Feeds

Zynga CFO cuts out the middleman and moves to Facebook

Show me the money, says latest departing exec

High performance access to file storage

Sinking ship Zynga has lost yet another senior executive, as chief financial officer Dave Wehner abandons the firm for a glittering career at Facebook.

Zynga said that Wehner had resigned for a "senior finance position" at the social network that more or less provides Zynga's revenues.

"Dave remains a good friend to us all and we wish him success in his next role," Zynga head Mark Pincus said in a canned statement.

The company has also recently lost John Schappert, its chief operating officer and Jeff Karp, chief marketing officer in the last few months among other top execs fleeing for the exit as Zynga keeps disappointing with its earnings and its share price heads for rock bottom.

To fill some of the gaping holes in its management team, the social gaming firm said Mark Vranesh, previously chief accounting officer, would take over as CFO and former chief mobile officer David Ko would become COO.

Zynga also moved Barry Cottle out of EVP of business and corporate development and into chief revenue officer and promoted Steven Chiang from EVP of games to president of games.

Pincus said in a note to employees that the employee changes were coming at "an important time".

"We are positioning ourselves for long-term growth and I’m confident that we have the breadth and depth of management talent to deliver on our mission of connecting the world through games," he said.

"With some of our recent game success and the great work that’s being done to move with our players to mobile, we’re making progress. We still have a lot of work to do, but it’s been great to see so many of you step forward to put us on the move again."

Zynga's shares have plummeted since July, when it announced poor second quarter earnings and showed revenues from Facebook had fallen. Without Facebook, Zynga needs to be making money from mobile games, something that's not happening fast enough for investors' liking. The shares have dropped by 58% since July 25, the day it released the results. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.