Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagement

How security professionals can approach risks to the financial team

By Barbara Cousins
fraud, cyber risk and other risks to your finance team
August 19, 2021

While the acceleration of digital adoption across global organizations has greatly improved operational efficiency, one of the unintended consequences has been the vulnerability to cyber risks. CISOs and CSOs are no longer the only organizational roles worrying about hacks, breaches and other cyber concerns - now, we are seeing these worries trickle down to other disciplines.

Finance teams in particular are increasingly worried about cyber issues, given the significant responsibility they have to secure and protect funds both inside and outside of their organizations. In a recent independent survey commissioned by Flywire of 300 CFOs, VPs of Finance, Controllers and other executive-level finance professionals, respondents indicated they were just as worried about cybersecurity issues as they were with accounting issues. In the survey, 90% of respondents cited fraud, 88% cited concerns about being hacked, and 85% mentioned money laundering as their biggest cybersecurity concerns.

There is more data supporting those trends. In a January 2021 research report published by PYMNTS.com, U.S. tech companies doing business internationally reported challenges with payment fraud and the ability to manage inbound international payments. Other industries report similar challenges.

As a security expert who has worked in financial services for most of my career, and closely with finance teams, I have had the opportunity to help address some of the unique security risks that emerge with teams who are responsible for accounting, payments, audit, and everything in between.

Below you will find some of the key lessons I have learned throughout my career, which can prove helpful as you bolster the security throughout your finance teams:

Assess the risk: How can someone steal money from us?

This is the first question I always ask the finance team. What are all the possibilities? This is not the only security concern facing the finance organization, but it should be your starting point in any security conversation. From there, each organization’s needs will be a little different, and require different tactics, but there are four best practices we can all consider with our finance teams.

  1. Segregate duties for money in and out

Any process that involves money coming in or going out of the organization should always have multiple people involved. This acts as a check and balance for any bad actors inside the organization. Steps should also be taken to provide oversight for two or more people that could scheme together. Of course, this all needs to be done without slowing the business down. The more this can be automated to flag irregular activity and create more real-time visibility, the better your chances of preventing problems.  

  1. Ensure compliance for managing client funds and data

Different industries have different compliance requirements for managing client funds and data. These are just a few:

  • Know Your Customer (KYC) – laws to prevent money laundering. This is a common challenge with international payments. The compliance team likely oversees this but there are software tools you can apply in your finance system to flag suspicious payments. Any payment vendor you use should also have this capability.

Utilize External Auditors to test controls:

  • Service Organization Control (SOC) 1 - Assess a company's internal control over financial reporting. By its very definition, as mandated by SSAE 18, SOC 1 is the audit of a company's accounting and financial controls. It is the metric of how well a company manages their books of accounts.
  • Service Organization Control (SOC) II Type 2 - A review of an organization’s internal controls to ensure data remains secure and confidential. An external auditor also evaluates the cyber security program to confirm the program has implemented both preventive and detective controls to avoid unauthorized access and disclosure of information. This review is great to assess your internal controls, but is equally important to determine who has a SOC II (your provider or their vendors) and what is covered in their SOC audit (security, availability, confidentiality, processing integrity, and privacy).
  • The Payment Card Industry Data Security Standard (PCI DSS) – A set of requirements intended to ensure that all companies that process, store, or transmit credit card information maintain a secure environment. This ensures a vendor’s systems are secure and helps prevent payment card fraud. There are four levels of PCI compliance depending on the number of transactions processed annually, and the scope of the audit varies by level - the lower the level, the more detailed the evaluation. Level 1 compliance is the highest standard, and with this in place, you can be sure your customers’ sensitive payment card information is safeguarded.
  • Privacy Standards - From General Data Protection Regulation (GDPR) to Personal Information Protection & Electronic Data Act (PIPEDA), data privacy regulations can be complex, and they vary worldwide. Check to see if your payment providers have a Privacy Officer dedicated to maintaining privacy standards and find out how they stay on top of these regulations. Failure to comply may put you and your customers at risk and can prove very costly, especially if you are doing business internationally.
  1. Eliminate indirect refunds

A lot of financial fraud can be prevented by adherence to the standards outlined above, but one problem area is the issue of refunds. Bad actors that get access to someone’s payment information often make large purchases and then request refunds to a different account. Refunds should always be made directly to the account from which the payment was made. International payments can sometimes make that difficult because they often involve intermediary banks. Be sure to work with a payment provider that can take responsibility for delivering refunds back to the original payment account. It can be a very difficult and manual process for finance teams to do on their own.

  1. Consider Insurance

The cost of a data breach, non-compliance or fraud today can be staggering – both in real dollars and in damage to a company’s brand reputation. Whether it’s a denial of service, data leakage or unauthorized access to customer information, the risks are very high. Cybersecurity insurance can provide protection just in case. And the cost will be based on the strength of your security profile, so you have some control over it.

Of course, risk can come from anywhere - not just in the process of sending and receiving money. Equally important to the points listed above are establishing best practices that can shore up security across your entire organization. Some of the key processes I recommend include:

  • Hiring an experience risk and information security team
  • Establishing internal controls and consistently reviewing them
  • Putting in place comprehensive vendor review processes
  • Regularly conducting breach and attack simulation exercises
  • Yearly penetration testing
  • Employee security awareness training

Finally, it is important to continue to evolve your tools, systems and practices to keep pace with the rapid innovation we’re seeing from bad actors. Establishing the right habits up front and educating your teams can help organizations stay ahead when it comes to risk management.

KEYWORDS: cyber security cybersecurity preparedness finance cybersecurity financial crime financial service security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Barbara Cousins is Chief Information Security Officer (CISO) at Flywire.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Gavel and book

    Cyber Risks Can Be Legal Risks: How to Protect the Organization

    See More
  • slashpro-1

    How Slash Resistant Clothing Can Help Protect Security Professionals

    See More
  • Security Podcast- Welch.jpg

    Listen to Michael Welch and how to address fourth-party risks and improve supply chain security in our latest The Security Podcast episode

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing