impact of cybersecurity, data analytics …...18. wombat security technologies, the state of the...

44
IMPACT OF CYBERSECURITY, DATA ANALYTICS AND ROBOTICS PROCESS AUTOMATION ON THE CA PROFESSION CA SAURABH GOENKA

Upload: others

Post on 10-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 2: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

The World is Changing. Intelligence is Leading that change.

Page 3: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

Understanding RPA, Analytics and Cybersecurity and it’s impact

on businesses and functions

Questions and Answers

What does this mean for the CA profession? What can I do to

embrace this technology?

A sneak peek into the key Digital Technologies enabling Digital

Transformation

Understanding Industry 4.0 and the Digital Transformation wave1

2

3

4

5

Page 4: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 2 3 4 5Understanding Industry 4.0 and the Digital

Transformation wave

Page 5: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 2 3 4 5Understanding Industry 4.0 and the Digital

Transformation wave

Page 6: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 2 3 4 5Understanding Industry 4.0 and the Digital

Transformation wave

Page 7: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 2 3 4 5Understanding Industry 4.0 and the Digital

Transformation wave

Page 8: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 2 3 4 5Understanding Industry 4.0 and the Digital

Transformation wave

Industry 1.0 – 4.0 journey credits : CGIIndustry 4.0 Framework credits : PwC

Page 9: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5A sneak peek into the key Digital Technologies

enabling Digital Transformation2

Page 10: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5A sneak peek into the key Digital Technologies

enabling Digital Transformation2

ADVANCED ANALYTICS

AI AND MACHINE LEARNING

ROBOTICS PROCESS AUTOMATION (RPA) CLOUD AND MOBILITY

CYBERSECURITY BLOCKCHAIN

Page 11: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 12: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

‘Robotic Process Automation’, is the use of software to ‘mimic’ the actions a human userwould perform on a PC at scale to Automate Business Processes.

It is a concept that leverages virtual software robots (Bots) to emulate human interaction with systems to automate existing user actions.

Bots work at a desktop UI level and can traverse through applications just as a real human user would.

Just as industrial robots are remaking the manufacturing industry by creating higher production rates and improved quality, RPA “robots” are revolutionizing the way we think about and administer business processes.

Page 13: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

RPA uses software to execute

business processes in a

repetitive, audited and controlled

manner

It orchestrates existing

applications for transaction

processing, data manipulation &

response triggering

It does all of this with very limited

human participation

• Simple Decisions

• Repetitive tasks

• Policies & Procedures

Ro

bo

t• Empathy & Judgement

• Tribal Knowledge

• Cognitive Ability

• Analysis

Hu

man

Page 14: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

THE BENEFITS OF RPA

Page 15: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 16: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

#10. KryonRPA product with built-in process discovery OCR, and operational analytics

#9. KofaxExtendable RPA platform that connects into Kofax’s BPM and OCR solutions

#8. Workfusion Pioneer of the AI-powered RPA solution

#7. Antworks Emerging and innovative RPA product with strong cognitive capabilities

#6. NICE The RPA front-office specialist

#5. Pega Systems Powerful combination of RPA and Business Process Management (BPM) capabilities

#4. Thoughtonomy Automation platform that goes beyond RPA with an innovative product roadmap

#1. Automation Anywhere

#2. Blue Prism

#3. UiPath

Top 3 leading RPA products with higher than industry average CX ratings on most dimensions

Voice of the customerInnovation capabilityExecution success

Types of RPA Tools – Top 10 RPA Tools of 2019

Page 17: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 18: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 19: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

Page 20: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 21: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

What is the most valuable asset in the

world today?Question

Page 22: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 23: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 24: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Data Science

Big DataData

Analytics

Big Data Analytics

Page 25: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 26: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

The MindMap Analytics driven transformation Pyramid Framework

Pinnacle

Integration of Analytics with

IOT, RPA and Blockchain

Expand with advanced analytics by

building ML/AI algorithms and integrating

visualization and BI

Get started with fundamental data extraction and reporting,

followed by Core analytics – Descriptive and Predictive Analytics

Build a strong foundation with efficient data management, data governance,

data warehousing, data quality and data modelling practices.

Data

Management

Analytics,

Reporting

Visualization

and BI

Automation,

IOT,

Blockchain

and AI

Page 27: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Remember data is the new oil?

Nobody wants to steal your house anymore.

They want to steal you data instead.

Page 28: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 29: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Global Cybersecurity Spend

Page 30: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

• Impact: Costly regulatory inquiries and penalties, consumer and shareholder lawsuits, loss of consumer confidence

• Motivation: Financial gain

• 2019 Outlook: Cyber-extortion will continue to rise

• Impact: Competitive advantage, trade secret disclosure, operational disruption, brand and reputation

• Motivation: Personal advantage, monetary gain, professional revenge, patriotism

• 2019 Outlook: More organizations will implement insider threat mitigation programs and processes

• Impact: Disruption of business activities, brand and reputation, loss of consumer confidence

• Motivation: Negatively impact reputation, drive attention to a cause, pressure for change

• 2019 Outlook: Expected to escalate attack methods with high-profile data breaches

• Impact: loss of competitive advantage, disruption to critical infrastructure

• Motivation: Economic, political, and/or military advantage

• 2019 Outlook: Will continue to strengthen their defensive and offensive cyber skills

Page 31: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Cyber Threat Landscape

• Cybersecurity events and costs are increasing:

– 79% of survey respondents detected a security incident in the past 12 months1

– Average total cost of a data breach increased 23% over the past two years2

– Average cost paid for each lost / stolen record increased 6%1

Industry Outlook

• Data breaches are expected to reach $2.1 trillion globally by 20193

• 76% of survey respondents1 were more concerned about cybersecurity threats than in previous 12 months:

Reputational Risk

• An IT security breach can have serious implications in how a company is perceived:

– 46% of companies suffered damage to reputation & brand value due to a security breach4

– 19% of companies suffered damage to reputation & brand value due to a third-party security breach

or IT system failure4

• The risk of losing customer trust is significant and rising:

– 82% of customers would consider leaving an institution that suffered a data breach5

Source: 1U.S. State of Cybercrime Survey, 2Ponemon Institute, 3Juniper Research , 4Forbes

Page 32: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Email Account Takeover1

Malware2

Phishing3

Credential Replay4

Social Engineering5

Call Forwarding6

Spoofing7

Common Cyber Threats

Page 33: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 34: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 35: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 36: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 37: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 38: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5Understanding RPA, Analytics and Cybersecurity and

it’s impact on businesses and functions2

RPA Analytics Cybersecurity

Page 39: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5What does this mean for the CA profession? What

can I do to embrace this technology?2

Source : Crunch Time – Future of Finance in a Digital World, Deloitte

Page 40: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5What does this mean for the CA profession? What

can I do to embrace this technology?2

PROFESSION 1.0 PROFESSION 2.0

CA FIRMS AND CAs IN

PRACTICE

CORPORATE FINANCE

• Tax Filing Services• Traditional Audit and Assurance• MIS and reporting• Traditional transaction advisory• Engagement on demand• Local presence

• Tax Filing Automation• AI and Analytics enabled audit• Advanced Analytics and visualization• Decision impact forecasting• Analytics driven demand generation• Digital presence

• Finance as a support function• Responds to business needs• Manual push based reporting• Manual controllership function• Traditional internal audit• Descriptive reporting

• Finance integrated with business• Forecasts business outcomes• Cloud based automated reporting• RPA driven controllership• AI and RPA driven internal audit• Predictive Analytics

Page 43: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5 REFERENCES AND ACKNOWLEDGMENTS2

1. Sophia video by Hanson Robotics and The Jakarta Post2. Industry 1.0 – 4.0 journey credits : CGI3. Industry 4.0 Framework credits : PwC4. Google Assistant video by Alphabet Inc. / Google5. 2018 CFO survey report by Grant Thornton6. RPA use case video and F&A Heatmap by UiPath7. Top 10 RPA Tools by HFS Research8. Tax automation video by Deloitte Netherlands9. Saurabh Goenka and MindMap Consulting for Analytics pyramid and F&A Transformation Use cases10. YouTube and the producers of the movie The Accountant11. Danish Police research12. Gartner research for research on cybersecurity spend13. US State of Cybersecurity Crime14. Report titled Crunch Time – Future of Finance in a Digital World, Deloitte15. Survey report by IT Governance UK16. NTT Group global threat intelligence report17. Verizon, 2016 data breach investigation report18. Wombat security Technologies, the state of the Phish 201719. Osterman Research on Ransomware20. Cisco, The Shadow IT Dilemma21. CBS News and YouTube for Cybersecurity interview video22. Kuka Robotics and YouTube for Kuka Video

Page 44: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21

1 3 4 5 QUESTIONS AND ANSWERS2

CA SAURABH GOENKA

[email protected]

www.linkedin.com/in/saurabhgoenka