Monday, June 23, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » CFO, AKA, “Chief Risk” Officer

SBN

CFO, AKA, “Chief Risk” Officer

by Frank Teruel on May 23, 2023

“This is the lesson: never give in, never give in, never, never, never, never—in nothing, great or small, large or petty—never give in except to convictions of honour and good sense. Never yield to force; never yield to the apparently overwhelming might of the enemy,” thundered Winston Churchill as he addressed his Alma Mater in 1941. These are powerful words that, even today, stir emotions, strengthen resolve, and brim with a call to continuous action.

Churchill’s words were uttered at a time when all seemed lost, and threats appeared insurmountable. Eighty-two years later, I am moved by the tenacity of that call to action, and often find myself thinking on his admonition as threats, challenges, and obstacles abound. “Never give in” is a mantra that all of us involved in the honorable pursuit of protecting businesses and consumers from omnipresent cyber threats need to take to heart.

Churchill also famously said, “It is no use saying, We are doing our best. You have got to succeed in doing what is necessary.” Two powerful directives applicable to our struggle against cyber threats: “Never give in” and “do what is necessary.” Both are imperatives in the ongoing battle against cyber threats and bad actors that require us to be prepared, predictive, intentional, and relentless in our risk mitigation efforts.

Techstrong Gang Youtube
AWS Hub

Find out more about today’s cyber threats in our new eBook: Bad Bots & Beyond: 2023 State of the Threat Report.

Bad Bots and Beyond: 2023 State of the Threat Report
RECOMMENDED RESOURCE
Bad Bots and Beyond: 2023 State of the Threat Report
ACCESS

Preparedness: Do what is necessary.

This call to action presupposes a deep understanding of the risk environment. As CFOs, it falls to us to bridge the gap between cybersecurity preparedness and the financial implications for our organizations. By ensuring that security imperatives, technology investments, and personnel are properly funded and strategically prioritized, we are “doing what is necessary.”

Whether we own the reporting relationship with the CISO, as is the case in many public companies, or we own the responsibility for business risk mitigation, which is the case in every company, we own the imperative of preparedness. So, what does it mean to be prepared…to be constantly prepared? We must all grapple with this question, especially considering the dynamism of the current threat environment. Minimally, we must:

Understand our vulnerabilities. For example, can we distinguish between sophisticated bot activity vs. legitimate customers vs. bad actors in new account registration and login activities? If so, do we know:

  • How much friction to introduce into the activities to ensure that the individuals transacting in those workflows are legit?
  • What would happen if the bots or bad actors succeed in their efforts?
  • Can we quantify the potential financial exposure and the downstream costs associated with the compromise?
  • What data might be exposed?

Implement a culture of continuous cyber threat training. We must instill a degree of professional skepticism into the functions most likely to be affected by a compromise attempt.

  • Do we run simulations that test the latest known threat vectors, including, Smishing, Phishing, Business Email Compromise, and others?
  • How did our people respond?
  • Are we still relying on grammatical errors or unfamiliar tone in an email as the gotchas for detecting a Phishing scam?
  • What happens to that approach when AI can now compose grammatically and contextually tonal emails better able to trick the recipient?

Select proven partners. As CFOs, we cannot fall to the allure of cool technology delivered by thinly capitalized and unproven vendors to power our critical systems. Have we selected vendors that are enterprise class? Think bank class…

  • Would they pass the rigor of a critical vendor in a highly regulated institution?
  • Is their reputation and product efficacy well regarded and proven?
  • Do they stand behind their products with warranties, SLAs, and cyber threat experts ready to assist at the moment of need?

Preside over a cyber threat committee. Bring together a group of internal constituents which meets frequently to assess risk, quantify exposure, determine insurance requirements, and report our cyber threat posture to the c-suite and the board. Minimally, the committee should include business line owners, the CISO and the infosec team, and legal.

Predictive: Don’t wait for the onslaught.

A quote often attributed to Churchill, “Let our advance worrying become advanced thinking and planning,” highlights the need to be predictive as it relates to our position as CFO in staying one step ahead of cyber threats. This thinking requires us to embrace the notion that it’s not if but when our organization will be attacked. Consequently, we must develop the predictive muscle, informed by our preparedness, that minimally:

Focuses us on following attack trends, hardening targets, and using data for protection.

  • What have we seen in attacks that have affected our competitors?
  • What was the financial impact of those attacks?
  • What downstream implications resulted from the attacks?
  • When did the CFO become aware of the threat vector and resulting compromise?

The last question is critical because many expensive cyberattacks go undetected by the finance organization for months. For example, consider SMS toll fraud, which is one of the most prevalent and current attack vectors. Bad actors and unscrupulous telcos and carriers collude to share the proceeds of illegitimate SMS activity during a registration process.

As CFO, we may interpret our increased SMS charges as proof of successful marketing initiatives to drive new registrations. It may take months before that premise is proven false—and by then, millions may have been lost. Why do I note millions? Because that is the magnitude of that attack vector on other organizations today. So, now that I am aware of the trend, I need to create a feedback loop that scrutinizes SMS spend against new registrations and deploy technical solutions that are proven to stop the attack.

Estimate the potential cost savings associated with stopping SMS toll fraud. Use our calculator today!

Interdict: Relentlessly fight and never give in.

The bad actors are intentional…they always come back with new attack vectors. It is not a one and done exercise. The key here is to be equally intentional and engaged in interdiction and mitigation. As CFOs, we must be vigilant and aggressive in our counterpunching. As the person stewarding my organization through business risk, it is imperative that I minimally:

Make the compromise effort expensive for the adversary. Consider the cybercrime-as-a-service environment in which we operate today. All of the tools needed for DIY fraud are readily and easily available to potential adversaries. For example, bad bots can be rented at scale, social channels like Discord, Telegram, and others are replete with DIY fraud information, and compromised data derived from innumerable data breaches is everywhere. In this environment, our job is to make compromise hard and expensive.

How? Use technologies and vendors that can increase the processing cost associated with automated attacks and then deploy those technologies in all workflows where financial opportunities abound.

The reality of cyber threats is a “follow the money” model. If the attack is increasingly expensive to perpetuate, and the value of the target is diminished and hardened, the incentive to compromise, the ROI if you will, becomes less attractive.

Determine the cost of compromise and engage vendors that help lessen that cost. The internal ROI must also be quantified to ensure alignment and continued engagement in the fight. Again, not a one and done exercise. Quantify the potential fraud losses, credit repair losses (call centers and notification services), and brand impact of a compromise in determining the budget allocation to fully fund these efforts. Remember, this is a table stakes, high-priority investment exercise that must be considered annually irrespective of the ebb and flow of cyberattacks.

Learn: Federate the data within our organization and our partners.

In February of 1941, in an appeal on the BBC to President Roosevelt, Churchill stated, “We shall not fail or falter; we shall not weaken or tire. Neither the sudden shock of battle, nor the long-drawn trials of vigilance and exertion will wear us down. Give us the tools, and we will finish the job.” Powerful and salient guidance in our mission against cyber threat.

As CFO, each of us must not just quantify the financial, regulatory, legal, and brand risks associated with cyber threats. We must steward our organizations through the maze of business risk, and we must stay vigilant and prepare, predict, and interdict by funding our teams with the right tools to finish the job! Our mission to protect our organization from this persistent and dynamic business antagonist is honorable, sensible, and never more important. Stay the course and never, never give in!

Have more questions on the strategies a CFO should employ?
Please reach out! The Arkose team and I stand ready to help.

*** This is a Security Bloggers Network syndicated blog from Arkose Labs authored by Frank Teruel. Read the original post at: https://www.arkoselabs.com/blog/cfo-managing-security-risk/

May 23, 2023May 23, 2023 Frank Teruel account security
  • ← Scam callers and spoofed telephone numbers.
  • Randall Munroe’s XKCD ‘Exoplanet High-5’ →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report
US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
Is Your CISO Ready to Flee? 
16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat
Scattered Spider Targets Aflac, Other Insurance Companies
How the New HIPAA Regulations 2025 Will Impact Healthcare Compliance
Your passwords are everywhere: What the massive 16 billion login leak means for you
Understanding EchoLeak: What This Vulnerability Teaches Us About Application Security | Impart Security
AI Security Guide: Protecting models, data, and systems from emerging threats
The $4.88 Million Question: Why Password-Based Breaches Are Getting More Expensive

Industry Spotlight

Scattered Spider Targets Aflac, Other Insurance Companies
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence 

Scattered Spider Targets Aflac, Other Insurance Companies

June 22, 2025 Jeffrey Burt | Yesterday 0
US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
Analytics & Intelligence Blockchain Cyberlaw Cybersecurity Data Privacy Digital Currency Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency

June 20, 2025 Richi Jennings | 3 days ago 0
Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks
Blockchain Cloud Security Cybersecurity Data Security Digital Currency Featured Identity & Access Incident Response Industry Spotlight Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks

June 18, 2025 Jeffrey Burt | Jun 18 0

Top Stories

16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Malware Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat

June 22, 2025 Jeffrey Burt | Yesterday 0
AWS Raises Expertise Bar for MSSP Partners
AI and Machine Learning in Security Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

AWS Raises Expertise Bar for MSSP Partners

June 22, 2025 Michael Vizard | Yesterday 0
Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report
Cybersecurity Featured News Security Boulevard (Original) Social - X Spotlight 

Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report

June 19, 2025 Jon Swartz | 4 days ago 0

Security Humor

Randall Munroe’s XKCD ‘Exoplanet System’

Randall Munroe’s XKCD ‘Exoplanet System’

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×