5 - Technology and Data Analytics Summary
5 - Technology and Data Analytics Summary
The role of the finance department in managing cyber security: CFOs are
needed to be much more pro-active in managing cyber risk. Although IT
issues are complex, finance team must be involved into managing the cyber
security risk where CFO must take broader view from commercial and
business-wide risk perspective rather than technical perspective. The ACCA
report recommends several specific actions for the CFO to take: 1.
Redefine risk and resilience(the capacity to recover quickly) - As cyber
criminals become ever more sophisticated (criminals knows how to even
attack on complex IT structures), the report recommends a 'zero trust'
model, where all users and equipment are systematically verified before
gaining access to a network. This can be seen with the 'two step
verification' (like user ID credentials and then okta confirmation) techniques
being adopted by many banks and consumer service providers.
2. Focus on recovery plans - Preventing cyber-attacks is a noble ambition (koi
rank ya title leny ki khwahish jitna) but it’s virtually (amli tor par) impossible
to achieve. It’s therefore crucial to have plans in place to manage any attack
itself but also, crucially, the recovery afterwards. 3. Audit your supply chain -
Supply chain cyberattacks put organizations at significant risk -- risk that can
disrupt their operations and damage their reputations. A system is only as
strong as its weakest link (here the weakest link is org's network with
suppliers i.e. a whole supply chain) so organisations need to place as much
emphasis on the cyber security protocols of any connected suppliers (those
suppliers who are connected with org, so like orgs have access to suppliers
info so org must put controls in order to protect supplier's info) as it does on
its own systems and controls (like orgs create strategic plans and put many
controls to protect it from cyber attacks).
Conclusion
The ACCA report concludes with the following warning:
'Do not wait for a cyber attack to occur. Do not wait for the fine or the
measurable reputational loss. Finance leaders need to recognise that cyber
risk is one that is very relevant to them. Ensure that you are fully up to date on
the nature of the risk that the organisation faces on an on-going basis.'
Devices: Smart devices can be found just about anywhere. For the home
there are devices that can turn on the coffee machine when you wake up,
lock the doors when you leave the house and put on your favourite music
when you get home. Travelling to work, smart devices can collect data
about traffic volumes, so that you can receive alerts warning you of traffic
jams and advising you to take a different route. In the office, smart desks
have been developed that can tell you when you’ve sat for too long in the
same position and it’s a good time to stand up.
Uses of IoT: Helping with particular tasks – the IoT can help enable better-
targeted working processes. The oil and gas industry has been able to build
models based on seismic images (knowing about the parameters of
rock/mountain in order to identify how much oil, gas, water is available
within the rock) to improve the precision of exploration (searching an area
for natural resources with a quality of accuracy) for new reserves. Data
about the conditions, that products are kept in, can be used to help predict
with precision the life of individual products within a larger batch. This is
particularly important in the food industry, where shelf life can vary
according to harvesting, holding, processing and distribution arrangements.
Sector examples: The medical sector has found many uses for smart
devices. Devices in the home can provide alerts that medical
emergencies, such as falls, have occurred. They can also enable
continuous remote monitoring of blood pressure and heart rate, and
also responses to treatment. In the transport sector the proliferation
of smart devices such as traffic cameras, sensors and vehicles’
tracking modules can be used for longer-term objectives, as well as
warning motorists of traffic problems ahead.
They can identify the most-frequently taken routes and provide data
that can be used as a basis for decisions about simplifying those
routes. Problems As always, security is an important concern. A
significant criticism of the IoT is that development of applications has
not been accompanied by sufficient development of security. In some
instances the consequences of hacking could be life-threatening.
Privacy and breaching data protection regulations are also serious
concerns. The more information that devices provide, the more is
known about what individuals are doing, leading perhaps to a
greater ability to predict behaviour.
What is Big Data? Read from article, only imp line are being written.
Data, which is not used or analysed has no value, but value can be added
to data if it is cleaned (relevant), processed (reliable), transformed
(structured) and analysed (data now becomes information to be useful
for strategy/risk analysis and DM). Reliable, timely and relevant
information is what the business leader needs in order to answer key
business questions and make more informed business decisions.
Data Analytics Techniques - There are unlimited ways in which data can
be analysed, depending on the number of business questions which can be
asked by business leaders about the businesses which they lead (any
information in any form/format can be asked at any time). Essentially the
data analytics process should always begin with posing a specific business
question such as the following: Read the questions from article.
There are many more of these questions and the SBL examination could
address such questions and require the candidate to assess how such
problems could be resolved and the solutions arrived at could involve some
application of their knowledge about data analytics. Essentially there are
three types of data analytics: 1) Descriptive 2) Predictive 3) Prescriptive.
Descriptive: To observe what has been and is currently happening. Customer
wise or product wise or verticals wise analysis helps identifying trends which
can be used in different ways to make DM. Charts, graphs and pivot tables
are very helpful with descriptive analysis because information can be
obtained in a variety of ways.
Only looking the figures in total will not help identifying unusual trends
therefore breaking data into product/store wise will only help detecting
fraud or loss using micro level descriptive analysis. Predictive Analytics: If
you are making strategy so you will evaluate the scenarios to know that
what outcomes will occurr at what scenario, so the strategic outcome is
dependent on the scenarios which we evaluate with the help of "scenario
manager" tool of excel. Basically the purpose is to predict the sales in future
by anaysing the relationship between independent/input variables (weather
conditions in past) and dependent/outcome variables (resulted sales of
items in different weather). However, when using such techniques, a degree
of scepticism must be applied because it not a hard and fast rule that the
inputs which are predicting the outcomes will always show a direct cause.
Read from article - imp..
Prescriptive: A form of data analysis where with the
help of data you can analyse that how we can minimise
our cost or maximize our sales because, in the example
in article, it will not be easy to calulate without solver
that how many units should be allocated to each store
in such a way that could optimise our operations. Read
this from article. Applications Data Analytics: The data
analysis shown in this article will not be done by SBL
students (i.e. business leaders) rather it will be done by
the data analysts on behal of the business leaders.
Students studying for SBL only need to be aware of how
big data and such techniques of data analytics can be
of use in leading or managing a business more
effectively.