Sign up for free newsletter

 

Mark Coriaty, Eze Castle Integration

Will outsourcing shield you from cyber threats?

Mon, 19/06/2017 - 08:27

Just a decade ago, the cyber threat landscape was far less pronounced, but thanks to significant advances in IT, mobile technology and digital platforms, the threat of cybercrime has grown exponentially and poses risks across the global industry and for national critical infrastructure (power stations, hospitals, dams, financial services). »

Jeremy Coller, Coller Capital

Private equity investors expect cyber attacks

Mon, 12/06/2017 - 08:43

Over half of private equity LPs expect their infrastructure to suffer a serious cyber-attack within five years – a sharp rise on the one in twenty LPs who have suffered attacks in recent years, according to Coller Capital’s latest Global Private Equity Barometer. »

Hurricane

Eight business continuity tips for weathering hurricane season

Thu, 01/06/2017 - 09:59

It’s June, which means hurricane season is upon us, and it’s time to shore up business contingency plans. As we all remember, many firms in New York and New Jersey were impacted by Hurricane Sandy back in 2012, and since then, focus on business resiliency and continuity has increased dramatically. If you’re an emerging manager just embarking on your first BCP plan or it’s time to review and update your existing plan, here are eight tips to keep in mind as hurricane season begins.  »

Bob Shaw, Eze Castle

What's in your cybersecurity arsenal? Tiers of protection for investment managers

Thu, 25/05/2017 - 00:47

By Bob Shaw (pictured) – As cyber threats continue to mature and firms become increasingly dependent on third-party service providers and Internet applications to support operations, they not only begin to benefit from greater efficiencies and advanced technologies, but also open themselves up to more security vulnerabilities. Investment firms need to evaluate all risks that pose potential threats to their firm and leverage the safeguards necessary to protect themselves, clients, partners and their assets.  »

Cyber security

Four steps to creating a security-oriented culture at your firm (Part 2 of 2)

Tue, 23/05/2017 - 10:08

Now that you have a handle on the nightmare scenario and understand the importance of fostering a culture of security across your investment firm, here are four steps to guide you through the creation of that culture.  »

Security

The security nightmare scenario: Preying on human weaknesses, not computer weaknesses (Part 1 of 2)

Thu, 18/05/2017 - 10:04

Where the vulnerabilities are – It’s 3:40 on a Friday afternoon, and an urgent email hits a back-office employee’s inbox. As the employee scrambles to get ready for the market-close and head off to a three-day weekend, it looks like the portfolio manager for a major client needs him to wire USD125,000 to a bank in Grand Cayman.  »

Ogier advises on Luxembourg cyber security fund

Fri, 12/05/2017 - 07:56

Ogier has acted as Luxembourg counsel to Paladin Capital Group on the structuring and launch of a fund investing in and developing global cyber security assets. »

Clipboard

Is your cyber security plan documented? If not, start here

Thu, 11/05/2017 - 12:14

How prepared is your firm to handle the aftermath of a security incident? If you haven’t documented your firm’s safeguards, then you may find yourself in hot water. Written Information Security Plans (WISPs) are must-haves in our security-focused culture – just ask your regulators and investors. Below are some insights into the development and maintenance of WISPs.  »

Sonja Maria Hilkhuijsen, Apex

Apex partners with data privacy firm

Wed, 03/05/2017 - 10:18

Apex Fund Services has partnered with DataGuidance to enhance the group’s data protection and data privacy programme. »

Cisco

Top 10 IT security audit gaps and how to avoid them

Fri, 28/04/2017 - 10:20

When it comes to cybersecurity, the list of potential gaps is expansive ranging from technology to human. To help identify where your firm may be lacking, here is a list of the top 10 most commonly identified gaps found during an IT audit/risk assessment.  »

Pages

specialreports
other gfm publications