impact of cybersecurity, data analytics …...18. wombat security technologies, the state of the...
TRANSCRIPT
![Page 1: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/1.jpg)
IMPACT OF CYBERSECURITY, DATA ANALYTICS AND ROBOTICS
PROCESS AUTOMATION ON THE CA PROFESSION
CA SAURABH GOENKA
![Page 2: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/2.jpg)
The World is Changing. Intelligence is Leading that change.
![Page 3: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/3.jpg)
Understanding RPA, Analytics and Cybersecurity and it’s impact
on businesses and functions
Questions and Answers
What does this mean for the CA profession? What can I do to
embrace this technology?
A sneak peek into the key Digital Technologies enabling Digital
Transformation
Understanding Industry 4.0 and the Digital Transformation wave1
2
3
4
5
![Page 4: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/4.jpg)
1 2 3 4 5Understanding Industry 4.0 and the Digital
Transformation wave
![Page 5: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/5.jpg)
1 2 3 4 5Understanding Industry 4.0 and the Digital
Transformation wave
![Page 6: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/6.jpg)
1 2 3 4 5Understanding Industry 4.0 and the Digital
Transformation wave
![Page 7: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/7.jpg)
1 2 3 4 5Understanding Industry 4.0 and the Digital
Transformation wave
![Page 8: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/8.jpg)
1 2 3 4 5Understanding Industry 4.0 and the Digital
Transformation wave
Industry 1.0 – 4.0 journey credits : CGIIndustry 4.0 Framework credits : PwC
![Page 9: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/9.jpg)
1 3 4 5A sneak peek into the key Digital Technologies
enabling Digital Transformation2
![Page 10: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/10.jpg)
1 3 4 5A sneak peek into the key Digital Technologies
enabling Digital Transformation2
ADVANCED ANALYTICS
AI AND MACHINE LEARNING
ROBOTICS PROCESS AUTOMATION (RPA) CLOUD AND MOBILITY
CYBERSECURITY BLOCKCHAIN
![Page 11: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/11.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 12: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/12.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
‘Robotic Process Automation’, is the use of software to ‘mimic’ the actions a human userwould perform on a PC at scale to Automate Business Processes.
It is a concept that leverages virtual software robots (Bots) to emulate human interaction with systems to automate existing user actions.
Bots work at a desktop UI level and can traverse through applications just as a real human user would.
Just as industrial robots are remaking the manufacturing industry by creating higher production rates and improved quality, RPA “robots” are revolutionizing the way we think about and administer business processes.
![Page 13: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/13.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
RPA uses software to execute
business processes in a
repetitive, audited and controlled
manner
It orchestrates existing
applications for transaction
processing, data manipulation &
response triggering
It does all of this with very limited
human participation
• Simple Decisions
• Repetitive tasks
• Policies & Procedures
Ro
bo
t• Empathy & Judgement
• Tribal Knowledge
• Cognitive Ability
• Analysis
Hu
man
![Page 14: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/14.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
THE BENEFITS OF RPA
![Page 15: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/15.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 16: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/16.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
#10. KryonRPA product with built-in process discovery OCR, and operational analytics
#9. KofaxExtendable RPA platform that connects into Kofax’s BPM and OCR solutions
#8. Workfusion Pioneer of the AI-powered RPA solution
#7. Antworks Emerging and innovative RPA product with strong cognitive capabilities
#6. NICE The RPA front-office specialist
#5. Pega Systems Powerful combination of RPA and Business Process Management (BPM) capabilities
#4. Thoughtonomy Automation platform that goes beyond RPA with an innovative product roadmap
#1. Automation Anywhere
#2. Blue Prism
#3. UiPath
Top 3 leading RPA products with higher than industry average CX ratings on most dimensions
Voice of the customerInnovation capabilityExecution success
Types of RPA Tools – Top 10 RPA Tools of 2019
![Page 17: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/17.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 18: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/18.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 19: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/19.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
![Page 20: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/20.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 21: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/21.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
What is the most valuable asset in the
world today?Question
![Page 22: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/22.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 23: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/23.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 24: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/24.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
Data Science
Big DataData
Analytics
Big Data Analytics
![Page 25: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/25.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 26: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/26.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
The MindMap Analytics driven transformation Pyramid Framework
Pinnacle
Integration of Analytics with
IOT, RPA and Blockchain
Expand with advanced analytics by
building ML/AI algorithms and integrating
visualization and BI
Get started with fundamental data extraction and reporting,
followed by Core analytics – Descriptive and Predictive Analytics
Build a strong foundation with efficient data management, data governance,
data warehousing, data quality and data modelling practices.
Data
Management
Analytics,
Reporting
Visualization
and BI
Automation,
IOT,
Blockchain
and AI
![Page 27: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/27.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
Remember data is the new oil?
Nobody wants to steal your house anymore.
They want to steal you data instead.
![Page 28: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/28.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 29: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/29.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
Global Cybersecurity Spend
![Page 30: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/30.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
• Impact: Costly regulatory inquiries and penalties, consumer and shareholder lawsuits, loss of consumer confidence
• Motivation: Financial gain
• 2019 Outlook: Cyber-extortion will continue to rise
• Impact: Competitive advantage, trade secret disclosure, operational disruption, brand and reputation
• Motivation: Personal advantage, monetary gain, professional revenge, patriotism
• 2019 Outlook: More organizations will implement insider threat mitigation programs and processes
• Impact: Disruption of business activities, brand and reputation, loss of consumer confidence
• Motivation: Negatively impact reputation, drive attention to a cause, pressure for change
• 2019 Outlook: Expected to escalate attack methods with high-profile data breaches
• Impact: loss of competitive advantage, disruption to critical infrastructure
• Motivation: Economic, political, and/or military advantage
• 2019 Outlook: Will continue to strengthen their defensive and offensive cyber skills
![Page 31: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/31.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
Cyber Threat Landscape
• Cybersecurity events and costs are increasing:
– 79% of survey respondents detected a security incident in the past 12 months1
– Average total cost of a data breach increased 23% over the past two years2
– Average cost paid for each lost / stolen record increased 6%1
Industry Outlook
• Data breaches are expected to reach $2.1 trillion globally by 20193
• 76% of survey respondents1 were more concerned about cybersecurity threats than in previous 12 months:
Reputational Risk
• An IT security breach can have serious implications in how a company is perceived:
– 46% of companies suffered damage to reputation & brand value due to a security breach4
– 19% of companies suffered damage to reputation & brand value due to a third-party security breach
or IT system failure4
• The risk of losing customer trust is significant and rising:
– 82% of customers would consider leaving an institution that suffered a data breach5
Source: 1U.S. State of Cybercrime Survey, 2Ponemon Institute, 3Juniper Research , 4Forbes
![Page 32: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/32.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
Email Account Takeover1
Malware2
Phishing3
Credential Replay4
Social Engineering5
Call Forwarding6
Spoofing7
Common Cyber Threats
![Page 33: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/33.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 34: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/34.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 35: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/35.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 36: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/36.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 37: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/37.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 38: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/38.jpg)
1 3 4 5Understanding RPA, Analytics and Cybersecurity and
it’s impact on businesses and functions2
RPA Analytics Cybersecurity
![Page 39: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/39.jpg)
1 3 4 5What does this mean for the CA profession? What
can I do to embrace this technology?2
Source : Crunch Time – Future of Finance in a Digital World, Deloitte
![Page 40: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/40.jpg)
1 3 4 5What does this mean for the CA profession? What
can I do to embrace this technology?2
PROFESSION 1.0 PROFESSION 2.0
CA FIRMS AND CAs IN
PRACTICE
CORPORATE FINANCE
• Tax Filing Services• Traditional Audit and Assurance• MIS and reporting• Traditional transaction advisory• Engagement on demand• Local presence
• Tax Filing Automation• AI and Analytics enabled audit• Advanced Analytics and visualization• Decision impact forecasting• Analytics driven demand generation• Digital presence
• Finance as a support function• Responds to business needs• Manual push based reporting• Manual controllership function• Traditional internal audit• Descriptive reporting
• Finance integrated with business• Forecasts business outcomes• Cloud based automated reporting• RPA driven controllership• AI and RPA driven internal audit• Predictive Analytics
![Page 41: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/41.jpg)
1 3 4 5What does this mean for the CA profession? What
can I do to embrace this technology?2
TRAIN YOURSELF AND BUILD CAPABILITY STRATEGIZE YOUR FIRST DIGITAL PROJECT
![Page 42: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/42.jpg)
1 3 4 5What does this mean for the CA profession? What
can I do to embrace this technology?2
CASH IN ON INDUSTRY 4.0EMBRACE TECHNOLOGY
![Page 43: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/43.jpg)
1 3 4 5 REFERENCES AND ACKNOWLEDGMENTS2
1. Sophia video by Hanson Robotics and The Jakarta Post2. Industry 1.0 – 4.0 journey credits : CGI3. Industry 4.0 Framework credits : PwC4. Google Assistant video by Alphabet Inc. / Google5. 2018 CFO survey report by Grant Thornton6. RPA use case video and F&A Heatmap by UiPath7. Top 10 RPA Tools by HFS Research8. Tax automation video by Deloitte Netherlands9. Saurabh Goenka and MindMap Consulting for Analytics pyramid and F&A Transformation Use cases10. YouTube and the producers of the movie The Accountant11. Danish Police research12. Gartner research for research on cybersecurity spend13. US State of Cybersecurity Crime14. Report titled Crunch Time – Future of Finance in a Digital World, Deloitte15. Survey report by IT Governance UK16. NTT Group global threat intelligence report17. Verizon, 2016 data breach investigation report18. Wombat security Technologies, the state of the Phish 201719. Osterman Research on Ransomware20. Cisco, The Shadow IT Dilemma21. CBS News and YouTube for Cybersecurity interview video22. Kuka Robotics and YouTube for Kuka Video
![Page 44: IMPACT OF CYBERSECURITY, DATA ANALYTICS …...18. Wombat security Technologies, the state of the Phish 2017 19. Osterman Research on Ransomware 20. Cisco, The Shadow IT Dilemma 21](https://reader034.vdocuments.us/reader034/viewer/2022042316/5f050d287e708231d411041a/html5/thumbnails/44.jpg)
1 3 4 5 QUESTIONS AND ANSWERS2
CA SAURABH GOENKA
www.linkedin.com/in/saurabhgoenka