Risk & Compliance

When confronted with unexpected business disruptions, alternative investment firms must react swiftly, methodically and successfully or else risk significant financial loss. This level of response requires extensive business continuity planning to ensure all aspects of a firm’s business are evaluated and protected.

Effective business continuity planning (BCP) can help minimize financial loss and the negative effects of disruptions on an investment firm’s strategic plans, market position, operations, and reputation.

When a cybersecurity incident happens, it is critical to act fast to minimize any inherent risk to your firm. That said, being able to act swiftly requires firms to have an Incident Response Plan in place.

Please join us on Thursday, October 18th to hear from Matt Donahue and Jeremy Ross, business continuity consultants at Eze Castle Integration to learn the steps to create a plan for before, during and after a cyber incident, including sample incidents and appropriate response steps.

In today's changing regulatory and investor landscape, Information Security Plans are critical for alternative investment management firms to comply with SEC regulations, due diligence requests and state laws.

Please join us on Thursday, October 4th to hear from Matt Donahue, business continuity consultant and Steve Banda, senior product manager from Eze Castle Integration to learn:

  • What is an information security plan and why it is necessary to have a formal plan in place?
  • What are the nine steps to create an information security plan?

Since 2003, October has been recognised as Cybersecurity Awareness Month. It encourages businesses around the world to be vigilant and share tips on digital security and protection. With the spotlight on security awareness, now is the perfect time for law firms to assess and update any defence practices in place, to ensure their network remains bulletproof in an ever-changing threat landscape.

Reserve your seat and find out how to get certified, expert ethical hackers when you need them – on demand, by the hour.

Hackers continue to be successful, which is why finding the right expertise to secure your firm is a must. But that has often proven to be very costly, with many additional costs including cancellation fees and extra for reporting.

Reserve your seat at our webinar and find out how our unique 'on demand' model means you:

Invoking disaster recovery isn’t as easy as some might have us believe. In fact, it’s probably one of the most intensely scrutinised and difficult times for any IT professional.

Where do you draw the line between fixing a problem with primary systems, or pulling the trigger and failing over?

Who’s responsible for making the ultimate decision? What happens if they’re unavailable?

How do you communicate throughout the incident – to both users and customers?

Claim Technology are delighted to announce a partnership with leading medical reporting software provider, Nephos Solutions. Nephos Solutions helps independent experts and MROs provide medical reports to UK solicitors.

Claim Technology will harness the power of Nephos Solutions, combined with their own cutting-edge conversational interface to provide medical appointments-as-a-service for the claims industry.

Highest risk from human error

Through statistics obtained by Kroll from the Information Commissioners Office, Workshare looks at the biggest causes of reported data loss to businesses in the UK.

The fear of cyber attacks may be high and information security risk rising all the time, but the real danger comes from simple human error. And, more importantly from individuals emailing data to the wrong person.

Misaddressed emails, with data inappropriately shared, is still the number 1 cause of data loss in UK firms. 

Post a Comment

Legal software company Peppermint has demonstrated its commitment to protecting its clients by joining the Cyber Essentials scheme.

The scheme is backed by the National Cyber Security Centre on behalf of the UK Government and shows that Peppermint maintains an excellent set of controls to protect users of its suite of cloud solutions.

The certification is the latest security development by Peppermint which, as a cloud provider, is constantly evolving its processes in order to mitigate the risks around cyber security for its Microsoft-backed technology.

Validating the identity of new customers and demonstrating compliance with anti-money laundering and know-your-client obligations has been a traditional pain-point for law firms. It can also cause frustration for customers who are asked to present a passport in person, or have a copy of their passport certified by a third party. 

Syndicate content