Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > FIVE THINGS CFOS SHOULD TAKE AWAY FROM ASHLEY MADISON CYBER ATTACK
    Technology

    FIVE THINGS CFOS SHOULD TAKE AWAY FROM ASHLEY MADISON CYBER ATTACK

    FIVE THINGS CFOS SHOULD TAKE AWAY FROM ASHLEY MADISON CYBER ATTACK

    Published by Gbaf News

    Posted on October 26, 2015

    Featured image for article about Technology

    Andrew Elder, president of EMEA at Intel Security

    The cyber attack targeted at infidelity website Ashley Madison clearly exemplifies the long lasting implications of online crime. Beyond the initial effects of customers having their most sensitive personal details exploited, we are now seeing secondary shock waves, as online scammers and criminals take advantage of victims of the attack. Such supplementary incidents include blackmailers threatening to send condemning personal data to friends and relatives of victims and charging a ransom via Bitcoin to remove the data. But alongside the personal consequences of the attack, the business implications for Ashley Madison are just as far reaching. With the site suffering lasting financial damage, the responsibility for the incident extends far beyond the IT staff to the C-level execs and in particular the chief financial officer (CFO).

    What can CFOs learn from the Ashley Madison attack?

    1. A cyber attack can cost a company more than its reputation
    Andrew Elder, president of EMEA at Intel Security

    Andrew Elder, president of EMEA at Intel Security

    Prior to the attack, Ashley Madison had high hopes of a public listing. With 37 million members worldwide the corporation had an estimated valuation of $1 billion. An IPO on the London Stock Exchange later this year was being widely discussed, in a listing that could raise up to $200 million. However, following the notorious cyber attack, many experts claim that the company’s flotation hopes have been damaged beyond repair.

    1. Cyber defence is a C-level issue

    Considering the potential crippling business consequences of a data breach, corporations cannot afford to dismiss cyber security as a problem solely for the IT department. Cyber defence is about teamwork across the organisation. C-level executives need to take responsibility for managing and executing this company-wide collaboration – with CFO taking an active role in in devising the organisation’s security strategy.  According to a recent study from Deloitte, 85 per cent of CFOs fear malicious attacks are a major threat to a corporation’s finances, however only 4 per cent say they are well prepared for such attacks.

    1. A cyber security strategy requires intricate risk analysis

    While C-level IT execs, such as the chief information officer (CIO) are best placed to understand the changing technology and security landscape, the CFO is armed with key details about the company’s financial situation and future business priorities. As such, understanding the data supply chain and how a company’s most valuable assets are secured, are all tasks that cannot be achieved effectively without the finance team’s input. This team also has experience in presenting these findings to the CEO, in order to secure the investment required.

    1. Careers are on the line

    The devastating impact of security breaches on C-level executives was made startlingly apparent, when the CEO of Ashley Madison was forced to resign following the incident late last month. Similarly, other recent high profile security incidents have highlighted that beyond the corporate damage resulting from a cyber attack, senior executives can suffer the personal consequences of failing to implement appropriate cyber security measures. The CFO of London-based hedge fund Fortelus was recently dismissed following a cyber-related scam that lost the company $1.2 million. Meanwhile, the director of the US Office of Personnel Management was forced to resign following a data breach that affected over 20 million records of government employees early in July.

    1. Regulatory compliance is at stake

    In today’s business landscape data is not only one of a company’s most valuable assets but is also tied to many regulations. Ashley Madison has not only suffered reputational and financial damage as a result of the attack, but is now experiencing the regulatory implications associated with such a breach. At least six complaints have been filed in federal court against Avid Life Media, the parent company of the infidelity website, following attackers’ disclosure of user information. With this in mind, a CFO’s evaluation of data assets must include a deep analysis and understanding of the regulatory landscape to ensure company compliance.

    Data breaches such as that targeted at Ashley Madison can evidently result in severe consequences for a company, including reputational and financial damage, loss of key talent and even legal implications. With the future of the company at stake, company data must be valued in the same way as other corporate assets. To ensure this, corporations should prioritise cyber security as a C-level concern and promote collaboration between the finance and technology teams to devise a security strategy that meets the needs of today’s cyber landscape.

    Related Posts
    Treasury transformation must be built on accountability and trust
    Treasury transformation must be built on accountability and trust
    Financial services: a human-centric approach to managing risk
    Financial services: a human-centric approach to managing risk
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    How Integral’s CTO Chidambaram Bhat is helping to solve  transfer pricing problems through cutting edge AI.
    How Integral’s CTO Chidambaram Bhat is helping to solve transfer pricing problems through cutting edge AI.

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Technology

    Explore more articles in the Technology category

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Compliance Has Become an Engineering Problem

    Why Compliance Has Become an Engineering Problem

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    How Nclude.ai   turned broken portals into completed applications

    How Nclude.ai turned broken portals into completed applications

    The Silent Shift: Rethinking Services for a Digital World?

    The Silent Shift: Rethinking Services for a Digital World?

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    View All Technology Posts
    Previous Technology PostALPHA INSIGHT – FLOW MONITORING THAT TAKES BANKS TO A NEW LEVEL OF EFFICIENCY
    Next Technology PostRAPID7 ACQUIRES LOGENTRIES; ADDS MACHINE DATA SEARCH TO ITS LEADING SECURITY DATA AND ANALYTICS PLATFORM