

                                                                            CFOs need to
                                                                            understand that their
                                                                            organisations are under
                                                                            attack all the time.

This seems like an overstatement when                             greater awareness of the implications and                         not be devastating. Nonetheless, most
you consider that most respondents (54%,                          increased investment on prevention                                organisations end up suffering avoidable
Figure 2.9) believe that they have either                         (Figure 2.10). CFOs reported suffering                            losses and then putting in place measures
never been the victim of a detected                               harm from lost revenue, fines and                                 that should have been implemented
cyber-attack or that they did not know                            reputational loss, although a significant                         beforehand. As we shall see (Chapter 5,
whether they had. CFOs need to                                    number said they had achieved                                     section 5.5) many organisations take out
understand that their organisations are                           reputational improvement through                                  cyber insurance only after an attack, and
under attack all the time, and that it is vital                   managing the attack effectively. Clearly, if                      the premiums reflect this.
that they are kept informed about this.                           you accept that a cyber-attack is
                                                                  inevitable and are prepared to respond                            Having suffered an attack, were
For those whose organisations had been                            appropriately, the consequences need                              organisations prepared for the aftermath?
attacked, the overwhelming impact was

FIGURE 2.10: What implications or impacts did the detected cyber-attack have on your organisation?
30%

                                                                               28%
25%

20%

15%                                                                                              17%

10%
                                                               9%
           8%
 5%                                           7%                                                                   7%
                                                                                                                                   6%
                                                                                                                                                            2%
                            3%                                                                                                                   1%                    3%
 0%
      Financial impact Financial impact Reputational loss Reputational          Greater         Increased    Recruitment of     Revision to   We do not     Other   Don't know
          from lost       from fines                       improvement       awareness of investment in and additional talent   HR policies   have a plan
           revenue     from regulators                    from managing    the implications / or expenditure to manage risk
                                                             effectively                     on prevention

                                                                                                                                                                                 19
Cyber and the CFO          |    2. Cyber and the CFO

                                                                        68%
                                                                        of respondents don't have
                                                                        an absolute up-to-date
                                                                        remediation plan

2.7 RESPONSE AND REMEDIATION
                                                                  FIGURE 2.11: Does your organisation have a remediation plan in place (one enacted
Given the inevitability of a cyber-attack,                        to enable an organisation to recover after an event), to manage the impact of a
how you respond is just as important as                           successful cyber-attack?
how well you protect yourself, if not more                        35%
so. Taking the wrong action after an
attack can increase the damage or even                            30%        32%
be more damaging than the attack itself,
                                                                  25%
whether through inflicting further damage
on systems or increasing the reputational                         20%
damage by poor communication.                                                                   19%
                                                                                                                                     18%
                                                                  15%
Despite this, only 32% (Figure 2.11) of
                                                                                                                                                                                      13%
respondents said they have a remediation                          10%
plan that they update and test frequently:                                                                         9%
47% were either unsure, do not have such                          5%                                                                                   7%
                                                                                                                                                                           2%
a plan, do not test or simply do not know
                                                                  0%
whether one exists.                                                       Yes and we Yes and we update Yes, but we do           I am unsure as     We do not               Other   Don’t know
                                                                        update and test and test it, but not update it          to whether we      have a plan
                                                                          it regularly   infrequently      or test it             have a plan

FIGURE 2.12: Does your organisation’s remediation plan include some or all of the following elements?
50%

            46%
40%

30%                                                 32%                                                                                      31%
                                                                          27%

20%
                                                                                                  21%                   22%

10%
                                10%

                                                                                                                                                                      1%              6%
0%
        Software and      Escrow agreements     Manual recovery      Communication,         Communication,         Communication       Infrastructure and        Other elements    Don’t know
      hardware recovery   related to software     procedures       including social media including social media   with regulators      system changes
                                                                   strategy for customers    strategy for staff
                                                                        and suppliers

                                                                                                                                                                                                20
Cyber and the CFO   |   2. Cyber and the CFO

                                                     83%
                                                     of respondents have no
                                                     cyber insurance in place

Again, large companies are leading good
                                               FIGURE 2.13: Does your organisation have cyber insurance?
practice that should be commonplace
across all organisations. Even so, the         50%
remediation measures focused very much
on recovery procedures, with                                                                                                  44%
                                               40%
communication being a much lower
priority, especially for smaller companies.
                                               30%
These results suggest that, for many of
                                                                                                     29%
our respondents, remediation after an
attack is probably analogous to the            20%
disaster recovery plan of the late 1990s
rather than a plan that encompasses the                    17%
far broader range of threats that the          10%
connected world brings with it.                                                  10%

One form of protection is cyber insurance,     0%
                                                              Yes         It is in consideration         No                 Don’t know
but only a small minority 17% (Figure 2.13)                                    or discussion
had (or knew they had) cyber insurance.

Chapter 5 reviews recovery and restoration
activities after a successful cyber-attack.
Before this, Chapter 3 considers the           FIGURE 2.13a: Does your organisation have cyber insurance? Analysis by business size
nature of the cyber threat and Chapter 4       60%
looks at the governance of this threat.                                                                             n Small / medium     n Large
                                               50%                                                                                52%

                                               40%                                                 43%

                                               30%
                                                                                                                          31%

                                               20%
                                                                                                              21%
                                                                    19%
                                               10%      14%
                                                                            12%
                                                                                        8%
                                               0%
                                                              Yes         It is in consideration         No                 Don’t know
                                                                               or discussion

                                                                                                                                              21
3. What is the
                cyber threat?

How much do we understand about the cyber threat? It is talked about it a lot but it seems from
the survey results that the overall level of awareness among finance professionals is relatively low.

This chapter reviews the level of threat        3.1 LEAVING IT TO IT IS NOT ENOUGH           Unless the business engages with IT and
and how it continues to evolve. Perhaps,                                                     articulates the true nature of the risk – and
                                                The impacts of a cyber-breach will be
for finance professionals, this is one of the                                                the organisation’s risk appetite – there is
                                                experienced across the organisation. It is
most significant challenges. Its changing                                                    a danger that IT will protect the wrong
                                                not just a technology issue. While IT
nature means that it cannot be contained                                                     assets or waste resources protecting
                                                teams may be part of the solution, they
once and for all. Therefore, it requires                                                     assets exposed to little or no threat.
                                                are not the owners of it. It needs to be a
effort and investment to remain up to
                                                cross-organisational activity, not just a    Cyber security is a commercial risk and
date and focused.
                                                technical remedy.                            responsibility for managing it cannot be
Chapter 6 considers some of the individual                                                   outsourced or delegated. Managing
                                                Cyber-attacks can disrupt operations
threats in detail to provide a context.                                                      cyber risk means that CFOs will need to
                                                such as train and flight operations, shut
                                                                                             engage closely with IT professionals and
                                                down manufacturing, reveal intellectual
                                                                                             develop a common language, rather than
                                                property and strategies to rivals, and
                                                                                             seeing them as ‘the techies around the
                                                leak market-sensitive or personally
                                                                                             corner’. As we shall see (in Chapter 6),
                                                damaging information.
                                                                                             while the language of cyber threats can
                                                While one might expect IT to be              seem arcane, the threats are very real, as
                                                reasonably abreast of the current threat     are the consequences. Even if they do not
                                                landscape, it is unreasonable to expect      become cyber security experts, CFOs
                                                them to show an equal understanding of       need to ensure they are not managing
                                                the risk landscape as they pertain to each   only the risks they understand.
                                                business and each part of the business.

                                                                                                                                       22
Cyber and the CFO   |   3. What is the cyber threat?

  CASE STUDY:
  Manage the risk,
  not just the data:
  do not assume that
  IT has it in hand

                                                Despite considering herself well             Fortunately, much of her data had been
                                                versed in the risks, and having              emailed to colleagues and could be
                                                undergone all the mandatory training,        reconstructed from email folders that had
                                                this director of finance downloaded          been backed up. But considerable
                                                malware – ransomware – that locked           amounts of data were lost.
                                                her PC and denied access to a range          The director of finance does not entirely
                                                of key financial data.                       blame IT for this: while they were
                                                On contacting IT to help her recover         managing data, she should have been
                                                from the situation, she was surprised to     managing risk, as only she understood the
                                                find that her hard drive was not, as she     relative importance of the financial data
                                                had assumed, automatically and fully         she handled. But she also argued that IT
                                                backed up by the IT department. IT had       saw cyber security as a mundane task
                                                provided shared folders for data backup,     compared with exploring new technology.
                                                but – ironically – she had not considered    IT now reports to the CFO: while this may
                                                these a secure place to store sensitive      not appropriate for all organisations, she
                                                data such as payroll.                        maintains that this is right for hers.

                                                  Key lessons:
                                                  Cyber criminals can catch even the most well-prepared and aware individuals, and
                                                  successful attacks occur even in well-resourced organisations. You have to assume
                                                  an attack will occur and be prepared for the consequences.
                                                  Your understanding of what is critical data may differ from the IT department’s
                                                  – discuss what needs to be backed up and why: changes in the IT environment may
                                                  change how your data is handled and backed up.
                                                  Finance and IT need to work together and not assume that the other ‘has it in hand’.

                                                                                                                                          23
Cyber and the CFO              |       3. What is the cyber threat?

                                                                                    The need to constantly
                                                                                    reappraise the threat
                                                                                    level is paramount.

3.2 NATURE OF THE THREAT                                                  and it is important that the leaders of the                   types of risk, and form an important
                                                                          finance community are sufficiently                            source of information.
The survey respondents were aware of
                                                                          educated to appreciate how cyber threats
the major threats (Figure 3.1): data theft,                                                                                             The systematic differences between big
                                                                          are evolving. The need to reappraise the
malware and web application attacks, but                                                                                                and small companies suggest that cyber
                                                                          threat level constantly to ensure that the
less aware of the emerging threats of                                                                                                   security is as much a matter of resources
                                                                          organisation is addressing the current
Denial of Service (DoS), Internet of Things                                                                                             as perception. Smaller companies either
                                                                          suite of risks is paramount.
and Cloud attacks (Figure 3.2). (These                                                                                                  think they are not on criminals’ radar or
threats are discussed in Chapter 6).                                      In addition, continuing professional                          have not thought hard enough about the
                                                                          development (CPD) programmes offer                            risk cyber threats poses to their business.
Each of these further threats has a
                                                                          updates to finance professionals on the
commercial impact on an organisation

FIGURE 3.1: Which of these issues in relation to cyber security attacks do you recognise as applicable to your organisation?
Select all that apply
80%

70%
                                                                                                                                           69%
60%                                                           64%                                             64%

50%
                                                                                                                           51%
40%                                                                            44%
           42%

30%                                           33%
                            31%                                                                 31%
                                                                                                                                                         29%
20%

10%                                                                                                                                                                                     15%

                                                                                                                                                                         0%
0%
        Unmanaged          Internet        Distributed       Data theft      Exploitation       Digital      Malware   Web application Phishing or      Stringent    None of these    Don't know
       use of external     of Things     denial of service                    of existing   transformation                attacks      smart / spear   global data   are applicable
      technology, such    and smart                                         vulnerabilities                                             phishing       regulations
      as cloud services   appliances

                                                                                                                                                                                                   24
Cyber and the CFO        |      3. What is the cyber threat?

                                                                          Resilience planning is so
                                                                          important because you
                                                                          do not know when and
                                                                          how an attack will occur.

FIGURE 3.2: Which of these emerging forms of cyber security attack do you consider your organisation to be vulnerable to?
Select all that apply
40%

35%                                                                                                                 36%                                                   36%

30%

25%                                                                     28%

                       24%
20%
                                                                                                      19%
15%                                    18%
         16%                                           16%
                                                                                     15%
                                                                                                                                  14%
10%

 5%
                                                                                                                                               1%           4%
 0%
       Dark web      Embedded       Distributed     Man-in-the-        Drive-by   SQL injection   Eavesdropping   Ransomware   Cryptojacking   Other   None of these    Don't know
      sale of data     code       denial of service middle attack      malware                                                                         are applicable

3.3 THE UNKNOWN THREAT                                              While CFOs show a reasonable awareness                     Guarding against ‘unknown unknowns’ is
                                                                    of the threats that have surfaced they are                 never easy, but knowing that there is much
The cyber risk is constantly changing and
                                                                    not necessarily aware of the evolving risk                 you do not know cautions against making
in unpredictable ways that are not always
                                                                    landscape (see Chapter 6) and the                          assumptions that leave you vulnerable:
well publicised: it differs from other risks
                                                                    damage that new threats can cause                          that cyber security is primarily a privacy
that the board has to deal with and can
                                                                    before the cyber security profession is                    issue, that attackers are motivated by
never be completely mitigated. And it is
                                                                    aware of them: so-called ‘zero-day                         financial gain, that the mode of attack is
just as hard for regulators to cope with this,
                                                                    exploits’ (see Chapter 6, section 6.2)                     purely technological. As we shall see, new
so compliance can never offer more than a
                                                                    wreak havoc before the professionals                       attackers are emerging all the time with a
bare minimum of protection. Organisations
                                                                    have even worked out how the attack has                    variety of motives, the human element
need to ensure that they reappraise the
                                                                    taken place. This is why resilience                        can be as much a weakness as poor
nature and the extent of the threat on a
                                                                    planning (see Chapter 4, section 4.4) is so                technology, and the damage wrought by
regular basis. The frequency will be
                                                                    important – you do not know when and                       cyber-attacks goes far beyond the
determined by the nature of the
                                                                    how an attack will occur.                                  compromise of personal details.
organisation and the industry in which it
operates. Nonetheless, to conclude that
these plans do not need updating is not
effectively managing the risk.

                                                                                                                                                                                     25
Cyber and the CFO   |   3. What is the cyber threat?

                                                       Organisations should not
                                                       assume that their cloud
                                                       provider will necessarily
                                                       provide an effective level
                                                       of security.

3.4 THIRD-PARTY RISKS                           Organisations need to understand where        Organisations need to be more proactive
                                                their data is stored, how it is protected     in assessing their supply chain: placing
Cloud computing
                                                and how this is assured.                      reliance on certifications may not be the
Business processes are also now highly
                                                                                              whole or even the right answer. Auditing
integrated between organisations                Standards such as the Systems and             and advising – just as you audit and
through managed services such as                Organization Controls Guides, SOC 2 and       advise yourself – are key. Just as we live in
Software as a Service (commonly known           SOC 3, published by the American              a more connected world so we need to
as SaaS) and cloud systems. Research            Institute of Certified Public Accountants     be more collaborative with other
conducted by McAfee shows that one in           (AICPA), can provide a level of assurance     stakeholders: organisations that help
four respondents to a 2018 survey               over the cloud environment. These reports     others will also help themselves.
reported a data theft from the public           can also be used to provide assurance to
cloud and one in five had experienced an        third parties with whom you interact.         Our survey respondents were asked if
advanced attack on their public cloud                                                         they undertook assessments or audits of
infrastructure (McAfee 2018).                   In 2019, the UK’s National Cyber Security     the cyber security vulnerabilities in their
                                                Centre (NCSC) highlighted that a large        supply chain. Only 19% of the respondents
Cloud is a double-edged sword: you lose         number of organisations leave data            (Figure 3.3a) said that they undertook
the possibility of control and assurance        unprotected in cloud storage locations        these activities; which reduced to 11% for
over ‘en-premises’ data centres and             such as Amazon S3 (NCSC 2019).                smaller organisations (Figure 3.3b).
procedures, and instead enter into a            Information needs to be protected even if
contractual relationship. The risk is not       it is stored for short periods of time.       Standards such as ISO/IEC 27001 can be
outsourced and neither is the reputational                                                    used as frameworks of leading practice
impact. Despite this, for many smaller          The Australian Cyber Security Centre          when conducting audits and reviews of
businesses data in the cloud may be safer       updated its guidance in January 2019 –        the supply chain. This standard is based
and better managed than if stored locally.      Cloud Computing Security Considerations       on a set of common principles that were
                                                (Australian Cyber Security Centre 2019a)      first developed as a British Standard in
But these benefits depend on integration        – to take account of this evolving threat.    1995. The standard provides examples of
of systems and sharing data with suppliers,
                                                                                              114 controls that can be implemented
and attackers may compromise weak               Supply chains
                                                                                              across 35 control categories.
security at a supplier or service provider,     Integrated supply chains improve
who may lack the in-house resources of          speed and efficiency and enable               Organisations can also be certified to be in
their clients. From late 2016, Operation        companies to ensure more easily that          compliance with one of three levels of the
Cloud Hopper attacked IT managed-               their suppliers comply with quality and       standard. While this can provide evidence
service providers to gain access to data        regulatory requirements.                      of policy and intention, it may not indicate
and networks of customers in a variety of                                                     that a given practice is being followed.
sectors in 15 countries (PwC 2017).             The weakest link for an organisation may
                                                be outside its direct control or even in a    NIST (the US National Institute of
When assessing the move to the cloud,           different country: organisations that still   Standards and Technology, a department
organisations should not assume that            think in terms of ‘perimeter security’ need   of the US Department of Commerce)
their cloud provider will necessarily           to think more deeply about where that         produces a Cyber Security framework that
provide an effective level of security.         perimeter is and who is guarding it.          can be used for similar purposes.

                                                                                                                                         26
You can also read