SlideShare a Scribd company logo
1 of 71
Merseyside
FD Network Event
Business Protection
- Opportunities
Agenda
Is there a
need?
What are the
risks?
Solutions
It won’t happen to me
3 minutes
Every three minutes
someone in the UK dies
from CVD.
28%
CVD causes 28% of all
deaths in the UK.
170,000(approx)
deaths each year caused by
CVD - an average of 460 people
each day.
Cardiovascular Disease (CVD)
Life changing events are taking place every three minutes in the UK
Source: British Heart Foundation, CVD statistics UK factsheet – April 2019
It won’t happen to me
3 minutes
Every three minutes
someone in the UK dies
from CVD.
28%
CVD causes 28% of all
deaths in the UK.
170,000(approx)
deaths each year caused by
CVD - an average of 460 people
each day.
Cancer
Life changing events are taking place every four minutes in the UK
4minutes
Every four minutes
someone in the UK dies
from cancer.1
1 in 2 people
born after 1960 in the UK
will develop cancer at
some point in their
lifetime.2
363,000(approx)
new cases of cancer in the
UK every year - that’s more
than 990 every day.3
1
Cancer Research UK, Cancer mortality for all cancers combined, May 2019
2
Cancer Research UK, Lifetime risk of cancer, September 2018
3
Cancer Research UK, Cancer incidence for all cancers combined, August 2019
Risk Assessment – potential impact
Text
Impact
Probability
HighLow
HighLow
• Flood
• Health and safety issue
• Bad advice
• Computer crash
• Fire
• Public liability
• Employer’s liability
• Compliance disaster
Risk Assessment – potential impact
Text
Impact
Probability
HighLow
HighLow
• Flood
• Health and safety issue
• Bad advice
• Computer crash
• Fire
• Public liability
• Employer’s liability
• Compliance disaster
• Key employee leaves
• Key employee dies
• Key employee illness
• Director/Owner dies
• Director/Owner illness
Business protection made easy
Why do businesses need our help?
Family Business
Cash needed for
employee’s family
when they die.
Cash needed for
employee if they’re
unable to work due
to an accident or
illness.
Cash needed for:
• Loan repayments
• Loss of profits
• Recruitment
• Loan accounts
Cash needed to buy
the deceased or ill
owner’s share of the
business.
Tax-efficient life
protection
Tax-efficient
income protection
Continuity
planning
Succession
planning
Family Business
Risk to Profits – the issues
How long would a business survive if it lost a key person?How long would a business survive if it lost a key person?
Risk to Profits – the issues
How long would a business survive if it lost a key person?
52%of
businesses would
stop trading in under
a year.
52%of
businesses would
stop trading in under
a year.
53%of businesses would stop
trading in under a year
Not as long as you may think!
Business protection made easy
Why do businesses need our help?
Family Business
Cash needed for
employee’s family
when they die.
Cash needed for
employee if they’re
unable to work due
to an accident or
illness.
Cash needed for:
• Loan repayments
• Loss of profits
• Recruitment
• Loan accounts
Cash needed to buy
the deceased or ill
owner’s share of the
business.
Tax-efficient life
protection
Tax-efficient
income protection
Continuity
planning
Succession
planning
Family Business
Motivation to act
- What’s your exit strategy for the business?
Motivation to act
- What’s your exit strategy for the business?
- What if you don’t get there?
- What’s your early exit strategy?
Motivation to act
Have you made a business will? I’m not sure I have, what is it?
Aspiration vs Reality
ABC Services Ltd has three
directors, each with an equal
share of the business.
A
33%
B C
33% 33%
Aspiration vs Reality
ABC Services Ltd has three
directors, each with an equal
share of the business.
A
33%
B C
33% 33%
Summary
Tax Efficient
Life Cover
Tax Efficient
Income
Protection
Lending
Director Loan
Accounts
Replacement
Cover
Loss of Profit
Shareholder
Protection
Peace of Mind
Personal
G
uarantee
Repayable
on
dem
and
Call to action
Any questions?
Thank you
Contact details
Nathan Douse FPFS
Chartered Financial Planner
Financial Planning Consultant
M: 07808 166 083
nathan.douse@mooreandsmalley.co.uk
Using Risk Management
Agenda
• What is Risk?
• What is Risk Management?
• Different types of Risk
• The Risk Management Cycle
• The Risk Register
• Identifying and evaluation a new risk
What is Risk?
• “The possibility of an event occurring that will have an impact
on the achievement of objectives.”
• Risk is measured in terms of likelihood and severity
What is Risk
Management?
• The process of identifying risks pertinent to your
business
• Analysis of the risk factor (likelihood x severity) -
grading
• Consideration of controls in place – do they work?
• Are there mitigating factors?
• Developing an action plan
Risk
Management
Cycle
Risk
Management
Identify
Assess and
Analyse
Mitigate
Re Evaluate
and Control
Inherent Risk Residual Risk
ID
Description of
Risk
Area
Risk
Owner
Likelihoo
d
Severity Impact Control
Financial
Impact
Likelihoo
d
Severity Impact Assurance
ABC1
Failure to comply
with GDPR results
in significant
financial penalties ,
loss of clients and
reputational
damage
Compliance
Head
Compliance 3 3 9
GDPR Plan at
Board level
Budget
allowance
increased
DPO Appointed
Employee
awareness
programme
4% of
worldwide
annual
turnover
2 2 4
Compliance
Monitoring
Plan
Monthly
reporting
Risk Register - Example
Control categories
Accounting
(records
accurate)
Administration
(achieve
objectives)
Prevent
(avoid errors
before occur)
Detect
(identify errors
that happen)
Recording
transactions;
responsibilities
for books and
assets
Reporting
responsibilities;
communication
channels
Check delivery
notes, invoices to
order; security
awareness
Stock controls;
bank
reconciliation;
intruder alarms;
anti-malware
Correct
(resolving the
consequences
of the error)
Back up
procedures,
data retrieval
and restoration
Control procedures
Physical
Authorisation
and approval
Segregation
of duties
Management
Building
access; swipe
cards;
passwords;
bolt-ins
Purchase order
limits; online
banking limits;
senior sign off
Cash handling
risky so
separate cash
receipts from
cash
reconciliations
Variance
analysis – actual
vs plan; staff
performance &
supervision
Arithmetic
and
accounting
Reconciliatio
ns; trial
balances;
control
accounts
HR
References;
qualifications
; criminal
records
Easy win checks
Physical
Authorisation
and approval
Segregation
of duties
Management
Early morning
late night walk
around; IT
password
policy -2FA?
Review bank £
limits, 2FA; look at
invoices>£ for
approval
Follow the cash
trail; stock count
by separate
team
Org plan with
responsibilities;
board meet
agenda
Arithmetic
and
accounting
Does
everything
balance;
postings up
to date;
check
journals
HR
New starter
file review
Mitigation Transfer
Avoid
LimitMitigation
Accept
High
spend,
lots of
change
High
spend,
lots of
change
Low
spend,
little
action
Low
spend,
little
action
Some
action
eg
backups
Some
action
eg
backups
Some
action eg
insurance,
outsourcing
Some
action eg
insurance,
outsourcing
Are there any questions?
Thank you for listening
Contact details
Karen Hain
Partner and Head of Professional Practices
T: 0151 318 9201 / 01772 821021
E: karen.hain@mooreandsmalley.co.uk
Managing Cyber Risk in a Fake World
Scott Burman, Executive Principal – Risk Management and Governance
February 2020
Intro Music by AIVA – The Artificial Intelligence composing emotional soundtrack music - https://www.aiva.ai/
Agenda
• What are DeepFakes?
• Threats (and opportunities) with DeepFake AI capabilities
• What should we be doing in organisational Cyber Security to mitigate the
threats?
The Inversion Point
• More than 50% YouTube traffic is “bots masquerading as people”
• The CEO of TwitterAudit says – “we’ve analyzed tens of millions of Twitter users over
the past six years. We’ve tuned our algorithm to recognize bot patterns distinguish
fake accounts from real accounts. Based on our data we would estimate that 40-
60% of Twitter accounts represent real people. About 50% are not real then”
• It is known from various studies that less than 60 per cent of web traffic on the
internet is human – the point of inversion has almost arrived here as well.
• Source: https://truepublica.org.uk/global/fake-world-the-era-of-inversion-arrives/
(Jan 2019)
What are Deepfakes?
“Deep” relates to the “deep learning”
technology used to produce the media.
Fake video and audio footage of
individuals, that are meant to make
them look like they have said and
done things which, in fact, they
haven’t.
When is a deepfake ok?
Fakes are old hat for cyber
• Business Email Compromise – fake invoices etc.
• Phishing – fake websites
But we have never solved the issue…
…and now its getting harder
Fake Text & Information
"This one works almost
good enough to use as
a general artificial
intelligence for text
generation - almost."
I'm terrified of GPT-2
because it represents
the kind of technology
that evil humans are
going to use to
manipulate the
population - and in my
opinion that makes it
more dangerous than
Personality portrait based on Matt, our Research Director’s tweets!
Fake Text & Information Threats to Cyber Security
• Disinformation affecting Threat Intelligence (TI) and actions – what’s real?
• Disinformation being misclassified as real, feeding AI-based systems
• Fake news used as a distraction or diversionary tactic during a cyber attack
• Malware learning context about a victim, and generating content to further an
attack (e.g. email inbox and email thread injection) – Emotet
• AI used to spear phish high profile individuals via deepfake text……
Fake Voice
https://faculty.ai/
Fake Voice Threats to Cyber Security
• Fraud - voice fraud jumped 350% from 2013 to 2017 – with one in 638 calls
synthetically created*
• Voice biometrics spoofing (e.g. to bypass physical or logical access controls)
*https://www.pindrop.com/2018-voice-intelligence-report/
Fake Voice Mitigations
• Business process improvements to mitigate fraud, e.g.
• Mandate face-to-face/physical presence for critical operations or high-end transactions
• Two-person rule for critical operations or high-end transactions
• Always verify using trusted information
Fake Faces & Video
REAL OR FAKE?
FAKE
REAL OR FAKE?
REAL
REAL OR FAKE?
REAL
REAL OR FAKE?
FAKE
REAL OR FAKE?
FAKE
Fake Image/Video Threats to Cyber Security
• Fraud – particularly with real-time capability –
e.g. plugin to video conferencing such as Slack,
Zoom, Teams, Skype, …
• Use in remote worker job interviews? Who are you
really hiring?
• Extortion and manipulation – e.g. use of victim’s
imagery in offensive or obscene settings that
look real and convincing
Emerging Technical Approaches to Combating
Fake Imagery
• https://faculty.ai/research/ - We are working with the Alliance of Democracies to
mitigate this risk through the creation of a classifier that determines if a video is
fake
• https://ambervideo.co/ - software embedded in smartphone cameras to act as a
watermark, to verify a video’s authenticity. The technology works by creating a
fingerprint at the moment of a film’s recording. It then compares any “playback”
of the footage with the original fingerprint to check for a match and provides the
viewer with a score that indicates the likelihood of tampering.
Fake Chat
Fake Chat Threats to Cyber Security
• Use in targeted social engineering (chat phishing – chishing?) – is more
interactive and life-like than a static email
• Use as a diversionary tactic when trying to exploit someone
• E.g. AI chat spun up with victim while real attacker is installing/backdooring their laptop
Threats with combined DeepFake approaches
• Social Engineering
• Adds (seemingly) more legitimacy to social engineering campaigns
• Adds interaction (through bots/chat), making phishing attempts seem less transactional and more
natural
• AI can learn from a target’s online presence to customise content
• AI and Natural Language Processing (NLP) for personality trait analysis
• Potential for full AI automation and execution of campaign
• Blackmail – threats to release fake content that appears real
• Potential biometric bypasses
• Fraud
• Impact on Threat Intelligence (TI) – what’s real vs. fake and impact on TI actions
• People with big online presence, e.g. public figures, celebrities, C-Suite are more at risk
Concluding Remarks
• DeepFakes and AI Fakery will have a growing impact on Cyber Security
• Indistinguishability of real vs. fake is a big problem
• Verification of data sources and their credibility is crucial
• Ethics, Legislation & Regulation
• This is happening which is great for curbing abuse by corporations; however
• attackers lack ethics and they break the law, so this is not a solution
• We may eventually need a complete redesign of how we create, use and share data
• Such as proposals from Solid, led by Prof. Tim Berners-Lee https://solid.mit.edu/
• Improved use and implementation of Root of Trust (RoT) intertwined with traceability of provenance
Some thoughts for the CFO/FD community
• Voice fraud, in particular, is Real and Present. Hollywood is here.
• Look at your current processes for high value financial transactions
• Revisit existing risks
• Mandate face-to-face/physical presence for critical operations or high-end transactions
• Two-person rule for critical operations or high-end transactions
• Always verify using trusted information – trust your intuition
• Put something in place – work closely with your information security teams (CISO/CIO)
• Don’t rule out perceived regression to counter the risks posed by the threat
• Manual v technical responses
• Improve organisational awareness and keep a focus on the evolving threat landscape
• Plan the response (and recovery)!
Questions?
Scott.Burman@nccgroup.com

More Related Content

Similar to Merseyside FD Network Event Presentations (06/02/2020)

Backup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and DirectorsBackup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and DirectorsLucy Denver
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Kevin Duffey
 
Digit Leaders 2023
Digit Leaders 2023 Digit Leaders 2023
Digit Leaders 2023 Ray Bugg
 
International Science Essay Competition For High School Students
International Science Essay Competition For High School StudentsInternational Science Essay Competition For High School Students
International Science Essay Competition For High School StudentsKristen Farnsworth
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataSteven Schwartz
 
BUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEES
BUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEESBUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEES
BUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEESHuman Capital Media
 
Independent-Fall-2015-Edition
Independent-Fall-2015-EditionIndependent-Fall-2015-Edition
Independent-Fall-2015-EditionTodd C. Schultze
 
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information RiskMeasuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information RiskTony Martin-Vegue
 
BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016Whitbags
 
Cyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and SuppliersCyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and SuppliersKevin Duffey
 
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
Global CISO Forum 2017: How To Measure Anything In Cybersecurity RiskGlobal CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
Global CISO Forum 2017: How To Measure Anything In Cybersecurity RiskEC-Council
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Jay Kesan
 
Employees And Fraud Risks - UiTM Masters in Accounting Special Lecture
Employees And Fraud Risks - UiTM Masters in Accounting Special LectureEmployees And Fraud Risks - UiTM Masters in Accounting Special Lecture
Employees And Fraud Risks - UiTM Masters in Accounting Special LectureKenny Ong
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Christmas Writing Paper Have Fun Teaching
Christmas Writing Paper  Have Fun TeachingChristmas Writing Paper  Have Fun Teaching
Christmas Writing Paper Have Fun TeachingKatie Booth
 
Crisis Management Training Strategies by RIMS
Crisis Management Training Strategies by RIMSCrisis Management Training Strategies by RIMS
Crisis Management Training Strategies by RIMSAtlantic Training, LLC.
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Career Goals 250 Word Essay Scholarships
Career Goals 250 Word Essay ScholarshipsCareer Goals 250 Word Essay Scholarships
Career Goals 250 Word Essay ScholarshipsJamie Boyd
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteDave Steer
 

Similar to Merseyside FD Network Event Presentations (06/02/2020) (20)

Backup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and DirectorsBackup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and Directors
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
 
Digit Leaders 2023
Digit Leaders 2023 Digit Leaders 2023
Digit Leaders 2023
 
International Science Essay Competition For High School Students
International Science Essay Competition For High School StudentsInternational Science Essay Competition For High School Students
International Science Essay Competition For High School Students
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
BUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEES
BUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEESBUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEES
BUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEES
 
Independent-Fall-2015-Edition
Independent-Fall-2015-EditionIndependent-Fall-2015-Edition
Independent-Fall-2015-Edition
 
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information RiskMeasuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
 
BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016
 
Cyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and SuppliersCyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and Suppliers
 
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
Global CISO Forum 2017: How To Measure Anything In Cybersecurity RiskGlobal CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Employees And Fraud Risks - UiTM Masters in Accounting Special Lecture
Employees And Fraud Risks - UiTM Masters in Accounting Special LectureEmployees And Fraud Risks - UiTM Masters in Accounting Special Lecture
Employees And Fraud Risks - UiTM Masters in Accounting Special Lecture
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Christmas Writing Paper Have Fun Teaching
Christmas Writing Paper  Have Fun TeachingChristmas Writing Paper  Have Fun Teaching
Christmas Writing Paper Have Fun Teaching
 
Crisis Management Training Strategies by RIMS
Crisis Management Training Strategies by RIMSCrisis Management Training Strategies by RIMS
Crisis Management Training Strategies by RIMS
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Career Goals 250 Word Essay Scholarships
Career Goals 250 Word Essay ScholarshipsCareer Goals 250 Word Essay Scholarships
Career Goals 250 Word Essay Scholarships
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to Waste
 

Recently uploaded

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 

Recently uploaded (20)

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 

Merseyside FD Network Event Presentations (06/02/2020)

  • 3. Agenda Is there a need? What are the risks? Solutions
  • 4. It won’t happen to me 3 minutes Every three minutes someone in the UK dies from CVD. 28% CVD causes 28% of all deaths in the UK. 170,000(approx) deaths each year caused by CVD - an average of 460 people each day. Cardiovascular Disease (CVD) Life changing events are taking place every three minutes in the UK Source: British Heart Foundation, CVD statistics UK factsheet – April 2019
  • 5. It won’t happen to me 3 minutes Every three minutes someone in the UK dies from CVD. 28% CVD causes 28% of all deaths in the UK. 170,000(approx) deaths each year caused by CVD - an average of 460 people each day. Cancer Life changing events are taking place every four minutes in the UK 4minutes Every four minutes someone in the UK dies from cancer.1 1 in 2 people born after 1960 in the UK will develop cancer at some point in their lifetime.2 363,000(approx) new cases of cancer in the UK every year - that’s more than 990 every day.3 1 Cancer Research UK, Cancer mortality for all cancers combined, May 2019 2 Cancer Research UK, Lifetime risk of cancer, September 2018 3 Cancer Research UK, Cancer incidence for all cancers combined, August 2019
  • 6. Risk Assessment – potential impact Text Impact Probability HighLow HighLow • Flood • Health and safety issue • Bad advice • Computer crash • Fire • Public liability • Employer’s liability • Compliance disaster
  • 7. Risk Assessment – potential impact Text Impact Probability HighLow HighLow • Flood • Health and safety issue • Bad advice • Computer crash • Fire • Public liability • Employer’s liability • Compliance disaster • Key employee leaves • Key employee dies • Key employee illness • Director/Owner dies • Director/Owner illness
  • 8. Business protection made easy Why do businesses need our help? Family Business Cash needed for employee’s family when they die. Cash needed for employee if they’re unable to work due to an accident or illness. Cash needed for: • Loan repayments • Loss of profits • Recruitment • Loan accounts Cash needed to buy the deceased or ill owner’s share of the business. Tax-efficient life protection Tax-efficient income protection Continuity planning Succession planning Family Business
  • 9. Risk to Profits – the issues How long would a business survive if it lost a key person?How long would a business survive if it lost a key person?
  • 10. Risk to Profits – the issues How long would a business survive if it lost a key person? 52%of businesses would stop trading in under a year. 52%of businesses would stop trading in under a year. 53%of businesses would stop trading in under a year Not as long as you may think!
  • 11. Business protection made easy Why do businesses need our help? Family Business Cash needed for employee’s family when they die. Cash needed for employee if they’re unable to work due to an accident or illness. Cash needed for: • Loan repayments • Loss of profits • Recruitment • Loan accounts Cash needed to buy the deceased or ill owner’s share of the business. Tax-efficient life protection Tax-efficient income protection Continuity planning Succession planning Family Business
  • 12. Motivation to act - What’s your exit strategy for the business?
  • 13. Motivation to act - What’s your exit strategy for the business? - What if you don’t get there? - What’s your early exit strategy?
  • 14. Motivation to act Have you made a business will? I’m not sure I have, what is it?
  • 15. Aspiration vs Reality ABC Services Ltd has three directors, each with an equal share of the business. A 33% B C 33% 33%
  • 16. Aspiration vs Reality ABC Services Ltd has three directors, each with an equal share of the business. A 33% B C 33% 33%
  • 17. Summary Tax Efficient Life Cover Tax Efficient Income Protection Lending Director Loan Accounts Replacement Cover Loss of Profit Shareholder Protection Peace of Mind Personal G uarantee Repayable on dem and
  • 20. Contact details Nathan Douse FPFS Chartered Financial Planner Financial Planning Consultant M: 07808 166 083 nathan.douse@mooreandsmalley.co.uk
  • 22. Agenda • What is Risk? • What is Risk Management? • Different types of Risk • The Risk Management Cycle • The Risk Register • Identifying and evaluation a new risk
  • 23. What is Risk? • “The possibility of an event occurring that will have an impact on the achievement of objectives.” • Risk is measured in terms of likelihood and severity
  • 24. What is Risk Management? • The process of identifying risks pertinent to your business • Analysis of the risk factor (likelihood x severity) - grading • Consideration of controls in place – do they work? • Are there mitigating factors? • Developing an action plan
  • 26. Inherent Risk Residual Risk ID Description of Risk Area Risk Owner Likelihoo d Severity Impact Control Financial Impact Likelihoo d Severity Impact Assurance ABC1 Failure to comply with GDPR results in significant financial penalties , loss of clients and reputational damage Compliance Head Compliance 3 3 9 GDPR Plan at Board level Budget allowance increased DPO Appointed Employee awareness programme 4% of worldwide annual turnover 2 2 4 Compliance Monitoring Plan Monthly reporting Risk Register - Example
  • 27. Control categories Accounting (records accurate) Administration (achieve objectives) Prevent (avoid errors before occur) Detect (identify errors that happen) Recording transactions; responsibilities for books and assets Reporting responsibilities; communication channels Check delivery notes, invoices to order; security awareness Stock controls; bank reconciliation; intruder alarms; anti-malware Correct (resolving the consequences of the error) Back up procedures, data retrieval and restoration
  • 28. Control procedures Physical Authorisation and approval Segregation of duties Management Building access; swipe cards; passwords; bolt-ins Purchase order limits; online banking limits; senior sign off Cash handling risky so separate cash receipts from cash reconciliations Variance analysis – actual vs plan; staff performance & supervision Arithmetic and accounting Reconciliatio ns; trial balances; control accounts HR References; qualifications ; criminal records
  • 29. Easy win checks Physical Authorisation and approval Segregation of duties Management Early morning late night walk around; IT password policy -2FA? Review bank £ limits, 2FA; look at invoices>£ for approval Follow the cash trail; stock count by separate team Org plan with responsibilities; board meet agenda Arithmetic and accounting Does everything balance; postings up to date; check journals HR New starter file review
  • 30. Mitigation Transfer Avoid LimitMitigation Accept High spend, lots of change High spend, lots of change Low spend, little action Low spend, little action Some action eg backups Some action eg backups Some action eg insurance, outsourcing Some action eg insurance, outsourcing
  • 31. Are there any questions? Thank you for listening
  • 32. Contact details Karen Hain Partner and Head of Professional Practices T: 0151 318 9201 / 01772 821021 E: karen.hain@mooreandsmalley.co.uk
  • 33. Managing Cyber Risk in a Fake World Scott Burman, Executive Principal – Risk Management and Governance February 2020 Intro Music by AIVA – The Artificial Intelligence composing emotional soundtrack music - https://www.aiva.ai/
  • 34. Agenda • What are DeepFakes? • Threats (and opportunities) with DeepFake AI capabilities • What should we be doing in organisational Cyber Security to mitigate the threats?
  • 35. The Inversion Point • More than 50% YouTube traffic is “bots masquerading as people” • The CEO of TwitterAudit says – “we’ve analyzed tens of millions of Twitter users over the past six years. We’ve tuned our algorithm to recognize bot patterns distinguish fake accounts from real accounts. Based on our data we would estimate that 40- 60% of Twitter accounts represent real people. About 50% are not real then” • It is known from various studies that less than 60 per cent of web traffic on the internet is human – the point of inversion has almost arrived here as well. • Source: https://truepublica.org.uk/global/fake-world-the-era-of-inversion-arrives/ (Jan 2019)
  • 36. What are Deepfakes? “Deep” relates to the “deep learning” technology used to produce the media. Fake video and audio footage of individuals, that are meant to make them look like they have said and done things which, in fact, they haven’t.
  • 37. When is a deepfake ok?
  • 38. Fakes are old hat for cyber • Business Email Compromise – fake invoices etc. • Phishing – fake websites But we have never solved the issue… …and now its getting harder
  • 39. Fake Text & Information
  • 40. "This one works almost good enough to use as a general artificial intelligence for text generation - almost." I'm terrified of GPT-2 because it represents the kind of technology that evil humans are going to use to manipulate the population - and in my opinion that makes it more dangerous than
  • 41. Personality portrait based on Matt, our Research Director’s tweets!
  • 42. Fake Text & Information Threats to Cyber Security • Disinformation affecting Threat Intelligence (TI) and actions – what’s real? • Disinformation being misclassified as real, feeding AI-based systems • Fake news used as a distraction or diversionary tactic during a cyber attack • Malware learning context about a victim, and generating content to further an attack (e.g. email inbox and email thread injection) – Emotet • AI used to spear phish high profile individuals via deepfake text……
  • 44.
  • 45.
  • 47. Fake Voice Threats to Cyber Security • Fraud - voice fraud jumped 350% from 2013 to 2017 – with one in 638 calls synthetically created* • Voice biometrics spoofing (e.g. to bypass physical or logical access controls) *https://www.pindrop.com/2018-voice-intelligence-report/
  • 48. Fake Voice Mitigations • Business process improvements to mitigate fraud, e.g. • Mandate face-to-face/physical presence for critical operations or high-end transactions • Two-person rule for critical operations or high-end transactions • Always verify using trusted information
  • 49. Fake Faces & Video
  • 50.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. Fake Image/Video Threats to Cyber Security • Fraud – particularly with real-time capability – e.g. plugin to video conferencing such as Slack, Zoom, Teams, Skype, … • Use in remote worker job interviews? Who are you really hiring? • Extortion and manipulation – e.g. use of victim’s imagery in offensive or obscene settings that look real and convincing
  • 63. Emerging Technical Approaches to Combating Fake Imagery • https://faculty.ai/research/ - We are working with the Alliance of Democracies to mitigate this risk through the creation of a classifier that determines if a video is fake • https://ambervideo.co/ - software embedded in smartphone cameras to act as a watermark, to verify a video’s authenticity. The technology works by creating a fingerprint at the moment of a film’s recording. It then compares any “playback” of the footage with the original fingerprint to check for a match and provides the viewer with a score that indicates the likelihood of tampering.
  • 65.
  • 66.
  • 67. Fake Chat Threats to Cyber Security • Use in targeted social engineering (chat phishing – chishing?) – is more interactive and life-like than a static email • Use as a diversionary tactic when trying to exploit someone • E.g. AI chat spun up with victim while real attacker is installing/backdooring their laptop
  • 68. Threats with combined DeepFake approaches • Social Engineering • Adds (seemingly) more legitimacy to social engineering campaigns • Adds interaction (through bots/chat), making phishing attempts seem less transactional and more natural • AI can learn from a target’s online presence to customise content • AI and Natural Language Processing (NLP) for personality trait analysis • Potential for full AI automation and execution of campaign • Blackmail – threats to release fake content that appears real • Potential biometric bypasses • Fraud • Impact on Threat Intelligence (TI) – what’s real vs. fake and impact on TI actions • People with big online presence, e.g. public figures, celebrities, C-Suite are more at risk
  • 69. Concluding Remarks • DeepFakes and AI Fakery will have a growing impact on Cyber Security • Indistinguishability of real vs. fake is a big problem • Verification of data sources and their credibility is crucial • Ethics, Legislation & Regulation • This is happening which is great for curbing abuse by corporations; however • attackers lack ethics and they break the law, so this is not a solution • We may eventually need a complete redesign of how we create, use and share data • Such as proposals from Solid, led by Prof. Tim Berners-Lee https://solid.mit.edu/ • Improved use and implementation of Root of Trust (RoT) intertwined with traceability of provenance
  • 70. Some thoughts for the CFO/FD community • Voice fraud, in particular, is Real and Present. Hollywood is here. • Look at your current processes for high value financial transactions • Revisit existing risks • Mandate face-to-face/physical presence for critical operations or high-end transactions • Two-person rule for critical operations or high-end transactions • Always verify using trusted information – trust your intuition • Put something in place – work closely with your information security teams (CISO/CIO) • Don’t rule out perceived regression to counter the risks posed by the threat • Manual v technical responses • Improve organisational awareness and keep a focus on the evolving threat landscape • Plan the response (and recovery)!