It’s Monday morning. You’ve barely had time to set your coffee down on your desk and pull up your email when the head of technology steps into your office unannounced. His breathless, panic-stricken voice can barely get the words out, yet you somehow know why he’s there before he opens his mouth to utter the words you’ve been dreading: “I think we’ve had a breach.” You’re suddenly at a loss for words, managing only a slight response, as if the question will make the issue go away: “A breach?” Almost instinctively the two of you look at each other and simultaneously ask, “What do we do?”
Fill in & submit the form below to download this Whitepaper
Your download will appear below momentarily.
Subscribe to CSS Blog
CSS frequently publishes blog posts which are written by our team from their observations in the field, at conferences and through experiences with compliance professionals. These posts are designed to further knowledge and share industry best practices. Topics run the gamut, including Form ADV, cybersecurity, MiFID II, position limit monitoring, technology challenges and more. Complete and submit the brief form below to receive notifications when we publish new content.