Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Sunday, July 6
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » From the FBI to F&A: lessons learnt in safeguarding systems and data
    Latest News

    From the FBI to F&A: lessons learnt in safeguarding systems and data

    TeamBy TeamJuly 5, 2025No Comments6 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    From the FBI to F&A: lessons learnt in safeguarding systems and data
    Share
    Facebook Twitter LinkedIn Pinterest Email


    One might not typically expect a childhood on a Texas farm to lead to a career that involve investigating cybercriminals at the FBI, and then to one protecting financial data at a global software company. But cybersecurity is an industry built on unpredictability – and that’s exactly what draws many aspiring individuals, including myself many years ago, to it.

    Having a varied and diversified career has many benefits, and not least the ability to approach challenges with a broader lens, draw on a wide range of experiences, and adapt quickly to new and evolving threats. In cybersecurity, where no two days are the same, this kind of versatility is invaluable. From early roles with Department of the Navy and the U.S. Bankruptcy Court – to the FBI – there are many learnings I have since taken into security roles in telecoms, consumer goods, private equity, and now in the financial software space as CISO at BlackLine. While some of these industries and organisations couldn’t be more different, there are some core skills and lessons for any security professional to be aware of.

    Finance teams: the unexpected front line

    When most people think about cyber security, they picture IT departments and firewalls. But increasingly, attackers are bypassing the technical perimeter and going straight for the people who hold the purse strings.

    Finance and accountancy (F&A) professionals handle sensitive data, authorise payments, and interact with vendors: all prime opportunities for cybercriminals looking to manipulate systems or people. In fact, business email compromise (BEC), fake invoice scams, and internal fraud schemes often originate within finance teams, whether due to process gaps, social engineering, or a simple lack of cyber awareness. Yet, many finance teams still see cybersecurity as “someone else’s job.”

    Similar issues persist in many other industries, with those in front-line roles vulnerable to attack. This is a dangerous blind spot. With global financial fraud losses topping $500 billion annually, finance, and other key department, leaders must now think of cyber risk as a core business risk – one that requires proactive controls, training, and collaboration with security teams.

    Securing operations: from mindset shift to practical steps

    The first step is recognising that cybersecurity isn’t only a technical issue; it’s a business issue. Therefore, all teams have a vital role to play in keeping the organisation safe and running effectively.

    At BlackLine, we treat F&A professionals as key players in our security programme. We invest heavily in tailored security awareness training, including phishing simulations, and ensure our financial controls are designed with cybersecurity in mind. Dual approvals for payments, multi-factor authentication for system access, and regular audits of user permissions are standard practice.

    Too often, a cyber-attack or fraud happens because of outdated processes or excessive trust in a single individual. Building layered controls – including in all financial processes – and pressure-testing them regularly, can drastically reduce risk.

    Equally important is recognising third-party exposure. For example, finance and accounting teams often deal directly with vendors, payment processors, and banks – any of which can introduce vulnerabilities. As a result, due diligence, regular risk assessments, and clear escalation paths for when suspected issues and threats arise are essential components of a secure financial operation. Crucially, other departments would be wise to take similar steps to prevent potential third-party security issues arising.

    Why communication is a CISO’s strongest tool

    One of the most valuable skills I’ve developed over the years isn’t technical, it’s translation. Communicating cybersecurity risk in business terms is key to engaging stakeholders who don’t live and breathe threat landscapes.

    During my time at BT, I learned how to frame security in the language of risk: not just cyber risk, but financial, operational, and reputational risk. That shift in perspective has allowed me to build stronger alignment between IT and business functions, especially in highly regulated industries like finance.

    Being transparent about both successes and challenges is also critical. I set clear expectations with my team and the board about what we measure, why it matters, and where we need to improve. This builds trust and helps foster a culture where continuous improvement – not fear – drives action.

    The rise of AI – and the risks that come with it

    Of course, the cybersecurity landscape is always evolving. Right now, the integration of generative and agentic AIv tools is reshaping how all departments, including security teams, operate. These technologies offer incredible promise in automating tasks and detecting anomalies, but they also introduce new risks, from data leakage into public LLMs to inaccuracies that could undermine integrity, including in a financial sense.

    It’s therefore vital that new AI solutions are not viewed as a silver bullet. They must be deployed carefully, with clear usage policies, regular reviews, and strong governance to prevent new threat types from gaining a foothold.

    At our company, we’re investing in AI capabilities that complement – rather than replace – human oversight. And we’re ensuring that all employees, not just technologists, are trained to understand both the opportunities and limitations of these tools.

    Cyber resilience in a borderless world

    Cyber threats no longer respect geographic boundaries. While compliance requirements may vary by region, attackers don’t care whether your headquarters is in London, Los Angeles or Lagos. That’s why I advocate for setting a global “high bar” for security controls, rather than customising by country.

    Taking finance professionals specifically, whether you’re a global CFO or an accountant at a mid-sized firm, the fundamentals remain the same: confidentiality, integrity, and availability – otherwise known as the CIA triad – must be preserved at all costs. And in the age of AI, that becomes even more complex.

    Advice for the next generation

    To those considering a career in cybersecurity, my advice is this: your perspective matters. My journey has taken unexpected turns, from tracking down hackers to building board-level security strategies. But if there’s one thing that hasn’t changed, it’s this: in cybersecurity, the human element is always the most important.

    Jill Knesek is the Chief Information Security Officer at BlackLine.

    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      The AI arms race begins at age 4

      July 6, 2025

      Supreme Court Ruling Highlights Continued Power Struggle Over LGBTQ+ Books in Schools

      July 5, 2025

      10 (and counting…) Google goodies for your classroom

      July 4, 2025

      Air France-KLM to increase intelligence of bots that have saved 200,000 hours

      July 4, 2025

      Large Public Libraries Give Young Adults Across U.S. Access to Banned Books

      July 3, 2025

      5 strategies to get your students talking

      July 3, 2025
      Courses and Software Tools

      Extreme Privacy: What It Takes to Disappear

      August 24, 202454 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202427 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202422 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202517 Views

      Coders at Work: Reflections on the Craft of Programming

      April 19, 202516 Views
      Reviews

      Digital Electronics and Circuits | Udemy Coupons 2025

      July 6, 2025

      Digital Campaign Manager

      July 6, 2025

      Salesforce JavaScript Developer I: 300+ Questions and Answer | Udemy Coupons 2025

      July 6, 2025

      Director, Campaign Management | Sam’s MAP Team (Member Access Platform)

      July 6, 2025

      The AI arms race begins at age 4

      July 6, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      The AI arms race begins at age 4

      July 6, 2025

      From the FBI to F&A: lessons learnt in safeguarding systems and data

      July 5, 2025

      Supreme Court Ruling Highlights Continued Power Struggle Over LGBTQ+ Books in Schools

      July 5, 2025

      10 (and counting…) Google goodies for your classroom

      July 4, 2025

      Air France-KLM to increase intelligence of bots that have saved 200,000 hours

      July 4, 2025
      Latest Videos

      What is Digital Marketing? Scope, Earnings & Who Can Start a Career in It Hammad’s Digital Hub

      July 5, 2025

      Just trend #gacha #memecreator #gachaclub #gcmeme #gachalife #trend #gachememe #edit #memes

      July 4, 2025

      Kenley Jansen notches his 1,000th career MLB strikeout | August 25, 2021 | Dodgers @ Padres

      July 3, 2025

      Top 5 Cyber Security Jobs in India || Cyber Security Career 2024

      July 2, 2025

      Navigate Your Marketing Career with Expert Mentorship | NIMS Academy Success Guide

      July 1, 2025
      Latest Jobs

      Digital Campaign Manager

      July 6, 2025

      Director, Campaign Management | Sam’s MAP Team (Member Access Platform)

      July 6, 2025

      Senior Software Engineer 2

      July 6, 2025

      Senior Scientist II, Chemistry

      July 5, 2025

      Software Development Engineer – FBDA, Fire TV Channels, FBDA Video Ads

      July 5, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202435 Views

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202531 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202530 Views

      Python Development & Data Science: Variables and Data Types | Udemy Coupons 2025

      May 24, 202521 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202521 Views
      Blog

      3 Ways To Network Over Summer Vacation And Grow Your Career

      July 3, 2025

      Why Community Is Your Most Valuable Career Asset In 2025

      June 28, 2025

      What Employers Are Really Looking For In Job Interviews

      June 27, 2025

      The Best Way to End a Cover Letter (With 4 Winning Examples)

      June 26, 2025

      5 Job Interview Secrets To Beat The Competition

      June 25, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT