CYBER RISK AND SECURITY 2015

32
FEATURING Ace IT // Capital Support // Eze Castle Integration // eSentire // Matsco Solutions // McGladrey // netConsult // Options IT // Dell SecureWorks STAFF TRAINING A vital element to any cyber-security framework CLOUD TECHNOLOGY Private and public both viable options for funds UP-TO-DATE SOFTWARE Regular updates essential for an effective firewall CYBER RISK AND SECURITY 2015 WEEK HFM S P E C I A L R E P O R T

Transcript of CYBER RISK AND SECURITY 2015

Page 1: CYBER RISK AND SECURITY 2015

FEATURING Ace IT // Capital Support // Eze Castle Integration // eSentire // Matsco Solutions // McGladrey // netConsult // Options IT // Dell SecureWorks

STAFF TRAININGA vital element to any cyber-security framework

CLOUD TECHNOLOGYPrivate and public both viable options for funds

UP-TO-DATE SOFTWARERegular updates essential for an effective firewall

CYBER RISK AND SECURITY 2 0 1 5

WEEKHFMS P E C I A L R E P O R T

Page 2: CYBER RISK AND SECURITY 2015

What’s keeping you up at night?

C Y B E R S E C U R I T YYou are not alone. The SEC, SIFMA, FINRA, DHS and multiple other organizations are worried about the threat of cyber attacks and vulnerabilities like ShellShock.

eSentire is the leading provider of continuous active threat protection to the financial services industry. We’ve helped numerous clients exceed the expectations of regulatory associations while protecting their assets and investor interests 24x7.

We can help. Contact us today: 1.866.579.2200 | [email protected]

http://info.esentire.com/sec-exam-readiness/

Page 3: CYBER RISK AND SECURITY 2015

G U E R N S E Y 2 0 1 5

H F M W E E K . CO M 3

I N T R O D U C T I O N

REPORT EDITOR Drew Nicol T: +44 (0) 20 7832 6659 [email protected] HFMWEEK HEAD OF CONTENT Paul McMillan T: +44 (0) 20 7832 6622 [email protected] HEAD OF PRODUCTION Claudia Honerjager SENIOR SUB-EDITOR Eleanor Stanley SUB-EDITORS Luke Tuchscherer, Mary Cooch GROUP COMMERCIAL MANAGER Lucy Churchill T: +44 (0) 20 7832 6615 [email protected] SENIOR PUBLISHING ACCOUNT MANAGER Tara Nolan +44 (0) 20 7832 6612, [email protected] PUBLISHING ACCOUNT MANAGERS Amy Reed T: +44 (0) 20 7832 6618 [email protected]; Jack Duddy T: +44 (0) 20 7832 6613 [email protected]; Alex Roper T: +44 (0) 20 7832 6594 [email protected] CONTENT SALES Tel: +44 (0) 20 7832 6511 [email protected] CIRCULATION MANAGER Fay Muddle T: +44 (0) 20 7832 6524 [email protected] CEO Charlie Kerr

HFMWeek is published weekly by Pageant Media Ltd ISSN 1748-5894 Printed by The Manson Group © 2015 all rights reserved. No part of this publication may be reproduced or used without the prior permission from the publisher

Published by Pageant Media Ltd LONDONThird Floor, Thavies Inn House, 3-4 Holborn Circus, London, EC1N 2HAT +44 (0) 20 7832 6500 NEW YORK 240 W 37th Street , Suite 302, NY 10018 T +1 (212) 268 4919

HFMHED

GEF

UN

DM

AN

AGER

WEEK

he threat of a cyber breach has become increasingly acute in the past year. Criminals are constantly creating more innovative hacking tools with which to attack a fund’s valuable and sensitive data.

A string of high-profile cyber-attacks in 2014 highlighted the stark reality that, for the financial industry especially, dedicated cyber defence systems are no longer a luxury; they are a necessity.

The SEC in the US is asking managers to show they operate cyber defence software and have implemented detailed action plans in the event of a breach, as part of its guidelines on the topic.

In this HFMWeek Cyber Risk and Security Report 2015 we hear from leading cyber service providers who discuss the key points surrounding creating an effective system. HFMWeek compares the pros and cons of creating a private in-house cloud platform against an outsourced third-party provider.

HFMWeek also discusses various best practices that industry specialists are recommending to hedge funds of all sizes, and the importance of mastering the basics of password protection and staff training exercises to avoid the many phishing attempts that will come.

Many cyber industry specialists now agree that attempted cyber breaches on funds of all sizes are now inevitable. The question of whether they’re successful is up to you.

Drew NicolREPORT EDITOR

TC Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

Page 4: CYBER RISK AND SECURITY 2015

4 H F M W E E K . CO M

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5 C O N T E N T S

SECURITY

FULL SPECTRUM SECURITYGustav Marx, service development manager at Matsco Solutions Group, discusses the top security solutions available to hedge funds

TECHNOLOGY

ARE YOU REALLY SAFE?Mark Sangster, vice-president, marketing, with eSentire, speaks to HFMWeek about the lessons that can be learned from 2014’s cyber events

TECHNOLOGY

PUBLIC, PRIVATE, OR A BIT OF BOTH?Phil Ashley of netConsult discusses the public versus private cloud platforms and the factors that should guide a fund manager’s choice

CONSULTING

BE PREPARED McGladrey’s Alan Alzfan and Daimon Geopfert speak to HFMWeek about the reality of the threat facing hedge funds through cyber attack

TECHNOLOGY

GETTING STRONGER TOGETHERBob Guilbert of Eze Castle Integration explains why so many funds are opting for cloud solutions and how the industry can work together to tackle cyber crime

TECHNOLOGY

FEEL SAFE WITH MANAGED SECURITYHFMWeek catches up with Marcus Lewis of Capital Support to discuss the company’s new cyber-security suite

TECHNOLOGY

STANDING OUT FROM THE CROWDJohn Bryant, head of technology at Options IT, talks to HFMWeek about why the company’s offering is the clear choice for funds even in a busy financial marketplace

TECHNOLOGY

CHANGE STARTS FROM WITHINWarren Finkel, of ACE IT, explains why cyber-security must include a top-down approach to security awareness

TECHNOLOGY

THE ATTACK HAS EVOLVED, HAVE YOU?Dan Bonnet, sales director, Dell SecureWorks, talks to HFMWeek about the must-have features of a cyber-security service provider

05

08

11

14

17

20

23

26

28

Page 5: CYBER RISK AND SECURITY 2015

S E C U R I T Y

H F M W E E K . CO M 5

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

Security services and information technol-ogy systems are designed, tested and de-veloped to help with the prevention of data loss, limit potential system compromise and to help prevent mid- to high-level security events from occurring within a company’s

information technology environment. The latest generation of

security systems that are de-veloped offer enhanced se-curity services that are fully integrated within a growing family of shared technologies and knowledge bases that encompass and deliver the most up-to-date elements in regards to environment and system management.

Vendors and develop-ers provide regular updates, security patch releases and software versioning as an in-tegral functionality of these systems, strengthening the relationship between the central security knowledge base and control centres and

the widely dispersed security units. All the different seg-ments that make up the multitude of security systems are able to provide up-to-date industry specific security solu-tions to individuals and companies alike.

The continued development of these security patches, security software solutions and integrated hardware systems allow security staff the ability to

implement, monitor and maintain security solutions suited to their individual environments to the highest available standards. This enables companies to iden-tify and prevent malicious attempts to access sensitive data and private systems, and delivers the benefit of industry compliant solutions in an increasingly cyber se-curity conscious work envi-ronment.

With the advent of better designed and controlled se-

curity solutions, companies can, regardless of size and environment complexity, implement enterprise level

COMPANIES CAN, REGARDLESS OF SIZE AND ENVIRONMENT

COMPLEXITY, IMPLEMENT ENTERPRISE LEVEL SECURITY

SYSTEMS

Gustav Marx, service development manager at Matsco Solutions Group has worked in IT services for more than eight years and is responsible for service improvement, infrastructure design, planning and product research. Focusing on cyber-security and cloud, Marx has developed a keen understanding of technologies available and methods of implementation.

FULL SPECTRUM SECURITY GUSTAV MARX, SERVICE DEVELOPMENT MANAGER AT MATSCO SOLUTIONS GROUP, DISCUSSES THE TOP SECURITY

SOLUTIONS AVAILABLE TO HEDGE FUNDS

Page 6: CYBER RISK AND SECURITY 2015

S E C U R I T Y

6 H F M W E E K . CO M

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

security systems to manage and protect the data that requires dedicated protection in all transitory and fixed states from all possible threats; data integrity, data loss, corruption as well as internal and external access. To fully protect and maintain security within environments, these security systems are increasingly available in the marketplace, fully adaptable to different scenarios and customisable to suit any company’s budget, size and/or security requirement.

A mixture of these different technologies that are avail-able today, allow companies to be proactive in their fight against cybercrime and enables security and compliance staff to put in place preventative measures that ensures enhanced security for the users and sensitive data that resides in their respective environments. These systems are currently available as several variations of hardware or software based solutions: pure cloud-based infrastruc-tures, hybrid systems or fully dedicated onsite environ-ments. Regardless of the method of deployment all these system are able to offer the highest levels of security so-lutions that are currently available in the industry today.

There are many risks that threaten data security to-day and the increasing emergence and identification of pre-existing software loopholes, previously unnoticed exploitable routes into sensitive areas and non-secure environment access points, have placed a large burden

TOP FOUR SECURITY SOLUTIONS:

1. MALWARE, SPYWARE, ADWARE AND VIRUSES• Security solutions designed to identify, pro-tect and eradicate threats that pose security risks to systems and data: • Auto-update of heuristic and protection soft-ware system files • Continuous scanning of the environment for threats• Central management consoles and policy controls • System configuration and malicious code identification and prevention

The top systems:• Symantec endpoint protection• Trend micro anti-virus and endpoint protec-tion• Messagelabs email protection services• Mimecast email protection and scanning

2. UNAUTHORISED NETWORK ACCESS• Network and IP address monitoring, security and scanning services to prevent unauthorised access. Intrusion detection and prevention services that monitor the network for access attempts, brute force attacks, DDoS and net-work penetration attempts:

The top systems:• eSentire Network protection and monitoring services• Dell SecureWorks• Cisco Global IPS/IDS services on Firewall

units• Juniper IPS enabled Firewalls

3. CONFIDENTIAL DATA LOSS, EMAIL AND MOBILE DEVICE MANAGEMENT• DLP and sensitive data protection systems prevent unauthorised movement of sensitive data out the environment by implementing security policies, access policies and filter lists to control and prevent unauthorised data transmissions. Mobile device management allows administrators to control data, applica-tion and system access from mobile devices, personal or company owned, across any inter-net connection.

The top systems:• SMARSH DLP email services• MimeCast DLP email services• Symantec Security Management suites• Airwatch mobile device management

4. UNAUTHORISED SYSTEM ACCESS• Dual factor authentication services, domain controller and system access controls prevent unauthorised use and access to company owned services, applications and data.

The Top systems:• Cisco ISE Systems• RSA Token based authentication• VASCO dual factor Authentication systems• Domain based control servers and access lists

THE TOP 5 IMMEDIATE SECURITY THREATS:

1. MALWARE, SPYWARE, ADWARE AND VIRUSES• Introduced to environments through mail, unauthorised data transfers, websites and programs• Encapsulated as packaged software installed to devices or scripts and system files that run on system start-up• Registry configurable files and keys• File lockout and encryption to prevent access• Key logging, data capturing and data worms

2. UNAUTHORISED NETWORK ACCESS• Access is gained through unsecured network device ports and unprotected access routes• Access over SSL security flaws• Software and application backdoors and security flaws• Unauthorised access to physical devices

3. CONFIDENTIAL DATA LOSS AND MOBILE DEVICE MANAGEMENT• Unprotected mail and file transfer, low level encryption• Data extraction through mobile devices and memory sticks• CD/DVD burning• Unprotected Web access and social accessibility

4. UNAUTHORISED SYSTEM ACCESS• Password and User name compromise• System hacks• Wireless hotspot access and network connections• Unprotected terminal access

5. SYSTEM MONITORING AND UPDATES• Uncontrolled software updates and security patching• System monitoring and incident management• Logging and identification

on compliance and security staff in many companies. These loopholes, access points and exploitable vulner-abilities that allow access to secure environments are vigilantly researched, tested and corrected by the main-stream security firms and software companies to remove these points of vulnerability from all environments.

The top security solutions range in price from the low hundreds to thousands per user per annum. Due to the increased requirement for cyber security reviews and cyber security solutions within the industry, it has become a minefield for many budget conscious compa-nies to cross on how best to determine which product is best suited to their environment and what the best price for the right solution is.

DUE TO THE INCREASED REQUIREMENT FOR CYBER SECURITY REVIEWS AND CYBER SECURITY SOLUTIONS WITHIN THE INDUSTRY, IT HAS BECOME A MINEFIELD

FOR MANY BUDGET CONSCIOUS COMPANIES ”

Page 7: CYBER RISK AND SECURITY 2015

Protect your network in real time with Managed Security Services. A simple andcost-effective way to limit potential threats and meet compliance mandates.

Focused on Security Essentials Security Intelligence from IBM X-Force Threat Analysis Team Partnered with ACE IT SolutionsPowered by IBM

Contact ACE IT Solutions for a free security assessment | 646-558-5575 | www.cybersecuritynyc.com

42%

31%

Page 8: CYBER RISK AND SECURITY 2015

8 H F M W E E K . CO M

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

Last year’s breach stories taught us many things about the complexities of previously under-estimated network vulnerabilities. Th e rise in sophisticated targeted att acks is challeng-ing cyber-security methodologies. Industry experts have long suggested that perimeter

security is essential cyber-security defence. We don’t dis-pute that the layers of technology that we use today all play an essential role in good cyber-security hygiene. But what today’s complex targeted att acks prove is that cyber threats extend beyond the perimeter. Th ese att acks dem-onstrate how the perimeter can be permeated.

2014 IN REVIEWWe’ve seen an undeniable shift from advanced persis-tent att acks to advanced tar-geted att acks. While this new breed that we see today has a longer life cycle, they are in-credibly eff ective. Less than 40% of the att acks we see are malware-based. Sophisticated cyber-att acks like phishing and watering hole att acks are dominating the threat landscape. Th ese kinds of att acks expose the Achilles heel of perimeter defences – technol-ogy alone can’t prevent your employees from clicking ma-licious email links. Targeted att acks are driven by att ack ingenuity.

2014 highlighted some of the most high profi le, highly publicised and sophisticated cyber-att acks the world has ever seen. Th ese targeted hacks shed light on what we have known all along – that without equally intuitive defence mechanisms the world’s data is highly vulnerable. 2014 was not just the year the internet broke, solidifying the fundamental shift in the cyber-security landscape, but it also marked a point in time when businesses big and small started to wake up to this new reality. Sony, Target, Home Depot and JP Morgan were just some of the more high-profi le victims of these att acks. For most it was too late for repairs – the damage was done. Th e loss of highly valuable data, fi nancial or otherwise, can mean the end of a business or worse. Th e numbers speak for themselves: $70bn was spent to combat these threats in 2014, but it was a drop in the bucket compared to losses last year of an estimated $375-575bn – equivalent to the GDP of some nations. Cy-ber criminality is highly lucrative, anonymous, and has a high probability of escaping capture and conviction.

THE EVOLUTION OF A CYBER-ATTACKTh e sources of new cyber-att acks are varied and growing, with perpetrators ranging from nation states to insiders. Th ey include hacktivists/activists, terrorists, organised criminals and smash-and-grab thieves. Basically, anyone who wants to profi t from stolen funds or information. Th eir targets include intellectual property, sensitive in-dustry or merger and acquisition information, or bank account credentials. Th ey may simply be looking to infl ict website brand damage. And their targets will inevitably include your enterprise. If you haven’t already been infi l-

trated, it’s just a matt er of time.Th e att acks can take the form

of an email with infected links (phishing scams) or other in-fected media. Th ey might infi l-trate an executive’s computer while it’s being used at home, or pose as a trusted source in an email message or phone call. Stolen mobile devices represent another opportunity for att ack.

Clearly these att acks are oft en creative and highly eff ective. As cyber criminality becomes more intelligent, so must the means to

prevent them. More oft en than not, victims of these crimes are unaware they have been hacked until it’s too late.

INDUSTRY EXPERT PERSPECTIVE (CATEGORICAL THINKING VERSUS MORE ADAPTIVE ARCHITECTURE)For several years, industry experts and leading analysts have suggested a siloed approach to cyber-security. It’s been more of a one-size-fi ts-all approach. However, rec-ognising the drastic shift in att ack vectors, experts now propose a far more adaptive framework.

Active threat protection, which means eyes on glass re-acting and responding to real threats and mitigating them in real-time, is the new standard enterprises need to adopt to elevate their cyber-security protection to match the level of threat present in the current era of cybercrime.

TRENDS FOR 2015This year’s trends focus on proactively implementing new strategies and protections to outwit cyber preda-tors and deter them. Cyber criminals will always look for vulnerabilities, without them they will move on to the next target or spin their wheels making fruitless at-tempts. To adequately protect high value assets, enter-prises must continue to evolve their security defences.

THE LOSS OF HIGHLY VALUABLE DATA, FINANCIAL OR OTHERWISE, CAN MEAN THE END OF A BUSINESS OR

WORSE

MARK SANGSTER, VICE-PRESIDENT, MARKETING, WITH ESENTIRE, SPEAKS TO HFMWEEK ABOUT THE LESSONS THAT CAN BE LEARNED FROM 2014’S CYBER EVENTS

ARE YOU REALLY SAFE?

Through his 20-year sales and marketing career, Mark Sangster has garnered experience at industry giants like Intel Corporation, Research in Motion and Cisco Systems. He has an excellent understanding of the customer and key verticals and has the unique ability to put himself in their shoes to see the service through their eyes.

Page 9: CYBER RISK AND SECURITY 2015

H F M W E E K . CO M 9

T E C H N O L O G Y

Isolation techniques – a trusted entity may need to be isolated to keep it secure from an untrusted system. Con-versely, in the case of a trusted system, you need the ability to isolate an untrusted entity from the rest of its contents. That way you can run and observe the un-known code or content and safely handle any malicious attacks.

Whitelisting is another important secu-rity foundation, which can ensure that only trusted entities are allowed to operate on the system. A perfect example of this is the Ap-ple App Store. With over 500,000 apps avail-able, there is virtually no malware because all of the apps are whitelisted by Apple before they can be downloaded to any system.

Regular testing is an important tactic to ensure the integrity of your security is in-tact. An example of this is using ‘honeydocs’ – fake phishing emails that help to gauge the solutions ability to react and respond to cyber-attacks.

RECOMMENDATIONSPrevious industry guidance suggested a far more siloed approach to cyber-security. However, today’s threat en-vironment, detection and response capabilities are more important than blocking and prevention. Continuous monitoring and analytics must be at the centre of the security platform with the capability to respond within seconds, before an incident occurs. An adaptive security architecture (ASA) is critical.

Because of the often unpredictable and targeted na-ture of these newer cyber-attacks, human intervention is required to detect and intercept sophisticated anomalies that technology alone cannot detect.

One of the key aspects of a successful security strategy is the ability to contain and isolate information. Keep the bad from the good, and the good from the bad.

Your enterprise could set up your own security op-erations centre (SOC). But do you want to?

Setting up an SOC is problematic, espe-cially for companies who have a high asset value to employee ratio. There may not be an extensive IT department in place. Recruiting suitable expertise is difficult and a highly competitive market can make retaining it problematic. An effective SOC is costly to build, maintain and manage. Technology is constantly evolving with frequent hardware and software updates, necessary to defend against the ever-changing threat landscape. And if any one of these areas becomes a weak link, your

CSO could become the chief scapegoat officer. Don’t let it be you.

If you haven’t thoroughly evaluated your security strat-egy in the past 18-24 months and continually tested its ef-fectiveness, you are not only at risk, you are exposed and highly vulnerable – you may be infected now. An effective security strategy requires sound protocols, continuous testing and monitoring and talented security experts with the knowledge to identify real threats.

Continuous active threat protection is the only proven strategy to combat the complex, targeted threats ever-pre-sent in today’s cyber environment. Accessing security as a service and utilising the highest level of threat protection and white glove customer service is the most effective way to protect your business in 2015.

CONTINUOUS MONITORING AND ANALYTICS MUST BE AT THE CENTRE OF THE SECURITY PLATFORM WITH

THE CAPABILITY TO RESPOND WITHIN SECONDS

Page 10: CYBER RISK AND SECURITY 2015

No one understands the security concerns of the hedge fund industry

better than Options. Our offering combines best practice cybersecurity

building blocks with continued operational agility and rigour.

As cyber attacks evolve, both in number and sophistication,

the SOC accredited Options platform can offer your firm lasting

peace of mind. Visit options-it.com for more information.

On a mission to transform financial sector technologywww.options-it.com

Options is the leading managed service & IT infrastructure

provider to the global hedge fund industry

Cybersecurity in 2015:Is your firm ready?

Page 11: CYBER RISK AND SECURITY 2015

T E C H N O L O G Y

H F M W E E K . CO M 11

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

HFMWeek (HFM): What is the diff erence between private and public cloud services?Phil Ashley (PA): Th ere is an ever increasing range of ser-vice providers which off er private and public cloud-based IT services and solutions. With the emergence of public cloud services, such as Google Apps, Amazon Web Ser-vices and Microsoft Offi ce 365, product developments and marketing material for cloud services can be a challenge to digest and the critical diff erences between public and private clouds can become blurred and lost in translation.

Th e foremost defi ning factor of a private cloud over a public cloud is in the nature of storage and access to cor-porate data and IT services. A private cloud solution will deliver an independent, isolated and discreet system with individual policies and access control mechanisms. Th ey are clear, standalone, single-tenanted environments with defi ned ownership which lever-age the service provider’s infra-structure.

Public clouds on the other hand are inherently shared en-vironments. Corporate data is stored inside large multi-ten-anted pools of IT systems and while this can provide substan-tial economy and scalability, the ability to control, secure and govern corporate data and ser-vices is oft en hindered at best or non-existent at worst. HFM: What factors should someone consider when choosing between them?PA: Firstly, consider what IT services are needed and how they are delivered. Both private and public clouds off er a broad range of scalable enterprise IT services, but they can be delivered in diff ering ways; directly or through a partner, over public or private connections, centrally or distributed, managed or unmanaged. Th ere are advantages and disadvantages to both.

Security, integrity and governance cannot be ignored in the fi nance industry. With continually growing regulatory and due diligence requirements, it can be challenging to

make the move towards public cloud services while private cloud solutions are generally accepted and commonplace within the industry. Th e security controls, data segrega-tion and access control and protection of systems are read-ily deliverable in private cloud environments. netConsult holds security as the primary focal point underpinning all of our IT solutions as we believe that maintaining data integrity and control are of critical importance to all busi-nesses. Public clouds oft en do not provide the means to maintain corporate governance and security of their data and services.

Considering availability, both public and private clouds typically provide services on substantial enterprise IT ar-chitectures in top tier datacentres with local and geograph-ical redundancy. Decisions turn to being led by confi dence levels taking into account SLAs, incident management,

track record, customer service in maintaining and restoring service and retrieval of backup or archive data in the event of an outage or data loss. Th e lat-ter can be an area where pub-lic clouds can be weaker and provide additional challenges, particularly with smaller con-sumers.

Usability, support and in-tegration can oft en be con-sidered retrospectively rather than pro-actively. When utilis-

ing cloud services, it is essential to appreciate that every-one’s day-to-day interaction with IT services will directly impact business processes. Public cloud providers typi-cally have very fi xed and regimented off erings and manag-ing various services from multiple public cloud providers can quickly become costly and ineff ective. Private cloud providers will typically manage system integrations and the associated support. For example, netConsult off ers an all-encompassing support service alongside our complete solutions with full IT support for clients across their entire IT landscape.

Finally, there is substantial variation in the apparent cost of cloud services; many being substantially economical for

SECURITY, INTEGRITY AND GOVERNANCE CANNOT BE IGNORED IN THE FINANCE

INDUSTRY

PHIL ASHLEY OF NETCONSULT DISCUSSES THE PUBLIC VERSUS PRIVATE CLOUD PLATFORMS AND THE FACTORS THAT SHOULD GUIDE A FUND MANAGER’S CHOICE

PUBLIC, PRIVATE, OR

A BIT OF BOTH?

Phil Ashley is the recently appointed chief information officer at netConsult. A trained analytical and applied scientist he has over 15 years’ senior IT experience across a range of industries running both internal IT teams and as an external service provider.

Page 12: CYBER RISK AND SECURITY 2015

T E C H N O L O G Y

1 2 H F M W E E K . CO M

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

business of all sizes. However, the value and true cost of cloud services needs to be determined and understood. Public cloud services can have additional hidden costs when it comes to implementing security controls, inef-fective and expensive integrations and high support cost from complex maintenance. Private clouds can be more expensive but can offer substantial value as service pro-viders are able to provide integrated security and con-trols, more cost-effective support, ease of integration with other line of business applications and provide substantial supporting documentation.

HFM: How has hybridisation of these services been created and what advantages does it offer?PA: Forming a hybrid cloud solution by combining pub-lic and private clouds can get more out of public clouds alone; cost-effective service delivery with manageable security controls mitigating some risks of data exposure and complex supportability. While not possible to escape the fundamentals of data storage and security in public clouds, hybridisation can help make up for some of their current shortcomings.

Hybridisation has been achieved by utilising a smaller footprint of private hosted systems coupled with some public cloud services. Adding management, security con-trols and network visibility moves public clouds more towards the quality of ser-vice and security of private clouds whilst leveraging improved economies of scale, reducing maintenance of complex IT sys-tems and enabling additional value added benefits.

netConsult’s hybrid cloud offering en-hances Microsoft Office 365 Enterprise Services. We maintain a common security, management and control infrastructure and keep sensitive file data isolated and secured on our private hosted platform. Layering multiple technology suites from different vendors and third-party systems maintains service availability, recoverabil-ity and long-term data protection.

HFM: Does cloud technology face a stigma after re-cent high-profile cases of hacking? PA: Public cloud technology presents a particularly ap-pealing target for hackers. There are new attack vectors and vulnerabilities in public cloud platforms emerging regularly and with the cross pollination potential, public clouds provide an obvious high-return target for hackers and cyber criminals.

Public cloud technology is relatively young when com-pared to private cloud technology and like any new tech-nology offering a fundamental change in the practice and delivery of IT services, it has been met with caution from uncertainty. Recent high-profile cases do hamper the cloud’s appeal, however with the amount of high-profile hacking cases spread across the media in relation to more than just cloud services, it more serves to highlight the fundamental requirement of a strong, professional end-to-end security position across all IT services rather than stigmatise one service specifically.

HFM: What are the essential best practices when it comes to cyber security? PA: The starting point for security systems is to ensure adoption of a professional security position with depth and breadth applying across the whole IT infrastructure. Gaps in controls or security are the first thing that hack-ers will be looking for.

A layered approach to security is key as no single tech-nology or system will provide sufficient levels of protec-tion. Visibility and intelligence into system and network activity and behaviour using network and event moni-toring tools, such as IDS/IPS with SIEM, as simply us-ing legacy perimeter and detection-based tools, such as firewalls, will not provide sufficient levels of security in isolation.

A focus must also be placed into the history of securi-ty position to augment point-in-time analytics. A single hack could last over a substantial period of time and vis-ibility needs to be maintained throughout the timeline of the attack, along with coupling this historic visibility with detailed and contextually aware information from next generation security platforms.

HFM: What trends is netConsult seeing from its cli-ents requests? Have these changed in the past year?

PA: Over the last year, netConsult has seen a noticeable change in client service requests and focal points. Firstly, a marked increase in interest in public cloud and hy-brid cloud services as the benefits in cost, scalability and accessibility have proven highly attractive, however service levels and enhanced security are expected to be maintained.

Cyber security has been always been a key factor for this industry and netCon-sult is seeing the trend for security focus continue to increase across our client base, quantified with more awareness and emphasis on data protection; where data is being stored and how it is being man-aged, who has access to it and how recov-

erable it is.

HFM: How can cloud technology move forward from here?PA: Technology trends invariably follow the demands for them. The cost-efficiencies and services that cloud technology can deliver are growing rapidly and are in high demand as they clearly demonstrate a real tangi-ble business benefit. The controls and security of public cloud services have yet to catch up however and are at the moment reliant on either private cloud, in-house systems or even complex system integrations to put the security wrapper around them.

The immediate hurdle for public cloud technology to move forward is very apparent; it must provide a very efficient standard service controlled by the Service Pro-vider, but enable the consumer to customise it and apply their own controls and security to meet their individual requirements. A challenge, certainly, however the de-mand for it is most definitely there.

A LAYERED APPROACH TO SECURITY IS KEY AS NO SINGLE TECHNOLOGY

OR SYSTEM WILL PROVIDE SUFFICIENT LEVELS OF PROTECTION

Page 13: CYBER RISK AND SECURITY 2015
Page 14: CYBER RISK AND SECURITY 2015

1 4 H F M W E E K . CO M

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

HFMWeek (HFM): Security soft ware providers have an obvious incentive to highlight the risks of cyber-crime, are the risks exaggerated?Alan Alzfan (AA): Cyber-crime is a very real and dan-gerous risk in today’s business world and the fi nancial services community is a prime target based on the fact that these organisations obtain sensitive personal infor-mation about their clients, most of who are high-net-worth individuals. Th e US’ Securities and Exchange Commission (SEC) has identifi ed cyber security as a very important topic, with the Offi ce of Compliance In-spections and Examinations (OCIE) publishing a risk alert on the topic recently based on an OCIE Cybersecu-rity Examination Initiative conducted in 2014 on broker-dealers and investment Advisors.

Daimon Geopfert (DG): No, the risk is not exaggerated because it is simply stating reality. If you compare cyber crimes against any other criminal enterprise you’ll see that the opportunity to make money versus the chances of be brought to account by law en-forcement (or other criminals) is very low. Th ere is a level of technical knowledge that will currently provide some type of barrier to entry for a large num-ber of criminals, but that barrier is gett ing lower every month as more powerful but easier to use tools are sold on the under-ground market.

HFM: When it comes to data protection, how do man-agers identify sensitive data and what is best practice for keeping it secure? AA: Th e alternative investment industry has many dif-ferent levels of data they need to protect. Some are more sensitive than others and each should be analysed for the type of security that is needed. Examples of your most sen-sitive data would be your investor’s personal and sensitive information. Other information that could be deemed to be highly sensitive could be your detailed trading informa-tion or algorithms, your position reports or research.

Each member of the organisation needs to be trained on cyber security and they need to understand they are an im-portant part of the plan. It only takes one person to open

the entire organisation to an att ack through opening an e-mail from an unknown source, visiting a suspect website or downloading an infected fi le.

An organisation must balance the levels of security based on the identifi ed sensitivity of the information. An organisation must make sure the most sensitive data has the highest level of protection, but also balance the cost of the protection of other information and the ability not to reduce productivity or make the protocols so complex that people try and go around them.

DG: Th e big concept here is to know what you have and what it is worth. If 95% of the systems and data in your environment do not touch, store, or process sensitive data then those systems can be maintained at a lower level of security than the 5% of system that do. However, once you start maintaining diff erent levels of security for diff erent systems you need to do everything in your power to keep those systems separate. It creates an extremely dangerous

scenario when a system with poor security, such as a user desktop, is sitt ing right next to a highly sensitive system such as a server with customer data on it. One of the most immediate and useful things you can do to lower your risk profi le is to identify these critical systems and segment them off from the rest of the network so that only the necessary components are exposed. Th at way even if an att acker can compromise a low

risk system they still have a lot of work to do to get to the valuable systems.

HFM: Are there certain elements of cyber security that hedge funds need to be especially aware of?AA: Many hedge funds maintain streamlined organisa-tions and do not have a dedicated IT personnel. In addi-tion, the cost of a full cyber security program can be very expensive. Th ere are many excellent consultants and third-party solutions that can be utilised, but a key element is having top management understand the importance of the threat and making sure it is an important part of the culture of the organisation. One incident can cost the organisation not only a lot of money and time but ruin the reputation

EACH MEMBER OF THE ORGANISATION NEEDS TO BE TRAINED ON CYBER SECURITY

MCGLADREY’S ALAN ALZFAN AND DAIMON GEOPFERT SPEAK TO HFMWEEK ABOUT THE REALITY OF THE THREAT FACING HEDGE FUNDS THROUGH CYBER ATTACK

BE PREPARED

Daimon Geopfert, McGladrey’s national leader for the security and privacy practice, specialises in penetration testing, vulnerability and risk management, security monitoring, incident response, digital forensics and investigations, and compliance frameworks within heavily regulated industries.

Alan Alzfan is a partner based in the New York office of McGladrey LLP. He serves as the national hedge fund leader and northeast strategic financial services lead. He works with a diverse range of clients in the financial services industry including start-up funds to multi-billion-dollar fund groups.

Page 15: CYBER RISK AND SECURITY 2015

C O N S U LT I N G

H F M W E E K . CO M 15

of the organisation and have a severe impact on the trust of current and future investors.

HFM: When it comes to data protection and cyber security audits, what are the key points that all fund managers or risk managers should consider?DG: Many organisations operate under two very dangerous mindsets: that hacking is ‘hard’, and that no hacker would be inter-ested in their organisation because you are the wrong size, industry, etc. Both of these trains of thought are wrong and will get you in trouble in a hurry. First, many aspects of hacking are surprisingly simple but effective such as social engineering. Social engineering is a fancy name for ‘con games’ in which an attacker simply tricks a user into doing something that will allow access to the en-vironment. It only takes a few minutes to create a fake web-site and send a user an email with a link asking them to visit the website to download updates, vacation photos, audit reports, or any number of false pretences in order to com-promise their system. On the second aspect, companies need to understand that the vast majority of breaches were not targeted against any specific organisation. The attack-ers are simply shooting at anything on the internet hoping that they will be successful. Once their attack works and they gain access they only then know which organisation that got in to, and then they figure out how they will mon-etise their access. If you are vulnerable somebody will find you, you cannot simply assume you are hiding because you are small.

AA: Dealing with cyber security must be made an im-portant part of the overall culture of an organisation. Top management must stress this area just as they stress other important compliance issues. Everyone must constantly be reminded of how one incident can ruin an organisation

and how important each person in the or-ganisation is to the program. Like any other compliance program, cyber security must be constantly reviewed and updated. The importance of updating the program can-not be over emphasised as new threats are constantly being deployed and your organi-sation is constantly being attacked, either directly or indirectly.

HFM: What can an organisation do to best prevent against these attacks?DG: The first, and most critical, piece of ad-vice is simply to have a plan. Most organi-sations do not have any type of incident

response plan, and if they do, it is generic with minimal detail. Put in the effort to think through what you’d do if something like this came to pass, and then make sure you exercise that plan so your people don’t have to learn it dur-ing the heat of a real event.

Make sure a major part of your plan is pre-arranged relationships with incident response specialists. It is very unlikely that many organisations have full time forensic investigators on staff so it is important to have found them and contracted with them early. In this same mindset, when there is an incident the organisation has to make the very difficult decision to do as little as possible on the net-work until those forensic experts are on-site. It can be very painful as a responder to have to explain to a client that their initial actions destroyed evidence that was necessary to fully control a breach or answer key questions such as how long it had been occurring.

AA: I agree with Daimon. Have a plan. Reach out to your service providers as well as industry colleagues and ask about the actions they are taking in this important area. It may help identify additional areas of consideration for your plan.

THE IMPORTANCE OF UPDATING THE PROGRAM CANNOT BE OVER

EMPHASISED AS NEW THREATS ARE CONSTANTLY BEING DEPLOYED

Page 16: CYBER RISK AND SECURITY 2015
Page 17: CYBER RISK AND SECURITY 2015

T E C H N O L O G Y

H F M W E E K . CO M 17

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

HFMWeek (HFM): What are the security implications of moving to a cloud system? Bob Guilbert (BG): Firms looking to move to the cloud need to consider which provider is right for them and can service their operational and security needs. A fi rm needs to consider the security protocols in their offi ce as well as in the cloud and work with someone that covers both sides, including the virtual and physical elements.

It’s also vital that fi rms understand the ‘response and remedy’ services that cloud providers off er, the quality of which can vary hugely between public and private clouds.

HFM: Can the quality of security off ered diff er signifi -cantly between cloud providers?BG: Absolutely, which is why IT due diligence is so im-portant. At Eze Castle Integration, we’ve taken a defence-in-depth approach to cloud security starting right at the foundation. We have lay-ers of security all the way through the infrastructure including access controls, continuous security moni-toring, and intrusion detec-tion and intrusion preven-tion systems.

You are only as strong as your last defence. You must have all the right locks on all the right doors and mul-tiple locks on those doors in order to thwart any hacker’s att empts to access your private information. You must also invest in employee training because even the best locks won’t help against many social engineering techniques. Th ese can only be combatt ed with good due diligence and best practice regarding security awareness training for all staff and senior management.

When evaluating a cloud provider it is also important to understand the security protocols followed within the provider’s corporate infrastructure. At Eze Castle Integra-tion, for example, we’ve invested heavily in our own fi rm’s security to ensure there aren’t any backdoors to allow a hacker to access the cloud and data of our clients.

HFM: So outsourcing to a cloud platform gives more protection than an in-house product?BG: I would say so, yes. We are off ering enterprise level se-curity, and we have a deep pool of specialists, which can be

leveraged when needed for our clients. In-house deploy-ments very oft en won’t have the same size of staff and also won’t have a budget that allows them to cover all areas of cyber-security to the same degree. Small fi rms, especially, will never be able to enjoy the scope of security and tech-nological power through their own means that they could by partnering with us.

HFM: Do you predict using cloud services will become the norm in the future?BG: I think it’s actually reached that stage now. If you look at the number of start-up hedge funds that launch annually, I would say 95%+ of them consider launch-ing on a cloud provider’s platform. One reason for this is the capital expenditure diff erence between sett ing up the hardware and soft ware in-house versus selecting an

established private cloud provider. Firms get all the benefi ts of proper manage-ment and security to run the environment, and they have predictability in their monthly costs.

HFM: Are established funds, considering their historic investment in in-house IT infrastructure, slower to adopt a cloud solution than start-up funds?BG: We fi nd there are typi-cally three infl ection points where an established fi rm

evaluates a move to the cloud. Th ese are offi ce relocation, technology refresh and adding a new application. A physi-cal move of offi ces provides an opportunity as fi rms don’t want to invest in moving and sett ing up old equipment at a new offi ce. A technology refresh is another logical switch-ing point as fi rms weigh the costs of doing a whole system upgrade as opposed to moving to the cloud.

In some cases very large funds are still inclined to invest in building their own infrastructure. However, they will look to the private cloud for application hosting. Th is may be due to the CTO wanting to have the data within the premises of the offi ce. However, Eze Castle Integration has several clients with multi-billion dollar AUMs on our cloud platform. At the highest AUM levels, it oft en comes down to personal preference and existing investments in internal IT staff and infrastructure.

YOU MUST HAVE ALL THE RIGHT LOCKS ON ALL THE RIGHT DOORS AND MULTIPLE LOCKS ON THOSE

DOORS IN ORDER TO THWART ANY HACKER’S ATTEMPTS TO ACCESS

YOUR PRIVATE INFORMATION

BOB GUILBERT OF EZE CASTLE INTEGRATION EXPLAINS WHY SO MANY FUNDS ARE OPTING FOR CLOUD SOLUTIONS AND HOW THE INDUSTRY CAN WORK TOGETHER TO TACKLE CYBERCRIME

GETTING STRONGER TOGETHER

With more than 25 years of IT experience, Bob Guilbert is responsible for leading all of Eze Castle Integration’s marketing, partnership and product development functions. The scope of his efforts ranges from maximising the value of the company’s brand, establishing core strategic partnerships, and developing new product lines for the company.

Page 18: CYBER RISK AND SECURITY 2015

T E C H N O L O G Y

1 8 H F M W E E K . CO M

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

HFM: What are ‘Written Information Security Plans’ (WISPs)? BG: WISPs are plans that cover the administrative and technical safeguards a firm has in place to ensure data is protected. They include details on incident response, re-mediation and communication procedures should a firm be subject to a cyber-breach. They answer questions such as: have you identified the chief information security of-ficer in the organisation? In the event of a breach what action will you take and what communication paths will you follow?

Having written information security plans is emerging as a requirement for firms. As part of its cyber-security questionnaire, the Security and Exchange Commission (SEC) is asking about WISPs. And investors are increas-ingly asking to review WISPs as part of their due diligence.

Overall, the security questions being asked by investors and regulators are getting much broader and deeper. Both groups are asking for more details on whether there have been breaches in the past and the process that was taken. Investors are also beginning to ask these details from not only the remedial third party but also all the providers they are using.

HFM: So investors have become much more sophisti-cated on cyber issues then? BG: Yes, they have. With increasing numbers of success-ful breaches in the marketplace and more visibility around cyber-security and cyber-crimes, investors are becoming more savvy, aware and concerned.

HFM: What do you expect from the SEC looking ahead?BG: The SEC has already said cyber-security is a top pri-ority for them in 2015/16. They are planning to conduct much wider and deeper examinations of funds to ensure they have the best cyber-security practices in place. They also want to see if a fund’s employees have been trained and tested on the firm’s WISP policy.

I believe there is going to be a broader sweep in terms of who is looked at. A number of firms use outsourced func-tions, and the SEC will soon start to look at these third-party providers in a lot more detail.

There is still a long way to go, but we all have a common enemy in keeping malicious activity outside of the hedge fund industry, and through effective dialogue between the public and private sectors, we can get stronger together.

THERE IS STILL A LONG WAY TO GO, BUT WE ALL HAVE A COMMON

ENEMY IN KEEPING MALICIOUS ACTIVITY OUTSIDE OF THE HEDGE

FUND INDUSTRY

Page 19: CYBER RISK AND SECURITY 2015

Up-to-the-minute technology news and insight for the global hedge fund space

HFMTechnology provides the latest news, trend analysis, regulatory updates and comment on the biggest technology issues affecting the hedge fund market, making it an essential business resource for anyone involved with hedge fund technology.

From the publishers of: For your complimentary trial visit:www.HFMTechnology.com

Try HFMTechnology

for free

Page 20: CYBER RISK AND SECURITY 2015

2 0 H F M W E E K . CO M

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

HFMWeek (HFM): What was the motivation behind the creation of this new cyber-security suite? Marcus Lewis (ML): In April 2014 the SCC published new guidance for cyber-security around the financial sec-tor. What was clear was the level of security consciousness around compliance was quite traditional, such as do you have anti-virus software, is there software in place, etc? We realised there was definitely a opportunity in the IT sec-tor for delivering something more robust and holistic. We therefore began a project to deliver something that was more than just a plug-in application and was focused on offering a comprehensive security service.

HFM: How does this new suite fill the gap in the mar-ket for a more substantial cyber-security service? What features will it have?ML: We came up with three core offerings. This has been collated into part of our new cyber security offering un-der the banner of ‘Man-aged Security’. The first is best practice. This doesn’t automatically require new technology, it could just be about making a technology you have more efficient. An example being, have you got high-level password protection for your sys-tem? This requires making it company policy to en-sure all users have a strong password that is changed regularly.

The second area is con-sultancy on security and risk management. Our ISO cred-ited chief information security officer carries out a gap analysis and creates a comprehensive report which will highlight the risk that a client may have. From that we can then discuss these risks with the clients and clarify what that risk means to them; this is vital because an exposure can be highly important for one company to mitigate but not so key for another.

For example, if your website is just a brochure site with only your own contact information included, that is very different to a website that may request sensitive and confi-dential information from its users. The consequences of a successful hacking attempt on the first website is marginal

compared to the second. Therefore your investment in se-curity for either type of site can be very different. While our clients choose which services they subscribe to, it is our responsibility to give the best possible advice so that they understand the risks to make the right business deci-sions.

HFM: What guidelines do you use for your own best practice standards? ML: We use ISO 27001:2013 standard and the govern-ment Cyber Essentials and Cyber Essentials Plus as guid-ance along with security reference sites eg, NIST and the Centre of Internet Security (CIS) tools, which has server and desktop benchmarking that acts as a good yardstick for us. For example the CIS has 245 separate recommen-dations on how to ‘harden’ a server, which we can use as a template. We also take on advice from our security part-ners and all this combines to give us a solid foundation for

our security procedures.

HFM: What happens if you find your client’s cur-rent protection software is inadequate? ML: If our report concludes that new security devices are recommended then we move onto the third area of our service where we have several products that come as part of our suite offering. First is Cyber Secure Protect and Detect. This adds a next generation firewall which

scans data as it enters and leaves the network. It scans for viruses and rogue activity as well as web and applica-tion filtering. Examples of app filters could be that we can manipulate the settings so that users who wants to access Dropbox or Facebook can download data but cannot up-load it, meaning no data can leak out that way.

We can adapt the system further so that most users are unable to access or upload to Facebook except the specific members of the marketing department, who have legiti-mate, work-related reasons to do so.

Historically, firewalls could be considered as an open or shut door. It looks at an email’s details but not what is actu-ally in it. Next-generation firewalls, like ours, will scan the

NEXT-GENERATION FIREWALLS, LIKE OURS, WILL SCAN THE ACTUAL

CONTENTS TO THE POINT WHERE WE CAN SET IT TO LOOK FOR…

BANK ACCOUNT NUMBERS

HFMWEEK CATCHES UP WITH MARCUS LEWIS, OF CAPITAL SUPPORT, TO DISCUSS THE COMPANY’S NEW CYBER-SECURITY SUITE

FEEL SAFE WITH MANAGED SECURITY

Marcus Lewis is responsible for the continual design, development and review of our managed services catalogue. Lewis is ITIL and Prince II qualified, and his ability to look at the periphery as well as the point of focus is essential to successfully maintaining a large set of services that works in harmony to meet the needs of our customers.

Page 21: CYBER RISK AND SECURITY 2015

T E C H N O L O G Y

H F M W E E K . CO M 21

YOU CAN HAVE THE BEST LOCKS IN THE WORLD BUT IF YOU LEAVE THE FRONT DOOR WIDE OPEN THEY AREN’T

GOING TO HELP

actual contents to the point where we can set it to look for things like a specific set of bank account numbers that the clients is especially keen to avoid leaking.

In addition to the firewall we also offer a SIEM service (security information and event management). This ser-vice monitors event logs for all the data moving around your system on all devices. Several million entries can be created per day, which would be impossible for staff to ef-fectively study for possible discrepancies. Therefore the SIEM service uses a correlation engine that follows a pre-defined set of rules to analyse the information for things such as multiple failed entry requests from a foreign IP address.

This service is very sophisticated and can even recog-nise when several smaller logs that wouldn’t raise concern by themselves actually form a pattern that is suspicious. Monitoring the events and alerts using our manned 24/7 Security Operations Centre, we alert clients of potential threats and actions they should take to eradicate potential weaknesses in their network

HFM: Does your security advice revolve exclusively around the cyber element? ML: No, our security advice is around protecting infor-mation assets and is not just about technology, it is also about people and processes. Risk management can’t just be about IT, it’s got to include the bigger picture.

We ask our clients what is the most business critical as-set and then look at the controls, for example, their policy on leaving data around the office, what’s the entry policy for your building? What’s your HR policy regarding new or leaving staff? Do you allow data to leave the building and is it monitored? All these things might have an IT so-lution but require a HR document which staff can follow. We do also have some software available that creates a se-cure method for staff to access and send data remotely if there is a significant exposure to data loss or manipulation. HFM: The technology industry is incredibly fast-paced. How do you ensure any new offerings are future-proof, or is this impossible?ML: In part the on-going success of our product is down to people and processes. You can have the best locks in the world but if you leave the front door wide open they aren’t going to help. That’s why personnel training and education is so important.

No system is future-proof as technology is constantly advancing and so is the sophistication of cyber criminals.

With regard to the software we use, there are a few things we can do to stay ahead of the enemy. Our firewall is updated daily in order to keep abreast of the forms of attack that might come. Everything has to come through our firewall so if we know what an attack looks like we can always stop it.

On the hardware side, we can incorporate any new tech-nology into our SIEM engine and create new rules around it. We can’t know everything all the time but considerable investment, by us and our technology partners, go into making sure what we don’t know now we will soon and this will continue in the future.

Page 22: CYBER RISK AND SECURITY 2015

McGladrey LLP is the U.S. member firm of RSM International, a global network of independent

accounting, tax and consulting firms. MCG-0315JH

It’s no longer a question of if you’ll suffer a cyber breach, it’s a question of when. How quickly you detect and

how effectively you respond to and contain that breach could shape the future of your business.

McGladrey understands. Over the last 50 years, McGladrey has served more than 1,500 investment companies.

We understand more than cyber security—we understand it within the context of your complex

operational, reporting and compliance environment.

Want to improve your odds? Watch http://mcgladrey.com/hedgefund and experience the power of being understood.

Power comes from being understood.®

Your data is attacked

hundreds of times a day.

Do you still like your odds?

Page 23: CYBER RISK AND SECURITY 2015

T E C H N O L O G Y

H F M W E E K . CO M 23

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

Options is the leading managed service and IT infrastructure products provider to the global fi nancial services sector. Founded in 1993, the company began life as a hedge fund technology services provider. More than a decade ago, the company

made a strategic decision to become the fi rst provider to off er cloud services to the fi nancial sector. Today, more than 150 fi rms globally lever-age the Options platform, in-cluding the leading global in-vestment banks, hedge funds, funds of funds, private equity houses and exchanges.

HFMWeek (HFM): Th ere are now several IT service providers to the fi nancial sector. What makes Op-tions’ off ering stand out?John Bryant (JB): From day one we set out to deliver bullet proof, ‘investment bank’ grade infrastructure and service, leveraging a global technology platform. Having such a clear vision has allowed us to stand out on multi-ple fronts. We have a global team and global infrastruc-ture, allowing our customers with global operations to work with a single vendor; most of our competitors, by

comparison, are focused in one region or service. Our fo-cus on building the platform to exacting standards means that many of the features that are expensive add-ons with competitors are base features with Options. Examples include DR, replication and hot-redundancy, daily back-ups to tape, carrier diversity and in-region data centre resiliency. Feedback from customers is that the major-

ity of competitors either treat these fundamental features as up-sell or in some cases don’t off er them at all. In London, for instance, a number of fi rms base all their services from data centres in the Th ames fl ood plain – a design that would be immediately thrown out in any top tier fi rm.

Another thing that sets Op-tions apart is the focus on build-ing security and transparency into our processes and proce-dures. Options has been lead-ing the market in this regard for

many years. We were among the fi rst service provider of our kind to be SOC accredited (since it was fi rst intro-duced in 2011) and we’ve made our cyber-security policies and best practice recommendations open and available for download online. We have been making a substantial in-vestment in the leading security related technologies for a

WE HAVE A GLOBAL TEAM AND GLOBAL INFRASTRUCTURE,

ALLOWING OUR CUSTOMERS WITH GLOBAL OPERATIONS TO WORK WITH A SINGLE VENDOR

JOHN BRYANT, HEAD OF TECHNOLOGY AT OPTIONS IT, TALKS TO HFMWEEK ABOUT WHY THE COMPANY’S OFFERING IS THE CLEAR CHOICE FOR FUNDS EVEN IN A BUSY FINANCIAL MARKETPLACE

STANDING OUT FROM THE CROWD

John Bryant was named head of technology for Options in November 2012 after joining the company in mid-2008 as head of technology for Europe, where he oversaw the development of the European Momentum and Velocity low-latency market data product portfolios and managed the company’s European data centre expansion program.

Page 24: CYBER RISK AND SECURITY 2015

T E C H N O L O G Y

2 4 H F M W E E K . CO M

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

number of years now and will continue to do so. Penetra-tion tests are a case in point, both Options and our leading customers do regular pen tests and we are happy to share our results with customers and prospects.

HFM: Options has a global market presence. Which areas are most sophisticated in their service demands and which are more reluctant to invest in cyber- security?JB: Had you asked me that question two years ago, my answer would have been that our US and UK institutional client base was much more sophisticated in terms of se-curity demands – with SLAs stipulating schedules for se-curity patching, server reboots, login audits, penetration tests, intrusion prevention log reviews, etc. Historically, the adoption of fundamental security best practices such as password expiry or complexity was an unwelcome hur-dle for some hedge fund COOs. However, in the last 18 months, with increased scrutiny both from regulators and investors, hedge funds display an increasing awareness of the risks posed by a laissez-faire attitude to security. Many no longer see it as a burden, instead using their firm’s se-curity policies and infrastructure as a positive to attract institutional investment.

HFM: What are the must-have features of a cyber- security offering in today’s fund industry?JB: Any security offering in this space should combine both the need to actively scrutinise each layer of your IT architecture as a point of potential weakness with the need for service uptime and operational flexibility.

As an example, our security offering combines best practice security building blocks (e.g. IPS-enabled fire-walls, access-lists, platform agnostic anti-spam/malware and vulnerability scanning tools) one might expect, to-gether with automation and the operational rigour to check all security-related data for signs of unwanted be-haviour, and review security bulletins for the latest vul-nerabilities exploited in the wild. Without the foundation of those processes and the efficiency of that automation these tools would fail to reach the full potential of our in-vestment in them.

Although the zeitgeist may today be around mobile malware and anti-DoS appliances, it pays to do the age old fundamentals well – audit your systems regularly, ensure your data is backed up, log all activity, reboot PCs and servers so they get the latest security patches, and reduce the potential attack entry points (disable portable media, use web filtering, filter spam).

Lastly, do not overlook the benefits of end user IT se-curity training and awareness. Your cyber-security infra-structure is only half the story.

HFM: When it comes to sensitive data management and protection, are managers sufficiently aware of the risks posed by cyber-attacks?JB: The order of magnitude increase in media attention given to the topic of cyber risk over the past year alone has certainly heightened the awareness of the business com-munity at large, and broadly we do see an appropriate level of awareness to the wider issues at work here. The ques-tion is are those managers committed to budgeting for

and taking the necessary actions to address them, and here again we see a positive and accelerating trend.

HFM: With cyber-attacks becoming more and more common as well are varied in their methods, how can Options offer security to its clients?JB: Options has invested significantly in our infrastructure in order to meet the increasing security demands service providers are facing in this space. All of the components we touched on above are key building blocks that form our security offering to clients. We’ve built and matured the Options global private network over the past 10 years, enabling best-in-class information security for our clients. While other vendors in the space continue to use VPNs, customers leveraging the Options platform can harness a fully resilient and secure global platform with high band-width and low latency.

In the past 12 months alone we have invested in a number of security and compliance products to enhance our security offering including Active Directory auditing, Windows file system auditing, BYOD management, and a web filtering platform refresh, to name but a few. All of these additions come at no extra cost – they are bundled within the service charge.

HFM: Which aspects of your offering are you looking to develop in the next year?JB: One of the latest initiatives we have committed to is to use Splunk as our enterprise SIEM product. We already use the Splunk platform in our day-to-day IT operations. Over the next few months we will bring all relevant secu-rity data such as firewall, web filtering, IPS and antivirus logs together into a single information repository. The new platform will also replace our current vulnerability scanning tool.

This represents a huge leap forward in our capabilities in this space, allowing us to react much more swiftly to detect new threats, diagnose anomalous behaviour, con-duct forensic investigations and perform security analysis in real time.

Additionally, we have recently introduced monthly management packs that report on key security metrics in order to provide clients with the transparency they need. While still in beta, these are due to be rolled out to our cli-ent base in due course.

OPTIONS HAS INVESTED SIGNIFICANTLY IN OUR

INFRASTRUCTURE IN ORDER TO MEET THE INCREASING SECURITY

DEMANDS SERVICE PROVIDERS ARE FACING IN THIS SPACE

Page 25: CYBER RISK AND SECURITY 2015

I exploit your weaknesses.It’s my job. And I take it seriously.

What do you do?

The fallout isn’t just the direct costs. Economic cyber crime seriously damages brands, tarnishes reputations beyond repair and impacts market share.As society becomes less tolerant of unethical behaviour, businesses need to make sure they are building – and keeping – trust.

Against a backdrop of data loss, IP theft and financial fraud, ENCODE’s Extrusion Testing™ and Cyber Readiness Assessment service, a simulated cyber attack providing you with the insight you need to address the threats that matter, combined with the Cyber Operation and Intelligence service, which delivers the visibility, early detection and adaptive response you need to protect your organisation against obscure, targeted cyber attacks.

Encode Group, 5 Chancery Lane, London WC2A 1LG, UK

Economic cyber crime does not discriminate.It is truly global. No industry or organisation is immune.

Take control.

+44 (0)207 406 7535www.encodegroup.com

Page 26: CYBER RISK AND SECURITY 2015

T E C H N O L O G Y

2 6 H F M W E E K . CO M

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

HFM: What is ACE IT Solutions’ approach to cyber-security and its main principles? Warren Finkel (WF): Our cyber-security solutions are tailored to help fi rms be proactive and meet compliance requirements. Th e fact is, your fi rm will get hacked; it’s no longer a matt er of if but when.

Th e key to minimising risk is using threat intelligence to get ahead of hackers. With up-to-date, customised intel-ligence about current and future threats, and a deep under-standing of how well your security strategy stands up to these threats, you can bett er manage your defences while reducing risk and making smarter investments. Th reat in-telligence also help you understand which threats are ap-plicable to your businesses. A one-size-fi ts-all approach does not work as well as a customised approach to taming your fi rm’s threat landscape.

Th is includes security awareness training to help em-ployees understand how they put their fi rm at risk, training them about cyber-security best practices and how to rec-ognise phishing emails – a primary entry point for hackers.

HFM: ACE IT Solutions partnered with IBM, which was rated number one by Gartner for threat intelli-gence. What is ‘threat intelligence’ and how is it em-ployed against cybercrime?WF: Th e more information you have about the threats that are out there, the bett er prepared fi rms can be to deal with the risks. Th reat intelligence can be used to defend against att acks, but it is incredibly useful for helping recog-nise an att ack and dealing with it. Th ink about it like this: we know company A, B, and C got hacked and this is how it happened. How can we use that information to mitigate a cyber-att ack on our own fi rm?

Even the US government is gett ing behind this ap-proach. It recently passed a bill that would push compa-nies to share information about security breaches. Th is is important because businesses can no longer fi ght the bad guys individually. We must use the compiled threat intel-ligence from the whole industry to fi ght them.

HFM: Th ere is a clear need to educate your clients’ staff to employ best practice and avoid a breach through phishing techniques, etc. How do you approach this?WF: We are doing a lot of employee training on safe in-ternet use, including phishing exercises to help them rec-ognise phishing emails. Teaching employees to be aware of an organisation’s security requirements can be one of the most eff ective ways to enhance the company’s overall

security posture. Employees are a key link in the security of a business’ technology infrastructure and company data. Without end-user training on security best practices and policies, it is impossible to secure your information re-sources or ensure data privacy. Th e eff ort to create a ‘secu-rity aware culture’ must include everyone in the company. Additionally, end-user training on security best practices and privacy awareness is essential to any organisation’s compliance and risk management initiatives.

We also educate people on the weaknesses of certain cloud apps and ensuring employees don’t have admin ac-cess that allows them to download applications and access back-offi ce functions.

As an IMB partner we can off er our clients access to its security operation centres and the X-Force threat intelli-gence team, but if you don’t have the basics of an educated and aware staff then it won’t help prevent a breach.

HFM: What is the most important feature of your staff education process?WF: Th e key is that change is driven from the top. We oft en speak to IT staff from a fund who are obviously very aware of the dangers of cyber-att acks and how to avoid a breach but more oft en than not when I speak to CFOs or CEOs they don’t even know what basic controls their fund has in place. Senior management must be made aware and then drive best practice procedures. Information security polic-es and incident response plans are also critical to a cyber-security programme. Th e SEC is now requiring these plans to be in place and that you have a penetration test.

Ultimately, we have all the services a client could want and we understand the SEC’s requirements but the best cyber-defence mechanism has to start internally by creat-ing a culture of awareness and training employees to com-ply with laws, regulations and policies to reduce the risk of exposure.

THE KEY IS THAT CHANGE IS DRIVEN FROM THE TOP

WARREN FINKEL, OF ACE IT, EXPLAINS WHY CYBER-SECURITY MUST INCLUDEA TOP-DOWN APPROACH TO SECURITY AWARENESS

CHANGE STARTSFROM WITHIN

Warren Finkel is the managing partner of ACE IT Solutions and brings decades of business and technology experience when consulting with clients in the alternative asset space to help them build a robust and secure IT infrastructure and connect their business initiatives to focused technology strategies and solutions.

Page 27: CYBER RISK AND SECURITY 2015

EVERY WEEK YOU WILL RECEIVE More exclusive stories than any other hedge fund publication All the latest searches and investment news Exclusive data on launches and performance Investment strategy analysis Topical comment from leading industry figures

Exclusive research surveys Regulatory developments People on the move

As a subscriber, you will also receive full registration to www.hfmweek.com, where you can access:

Daily updated performance data Exclusive research Daily news alerts Industry events information Service directory listings and much more...

vF O R M O R E I N F O R M A T I O N P L E A S E C O N T A C TThe Membership Team at +44 (0)207 832 6511 OR email membership@hfmweek .com O R V I S I T H F M W E E K . C O M F O R D E T A I L S

THE BEST READ IN THE HEDGE FUND INDUSTRY

SUBSCRIBE TO

www.hfmweek .com

P OW E R

HFMWeek reveals who’s made this

year’s investor power 30 list

ANALYS IS 16

FORMER BREVAN Howard

partner Chris Rokos has

named his new firm Rokos

Capital Management and

revealed senior staff members.

Rokos is listed as a direc-

tor of the recently incorpo-

rated firm, which is expected

to be one of the year’s biggest

hedge fund launches, along-

side Nicholas Howard and

Andrea French, according to

Companies House records.

Howard, a former Barclays

managing director, and French,

previously a partner at Brevan

Howard, have both held roles

at Rokos’ family office, estab-

lished in 2013, working as

CRO and COO, according

to their respective LinkedIn

profiles.

Rokos Capital submitted its

application for FCA authori-

sation last week and is in the

process of sourcing its service

providers for the $1bn-plus

fund, HFMWeek understands.

Mary Bynum, an inves-

tor relations pro at Comac

Capital, is also understood to

be joining the firm, while for-

mer Goldman Sachs co-head

of Asia-Pacific macro trading,

Stuart Riley, has also been

hired, according to reports.

Exact details of Rokos

Capital’s strategy are not clear,

but a global macro

focus seems likely,

Nicholas Howard and Andrea

French listed as directors of

high-profile launch

BY JASMIN LEITNER

03

COMMENT THE GROWING COST OF REGULATORY COLLABORATION 14

Ex-Brevan partner

readies Rokos

Capital for launch

TARGETING

THE CROWN

DEPENDENCIES

WOULD LABOUR LEADER ED

MILIBAND BE ABLE TO CARRY

OUT HIS BLACKLISTING THREAT?

ANALYSIS 21

The long and the short of it

ISSUE 374 2 April 2015

LAUNCH 10

DALLAS-BASED WARRINGTON LAUNCHES ONSHORE FUND

Options trader spins out of Morgan Stanley

PEOPLE MOVES 05

ALBOURNE CEO SIMON RUDDICK TO STEP DOWN

Partner John Claisse to take over from August

PEOPLE MOVES 06

PM FOR $450M ARMAJARO FUND STEPS DOWN

Oliver Denny to become lead manager from 1 April

s1 indd 1

31/03/2015 16

www.hfmweek .com

Opposition leader Ed Miliband has

the financial sector in his sights with

proposals to reform taxation rules

ANALYS IS 25

NON-DOM CLAMPDOWN

THERE HAS BEEN a 36.5%

increase in the amount of

assets London borough pen-

sion schemes allocate to hedge

funds in the past three and a half

years, according to HFMWeek

research. The findings, based on free-

dom of information requests

and independent research, show

that eight council schemes allo-

cate £550m ($806m) to hedge

funds compared to £403m

($589.6m) at the end of 2011.

Amid rising anti-hedge fund

rhetoric emerging from the

Labour party in the build-up

to the UK general election,

the research has also revealed

that most hedge fund investors

among London’s local author-

ity pension funds are Labour-

controlled councils.Six of the eight boroughs

currently allocating to hedge

funds are Labour-led, including

the three biggest hedge fund

investors – Enfield, Camden

and Lambeth – which allo-

cate about £121m ($177m) or

15%, £109m ($160m) or 9%,

and £105m ($154m) or 10%

respectively to hedge funds.

Elected councillors typically

form a significant part of a

fund’s pension committee.

This compares to 11 boroughs

which had allocated or were

close to allocating at the end of 2011.

Most councils allocating are

Labour despite leader’s anti-hedge fund stance

BY CHRIS JOSSELYN

03

COMMENT BIG BROTHER MUST ALWAYS BE ALLOWED TO WATCH 14

London boroughs see rise in hedge

fund investing

LIQUID ALTS SPACE SEES GROWING

CONSOLIDATIONHFMWEEK FINDS THAT MANY

LIQUID ALTERNATIVE STRATEGIES

ARE HAVING A TOUGH TIMEANALYSIS 21

The long and the short of it

ISSUE 375 16 April 2015

LAUNCH 10

EX-JAMISON PM STARTS COMMODITY HEDGE FUND

Marwan Younes spins out Massar Capital Management

LAUNCH 05

PVE TEAMS WITH SCIENS ON DISTRESSED DEBT FUND LAUNCH

Manager acquired $437m of Italian non-performing loans

ADMINISTRATION 07

ADMIN M&A CONTINUES AS MAITLAND BUYS PHOENIX

Luxembourg firm makes first move into UK market

001_003_HFM375_News.indd 1

14/04/2015 17:04

www.hfmweek .com

Lawyers warn managers to take great

care if deciding to rely on reverse

solicitation in Europe

ANALYS IS 21

MAN GROUP’S US distressed

debt plans are coming together

with an eight-strong team now

hired to run the strategy.

Part of Man GLG, the GLG

Select Opportunities strategy

will be led by former Perry

Capital managing partner

Himanshu Gulati, who was

hired in February 2015 to build

the team and lead the firm’s

move into the distressed space.

Joining Gulati are Rick Paige,

who is managing director/

legal, and managing directors

Eric Mason, and Ned Oakley,

HFMWeek understands.

Paige was previously manag-

ing director at Perry Capital,

where he worked for 18 years,

while Mason spent 10 years at

Lehman Brothers/Barclays,

and Oakley will join next month

from Goldman Sachs.

Jason Harris joined this

month as head trader, hav-

ing previously worked at

Mason Capital Management

in London, with Himanshu

Sheth, senior investment ana-

lyst, Taishi Kushiro, invest-

ment analyst, and David

Schwartz, investment asso-

ciate, making up the other

recruits, according to a well-

placed source.

London-listed Man, which

managed $72.9bn as of 31

December 2014, aims

to launch the special

Rick Paige, Eric Mason and

Ned Oakley join eight-strong

team

BY JASMIN LEITNER

03

COMMENT HEDGE FUNDS CREATING POLIT ICAL DEBATE IN UK14

Man Group’s US

distressed debt

team revealed

CHEYNE CO-FOUNDER

IN DEFENCE OF

HEDGE FUNDS

STUART FIERTZ WARNS ON

ANTI-INDUSTRY RHETORIC AT

HFMWEEK AWARDS NEWS 03

The long and the short of it

ISSUE 376 23 April 2015

ANALYSIS17

HFMWEEK INVESTMENT CONSULTANT RESEARCH REVEALED

New study shows strong growth from a number of big names

REGULATION 05

SEC REVEALS SECOND WAVE OF CYBER-SECURITY EXAMS

Chris Hetner joins agency as cyber lead on tech programme

REGULATION 07

LABOUR LOOKS TO ‘NEUTER’ UK MERGER ARBITRAGE

Experts warn new takeover rules will hit activist hedge funds

DANGER AHEAD

22/04/2015

www.hfmweek .com

Part 1: HFMWeek examines how insider trading rules are changing

across the globe

ANALYS IS 20

CITIGROUP SAW A 22% reduction in the number

of hedge funds it provides administration to in the latest

HFMWeek/AlphaPipe quarter-ly research survey.The research of SEC-

registered firms, based on Q1 filings, also shows BNY

Mellon saw a 7% fall in funds, from 606 to 565, although it

increased RAuM by 8%, con-firming HFMWeek’s revela-

tions last year that it was shed-ding smaller clients.Citi’s book dropped from

417 to 324 funds over the quar-

ter with RAuM falling 15%, from $217.9bn to $184.7bn.

The bank confirmed on 15 January that it was putting the

book up for sale and moving it into Citi Holdings while it

looked for a buyer.At the time, Citi had a book of $380bn globally. The

HFMWeek/AlphaPipe survey only covers SEC filings.

Experts have previously raised concerns that Citi may

struggle to sell the admin book given the number of hedge

funds expected to leave.SS&C appears to be the

biggest winner, with 90 new funds onboarded in Q1, an

increase that sees it move into second place behind

Citco in the quarterly standings.

HFMWeek/AlphaPipe research shows BNY Mellon shedding

clientsBY CHRIS MATTHEWS

03

C O M M E N T HOW DO YOU SOLVE A P ROBLEM L I K E UC I T S ? 14

Citi sees 22% drop in funds as SS&C makes big gains

THE HFMWEEK/APHAPIPE SERVICE PROVIDER SNAPSHOTLATEST DATA ON THE TOP 20 ADMINS, AUDITORS, CUSTODIANS

AND PRIME BROKERSANALYSIS 16

The long and the short of it

ISSUE 377 30 April 2015

CLOSURE 10

CITY FUND MANAGEMENT CEASES TRADING

Fund of managed accounts sustained two years of losses

ADMINISTRATION 03

SS&C RIVALS PRESSED DOJ TO EXAMINE ADVENT DEAL

Administrator complaints led to antitrust probe

SEARCH 08

DEUTSCHE PLATFORM SEEKS EVENT-DRIVEN CREDIT STRATS

DeAWM searches for cat bond and multi-strategy managers

INSIDER TRADING RULES

AROUND THE WORLD

001_003_HFM377_News.indd 1

Page 28: CYBER RISK AND SECURITY 2015

2 8 H F M W E E K . CO M

C Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

The US Security and Exchange Commis-sion (SEC) has provided cyber security risk guidance for investment management firms. Hedge fund firms are spending more for cyber security to align with the guid-ance but are missing many opportunities

to optimally secure their networks. The focus should be on security. Once that is taken care of, the SEC rec-ommendations will automatically fall into place.

If you have not yet focused on cyber security, you are not alone. In the SANS Institute report (Securing the Human 2015 Security Awareness), the cyber security institute dis-covered that half of the organisations surveyed currently do not have an awareness programme or have an immature programme that is solely focused on compliance. Focus-ing on compliance gives organisations a stronger security posture but could leave out important processes in secur-ing a network. Most organisa-tions have put a few protective and detective security devices, soft ware products and secu-rity policies in place, and think they are secure. However, if you are not looking beyond your network and into your endpoints, employees and processes, then client trust and reputation is at risk.

A recent survey of global in-stitutional investors by KPMG found that 79% of investors would be discouraged from investing in a business that has been hacked. Security today is not based on devices alone. It is based on a combination of people, process and tech-nology. Organisations that don’t have their own full-time team of security analysts need to collaborate with experts who can consult and advise them on security matt ers, and who can monitor their networks 24/7 to help them get threats out of their networks before damage has been done. Perhaps you have already invested in a SIEM, a new fi rewall, or a threat protection device, or are considering buying them. Once they’re in your possession, how will you incorporate necessary changes as the att acks change? Who is going to make certain they are consistently confi g-ured to present accurate alerts? I’m not talking about alerts that keep going off when nothing is really wrong. I’m talk-ing about accurate alerts so that your security team doesn’t

ignore that one alert out of thousands that really is a net-work breach. In a typical week an organisation can receive an average of nearly 17,000 malware alerts, but only 19% of these alerts are deemed to be reliable, according to the 2015 Ponemon report Th e Cost of Malware Containment.

Before you have been breached, you should have already thought about and have answered the following questions:

• Who is going to analyse the threats that are discov-ered?

• Who is going to assess what damage has been done thus far?

• Will this person have the tools and a database of bil-lions of threats and threat activities, all necessary to analyse the suspicious activity to determine exactly what malware is in your network?

• Who is going to fi nd out where in your network the threats are and how the intruders entered?

• Who is going to be able to remove the threat?

Before investing in any cyber security infrastructure, answer those questions. If you’ve spent thousands of dollars on a device that is not being patched, man-aged, and confi gured consist-ently, your fi rm’s assets aren’t properly protected. Just as a hedge fund needs a fund manag-er, hedge funds fi rms need secu-rity experts to help them manage their networks.

At a hedge fund management seminar in September 2014, the SEC said, “Compliance policies and procedures must be specifi cally tailored to your fi rm’s advisory business, and should evolve and grow with your business... It is crucial that policies and proce-dures be reviewed and updated as your business changes, as regulations change, and as new guidance is issued”.

Th ose are principles your cyber security strategy should encompass. As your business changes, so does your net-work, which is why you need operational and technical controls to protect it. However, you can’t decide what con-trols to implement without knowing where your network is at risk. So a risk assessment should be one of the fi rst steps you take when analysing your security. Th is will help you assess risk based on probability, impact and cost.

You also should conduct a vulnerability assessment to

SECURITY TODAY IS NOT BASED ON DEVICES ALONE. IT IS BASED ON A COMBINATION

OF PEOPLE, PROCESS AND TECHNOLOGY

DAN BONNET, SALES DIRECTOR, DELL SECUREWORKS, TALKS TO HFMWEEK ABOUT THE MUST HAVE FEATURES OF A CYBER-SECURITY SERVICE PROVIDER

THE ATTACK HAS EVOLVED, HAVE YOU?

Dan Bonnet is director of sales for North America medium business for Dell SecureWorks. Dell SecureWorks is a leading provider of managed security, security consulting, threat intelligence and incident response services to the financial services industry.

Page 29: CYBER RISK AND SECURITY 2015

H F M W E E K . CO M 29

T E C H N O L O G Y

discover current weaknesses in your network. An automated scanner may scan for firewall configuration weaknesses, open ports and de-fault login credentials. However, an expert is needed to delve deeper into your network to manually scan it in order to find errors that au-tomated tools often make and to review secu-rity policies and logs, and personnel processes to discover other weaknesses.

You should next conduct a penetration test, or pen test. By simulating an attack without harming your network, this test assesses how well your deployed security controls are work-ing and to what extent an attacker could cause damage.

One of the biggest problems organisations face is they don’t know when they are being tar-geted or when they have been compromised. In the 2014 Ponemon research report The Year of the Megabreach, it took one-third of the organi-sations represented in this research two or more years after an incident to discover they had been breached. 20% were unable to determine when the breach was discovered, mak-ing it difficult to determine the extent of the breach and the root cause. Threat intelligence and 24-hour monitoring can help you know when your adversaries are targeting you and how to stop them before they reach your assets.

Security professionals who have the know-how and ex-perience can help you create a long-term security strategy to develop and maintain a secure network. A vendor that has knowledge of only some network security operations but does not have its own threat database and incident re-sponse team won’t have all the knowledge that is needed to combat threats, and could leave you with gaps in your cyber security programme.

To secure your client database, trading al-gorithms, proprietary trading secrets, strate-gies and business processes, you need the ut-most security. Experts who work in security full time need to do many things in order to truly understand the tactics, techniques and procedures threat actors use.

The best security experts for hedge funds and financial services should provide the fol-lowing services:

• Monitor the networks of more than 1,000 financial services clients to have first-hand knowledge of their targeted attacks

• Can provide you with knowledge of threat actors who are targeting you so you can stop them before they reach your as-sets

• Have a personal global view of the threat landscape from monitoring thousands of networks around the world to see exactly the type of threats that are out there and to advise you what you need to do to pro-tect yourself

• Monitor the threat underground to understand the attackers and catch threats before they hit you

• Be able to continually manage, configure and pro-vide updates to your protective devices so that they actually block the threats as they were designed to do

• Provide countermeasures for the most recent threats• Conduct incident response engagements, to provide

insider knowledge as to who the threat actors are and how they work

• Consistently analyse malware and its activities so when you get strange activity in your network, they can identify it and remove it.

THREAT INTELLIGENCE AND 24-HOUR MONITORING CAN HELP YOU KNOW WHEN

YOUR ADVERSARIES ARE TARGETING YOU AND HOW

TO STOP THEM BEFORE THEY REACH YOUR ASSETS

Page 30: CYBER RISK AND SECURITY 2015

3 0 H F M W E E K . CO M

S E R V I C E D I R E C TO R YC Y B E R R I S K A N D S E C U R I T Y 2 0 1 5

netConsult Ltd, Level 3, 75 Wells Street, London W1T 3QH // www.netconsult.co.uk // David Mansfield, COO // T:+44 (0)20 71003310 // [email protected] // Laura Zverko, commercial director // T:+44 (0)20 71003310 // [email protected] //

Established in 2002, netConsult is an award winning provider of managed IT Services to the global alternative investment industry. We aim to provide a high level of technical expertise to our clients combined with a dedication to customer service. Our ethos is based upon designing secure IT platforms which are manageable over the long term. We are a trusted technology provider to a large portfolio of clients ranging from small start ups to large global funds. netConsult provides a bespoke service to its clients and provides a full suite of IT services including cloud services, outsourced IT, BCP, virtual CTO and IT security.

Matsco Solutions Ltd, Jim Serpi, Director of Global Operations // London +44 (0)20 7821 4950 // Hong Kong +852 8101 8418 // Singapore +65 6100 1090 // New York +1 866 446 9226 // Beijing +86 400 120 2782 // email: [email protected] Jilbert El-Zmetr, Director of Asian Operations, Hong Kong +852 3973 8900 // email: [email protected] Solutions is a leading IT services and support company founded in 2002 with offices in London, New York, Connecticut, California, Hong Kong, Singapore and Beijing. Specialising in the financial services industry, Matsco Solutions provides IT services and support for a full range of business operations and requirements from sole traders, small and medium size enterprises (SME) and large multi-nationals. We provide 24/7 support and project solutions to a wide range of businesses across the globe. We specialise in company start-up services, support and monitoring, business consulting, private cloud services, IT engineering and design, outsourcing, project management, start-up projects and implementations.

Eze Castle Integration, Dean Hill, Executive Director // +44 (0)207 071 6802 Simon Eyre, Director of Service // +44 (0)207 071 6835Interpark House, 7 Down Street, London, W1J 7AJ, email: www.eci.com Eze Castle Integration is the leading provider of IT solutions and private cloud services to more than 650 alternative investment firms worldwide, including more than 100 firms with $1 billion or more in assets under management. Since 1995, Eze Castle Integration has developed financial vertical-specific IT solutions including infrastructure design and management (both in our Eze Private Cloud and on premise), telecommunications, business continuity planning and disaster recovery, archiving, storage, and internet services. These solutions are complemented by a broad service organisation that delivers outsourced IT support, including a 24x7x365 help desk, project and technology management services, consulting services and more. Eze Castle has presence in major financial centres including 8 US offices, a Singapore office, and a Hong Kong office in addition to its London office.

eSentire, Mark Sangster, VP of Marketing // Tel: +1 519 651 2200 // 1 Penn Plaza, Suite 4501, New York, NY 10119 // www.esentire.com

eSentire® is the leader in Active Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen cyber threats. eSentire’s flagship offering, Network Interceptor, challenges legacy security approaches, combining behaviour-based analytics, immediate mitigation and actionable intelligence on a 24x7x365 basis. The company’s dedicated team of security experts continuously monitors customer networks to detect and block cyber attacks in real-time. Protecting more than $2trn in combined assets, eSentire is the trusted choice for security decision-makers in financial services. In 2014 eSentire was named Best Security Service Winner at HFM's US Services Awards. For more information visit www.esentire.com and follow @esentire.

Capital Support Limited, Nigel Brooks, Managing Partner // T: +44(0)20 7458 1250 Carrie Saunderson, Executive Director of Sales // T: +44 (0)20 7458 1250Capital Support specialises in implementing and supporting end-to-end IT solutions for a large portfolio of global finance sector customers. The company ethos is to make IT simple for its customers, providing intelligently designed tailored solutions that span the breadth of regulated firms’ requirements. Capital Support’s vision is to be the most trusted and respected managed IT services provider. 2015 is seeing a continued rise in the number of cyber-attacks suffered by businesses across all sectors. Finance sector firms are amongst the most prized targets for cyber criminals. Capital Support’s managed security services provide peace-of-mind to businesses, investors and regulators.

Dell Secureworks, Dan Bonnet, Sales Director // [email protected] // T: +1 404 486 4478

Dell Inc. listens to clients and delivers innovative technology and services that give them the power to do more. Recognized as an industry leader by top analysts, Dell SecureWorks provides world-class information security services to help organizations of all sizes, including asset management firms, protect their IT assets comply with regulations and reduce security costs.

Alan D. Alzfan, Partner, Financial Services Practice - North America // T: +1 212-372-1380 // [email protected] Lynne Weil, Partner, Financial Services Practice, N America // T: + 1 312.634.4568 // [email protected] more than 50 years of experience serving the financial services community in key financial hubs, McGladrey professionals help organizations navigate complex reporting, governance and regulatory issues to achieve their business objectives. Based on the knowledge that comes from serving alternative investment companies, investment advisors, investment partnerships/hedge funds, private equity funds, business development companies, mutual funds, broker-dealers and futures commission merchants, we understand the complex operational, financial reporting and compliance issues facing the industry. We provide industry insight, advice and solutions to financial services organizations across the country and around the world. That’s what you can expect from McGladrey. Experience the Power of Being Understood.SM

Page 31: CYBER RISK AND SECURITY 2015
Page 32: CYBER RISK AND SECURITY 2015

Enterprise Business Technology That Provides Guaranteed Security, Resilience & Uptime.

Speak to netConsult on 020 7100 3310

Established in 2002, netConsult is an award winning provider of managed IT Services to the global alternative investment industry.

We aim to provide a high level of technical expertise to our clients combined with a dedication to customer service. Our ethos is based upon designing secure IT platforms which are manageable over the long term.

We are a trusted technology provider to a large portfolio of clients ranging from small start ups to large global funds. netConsult provides a bespoke service to its clients and provides a full suite of IT services including Cloud Services, Outsourced IT, BCP, Virtual CTO and IT Security. For more information visit www.netconsult.co.uk

• IT Security &

Business Continuity

• High Availability

Cloud Platform

• 24x7x365 Support

• Central London

Head Office

Level 3, 75 Wells Street London, W1T 3QH Tel: 020 7100 3310 www.netconsult.co.uk