5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy-1 Next

Staying Ahead of Cyber Threats

Click through for five ways organizations, especially CFOs, can stay ahead of cybersecurity threats, as identified by Thack Brown, global head of Line of Business Finance at SAP.

In today's digital world, cybersecurity is an issue that is top of mind for every company. Whether it's worrying about the malware threat from employees chasing Pokemon around the office, to large-scale breaches such as that seen with Wendy's earlier this year, executives face a greater challenge than ever in ensuring that data is protected in the enterprise.

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. In fact, a recent report from Deloitte noted that U.S. financial services companies lost on average $23.6 million from cybersecurity breaches in 2013 – the highest average loss across all industries. Information is the new sinew of war – beyond customer information, a company's internal assets are also at risk, from financial and strategic plans to employees' personal data and so on. An attack on this data (either for leakage, manipulation, ransom or other malicious intent) could seriously endanger CFO relationships and trust with a number of important parties. It could also lead to business disruptions and loss of market share, not to mention potentially hefty fines.

In this slideshow, Thack Brown, global head for SAP's Line of Business Finance, has identified five ways organizations -- in particular CFOs – can stay ahead when it comes to cybersecurity.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.