SlideShare a Scribd company logo
1 of 2
Download to read offline
financial-protection

In the wake of the massive probe into insider trading at hedge funds, where feds have been
able to level charges against individuals via evidence obtained from wire taps and covert
audio recordings, hedge fund managers are having their offices and homes swept for
listening gizmos, according to the FT. In the recent arrest of former SAC portfolio manager
Don Longeueil, for instance, the FBI's complaint is filled with evidence that came from his ex-
best friend, Noah Freeman, who wore a recorder as they talked about damaging disk drives.
The case against Galleon and Raj Rajaratnam, and specialists at expert network companies,
were built using identical methods.


The FT spoke to various security companies that implement sweeps for bugs and they all
said they'd seen a tremendous surge in requests for their expert services by money
managers. The founder of Insite Security, a security and risk administration business situated
in New York, told the FT, In the last 6 months, there has been an extremely increased
fascination with electronic sweeps for hedge funds. They’re working harder at clamping down
on their information security and making sure the telephones are safeguarded and the office
spaces aren’t being bugged. We’ve also been instructed to sweep traders’ homes. That story
was echoed by yet another security agency, called Guidepost Solutions, which has also
experienced a spike in calls from hedge funds which have arisen "out of the government’s
current investigations.” The head of Guidepost, Andrew O’Connell, said: “The hedge funds
calling for these facilities, which include sweeps but also compliance assistance, has grown
1000% over the last year.”


A lot has changed in the hedge fund segment throughout the years. New limitations,
increased investor functional requirements and taking on markets have led to changes in the
way funds ply their trade. Debatably one of the most considerable changes we’ve seen in the
realm of technology operations is an increased focus on security and data protection. On a
relatively regular basis, we learn about high-profile security breaches by criminal and state-
sponsored groups attempting to get access to susceptible material. The market is involved in
an arms race as security pitfalls and threats regularly change, while hedge funds and their
investors elevate their security poses.


Investors have gotten savvier on the subject of technology, desirous to better appreciate the
methods and processes that enterprises have in place to guide their daily operations. And
with the frequency of new public cloud programs, such as storage devices and sharing
services like Dropbox, firms and investors alike are forced to take particular notice at their
security profiles to make certain all essential procedures are taken to secure their
information. In order to properly manage security risks, firms must be practical. Conducting a
weakness evaluation is an effective way to measure the threat level for your firm and so
gauge the steps needed to combat the problems. They often expose dangerous activity
formerly unseen. Even simple security suggestions can go a great distance in remedying
complicated and expensive threats in the future. The most prevalent security threats often
stem from out-of-date network and anti-virus patches, application updates and Browser
activity.

More Related Content

What's hot

Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk trade
John Davis
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmine
Evelyne Oreskovich
 
The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach Column
Michael Sexton
 

What's hot (13)

Unisa 2010
Unisa 2010Unisa 2010
Unisa 2010
 
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
 
cyber crime
cyber crime cyber crime
cyber crime
 
SLVA - Privacy Framework and Approach
SLVA - Privacy Framework and ApproachSLVA - Privacy Framework and Approach
SLVA - Privacy Framework and Approach
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk trade
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmine
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threats
 
Deception Technology Market – Overview of advancements in innovation 2025
Deception Technology Market – Overview of advancements in innovation 2025Deception Technology Market – Overview of advancements in innovation 2025
Deception Technology Market – Overview of advancements in innovation 2025
 
The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach Column
 
IT Business Law Assignment Help
IT Business Law Assignment HelpIT Business Law Assignment Help
IT Business Law Assignment Help
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
What Lawyers Need to Know About Your Company's Security
What Lawyers Need to Know About Your Company's SecurityWhat Lawyers Need to Know About Your Company's Security
What Lawyers Need to Know About Your Company's Security
 

Similar to financial-protection

Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
Adriana Sanford
 
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Tania Mushtaq
 
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
Matthew Magner
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
nettletondevon
 
LogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperLogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector Whitepaper
Tom Salmon
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Mark Baker
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Mark Baker
 

Similar to financial-protection (20)

Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Data Security Trends - Q4 2018 M&A Report
Data Security Trends - Q4 2018 M&A ReportData Security Trends - Q4 2018 M&A Report
Data Security Trends - Q4 2018 M&A Report
 
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
 
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
LogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperLogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector Whitepaper
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 

financial-protection

  • 1. financial-protection In the wake of the massive probe into insider trading at hedge funds, where feds have been able to level charges against individuals via evidence obtained from wire taps and covert audio recordings, hedge fund managers are having their offices and homes swept for listening gizmos, according to the FT. In the recent arrest of former SAC portfolio manager Don Longeueil, for instance, the FBI's complaint is filled with evidence that came from his ex- best friend, Noah Freeman, who wore a recorder as they talked about damaging disk drives. The case against Galleon and Raj Rajaratnam, and specialists at expert network companies, were built using identical methods. The FT spoke to various security companies that implement sweeps for bugs and they all said they'd seen a tremendous surge in requests for their expert services by money managers. The founder of Insite Security, a security and risk administration business situated in New York, told the FT, In the last 6 months, there has been an extremely increased fascination with electronic sweeps for hedge funds. They’re working harder at clamping down on their information security and making sure the telephones are safeguarded and the office spaces aren’t being bugged. We’ve also been instructed to sweep traders’ homes. That story was echoed by yet another security agency, called Guidepost Solutions, which has also experienced a spike in calls from hedge funds which have arisen "out of the government’s current investigations.” The head of Guidepost, Andrew O’Connell, said: “The hedge funds calling for these facilities, which include sweeps but also compliance assistance, has grown 1000% over the last year.” A lot has changed in the hedge fund segment throughout the years. New limitations, increased investor functional requirements and taking on markets have led to changes in the way funds ply their trade. Debatably one of the most considerable changes we’ve seen in the realm of technology operations is an increased focus on security and data protection. On a relatively regular basis, we learn about high-profile security breaches by criminal and state- sponsored groups attempting to get access to susceptible material. The market is involved in an arms race as security pitfalls and threats regularly change, while hedge funds and their investors elevate their security poses. Investors have gotten savvier on the subject of technology, desirous to better appreciate the methods and processes that enterprises have in place to guide their daily operations. And with the frequency of new public cloud programs, such as storage devices and sharing services like Dropbox, firms and investors alike are forced to take particular notice at their security profiles to make certain all essential procedures are taken to secure their information. In order to properly manage security risks, firms must be practical. Conducting a weakness evaluation is an effective way to measure the threat level for your firm and so gauge the steps needed to combat the problems. They often expose dangerous activity formerly unseen. Even simple security suggestions can go a great distance in remedying complicated and expensive threats in the future. The most prevalent security threats often
  • 2. stem from out-of-date network and anti-virus patches, application updates and Browser activity.