Sign up for free newsletter

 

Mark Coriaty, Eze Castle Integration

Will outsourcing shield you from cyber threats?

Mon, 19/06/2017 - 08:27

Just a decade ago, the cyber threat landscape was far less pronounced, but thanks to significant advances in IT, mobile technology and digital platforms, the threat of cybercrime has grown exponentially and poses risks across the global industry and for national critical infrastructure (power stations, hospitals, dams, financial services). »

Hurricane

Eight business continuity tips for weathering hurricane season

Thu, 01/06/2017 - 09:59

It’s June, which means hurricane season is upon us, and it’s time to shore up business contingency plans. As we all remember, many firms in New York and New Jersey were impacted by Hurricane Sandy back in 2012, and since then, focus on business resiliency and continuity has increased dramatically. If you’re an emerging manager just embarking on your first BCP plan or it’s time to review and update your existing plan, here are eight tips to keep in mind as hurricane season begins.  »

Bob Shaw, Eze Castle

What's in your cybersecurity arsenal? Tiers of protection for investment managers

Thu, 25/05/2017 - 00:47

By Bob Shaw (pictured) – As cyber threats continue to mature and firms become increasingly dependent on third-party service providers and Internet applications to support operations, they not only begin to benefit from greater efficiencies and advanced technologies, but also open themselves up to more security vulnerabilities. Investment firms need to evaluate all risks that pose potential threats to their firm and leverage the safeguards necessary to protect themselves, clients, partners and their assets.  »

Cyber security

Four steps to creating a security-oriented culture at your firm (Part 2 of 2)

Tue, 23/05/2017 - 10:08

Now that you have a handle on the nightmare scenario and understand the importance of fostering a culture of security across your investment firm, here are four steps to guide you through the creation of that culture.  »

Security

The security nightmare scenario: Preying on human weaknesses, not computer weaknesses (Part 1 of 2)

Thu, 18/05/2017 - 10:04

Where the vulnerabilities are – It’s 3:40 on a Friday afternoon, and an urgent email hits a back-office employee’s inbox. As the employee scrambles to get ready for the market-close and head off to a three-day weekend, it looks like the portfolio manager for a major client needs him to wire USD125,000 to a bank in Grand Cayman.  »

Clipboard

Is your cyber security plan documented? If not, start here

Thu, 11/05/2017 - 12:14

How prepared is your firm to handle the aftermath of a security incident? If you haven’t documented your firm’s safeguards, then you may find yourself in hot water. Written Information Security Plans (WISPs) are must-haves in our security-focused culture – just ask your regulators and investors. Below are some insights into the development and maintenance of WISPs.  »

Sonja Maria Hilkhuijsen, Apex

Apex partners with data privacy firm

Wed, 03/05/2017 - 10:18

Apex Fund Services has partnered with DataGuidance to enhance the group’s data protection and data privacy programme. »

Alex Walker, TNS

TNS launches encryption service

Wed, 03/05/2017 - 09:28

Transaction Network Services (TNS) has launched an encryption solution which allows financial market participants to further protect the privacy of their trading data. »

Cisco

Top 10 IT security audit gaps and how to avoid them

Fri, 28/04/2017 - 10:20

When it comes to cybersecurity, the list of potential gaps is expansive ranging from technology to human. To help identify where your firm may be lacking, here is a list of the top 10 most commonly identified gaps found during an IT audit/risk assessment.  »

Thomas Deinet, HFSB

How to protect one’s digital footprint

Tue, 25/04/2017 - 13:14

The way that fund managers protect their data goes far beyond thinking about the four walls of their office. The way we work has revolutionised in recent times, as technology advances, especially cloud technology, redefining what the workplace actually is. With wifi, cloud platforms, and mobile phones, a hedge fund CEO could, if they wished to, run their business from a beach in Martinique. But with every upside there is always a downside. And today, that means that protecting one’s perimeter has become a far greater challenge.  »

Pages

specialreports
other gfm publications