tl;dr / summary;

  • Cybercriminals are bypassing IT by targeting the "human element" in finance through whaling and CEO fraud.
  • CFOs must transition from "bean counters" to strategic risk leaders, treating cyber threats as material financial risks.
  • Implementing the "Four-Eye Principle" and dual-approval workflows is now a non-negotiable safeguard.
  • Deepfake technology is the 2026 frontier; voice and video verification protocols are the only way to counter sophisticated spoofing.
  • Training finance teams to challenge urgency and verify instructions is your strongest line of defence.

For years, cybersecurity was viewed as a technical skirmish fought in the server rooms by the IT department. If the firewall was up and the antivirus was green, you would assume the fortress was secure. But the landscape in 2026 has shifted dramatically. Today, the most sophisticated cyber attack doesn’t target a software vulnerability; it targets the person with the keys to the treasury: you.

As a finance professional, you sit at the intersection of liquidity and authority. This makes you, and your department, the primary target for modern cybercriminals. This isn’t just random spam. It is precision-engineered whaling attacks and CEO fraud designed to bypass every technical layer of your security stack by exploiting human trust.

This article explores why the CFO and their team is now the ultimate guardian of corporate trust, how you can build a robust human firewall, and why cybersecurity for financial services must become a cornerstone of your 2026 strategic agenda.

why are CFOs and finance teams the primary targets for cybercriminals?

Let’s approach this practically: why would a hacker spend months trying to crack a 256-bit encryption when they can simply convince a Controller to click "approve" on a fraudulent DuitNow or Interbank GIRO (IBG) transfer?

Cybercriminals follow the money, and in any organisation, all roads lead to the finance department. You control the wires, the payroll, the M&A funds, and the banking tokens. Furthermore, your role is inherently public. Between LinkedIn profiles, earnings calls, and press releases, hackers have a blueprint of your hierarchy and current projects.

The rise of the whaling attack (a form of phishing specifically aimed at the "big fish" like CFOs and CEOs) is no accident. In Malaysia, the threat is escalating. The National Scam Response Centre (NSRC) has consistently highlighted that business email compromise and sophisticated financial scams account for significant losses annually.

When a hacker impersonates a CEO during a high-pressure acquisition, they aren't fighting your IT; they are fighting your psychology.

Randstad Professional Career
Randstad Professional Career

the anatomy of CEO fraud: why your team overrides the process.

CEO fraud, often categorised as Business Email Compromise (BEC), is a masterclass in psychological manipulation. It usually begins with a spoofed email that looks identical to your Chief Executive’s address. The message is simple: "I’m in a confidential meeting. We need to secure this vendor today. Keep this quiet until the official announcement."

By combining authority with urgency and secrecy, attackers create a "perfect storm" that pressures finance professionals to bypass standard logical review. This pressurises even seasoned professionals, playing on the fear that they might hinder a critical deal, and leads them to override internal controls to satisfy an executive request.

In Malaysian business culture, where hierarchical respect is deeply ingrained, this pressure is even more acute. If the boss says "jump," the cultural instinct is often to ask "how high," not "can I see your ID?"

the “four-eye” principle: why dual approval is your best strategic safeguard.

If the threat is human, the solution must be procedural. This is where the four-eye principle moves from being a compliance box-tick to a strategic shield.

Establishing a culture where no single individual has the power to initiate and release a payment is the baseline of financial cybersecurity, in line with Bank Negara Malaysia’s RMIT (Risk Management in Technology) guidelines. But in 2026, you must go further. Dual approval shouldn't just exist in your ERP system; it must be embedded in your communication.

Tactical safeguards to implement today:

  • Mandatory call-backs: Any change to vendor bank details or urgent "out of cycle" payment requests must be verified via a known phone number. Never use the contact details provided in the suspicious email.
  • Threshold-based escalation: For example, any payment over RM150,000 should require a three-way sign-off involving the CFO, a Director, and Treasury.
  • ERP-bank sync: Ensure your bank-side release controls mirror your internal hierarchy. If it isn’t dual-signed at the bank, your internal process is moot.

deepfakes in finance: the 2026 threat landscape.

The game changed when AI entered the fray. "Hybrid attacks" are now the norm, where an email from the CEO is followed by a voice-cloned phone call or even a deepfake video in a Microsoft Teams meeting.

Imagine receiving a call that sounds exactly like your CEO, discussing a project you know is active, asking for a payment to be moved. The "human" element (our reliance on sight and sound) is being weaponised. To counter this, cybersecurity in financial services now requires a "Safe Word" protocol.

In high-stakes environments, pre-agreed, non-digital verification phrases or "out-of-band" multi-channel confirmations (for instance, confirming a voice request via a separate encrypted chat app like Signal) are becoming the new standard for the human firewall.

Randstad Professional Career
Randstad Professional Career

building the human firewall: finance teams as the last line of defence.

Your team isn't the "weak link." They are your most intelligent sensors. Building a human firewall means moving away from a culture of blame to a culture of curiosity.

  1. Cyber drills for finance: Don't just send a generic phishing test. Simulate a whaling attack that targets your AP manager specifically during the month-end close or during the festive Raya or Chinese New Year rush when vigilance often dips.
  2. Zero-blame reporting: If you’re a leader and an analyst flags a suspicious email from you, reward them. They shouldn't fear "bothering" you; they should fear not bothering you.
  3. Governance as resilience: Framing these controls as part of your fiduciary duty and Bursa Malaysia ESG reporting commitments helps get board-level buy-in for the necessary L&D investment.

Cybersecurity is no longer an IT footnote; it is a fundamental pillar of modern financial stewardship. The strongest defence in 2026 isn't a better algorithm but a finance team that has the confidence to pause, verify, and challenge the sense of urgency.

By leading this shift, you aren't just protecting the balance sheet; you are safeguarding the very reputation of your organisation.

Randstad accounting & finance community.

Join the Randstad A&F community to get access to the resources and insights you need to address the challenges of a dynamically changing market.

join today

FAQs.

looking for a job in accounting & finance?

browse jobs

join our accounting & finance community.

join today