The U.S. Securities and Exchange Commission (“SEC”) has begun to focus in earnest on cybersecurity-related issues at the SEC’s regulated investment adviser and broker-dealer firms. In April 2014, the SEC Office of Compliance Inspections and Examinations (“OCIE”) announced its Cybersecurity Initiative in a National Exam Program (“NEP”) Risk Alert. In response, this presentation will cover compliance and technological aspects of a cybersecurity risk assessment and steps firms are taking to enhance cybersecurity protections.
The SEC's Risk Alert and a Guide to Third Party Due Diligence Best PracticeCordium
The Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) recently issued a Risk Alert describing current industry trends and practices in investment advisers’ due diligence on alternative investment vehicles, as well as certain deficiencies observed in several of the advisory firms examined.
In response, Cordium is hosting a Webinar which will cover the SEC observations as related to third party due diligence background checks and best practice for advisers that are fiduciaries acting in the best interest of their clients with an open Question and Answer session to follow.
Please join the team at Cordium as they discuss some suggested best practice guidelines regarding third party due diligence background checks and the observations highlighted by the SEC in their recently issued Risk Alert.
Topics for discussion will include:
- Conducting comprehensive background checks of managers, key personnel and entities
- Verifying critical service provider relationships
- Performing regulatory history checks
- Review of offering document materials, information and data directly from the managers of alternative investments
- Validating information provided by managers of alternative investments
- Formalizing due diligence policies and procedures
- Annual reviews
Cordium Webinar: The Do’s and Don’ts of the FINRA Audit Questionnaire - June ...Cordium
During the routine audit process, FINRA Registered Broker Dealers usually receive an extensive questionnaire. Cordium held a webinar with our Broker Dealer expert, who possesses 30 years of industry experience, that ran through some of the typical questions in the questionnaire and provided guidance aimed at helping Broker Dealers navigate the FINRA Questionnaire and feel more prepared for a future audit.
The 'Never before examined initiative': Navigating the SEC Examination Process Cordium
On February 20, 2014, the U.S. Securities and Exchange Commission (“SEC”) announced that they will be commencing their “Never-Before-Examined” Initiative. As part of this Initiative, they anticipate examining a “significant percentage” of registered investment advisers (“RIAs”) that have never been examined, focusing on those that have been registered three or more years. In response, This presentation will covers key aspects of this new initiative as well as practical advice for navigating the SEC examination process as applicable to all RIAs
In July 2014 the FCA published its discussion paper on the use of dealing commission regime which included the findings of its thematic review. This paper and the accompanying speech by Martin Wheatley publicly backed ESMA’s proposals for the full unbundling of research from execution as part of MiFID II. Should the MiFID II text be implemented as currently proposed, it would result in a major change of the way execution and research services are paid for in Europe.
Irrespective of where MiFID II comes out, the FCA’s recent banning of payments out of dealing commission for corporate access and the findings of the thematic review, will no doubt mean that some firms are unsure of what they should be doing to meet the FCA’s expectations. In response to this uncertainty, Cordium are hosting a webinar with Will Morrell who has recently joined Cordium from the FCA where he led the use of dealing commission thematic review and Michael Hufton, a former fund manager and CEO of a new type of investor relations company. During this webinar we will help firms understand what the FCA expects and share some of our experiences of what firms are doing to meet these expectations.
Topics for discussion include:
- What is the FCA concerned about?
- What does the FCA expect?
- How do you evidence to the FCA that you are meeting their expectations?
- The challenges and potential solutions of meeting these expectations
Presented by:
Will Morrell, Consultant, Cordium
Michael Hufton, Director, ingage
Date: Wednesday, 15th October 2014
Time: 2:00 - 3.00pm BST
Duration: 1 hour
Cordium Webinar: Broker Dealer Year-End to Do List 2014Cordium
As we near the close of 2014, FINRA Registered Broker-Dealers are completing their year-end compliance obligations. This compliance task list provides guidance to help ensure that the final months of 2014 are effective and stress-free.
AIFMD Surgery Webinars: Remuneration Code; Regulatory and Tax ImplicationsCordium
Cordium continues its series of AIFMD Surgery Webinars, which allows fund managers to put their questions forward on key AIFMD areas in a real time question and answer session, with a session on the Remuneration Code.
Once a firm is authorised under the AIFMD, it will be subject to the Remuneration Code as set in SYSC 19B of the FCA handbook.
However, the full AIFMD remuneration regime (and specifically the pay-out process rules) only applies to full performance periods. Thus, it will first apply to awards of variable remuneration to relevant staff following the first full year after authorisation. For most, this is likely to affect awards paid in 2016.
Although 2016 seems a long way off for most, firms should be considering now, how they structure remuneration payments.
Please join the team at Cordium, as they discuss the various options open to AIFMs as well as the tax implications.The webinar will cover;
The AIFMD Remuneration code – an overview - Bobby Johal, Cordium
- Who, what, where
- FCA guidance - a measured approach
- The remuneration challenge
Remuneration and tax - Laurence Parry, Cordium
- When it’s simple – employee
- When it’s more complicated – LLP members
- When it gets interesting – when it’s not remuneration at all
Malta and Remuneration - Adam de Domenico, Cordium Malta
- Remuneration in accordance with MFSA
- Malta as a possible solution for the Remuneration Code
Panel discussion - What doesn't the Remuneration Code say? - moderated by Jonathan Wilson, Cordium
Questions and Answer session
The SEC's Risk Alert and a Guide to Third Party Due Diligence Best PracticeCordium
The Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) recently issued a Risk Alert describing current industry trends and practices in investment advisers’ due diligence on alternative investment vehicles, as well as certain deficiencies observed in several of the advisory firms examined.
In response, Cordium is hosting a Webinar which will cover the SEC observations as related to third party due diligence background checks and best practice for advisers that are fiduciaries acting in the best interest of their clients with an open Question and Answer session to follow.
Please join the team at Cordium as they discuss some suggested best practice guidelines regarding third party due diligence background checks and the observations highlighted by the SEC in their recently issued Risk Alert.
Topics for discussion will include:
- Conducting comprehensive background checks of managers, key personnel and entities
- Verifying critical service provider relationships
- Performing regulatory history checks
- Review of offering document materials, information and data directly from the managers of alternative investments
- Validating information provided by managers of alternative investments
- Formalizing due diligence policies and procedures
- Annual reviews
Cordium Webinar: The Do’s and Don’ts of the FINRA Audit Questionnaire - June ...Cordium
During the routine audit process, FINRA Registered Broker Dealers usually receive an extensive questionnaire. Cordium held a webinar with our Broker Dealer expert, who possesses 30 years of industry experience, that ran through some of the typical questions in the questionnaire and provided guidance aimed at helping Broker Dealers navigate the FINRA Questionnaire and feel more prepared for a future audit.
The 'Never before examined initiative': Navigating the SEC Examination Process Cordium
On February 20, 2014, the U.S. Securities and Exchange Commission (“SEC”) announced that they will be commencing their “Never-Before-Examined” Initiative. As part of this Initiative, they anticipate examining a “significant percentage” of registered investment advisers (“RIAs”) that have never been examined, focusing on those that have been registered three or more years. In response, This presentation will covers key aspects of this new initiative as well as practical advice for navigating the SEC examination process as applicable to all RIAs
In July 2014 the FCA published its discussion paper on the use of dealing commission regime which included the findings of its thematic review. This paper and the accompanying speech by Martin Wheatley publicly backed ESMA’s proposals for the full unbundling of research from execution as part of MiFID II. Should the MiFID II text be implemented as currently proposed, it would result in a major change of the way execution and research services are paid for in Europe.
Irrespective of where MiFID II comes out, the FCA’s recent banning of payments out of dealing commission for corporate access and the findings of the thematic review, will no doubt mean that some firms are unsure of what they should be doing to meet the FCA’s expectations. In response to this uncertainty, Cordium are hosting a webinar with Will Morrell who has recently joined Cordium from the FCA where he led the use of dealing commission thematic review and Michael Hufton, a former fund manager and CEO of a new type of investor relations company. During this webinar we will help firms understand what the FCA expects and share some of our experiences of what firms are doing to meet these expectations.
Topics for discussion include:
- What is the FCA concerned about?
- What does the FCA expect?
- How do you evidence to the FCA that you are meeting their expectations?
- The challenges and potential solutions of meeting these expectations
Presented by:
Will Morrell, Consultant, Cordium
Michael Hufton, Director, ingage
Date: Wednesday, 15th October 2014
Time: 2:00 - 3.00pm BST
Duration: 1 hour
Cordium Webinar: Broker Dealer Year-End to Do List 2014Cordium
As we near the close of 2014, FINRA Registered Broker-Dealers are completing their year-end compliance obligations. This compliance task list provides guidance to help ensure that the final months of 2014 are effective and stress-free.
AIFMD Surgery Webinars: Remuneration Code; Regulatory and Tax ImplicationsCordium
Cordium continues its series of AIFMD Surgery Webinars, which allows fund managers to put their questions forward on key AIFMD areas in a real time question and answer session, with a session on the Remuneration Code.
Once a firm is authorised under the AIFMD, it will be subject to the Remuneration Code as set in SYSC 19B of the FCA handbook.
However, the full AIFMD remuneration regime (and specifically the pay-out process rules) only applies to full performance periods. Thus, it will first apply to awards of variable remuneration to relevant staff following the first full year after authorisation. For most, this is likely to affect awards paid in 2016.
Although 2016 seems a long way off for most, firms should be considering now, how they structure remuneration payments.
Please join the team at Cordium, as they discuss the various options open to AIFMs as well as the tax implications.The webinar will cover;
The AIFMD Remuneration code – an overview - Bobby Johal, Cordium
- Who, what, where
- FCA guidance - a measured approach
- The remuneration challenge
Remuneration and tax - Laurence Parry, Cordium
- When it’s simple – employee
- When it’s more complicated – LLP members
- When it gets interesting – when it’s not remuneration at all
Malta and Remuneration - Adam de Domenico, Cordium Malta
- Remuneration in accordance with MFSA
- Malta as a possible solution for the Remuneration Code
Panel discussion - What doesn't the Remuneration Code say? - moderated by Jonathan Wilson, Cordium
Questions and Answer session
ICIL is one among few companies in Pakistan who is providing key AML solutions in accordance with country AML regulatory framework to Pakistan banking industry & sectors regulated by State Bank of Pakistan (SBP) & Security & Exchange Commission of Pakistan (SECP).
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...PECB
This presentation was delivered by John Boscariol, Partner in the Litigation Group at McCarthy Tétrault, at the ISO 37001 & Anti-Bribery PECB Insights Conference.
IT enabled services, also called web enabled services covers the entire range of operations which exploit information technology for improving efficiency of an organization.
Increasingly as companies look at acquisition targets, those acquisition targets operated on a multi-jurisdictional basis, and often the buyer and the seller will be from different jurisdictions themselves. This session looks at the key issues around cross Border M&A including the role of vendor due diligence, data rooms, conditionality, the approach to warranties and indemnities and limitations as well as the mechanics to deal with multiple closings and integration.
Operational innovations in AML/CFT compliance processes and financial inclus...CGAP
This report contains the findings of a research project to identify and categorize leading operational AML* compliance practices among financial service providers for the identification, verification and ongoing monitoring and management of lower income customers. This project began with the hypothesis that an increasing number of financial service providers with products targeting lower income population segments are reducing client acquisition and monitoring costs, and improving efficiency and effectiveness of the processes in scope.
All AIFMs managing or marketing an AIF into the European Union will have to file an Annex IV report to the Financial Conduct Authority (FCA) or other National Competent Authority (NCA). A non EEA AIFM will have to make a report to the NCA of each member state in which an AIF is marketed. The Annex IV reporting obligation is live and for some firms this will mean fulfilling that obligation in October 2014, with all firms having to report by 31 January 2015.
FCPA Enforcement Tends and Their Impact on Corporate Compliance ProgramsPECB
This presentation was delivered at the ISO 37001 & Anti-Bribery PECB Insights Conference by William Marquardt, Director at Berkeley Research Group LLC in Florida
Streamlining for success: M&A divestment and separation trendsEversheds Sutherland
Divestments are a complex, challenging and necessary part of the business lifecycle. Despite this, up until the financial crisis they received little attention in strategic M&A reviews. We will consider the implications of the research published in our recent Global M&A report, Streamlining for success, along with the challenges of managing divestments and lessons learnt in recent years.
Countering Financial Crime - The Importance of Effective TrainingAperio Intelligence
We are a corporate intelligence and financial crime advisory firm based in the City of London. We specialise in: conducting enhanced due diligence on high risk customers and third parties; integrity due diligence on critical acquisitions and investments; market entry and political risk analysis; and investigations. We provide tailored training and advisory services relating to financial crime, in particular anti-money laundering and sanctions compliance. Our clients include some of the world’s leading regulated financial institutions and corporations. Our team has decades of collective experience in advising clients on financial crime and intelligence gathering, helping them to manage risk and maximise potential.
Contact us today for further information on how we can help you.
ICIL is one among few companies in Pakistan who is providing key AML solutions in accordance with country AML regulatory framework to Pakistan banking industry & sectors regulated by State Bank of Pakistan (SBP) & Security & Exchange Commission of Pakistan (SECP).
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...PECB
This presentation was delivered by John Boscariol, Partner in the Litigation Group at McCarthy Tétrault, at the ISO 37001 & Anti-Bribery PECB Insights Conference.
IT enabled services, also called web enabled services covers the entire range of operations which exploit information technology for improving efficiency of an organization.
Increasingly as companies look at acquisition targets, those acquisition targets operated on a multi-jurisdictional basis, and often the buyer and the seller will be from different jurisdictions themselves. This session looks at the key issues around cross Border M&A including the role of vendor due diligence, data rooms, conditionality, the approach to warranties and indemnities and limitations as well as the mechanics to deal with multiple closings and integration.
Operational innovations in AML/CFT compliance processes and financial inclus...CGAP
This report contains the findings of a research project to identify and categorize leading operational AML* compliance practices among financial service providers for the identification, verification and ongoing monitoring and management of lower income customers. This project began with the hypothesis that an increasing number of financial service providers with products targeting lower income population segments are reducing client acquisition and monitoring costs, and improving efficiency and effectiveness of the processes in scope.
All AIFMs managing or marketing an AIF into the European Union will have to file an Annex IV report to the Financial Conduct Authority (FCA) or other National Competent Authority (NCA). A non EEA AIFM will have to make a report to the NCA of each member state in which an AIF is marketed. The Annex IV reporting obligation is live and for some firms this will mean fulfilling that obligation in October 2014, with all firms having to report by 31 January 2015.
FCPA Enforcement Tends and Their Impact on Corporate Compliance ProgramsPECB
This presentation was delivered at the ISO 37001 & Anti-Bribery PECB Insights Conference by William Marquardt, Director at Berkeley Research Group LLC in Florida
Streamlining for success: M&A divestment and separation trendsEversheds Sutherland
Divestments are a complex, challenging and necessary part of the business lifecycle. Despite this, up until the financial crisis they received little attention in strategic M&A reviews. We will consider the implications of the research published in our recent Global M&A report, Streamlining for success, along with the challenges of managing divestments and lessons learnt in recent years.
Countering Financial Crime - The Importance of Effective TrainingAperio Intelligence
We are a corporate intelligence and financial crime advisory firm based in the City of London. We specialise in: conducting enhanced due diligence on high risk customers and third parties; integrity due diligence on critical acquisitions and investments; market entry and political risk analysis; and investigations. We provide tailored training and advisory services relating to financial crime, in particular anti-money laundering and sanctions compliance. Our clients include some of the world’s leading regulated financial institutions and corporations. Our team has decades of collective experience in advising clients on financial crime and intelligence gathering, helping them to manage risk and maximise potential.
Contact us today for further information on how we can help you.
'More Rough Winds that shake the darling Buds of May' Breakfast Seminar, 20th...Cordium
With apologies to the Bard himself, we hoped for at least a few months of consolidation after the implementation of AIFMD! However, since our regulatory forum in February, the FCA has released a number of key Consultation Papers ('CPs'), Discussion Papers ('DPs') in addition to the results of their thematic review on Market Abuse. We also currently have a backdrop of political uncertainty which may or may not affect our membership of the EU as well as corporate and personal taxation. There is a good deal to keep us busy in the months ahead.
At this breakfast seminar we brought together some of the most pertinent regulatory issues that could affect asset management and securities firms, as well as examined post-election tax implications.
Seminar topics
Post-election Tax implications – Laurence Parry, Private Client Partner, Cordium
Remuneration and Valuation – Implications of the FCA’s consultation on valuation and the European consultation on the proposal to extend remuneration requirements to IFPRU firms – Bobby Johal, Management Consultant, Technical, Cordium
Identifying the key messages from the FCA’s Thematic Review on Market Abuse for managers to take on board – Jonathan Wilson, Project Director, EMEA, Cordium
July 22, 2014 marks the end of the Alternative Investment Fund Manager Directive (‘the Directive’) one year transition period. With their applications submitted, managers now must turn their attention to how becoming an AIFM will affect the day-today running of their compliance obligations. This seminar will consider the various oversight functions required under the Directive and what this means for the scope of compliance monitoring that firms will need to undertake once the Directive is implemented. In addition we will consider the increased FCA notification requirements introduced under the Directive.
A key player in the oversight model is the Depositary and our guest speaker from GlobeOp Markets Ltd. will also consider the extent to which the Depositary’s risk assessment takes account of the quality and effectiveness of an AIFM’s compliance arrangements.
Critical Issues in School Board Cyber SecurityDan Michaluk
An hour presentation to school board officials in Ontario on cyber security issues, covering the threat environment, defense, incident response, threat information sharing and vendor issues.
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Shawn Tuma
Presentation to the Association of Continuity Professionals, North Texas Chapter, by Cybersecurity & Data Privacy Attorney Shawn Tuma, on October 19, 2017. For more information visit www.businesscyberrisk.com
Presentation to the Texas Bar CLE program on Contract Drafting, Review and Negotiation on December 5, 2017 in Austin, Texas, by Cybersecurity & Data Privacy Attorney Shawn Tuma, on October 19, 2017. For more information visit www.businesscyberrisk.com
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
Get an in-depth analysis of the framework of insider threats, its legal considerations and global privacy implications, and best practices to build an effective insider threat program.
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
Part 1 of this webinar series provided an overview of cybersecurity and explained the cyber risks and legislation affecting nonprofits. In part 2 of the series, Imran Ahmad of Miller Thomson, LLP returns to answer your questions on cybersecurity and to delve deeper into cybersecurity maintenance and best practices to avoid data breaches. This includes the implementation of measures to prevent data breaches in the pre-attack phase, to the implementation of security best practices in the event of a cyber attack or breach.
What you will learn:
· How to develop key cybersecurity-related documents;
· How to maintain an internal matrix of when to notify affected individuals;
· How to review contracts from a cybersecurity compliance perspective.
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...Lucien Pierce
Between 2011 and 2015, 80% of large law firms suffered some sort of cyber security breach. Taking into account the Protection of Personal Information Act and other privacy requirements, the Law Society of South Africa's L.E.A.D, asked me to host a webinar to educate South African law firms on how to protect themselves. The tips are just as applicable to most businesses. Here's my presentation. You can find a recording of the presentation here: http://tinyurl.com/zt7p6uq
Similar to Cybersecurity and the regulator, what you need to know (20)
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2. The webinar will begin shortly…
You can join either by VoIP or dial in
by telephone
Follow call in details if you select
to use Telephone audio
3. Cybersecurity and the Regulator,
What You Need to Know
July 24, 2014
Presented By:
Patrick Shea
Partner, Cordium
James Hogbin
Director, IP Sentinel
4. Agenda
o Regulatory Focus on Cybersecurity
o Key Concerns Related to Financial Services
o Basic Practices
o Steps to be Taking
o Risk Assessment
o Controls related to 3rd
Party Providers
o Dealing with an “Incident”
o Insurance
o Training, Testing and Monitoring
o Why Security
o Threat Surface
o Protecting What
o From Who
o Security Posture
o Forensic Readiness
o Security Operations
o What do bad actors do & how to catch them
o Checklist
4
7. Agenda – Part One
o Regulatory Focus on Cybersecurity
o Key Concerns Related to Financial Services
o Basic Practices
o Steps to be Taking
o Risk Assessment
o Controls related to 3rd
Party Providers
o Dealing with an “Incident”
o Insurance
o Training, Testing and Monitoring
7
8. Regulatory Focus on Cybersecurity
o Governments
o EU : Cyber Security Strategy
o US : The Comprehensive National Cybersecurity Initiative
o UK : Office of Cyber Security and Information Assurance
o Regulators
o CFTC : Staff Advisory No. 14-21 Gramm-Leach-Bliley Act Security
Safeguards
o SEC : OCIE Cybersecurity Initiative
o FCA : FCA Risk Outlook 2014
8
9. Regulatory Focus on Cybersecurity
o SEC/OCIE Examination Priorities for 2014 include focus on
technology, including cybersecurity preparedness.
o January 2014, FINRA announces targeted exam assessing its
regulated firms’ approaches to managing cybersecurity threats.
o Gather a better understanding and share findings with regulated firms.
o March 2014 - SEC Sponsors Cybersecurity Roundtable
o Cyber threats are "first on the Division of Intelligence’s list of global threats,
even surpassing terrorism.”
SEC Chair Mary Jo White (Roundtable opening remarks).
9
10. Regulatory Focus on Cybersecurity
o April 2014 Risk Alert from the SEC outlines OCIE’s cybersecurity
initiative:
o Examinations of more than 50 BDs and RIAs focused on:
o Entity’s cybersecurity governance;
o Identification and assessment of cybersecurity risks;
o Protection of networks and information;
o Risks associated with remote customer access and funds transfer requests;
o Risks associated with vendors and other third parties;
o Detection of unauthorized activity; and
o Experiences with certain cybersecurity threats.
o Risk Alert included a sample document request, to be used during exams.
Provided to raise awareness and empower compliance professionals.
10
11. Key concerns
o Financial services sector is vulnerable
o Perception that cybersecurity is lacking and need to raise awareness
o Client data at risk – Consumer Protection
o Well-established reliance on service providers
o Sensitive data being transferred & 3rd
party security protocols critical
o Hackers with the upper-hand
o “Insider” Risk
o Employees do things (intentionally or unintentionally)
that compromise the firm’s security.
11
12. Basic Practices
o Holistic approach needed.
o Threat to cybersecurity is NOT just an IT issue;
o Business issue & should be part of your firm’s risk
management function.
o Top-down approach to cybersecurity!
o Create & perpetuate a culture of involvement and
awareness.
o Everyone at the firm should be involved, educated and regularly
trained.
o Policies and procedures to be reviewed, upgraded & tailored to
your firm.
o Past intrusions/breaches? Learn from them.
12
13. Steps to be Taking: Risk Assessment
o Identify your cybersecurity & physical threats, vulnerabilities and
potential consequences to your business.
o Determine what you have in place today with respect to
cybersecurity.
o What needs to be protected?
o How are you presently managing/monitoring security?
o What technology?
o Who is responsible?
o How are you managing employee access to the systems/data?
o What data is leaving the firm? Where it is going?
o Answers to these questions help drive your Written Information
Security Policy (“WISP”).
13
14. Steps to be Taking: Controls related to 3rd
Party
Providers
o Need to understand cybersecurity policies and procedures of your
vendors & key service providers
o Focus on vendors with access to your network, customer data and/or other
sensitive information
o Gather their WISP and related documentation
o Best practice – Questionnaire to be sent to vendors
o Perform due diligence on, and monitor, their practices
o Review your contracts with those vendors
o Try and negotiate for prompt notice of any
material incidents
14
15. Steps to be Taking: Dealing with an “Incident”
o Simulations are an opportunity to test your plan “in action”
o Detecting & reporting unauthorized activity
o Monitoring system (Who? What? How?)
o Develop clear escalation procedures and robust cyber-incidence
response plans.
o Information sharing = Transparency
o FINRA notification requirements
o OCIE wants to hear about significant issues and data breaches
o Information-sharing arrangements with law enforcement such as the FBI?
o Possible reporting at State-level
o Disclosure to investors/clients needed?
15
16. Steps to be Taking: Insurance
o Cyber liability insurance protection -- important step
o Review your current policies
o SEC Risk Alert
o Do you maintain insurance that specifically covers losses and expenses
attributable to cybersecurity threats?
o Know what is covered & what is excluded
o If/when you file claims, document the issues and the resolution
16
17. Steps to be Taking: Training, Testing &
Monitoring
o Educate all employees on risks & responses
o Front line defense
o Help employees stay vigilent & teach them what to do if the spot an issue
o Bring your plan to life through routine testing
o Part of your risk-assessment plan
o Focus on key risks as relating to your business
o Develop a monitoring program so risks and/or breaches
can be promptly identified, reviewed and resolved.
o Don’t stop there – document & consider whether you
need to report to authorities and/or clients.
17
19. Agenda – Part Two
o Why Security
o Threat Surface
o Protecting What
o From Who
o Security Posture
o Forensic Readiness
o Security Operations
o What do bad actors do & how to catch them
o Checklist
19
20. The Facts
o If a skilled hacker/state actor wants to get in to your
systems they will.
o The biggest threat is your existing staff.
o It is a case of when, not if.
o It is still important to try to prevent breaches,
when they happen it is essential to
detect them, know their scope and
be able to remediate the damage.
20
21. Why Security?
o Government & Regulatory Focus (discussed above)
o Market Participants
“Cyber-crime, Securities Markets and Systemic Risk”
CPSS-IOSCO & World Federation of Exchanges (WFE)
53 % of 46 exchanges surveyed had been subject to a cyber-attack over the preceding
12 months.
“Beyond the Horizon: A White Paper to the Industry on Systemic risk”
Depository Trust & Clearing Corporation (DTCC)
Identified cyber-crime as the biggest threat to market stability, putting it ahead of
counterparty risk and concentration risk at central counterparty clearing houses
(CCPs).
“70% of managers do not feel ‘well prepared’ to deal with a cyber-security threat.”
cooconnect.com 2014
21
23. Protecting What?
o Company Information
o Trading Models
o CRM Data – Clients & Prospects
o Investment Agreements
o Trading Arrangements
o Personnel Information
o Company Brand
o Company Systems
o Bank Accounts/Payroll
o Trading Infrastructure
o Payment Processing
23
24. From Who?
Information Leakage
oEmployees - 37% of the time
o Mistake
o Deliberate
oSystem Glitch – 29% of the time
oExternal Bad Actors – 34% of the time
o Malware
o Ransomware
o Remote Access/Control
o Fraud
o Theft
o Processing Cycles – Bitcoin mining
o Data Storage - Hosting Illegal content
o Network Capacity - DDoS
24
25. Security Posture
Traditional “Citadel” approach
o Hard outer shell
o Soft core
Once you’re in you’re in!
Current Thinking
o Layered security
o Digital Sand Traps
o SIEM = Log Aggregation & Monitoring
o TRAINING
It will happen so be prepared
25
26. Security Operations
o How does a good hacker behave
o As a normal employee NOT L33t Hax0r
o Nothing obviously out of the ordinary
o Will attempt to
o Enter, Elevate Privileges, Retain Access
o Look for Odd usage patterns.
o e.g. Dev user looking at Sales.xls
o Logins @ odd times
o Sequential access to systems
o Unusual Traffic to or from devices
o Network or Protocol (SNMP, HTTP)
o Unusual services on devices
o Web server, ssh, rdp etc
26
27. Security Operations
o How to frustrate L33t Hax0rs
o Staff Training
o Segmented Networks with Air Gaps
o Regular Internal Device Asset scans
o Multi layer security
o Keep everything patched
o Remove server banner information
o Outbound as well as inbound firewall
27
28. Security Operations
o How to find them
o Staff Training
o Treat the entire thing as insider threat
o Because it is.
o Centralise Log Management & use it
o http://fingerprint.ip-sentinel.com
user=demo, password=demo
o Detect rate based metrics across environment
o Honey trap servers
o Seed CRM data
o Network traffic/protocol analysis & monitoring
o Regular Device service scanning
o Firewall/web proxy configuration
28
29. Hackers need only be
lucky once, you have to
be good all the time.
29