Getting Smart about Cybersecurity

Most firms have addressed cybersecurity in one aspect or another, thinking a few access controls and anti-virus programs are the silver bullet. However very few firms have a holistic cyber program in place, often lacking in high-risk areas while having an excess of controls in others, wasting time and resources that should be spent elsewhere. By taking a step back and examining a cyber program, these risk areas can be properly mitigated, reducing data loss, reputation, downtime and monetary risks.

Topics covered in this CCAST include:

  • Creating an effective cybersecurity program
  • Methods of testing and improving controls
  • Drafting policies and procedures
  • Common areas of deficiency
  • Answers to your cyber risk questions

Fill in & submit the form below to download this ComplianceCast™

Thank you!

Your download will appear below momentarily.

Download Now.


Subscribe to CSS Blog

CSS frequently publishes blog posts which are written by our team from their observations in the field, at conferences and through experiences with compliance professionals. These posts are designed to further knowledge and share industry best practices. Topics run the gamut, including Form ADV, cybersecurity, MiFID II, position limit monitoring, technology challenges and more. Complete and submit the brief form below to receive notifications when we publish new content.

Latest Content

Breakdown of OCIE’s COVID-19 Compliance Risks Alert

The SEC’s “Office of Compliance Inspections and Examinations (“OCIE”) issued an Alert today regarding “Select COVID-19 Compliance Risks for Investment Advisers and Broker-Dealers.” OCIE shared observations regarding six broad categories: protection of investors’ assets; supervision of personnel; practices relating to fees, expenses, and financial transactions; investment fraud; business continuity; and the protection of investor and … Continued

Are Investment Managers Going to Have More KIDs?

Let us be clear…. we’re actually talking about the potential increase in production of point-of-investment disclosure documents for investment managers. The complications and stress of Brexit just got a whole lot more real for many UK- and EU-based investment management companies that are subject to rules requiring production of UCITS KIID (Key-Investor-Information-Document) and PRIIPs KID … Continued

Do You Feel Confident Your Password Hasn’t Been Hacked?

As a cybersecurity consultant, I am often asked if some of the threats we industry practitioners talk about are overstated. Hyped up fear as a sales tactic. The simple answer is no. The fear is not overstated, and the risks all too real – which helps to explain why cyber remains a top priority for … Continued