Sign up for free newsletter


Dirty data

Is your data dirty? Data hygiene best practices for financial services

Fri, 21/07/2017 - 08:37

The most vital asset a business controls is its information. As the driver of many business processes, data is a powerful tool, and therefore has to be secure, accurate and accounted for. When this sensitive information gets into the wrong hands, it can cause serious damage to a firm’s business operations and reputation.  »

George Ralph, RFA

Does cybersecurity utopia really exist?

Thu, 20/07/2017 - 13:04

By George Ralph, RFA – Imagine you’re the CTO of a successful hedge fund. You’re not big enough to have a dedicated CISO but you think you’re doing a pretty good job of securing your network. Your applications and databases are secure, you’ve just invested in a network intrusion detection system and some next generation firewalls. »

James Williams, Hedgeweek

Compliance risk management for private equity & hedge funds

Thu, 20/07/2017 - 10:40

Running an alternative fund management business has become a far more considered, strategic affair in the light of significant regulatory changes post-08. One might compare it to the ultimate game of strategy, chess. To stay in compliance with AIFMD, Dodd-Frank, and the upcoming MiFID II and General Data Protection Regulations (GDPR) in Europe, fund managers have to think two moves ahead, and ensure that they have their pawns in position. One wrong move and they run the risk of facing what might be best described as regulatory checkmate. »

George Ralph, RFA

Make time for risk management

Wed, 19/07/2017 - 11:52

By George Ralph (pictured), RFA​ - In these turbulent times, it sometimes feels like we need to be armour plated to protect ourselves against the relentless barrage of attacks against our families, our businesses, our economy and our political stability. »

George Ralph, RFA

What can the financial services sector learn from the WannaCry ransomware attack?

Tue, 18/07/2017 - 10:20

By George Ralph (pictured), RFA​ - The aptly named WannaCry cryptoworm, is working its way around the world, encrypting data and demanding ransom payments in the cryptocurrency, bitcoin. »

George Ralph, RFA

Why cyber security should be at the top of your priority list

Mon, 17/07/2017 - 08:12

By George Ralph (pictured), RFA – Cyber security has never been as important as it is today. The Cyber Security Breaches Survey 2017, published recently by the Department for Culture, Media and Sport and undertaken by Ipsos Mori highlights some statistics that should make even the most jaded CIOs sit up and take notice. »

Viktor Tadijanovic, Abacus Group

Risk assessing outsourced IT partners

Wed, 12/07/2017 - 13:49

The average hedge fund is often a lean operation with limited headcount, which leans more towards the front office. As such, areas such as IT and cybersecurity are typically outsourced. Many have chosen not to hire CISOs but have instead chosen to appoint outsourced partners/consultants to conduct risk assessments, including appraising the manager's third party vendor relationships.  »

Eldon Sprickerhoff, eSentire

Ransomware: Managers should expect the unexpected

Wed, 12/07/2017 - 13:43

Ransomware, malicious code that encrypts files and demands a ransom to decrypt, has been around for years, but why is this most recent version so successful? The answer is bitcoin.  »

John Araneo, Align Cybersecurity

Cybersecurity challenges for investment managers

Wed, 12/07/2017 - 13:37

The Cybersecurity phenomenon has completely changed the game in both the investment management industry and the broader financial services sector.  »

Jay Kaplan, Synack

Insights on the evolving cyber threat landscape

Wed, 12/07/2017 - 13:34

Business has changed markedly over the last few years thanks to the rise and sophistication of digital technologies. As asset managers have evolved to become more automated and utilise a plethora of solutions to manage data, they have unavoidably become more vulnerable to serious cyber attacks. The simple fact is, cyber criminals have an exponentially higher number of attack surfaces to utilise, from cloud computing systems to mobile devices and the Internet of Things.  »


other gfm publications