{"id":9466,"date":"2020-03-31T06:23:18","date_gmt":"2020-03-31T06:23:18","guid":{"rendered":"https:\/\/ca.syspro.com\/blog\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/"},"modified":"2021-03-04T14:50:54","modified_gmt":"2021-03-04T14:50:54","slug":"cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk","status":"publish","type":"post","link":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/","title":{"rendered":"CFO 4.0 \u2013 Manufacturing &#038; Cybercrime \u2013 Assessing your Financial Risk"},"content":{"rendered":"<p>Sometimes it takes an unfortunate occurrence, initiated by malicious actors, to drive home the realization that we operate our businesses under the predatory gaze of thieves. For me, despite years of experience in risk identification, mitigation, and transference, <strong>that defining event came several weeks ago,<\/strong> when I found an email in my in-box from one of our senior execs:<\/p>\n<p><!--more--><\/p>\n<p><strong><em>Sanjay, please wire $xxx,xxx.00 to ABC Consulting\u00a0<u>today<\/u>. Invoice attached.\u00a0<\/em><\/strong><br \/>\n<strong><em>Thanks, Maddie.<\/em><\/strong><\/p>\n<p>On the face of it, the request appeared legitimate. Maddie is well known to me, as is the consulting firm in question, and neither the nature nor the amount of the request was extraordinary. When I looked at the invoice, however, I knew immediately that something was wrong.<\/p>\n<p>The first thing I did was contact Maddie, in the old-fashioned, inefficient, 20th-century manner, by knocking on her office door. Had she sent me this email? Maddie shook her head emphatically and my suspicions were confirmed. Her account had been hacked.<\/p>\n<p>A few minutes later our head of IT had locked down Maddie&#8217;s email. That thwarted any future mischief, and gave us time to question and dig:<\/p>\n<p><em>Had other malicious emails been sent from Maddie&#8217;s address<\/em>? No \u2013 thankfully, we&#8217;d caught the intrusion in time.<\/p>\n<p><em>Had anyone else&#8217;s email been compromised?<\/em>\u00a0Again, the answer was negative.<\/p>\n<p>That was a relief, but there was no time to rest on our laurels. The incident response team was gathered, the Board notified, and our investigation began.<\/p>\n<p>In the pre-IT world, manufacturers maintained an &#8216;air-gap&#8217; between themselves and the outside world. Today, however, we have come to rely <a href=\"\/product\/business-digitization\/\"><strong>on IP-connected, enterprise-wide business systems<\/strong><\/a> to build and maintain competitive efficiencies. Given the pace of competition, and the realities of consumer-driven markets, manufacturers are rapidly pushing to implement systems, connect product lifecycles, incorporate mobile devices and build a digitally connected shop floor using, for example, <a href=\"\/product\/business-digitization\/internet-of-things\/\"><strong>the Internet of Things (IoT).<\/strong><\/a> With all of that burgeoning complexity, it&#8217;s no real surprise that manufacturers are attractive targets for cybercrime. The situation is made worse by the fact that cybercrime is generally low-risk but can deliver enormous payoffs in cash, IP, and other types of personal and company data.<\/p>\n<h2><strong>How to manage the financial risks of\u00a0<\/strong><strong>cybercrime<\/strong><\/h2>\n<p><a href=\"\/business-software\/business-functions\/cfo-solutions\/\"><strong>As a CFO in 2020,<\/strong> <\/a>I have a roster of duties and a breadth of mandate that might baffle my counterparts from a previous century. My job, beyond the mere crunching of numbers, is to drive innovation and complex analytics throughout the organization. And since innovation is intimately bound to technology, I am also responsible for identifying, mitigating, and transferring the risks of the IT systems we install.<\/p>\n<p>Despite my intimate involvement with technology, it is not my job to mimic the skill sets of the CTO. As one would expect, it&#8217;s my job to approach the issue of cybercrime from a financial perspective. To that end, I create strategies that help me to identify, analyze and transfer the net financial risk<sup>1<\/sup>\u00a0of cybersecurity, and to calculate the ROI on our cybersecurity investments. From a manufacturing point\u00a0of view, this means establishing a strategic approach to managing the financial risks of\u00a0cybercrime, and\u00a0embedding those risks into our existing risk-management framework.<\/p>\n<p>To do that takes an integrative and wholistic approach. Firewalls and anti-virus programs are important, but cybercriminals are highly motivated and technically adept. They, like us, are constantly seeking a competitive edge. To rely on technology alone for your company&#8217;s wellbeing is to vastly underestimate your attackers. Thus, the &#8216;solution&#8217; to cybersecurity is only partially technical. There are risks and appropriate responses in every department of a manufacturing concern, and to be robust, a strategic approach must involve data and observations from a wide variety of disciplines.<\/p>\n<h2><strong>Using ERP as a tool to manage cybercrime<\/strong><\/h2>\n<p>As a CFO, I rely on data as my primary weapon in the war against cybercrime. To that end, I gather data points from our ERP, and qualitative information from major stakeholders across the enterprise, including major stakeholders from IT, operations, regulatory, human resources, communications, supply chain, customer service and legal. It is possible, even probable, that every department has its own perspective and needs, and can shed valuable light on its particular concerns and vulnerabilities.<\/p>\n<p>Although an improperly secured ERP can itself present vulnerabilities, it is without a doubt the most important tool at a CFO&#8217;s disposal. It provides a wholistic and granular view of the entire organization and allows me to gather data on a wide variety of potential vulnerabilities. It also performs a long list of essential cybersecurity functions, such as back-ups and user access control. SYSPRO, for example, provides role-based security, thus minimizing the potential for insider mischief.<\/p>\n<h2><strong>Cybercrime caveats to bear in mind<\/strong><\/h2>\n<p>There are three caveats, however, that I beg you to keep in mind.<\/p>\n<ol>\n<li><strong>UPDATES!<\/strong><\/li>\n<li><strong>EMPLOYEE TRAINING<\/strong> \u2013 I hope this is a given. Not only is regular user training important for cybersecurity, it will also protect your ERP&#8217;s ROI, by helping to prevent the crippling effects of application erosion.<\/li>\n<li><strong>UPDATES<\/strong> \u2013 I realize that I listed &#8216;updates&#8217; twice, but updates are so important, and so often neglected, that I believe the repetition is warranted.<\/li>\n<\/ol>\n<p>Only by collating and analyzing the full spectrum of data, with the help of both <strong><a href=\"\/product\/erp-system\/\">ERP<\/a> <\/strong>and a full spectrum of major stakeholders, can a CFO begin to assess a company&#8217;s net financial risk. And without that initial calculation, or without sufficient confidence in that calculation, the mitigation and transference of cyber risk are likely to be insufficient or misdirected.<\/p>\n<h2><strong>Key cybercrime statistics<\/strong><\/h2>\n<ul>\n<li>Worldwide spending on cybersecurity is forecasted to reach $133.7 billion in 2022. (<a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019#_blank\">Gartner<\/a>)<\/li>\n<li>62% of businesses experienced phishing and social engineering attacks in 2018. (<u>Cybint\u00a0Solutions<\/u>)<\/li>\n<li>68% of business leaders feel their cybersecurity risks are increasing. (<a href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-96\/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf#_blank\">Accenture<\/a>)<\/li>\n<li>Only 5% of companies\u2019 folders are properly protected, on average. (<a href=\"https:\/\/www.varonis.com\/2019-data-risk-report\/#_blank\">Varonis<\/a>)<\/li>\n<li>Data breaches exposed 4.1 billion records in the first half of 2019. (<u>RiskBased<\/u>)<\/li>\n<li>71% of breaches were financially motivated and 25% were motivated by espionage.\u202f (<a href=\"https:\/\/enterprise.verizon.com\/en-gb\/resources\/reports\/dbir\/#_blank\">Verizon<\/a>)<\/li>\n<li>52% of breaches featured hacking, 28% involved malware and 32\u201333% included phishing or social engineering, respectively. (<a href=\"https:\/\/enterprise.verizon.com\/en-gb\/resources\/reports\/dbir\/#_blank\">Verizon<\/a>)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>Sometimes it takes an unfortunate occurrence, initiated by malicious actors, to drive home the realization that we operate our businesses under the predatory gaze of thieves. For me, despite years of experience in risk identification, mitigation, and transference, that defining event came several weeks ago, when I found an email in my in-box from one &#8230; <a title=\"CFO 4.0 \u2013 Manufacturing &#038; Cybercrime \u2013 Assessing your Financial Risk\" class=\"read-more\" href=\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/\" aria-label=\"Read more about CFO 4.0 \u2013 Manufacturing &#038; Cybercrime \u2013 Assessing your Financial Risk\">Read more<\/a><\/p>\n","protected":false},"author":212,"featured_media":9467,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[126],"tags":[45,280,281],"class_list":["post-9466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-erp-and-technology","tag-business-software","tag-erp-and-data","tag-erp-and-digitization"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CFO 4.0 in Manufacturing | Cybercrime | Assessing Your Financial Risks<\/title>\n<meta name=\"description\" content=\"CFOs within Manufacturing and Distribution sectors need to be Aware of the Financial Risks of Cybercrime and How ERP can Assist in Gathering Data Points.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CFO 4.0 in Manufacturing | Cybercrime | Assessing Your Financial Risks\" \/>\n<meta property=\"og:description\" content=\"CFOs within Manufacturing and Distribution sectors need to be Aware of the Financial Risks of Cybercrime and How ERP can Assist in Gathering Data Points.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSPRO Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-31T06:23:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-04T14:50:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/CFO_and_Cyberisk_in_Business.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Franklin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Franklin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/\"},\"author\":{\"name\":\"Roger Franklin\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a9434511438ed1f62f4307ddcc7a23fd\"},\"headline\":\"CFO 4.0 \u2013 Manufacturing &#038; Cybercrime \u2013 Assessing your Financial Risk\",\"datePublished\":\"2020-03-31T06:23:18+00:00\",\"dateModified\":\"2021-03-04T14:50:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/\"},\"wordCount\":1010,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/CFO_and_Cyberisk_in_Business.jpg\",\"keywords\":[\"Business software\",\"ERP and Data\",\"ERP and Digitization\"],\"articleSection\":[\"ERP and Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/\",\"name\":\"CFO 4.0 in Manufacturing | Cybercrime | Assessing Your Financial Risks\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/CFO_and_Cyberisk_in_Business.jpg\",\"datePublished\":\"2020-03-31T06:23:18+00:00\",\"dateModified\":\"2021-03-04T14:50:54+00:00\",\"description\":\"CFOs within Manufacturing and Distribution sectors need to be Aware of the Financial Risks of Cybercrime and How ERP can Assist in Gathering Data Points.\",\"breadcrumb\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#primaryimage\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/CFO_and_Cyberisk_in_Business.jpg\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/CFO_and_Cyberisk_in_Business.jpg\",\"width\":900,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ca.syspro.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CFO 4.0 \u2013 Manufacturing &#038; Cybercrime \u2013 Assessing your Financial Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"name\":\"SYSPRO Blog\",\"description\":\"Insights on Business Management Software and ERP\",\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\",\"name\":\"SYSPRO\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"width\":260,\"height\":94,\"caption\":\"SYSPRO\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a9434511438ed1f62f4307ddcc7a23fd\",\"name\":\"Roger Franklin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/06\/Roger_Franklin_blog-150x150.png\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/06\/Roger_Franklin_blog-150x150.png\",\"caption\":\"Roger Franklin\"},\"description\":\"As the Senior Solutions Architect at SYSPRO Australasia, Roger is responsible for providing expertise in selling, shaping, defining, implementing and quality assuring SYSPRO ERP solutions in the region. As a solution driven leader, he identifies gaps that exist in systems to ensure our solutions meet industry needs. Roger has a wealth of experience in delivering quality and innovative solutions that add tangible business value to manufacturers and distributors as they digitally transform.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/roger-franklin-australia\"],\"url\":\"https:\/\/ca.syspro.com\/blog\/author\/roger-franklin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CFO 4.0 in Manufacturing | Cybercrime | Assessing Your Financial Risks","description":"CFOs within Manufacturing and Distribution sectors need to be Aware of the Financial Risks of Cybercrime and How ERP can Assist in Gathering Data Points.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/","og_locale":"en_US","og_type":"article","og_title":"CFO 4.0 in Manufacturing | Cybercrime | Assessing Your Financial Risks","og_description":"CFOs within Manufacturing and Distribution sectors need to be Aware of the Financial Risks of Cybercrime and How ERP can Assist in Gathering Data Points.","og_url":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/","og_site_name":"SYSPRO Blog","article_published_time":"2020-03-31T06:23:18+00:00","article_modified_time":"2021-03-04T14:50:54+00:00","og_image":[{"width":900,"height":410,"url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/CFO_and_Cyberisk_in_Business.jpg","type":"image\/jpeg"}],"author":"Roger Franklin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Franklin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#article","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/"},"author":{"name":"Roger Franklin","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a9434511438ed1f62f4307ddcc7a23fd"},"headline":"CFO 4.0 \u2013 Manufacturing &#038; Cybercrime \u2013 Assessing your Financial Risk","datePublished":"2020-03-31T06:23:18+00:00","dateModified":"2021-03-04T14:50:54+00:00","mainEntityOfPage":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/"},"wordCount":1010,"commentCount":0,"publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/CFO_and_Cyberisk_in_Business.jpg","keywords":["Business software","ERP and Data","ERP and Digitization"],"articleSection":["ERP and Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/","url":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/","name":"CFO 4.0 in Manufacturing | Cybercrime | Assessing Your Financial Risks","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#primaryimage"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/CFO_and_Cyberisk_in_Business.jpg","datePublished":"2020-03-31T06:23:18+00:00","dateModified":"2021-03-04T14:50:54+00:00","description":"CFOs within Manufacturing and Distribution sectors need to be Aware of the Financial Risks of Cybercrime and How ERP can Assist in Gathering Data Points.","breadcrumb":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#primaryimage","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/CFO_and_Cyberisk_in_Business.jpg","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/CFO_and_Cyberisk_in_Business.jpg","width":900,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/ca.syspro.com\/blog\/erp-and-technology\/cfo-4-0-manufacturing-cybercrime-assessing-your-financial-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ca.syspro.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CFO 4.0 \u2013 Manufacturing &#038; Cybercrime \u2013 Assessing your Financial Risk"}]},{"@type":"WebSite","@id":"https:\/\/ca.syspro.com\/blog\/#website","url":"https:\/\/ca.syspro.com\/blog\/","name":"SYSPRO Blog","description":"Insights on Business Management Software and ERP","publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ca.syspro.com\/blog\/#organization","name":"SYSPRO","url":"https:\/\/ca.syspro.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","width":260,"height":94,"caption":"SYSPRO"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a9434511438ed1f62f4307ddcc7a23fd","name":"Roger Franklin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/06\/Roger_Franklin_blog-150x150.png","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/06\/Roger_Franklin_blog-150x150.png","caption":"Roger Franklin"},"description":"As the Senior Solutions Architect at SYSPRO Australasia, Roger is responsible for providing expertise in selling, shaping, defining, implementing and quality assuring SYSPRO ERP solutions in the region. As a solution driven leader, he identifies gaps that exist in systems to ensure our solutions meet industry needs. Roger has a wealth of experience in delivering quality and innovative solutions that add tangible business value to manufacturers and distributors as they digitally transform.","sameAs":["https:\/\/www.linkedin.com\/in\/roger-franklin-australia"],"url":"https:\/\/ca.syspro.com\/blog\/author\/roger-franklin\/"}]}},"metadata":{"_yoast_wpseo_focuskw":["cfo and cybercrime"],"_yoast_wpseo_focuskw_text_input":[""],"_yoast_wpseo_title":["CFO 4.0 in Manufacturing | Cybercrime | Assessing Your Financial Risks"],"_yoast_wpseo_metadesc":["CFOs within Manufacturing and Distribution sectors need to be Aware of the Financial Risks of Cybercrime and How ERP can Assist in Gathering Data Points."],"_yoast_wpseo_content_score":["30"],"_yoast_wpseo_primary_category":["44"],"_yoast_wpseo_linkdex":["63"],"_yoast_wpseo_metakeywords":[""],"_yoast_wpseo_is_cornerstone":[""],"_wp_page_template":["default"],"_thumbnail_id":["9467"],"_elementor_page_assets":["a:0:{}"]},"_links":{"self":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/users\/212"}],"replies":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/comments?post=9466"}],"version-history":[{"count":0,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9466\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media\/9467"}],"wp:attachment":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media?parent=9466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/categories?post=9466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/tags?post=9466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}