cyber risk and security 2015

Transcription

cyber risk and security 2015
HFMWEEK
S P E C I A L
R E P O R T
CYBER RISK AND
SECURITY 2 0 1 5
STAFF TRAINING
A vital element to any cyber-security framework
CLOUD TECHNOLOGY
Private and public both viable options for funds
UP-TO-DATE SOFTWARE
Regular updates essential for an effective firewall
FEATURING Ace IT // Capital Support // Eze Castle Integration //
eSentire // Matsco Solutions // McGladrey // netConsult // Options IT
// Dell SecureWorks
What’s keeping you up at night?
CYBERSECURITY
You are not alone. The SEC, SIFMA, FINRA, DHS and multiple other
organizations are worried about the threat of cyber attacks and
vulnerabilities like ShellShock.
eSentire is the leading provider of continuous active threat protection
to the financial services industry. We’ve helped numerous clients
exceed the expectations of regulatory associations while protecting
their assets and investor interests 24x7.
We can help. Contact us today:
1.866.579.2200 | [email protected]
http://info.esentire.com/sec-exam-readiness/
C YG
BE
U RE RRNI S K
E YA 2N0D1 5S E C U R I T Y 2 0 1 5
INTRODUCTION
T
he threat of a cyber breach has become increasingly
acute in the past year. Criminals are constantly
creating more innovative hacking tools with which to
attack a fund’s valuable and sensitive data.
A string of high-profile cyber-attacks in 2014
highlighted the stark reality that, for the financial
industry especially, dedicated cyber defence systems
are no longer a luxury; they are a necessity.
The SEC in the US is asking managers to show
they operate cyber defence software and have implemented detailed action
plans in the event of a breach, as part of its guidelines on the topic.
In this HFMWeek Cyber Risk and Security Report 2015 we hear from leading
cyber service providers who discuss the key points surrounding creating an
effective system. HFMWeek compares the pros and cons of creating a private
in-house cloud platform against an outsourced third-party provider.
HFMWeek also discusses various best practices that industry specialists are
recommending to hedge funds of all sizes, and the importance of mastering
the basics of password protection and staff training exercises to avoid the many
phishing attempts that will come.
Many cyber industry specialists now agree that attempted cyber breaches on
funds of all sizes are now inevitable. The question of whether they’re successful
is up to you.
Drew Nicol
REPORT EDITOR
HEDGEFUNDMANAGER
HFMWEEK
Published by Pageant Media Ltd
LONDON
Third Floor, Thavies Inn House, 3-4 Holborn
Circus, London, EC1N 2HA
T +44 (0) 20 7832 6500
NEW YORK
240 W 37th Street, Suite 302, NY 10018
T +1 (212) 268 4919
REPORT EDITOR Drew Nicol T: +44 (0) 20 7832 6659 [email protected] HFMWEEK HEAD OF CONTENT Paul
McMillan T: +44 (0) 20 7832 6622 [email protected] HEAD OF PRODUCTION Claudia Honerjager
SENIOR SUB-EDITOR Eleanor Stanley SUB-EDITORS Luke Tuchscherer, Mary Cooch GROUP COMMERCIAL MANAGER
Lucy Churchill T: +44 (0) 20 7832 6615 [email protected] SENIOR PUBLISHING ACCOUNT MANAGER Tara Nolan
+44 (0) 20 7832 6612, [email protected] PUBLISHING ACCOUNT MANAGERS Amy Reed T: +44 (0) 20 7832 6618
[email protected]; Jack Duddy T: +44 (0) 20 7832 6613 [email protected]; Alex Roper T: +44 (0) 20 7832 6594
[email protected] CONTENT SALES Tel: +44 (0) 20 7832 6511 [email protected] CIRCULATION MANAGER Fay
Muddle T: +44 (0) 20 7832 6524 [email protected] CEO Charlie Kerr
HFMWeek is published weekly by Pageant Media Ltd ISSN 1748-5894 Printed by The Manson Group
© 2015 all rights reserved. No part of this publication may be reproduced or used without the prior
permission from the publisher
H F M W E E K . CO M 3
CONTENTS
CYBER RISK AND SECURITY 2015
05
SECURITY
FULL SPECTRUM SECURITY
20
TECHNOLOGY
ARE YOU REALLY SAFE?
23
TECHNOLOGY
PUBLIC, PRIVATE, OR A BIT OF BOTH?
26
Phil Ashley of netConsult discusses the public versus private cloud
platforms and the factors that should guide a fund manager’s choice
14
CONSULTING
BE PREPARED
McGladrey’s Alan Alzfan and Daimon Geopfert speak to HFMWeek
about the reality of the threat facing hedge funds through cyber
attack
17
TECHNOLOGY
GETTING STRONGER TOGETHER
Bob Guilbert of Eze Castle Integration explains why so many funds
are opting for cloud solutions and how the industry can work
together to tackle cyber crime
4 H F M W E E K . CO M
TECHNOLOGY
STANDING OUT FROM THE CROWD
John Bryant, head of technology at Options IT, talks to HFMWeek
about why the company’s offering is the clear choice for funds
even in a busy financial marketplace
Mark Sangster, vice-president, marketing, with eSentire, speaks to
HFMWeek about the lessons that can be learned from 2014’s cyber
events
11
FEEL SAFE WITH MANAGED SECURITY
HFMWeek catches up with Marcus Lewis of Capital Support to
discuss the company’s new cyber-security suite
Gustav Marx, service development manager at Matsco Solutions
Group, discusses the top security solutions available to hedge funds
08
TECHNOLOGY
TECHNOLOGY
CHANGE STARTS FROM WITHIN
Warren Finkel, of ACE IT, explains why cyber-security must include
a top-down approach to security awareness
28
TECHNOLOGY
THE ATTACK HAS EVOLVED, HAVE YOU?
Dan Bonnet, sales director, Dell SecureWorks, talks to HFMWeek
about the must-have features of a cyber-security service provider
SECURIT Y
CYBER RISK AND SECURITY 2015
FULL SPECTRUM SECURITY
GUSTAV MARX, SERVICE DEVELOPMENT MANAGER AT MATSCO SOLUTIONS GROUP, DISCUSSES THE TOP SECURITY
SOLUTIONS AVAILABLE TO HEDGE FUNDS
S
Gustav Marx, service
development manager at
Matsco Solutions Group has
worked in IT services for
more than eight years and
is responsible for service
improvement, infrastructure
design, planning and
product research. Focusing
on cyber-security and
cloud, Marx has developed
a keen understanding of
technologies available and
methods of implementation.
ecurity services and information technology systems are designed, tested and developed to help with the prevention of data
loss, limit potential system compromise and
to help prevent mid- to high-level security
events from occurring within a company’s
information technology environment.
The latest generation of
security systems that are developed offer enhanced security services that are fully
integrated within a growing
family of shared technologies
and knowledge bases that
encompass and deliver the
most up-to-date elements in
regards to environment and
system management.
Vendors and developers provide regular updates,
security patch releases and
software versioning as an integral functionality of these
systems, strengthening the relationship between the
central security knowledge base and control centres and
the widely dispersed security units. All the different segments that make up the multitude of security systems are
able to provide up-to-date industry specific security solutions to individuals and companies alike.
The continued development of these security
patches, security software solutions and integrated
hardware systems allow security staff the ability to
implement, monitor and
maintain security solutions
suited to their individual
environments to the highest
available standards. This
enables companies to identify and prevent malicious
attempts to access sensitive
data and private systems,
and delivers the benefit of
industry compliant solutions
in an increasingly cyber security conscious work environment.
With the advent of better
designed and controlled security solutions, companies can, regardless of size and
environment complexity, implement enterprise level
COMPANIES CAN, REGARDLESS
OF SIZE AND ENVIRONMENT
COMPLEXITY, IMPLEMENT
ENTERPRISE LEVEL SECURITY
SYSTEMS
”
H F M W E E K . CO M 5
CYBER RISK AND SECURITY 2015
SECURIT Y
security systems to manage and protect the data that
requires dedicated protection in all transitory and fixed
states from all possible threats; data integrity, data loss,
corruption as well as internal and external access. To
fully protect and maintain security within environments,
these security systems are increasingly available in the
marketplace, fully adaptable to different scenarios and
customisable to suit any company’s budget, size and/or
security requirement.
A mixture of these different technologies that are available today, allow companies to be proactive in their fight
against cybercrime and enables security and compliance
staff to put in place preventative measures that ensures
enhanced security for the users and sensitive data that
resides in their respective environments. These systems
are currently available as several variations of hardware
or software based solutions: pure cloud-based infrastructures, hybrid systems or fully dedicated onsite environments. Regardless of the method of deployment all these
system are able to offer the highest levels of security solutions that are currently available in the industry today.
There are many risks that threaten data security today and the increasing emergence and identification of
pre-existing software loopholes, previously unnoticed
exploitable routes into sensitive areas and non-secure
environment access points, have placed a large burden
on compliance and security staff in many companies.
These loopholes, access points and exploitable vulnerabilities that allow access to secure environments are
vigilantly researched, tested and corrected by the mainstream security firms and software companies to remove
these points of vulnerability from all environments.
The top security solutions range in price from the
low hundreds to thousands per user per annum. Due
to the increased requirement for cyber security reviews
and cyber security solutions within the industry, it has
become a minefield for many budget conscious companies to cross on how best to determine which product is
best suited to their environment and what the best price
for the right solution is. Q
DUE TO THE INCREASED REQUIREMENT FOR CYBER
SECURITY REVIEWS AND CYBER SECURITY SOLUTIONS
WITHIN THE INDUSTRY, IT HAS BECOME A MINEFIELD
FOR MANY BUDGET CONSCIOUS COMPANIES
TOP FOUR SECURITY SOLUTIONS:
1. MALWARE, SPYWARE, ADWARE AND
VIRUSES
• Security solutions designed to identify, protect and eradicate threats that pose security
risks to systems and data:
• Auto-update of heuristic and protection software system files
• Continuous scanning of the environment for
threats
• Central management consoles and policy
controls
• System configuration and malicious code
identification and prevention
The top systems:
• Symantec endpoint protection
• Trend micro anti-virus and endpoint protection
• Messagelabs email protection services
• Mimecast email protection and scanning
2. UNAUTHORISED NETWORK ACCESS
• Network and IP address monitoring, security
and scanning services to prevent unauthorised
access. Intrusion detection and prevention
services that monitor the network for access
attempts, brute force attacks, DDoS and network penetration attempts:
The top systems:
• eSentire Network protection and monitoring
services
• Dell SecureWorks
• Cisco Global IPS/IDS services on Firewall
6 H F M W E E K . CO M
”
THE TOP 5 IMMEDIATE SECURITY THREATS:
units
• Juniper IPS enabled Firewalls
3. CONFIDENTIAL DATA LOSS, EMAIL AND
MOBILE DEVICE MANAGEMENT
• DLP and sensitive data protection systems
prevent unauthorised movement of sensitive
data out the environment by implementing
security policies, access policies and filter
lists to control and prevent unauthorised data
transmissions. Mobile device management
allows administrators to control data, application and system access from mobile devices,
personal or company owned, across any internet connection.
The top systems:
• SMARSH DLP email services
• MimeCast DLP email services
• Symantec Security Management suites
• Airwatch mobile device management
4. UNAUTHORISED SYSTEM ACCESS
• Dual factor authentication services, domain
controller and system access controls prevent
unauthorised use and access to company
owned services, applications and data.
The Top systems:
• Cisco ISE Systems
• RSA Token based authentication
• VASCO dual factor Authentication systems
• Domain based control servers and access
lists
1. MALWARE, SPYWARE, ADWARE AND VIRUSES
• Introduced to environments through mail, unauthorised
data transfers, websites and programs
• Encapsulated as packaged software installed to devices
or scripts and system files that run on system start-up
• Registry configurable files and keys
• File lockout and encryption to prevent access
• Key logging, data capturing and data worms
2. UNAUTHORISED NETWORK ACCESS
• Access is gained through unsecured network device ports
and unprotected access routes
• Access over SSL security flaws
• Software and application backdoors and security flaws
• Unauthorised access to physical devices
3. CONFIDENTIAL DATA LOSS AND MOBILE DEVICE
MANAGEMENT
• Unprotected mail and file transfer, low level encryption
• Data extraction through mobile devices and memory
sticks
• CD/DVD burning
• Unprotected Web access and social accessibility
4. UNAUTHORISED SYSTEM ACCESS
• Password and User name compromise
• System hacks
• Wireless hotspot access and network connections
• Unprotected terminal access
5. SYSTEM MONITORING AND UPDATES
• Uncontrolled software updates and security patching
• System monitoring and incident management
• Logging and identification
Protect your network in real time with Managed Security Services. A simple and
cost-effective way to limit potential threats and meet compliance mandates.
Focused on Security Essentials
Security Intelligence from IBM X-Force Threat Analysis Team
Partnered with ACE IT Solutions
Powered by IBM
31%
42%
Contact ACE IT Solutions for a free security assessment | 646-558-5575 | www.cybersecuritynyc.com
CYBER RISK AND SECURITY 2015
ARE YOU REALLY SAFE?
MARK SANGSTER, VICE-PRESIDENT, MARKETING, WITH ESENTIRE, SPEAKS TO HFMWEEK ABOUT THE LESSONS THAT
CAN BE LEARNED FROM 2014’S CYBER EVENTS
L
Through his 20-year sales
and marketing career,
Mark Sangster has
garnered experience at
industry giants like Intel
Corporation, Research in
Motion and Cisco Systems.
He has an excellent
understanding of the
customer and key verticals
and has the unique ability
to put himself in their shoes
to see the service through
their eyes.
8 H F M W E E K . CO M
ast year’s breach stories taught us many things
about the complexities of previously underestimated network vulnerabilities. The rise
in sophisticated targeted attacks is challenging cyber-security methodologies. Industry
experts have long suggested that perimeter
security is essential cyber-security defence. We don’t dispute that the layers of technology that we use today all
play an essential role in good cyber-security hygiene. But
what today’s complex targeted attacks prove is that cyber
threats extend beyond the perimeter. These attacks demonstrate how the perimeter
can be permeated.
2014 IN REVIEW
We’ve seen an undeniable
shift from advanced persistent attacks to advanced targeted attacks. While this new
breed that we see today has a
longer life cycle, they are incredibly effective. Less than
40% of the attacks we see are
malware-based. Sophisticated
cyber-attacks like phishing
and watering hole attacks are
dominating the threat landscape. These kinds of attacks
expose the Achilles heel of perimeter defences – technology alone can’t prevent your employees from clicking malicious email links. Targeted attacks are driven by attack
ingenuity.
2014 highlighted some of the most high profile, highly
publicised and sophisticated cyber-attacks the world has
ever seen. These targeted hacks shed light on what we have
known all along – that without equally intuitive defence
mechanisms the world’s data is highly vulnerable. 2014
was not just the year the internet broke, solidifying the
fundamental shift in the cyber-security landscape, but it
also marked a point in time when businesses big and small
started to wake up to this new reality. Sony, Target, Home
Depot and JP Morgan were just some of the more highprofile victims of these attacks. For most it was too late for
repairs – the damage was done. The loss of highly valuable
data, financial or otherwise, can mean the end of a business
or worse. The numbers speak for themselves: $70bn was
spent to combat these threats in 2014, but it was a drop
in the bucket compared to losses last year of an estimated
$375-575bn – equivalent to the GDP of some nations. Cyber criminality is highly lucrative, anonymous, and has a
high probability of escaping capture and conviction.
THE EVOLUTION OF A CYBER-ATTACK
The sources of new cyber-attacks are varied and growing,
with perpetrators ranging from nation states to insiders.
They include hacktivists/activists, terrorists, organised
criminals and smash-and-grab thieves. Basically, anyone
who wants to profit from stolen funds or information.
Their targets include intellectual property, sensitive industry or merger and acquisition information, or bank
account credentials. They may simply be looking to inflict
website brand damage. And their targets will inevitably
include your enterprise. If you haven’t already been infiltrated, it’s just a matter of time.
The attacks can take the form
of an email with infected links
(phishing scams) or other infected media. They might infiltrate an executive’s computer
while it’s being used at home,
or pose as a trusted source in
an email message or phone call.
Stolen mobile devices represent
another opportunity for attack.
Clearly these attacks are often
creative and highly effective. As
cyber criminality becomes more
intelligent, so must the means to
prevent them. More often than not, victims of these crimes
are unaware they have been hacked until it’s too late.
THE LOSS OF HIGHLY
VALUABLE DATA, FINANCIAL
OR OTHERWISE, CAN MEAN
THE END OF A BUSINESS OR
WORSE
”
INDUSTRY EXPERT PERSPECTIVE (CATEGORICAL THINKING
VERSUS MORE ADAPTIVE ARCHITECTURE)
For several years, industry experts and leading analysts
have suggested a siloed approach to cyber-security. It’s
been more of a one-size-fits-all approach. However, recognising the drastic shift in attack vectors, experts now
propose a far more adaptive framework.
Active threat protection, which means eyes on glass reacting and responding to real threats and mitigating them
in real-time, is the new standard enterprises need to adopt
to elevate their cyber-security protection to match the
level of threat present in the current era of cybercrime.
TRENDS FOR 2015
This year’s trends focus on proactively implementing
new strategies and protections to outwit cyber predators and deter them. Cyber criminals will always look
for vulnerabilities, without them they will move on to
the next target or spin their wheels making fruitless attempts. To adequately protect high value assets, enterprises must continue to evolve their security defences.
TECHNOLOGY
Isolation techniques – a trusted entity may need to be
isolated to keep it secure from an untrusted system. Conversely, in the case of a trusted system, you need the ability
to isolate an untrusted entity from the rest of its contents.
That way you can run and observe the unknown code or content and safely handle
any malicious attacks.
Whitelisting is another important security foundation, which can ensure that only
trusted entities are allowed to operate on the
system. A perfect example of this is the Apple App Store. With over 500,000 apps available, there is virtually no malware because all
of the apps are whitelisted by Apple before
they can be downloaded to any system.
Regular testing is an important tactic to
ensure the integrity of your security is intact. An example of this is using ‘honeydocs’
– fake phishing emails that help to gauge
the solutions ability to react and respond to cyber-attacks.
One of the key aspects of a successful security strategy
is the ability to contain and isolate information. Keep the
bad from the good, and the good from the bad.
Your enterprise could set up your own security operations centre (SOC). But do you want
to?
Setting up an SOC is problematic, especially for companies who have a high asset
value to employee ratio. There may not
be an extensive IT department in place.
Recruiting suitable expertise is difficult
and a highly competitive market can make
retaining it problematic. An effective SOC
is costly to build, maintain and manage.
Technology is constantly evolving with
frequent hardware and software updates,
necessary to defend against the everchanging threat landscape. And if any one
of these areas becomes a weak link, your
CSO could become the chief scapegoat officer. Don’t let
it be you.
If you haven’t thoroughly evaluated your security strategy in the past 18-24 months and continually tested its effectiveness, you are not only at risk, you are exposed and
highly vulnerable – you may be infected now. An effective
security strategy requires sound protocols, continuous
testing and monitoring and talented security experts with
the knowledge to identify real threats.
Continuous active threat protection is the only proven
strategy to combat the complex, targeted threats ever-present in today’s cyber environment. Accessing security as a
service and utilising the highest level of threat protection
and white glove customer service is the most effective way
to protect your business in 2015. Q
CONTINUOUS MONITORING AND
ANALYTICS MUST BE AT THE CENTRE
OF THE SECURITY PLATFORM WITH
THE CAPABILITY TO RESPOND
WITHIN SECONDS
RECOMMENDATIONS
Previous industry guidance suggested a far more siloed
approach to cyber-security. However, today’s threat environment, detection and response capabilities are more
important than blocking and prevention. Continuous
monitoring and analytics must be at the centre of the
security platform with the capability to respond within
seconds, before an incident occurs. An adaptive security
architecture (ASA) is critical.
Because of the often unpredictable and targeted nature of these newer cyber-attacks, human intervention is
required to detect and intercept sophisticated anomalies
that technology alone cannot detect.
”
H F M W E E K . CO M 9
Cybersecurity in 2015:
Is your firm ready?
Options is the leading managed service & IT infrastructure
provider to the global hedge fund industry
No one understands the security concerns of the hedge fund industry
better than Options. Our offering combines best practice cybersecurity
building blocks with continued operational agility and rigour.
As cyber attacks evolve, both in number and sophistication,
the SOC accredited Options platform can offer your firm lasting
peace of mind. Visit options-it.com for more information.
www.options-it.com
On a mission to transform financial sector technology
TECHNOLOGY
CYBER RISK AND SECURITY 2015
PUBLIC, PRIVATE,
OR
A BIT OF BOTH?
PHIL ASHLEY OF NETCONSULT DISCUSSES THE PUBLIC VERSUS PRIVATE CLOUD PLATFORMS AND THE FACTORS THAT
SHOULD GUIDE A FUND MANAGER’S CHOICE
Phil Ashley is the
recently appointed chief
information officer at
netConsult. A trained
analytical and applied
scientist he has over 15
years’ senior IT experience
across a range of industries
running both internal IT
teams and as an external
service provider.
HFMWeek (HFM): What is the difference between
private and public cloud services?
Phil Ashley (PA): There is an ever increasing range of service providers which offer private and public cloud-based
IT services and solutions. With the emergence of public
cloud services, such as Google Apps, Amazon Web Services and Microsoft Office 365, product developments and
marketing material for cloud services can be a challenge
to digest and the critical differences between public and
private clouds can become blurred and lost in translation.
The foremost defining factor of a private cloud over a
public cloud is in the nature of storage and access to corporate data and IT services. A private cloud solution will
deliver an independent, isolated and discreet system with
individual policies and access control mechanisms. They
are clear, standalone, single-tenanted environments with
defined ownership which leverage the service provider’s infrastructure.
Public clouds on the other
hand are inherently shared environments. Corporate data is
stored inside large multi-tenanted pools of IT systems and
while this can provide substantial economy and scalability, the
ability to control, secure and
govern corporate data and services is often hindered at best or
non-existent at worst.
make the move towards public cloud services while private
cloud solutions are generally accepted and commonplace
within the industry. The security controls, data segregation and access control and protection of systems are readily deliverable in private cloud environments. netConsult
holds security as the primary focal point underpinning
all of our IT solutions as we believe that maintaining data
integrity and control are of critical importance to all businesses. Public clouds often do not provide the means to
maintain corporate governance and security of their data
and services.
Considering availability, both public and private clouds
typically provide services on substantial enterprise IT architectures in top tier datacentres with local and geographical redundancy. Decisions turn to being led by confidence
levels taking into account SLAs, incident management,
track record, customer service
in maintaining and restoring
service and retrieval of backup
or archive data in the event of
an outage or data loss. The latter can be an area where public clouds can be weaker and
provide additional challenges,
particularly with smaller consumers.
Usability, support and integration can often be considered retrospectively rather
than pro-actively. When utilising cloud services, it is essential to appreciate that everyone’s day-to-day interaction with IT services will directly
impact business processes. Public cloud providers typically have very fixed and regimented offerings and managing various services from multiple public cloud providers
can quickly become costly and ineffective. Private cloud
providers will typically manage system integrations and
the associated support. For example, netConsult offers an
all-encompassing support service alongside our complete
solutions with full IT support for clients across their entire
IT landscape.
Finally, there is substantial variation in the apparent cost
of cloud services; many being substantially economical for
SECURITY, INTEGRITY AND
GOVERNANCE CANNOT BE
IGNORED IN THE FINANCE
INDUSTRY
”
HFM: What factors should someone consider when
choosing between them?
PA: Firstly, consider what IT services are needed and how
they are delivered. Both private and public clouds offer a
broad range of scalable enterprise IT services, but they
can be delivered in differing ways; directly or through a
partner, over public or private connections, centrally or
distributed, managed or unmanaged. There are advantages
and disadvantages to both.
Security, integrity and governance cannot be ignored in
the finance industry. With continually growing regulatory
and due diligence requirements, it can be challenging to
H F M W E E K . C O M 11
CYBER RISK AND SECURITY 2015
TECHNOLOGY
business of all sizes. However, the value and true cost of
cloud services needs to be determined and understood.
Public cloud services can have additional hidden costs
when it comes to implementing security controls, ineffective and expensive integrations and high support cost
from complex maintenance. Private clouds can be more
expensive but can offer substantial value as service providers are able to provide integrated security and controls, more cost-effective support, ease of integration with
other line of business applications and provide substantial
supporting documentation.
HFM: What are the essential best practices when it
comes to cyber security?
PA: The starting point for security systems is to ensure
adoption of a professional security position with depth
and breadth applying across the whole IT infrastructure.
Gaps in controls or security are the first thing that hackers will be looking for.
A layered approach to security is key as no single technology or system will provide sufficient levels of protection. Visibility and intelligence into system and network
activity and behaviour using network and event monitoring tools, such as IDS/IPS with SIEM, as simply using legacy perimeter and detection-based tools, such as
firewalls, will not provide sufficient levels of security in
isolation.
A focus must also be placed into the history of security position to augment point-in-time analytics. A single
hack could last over a substantial period of time and visibility needs to be maintained throughout the timeline
of the attack, along with coupling this historic visibility
with detailed and contextually aware information from
next generation security platforms.
HFM: How has hybridisation of these services been
created and what advantages does it offer?
PA: Forming a hybrid cloud solution by combining public and private clouds can get more out of public clouds
alone; cost-effective service delivery with manageable
security controls mitigating some risks of data exposure
and complex supportability. While not possible to escape
the fundamentals of data storage and security in public
clouds, hybridisation can help make up for some of their
current shortcomings.
Hybridisation has been achieved by utilising a smaller
footprint of private hosted systems coupled with some
public cloud services. Adding management, security controls and network visibility moves public
clouds more towards the quality of service and security of private clouds whilst
leveraging improved economies of scale,
reducing maintenance of complex IT systems and enabling additional value added
benefits.
netConsult’s hybrid cloud offering enhances Microsoft Office 365 Enterprise
Services. We maintain a common security,
management and control infrastructure
and keep sensitive file data isolated and
secured on our private hosted platform.
Layering multiple technology suites from
different vendors and third-party systems
maintains service availability, recoverability and long-term data protection.
HFM: What trends is netConsult seeing from its clients requests? Have these changed in the past year?
PA: Over the last year, netConsult has
seen a noticeable change in client service
requests and focal points. Firstly, a marked
increase in interest in public cloud and hybrid cloud services as the benefits in cost,
scalability and accessibility have proven
highly attractive, however service levels
and enhanced security are expected to be
maintained.
Cyber security has been always been a
key factor for this industry and netConsult is seeing the trend for security focus
continue to increase across our client
base, quantified with more awareness and
emphasis on data protection; where data
is being stored and how it is being managed, who has access to it and how recoverable it is.
A LAYERED APPROACH TO SECURITY
IS KEY AS NO SINGLE TECHNOLOGY
OR SYSTEM WILL PROVIDE
SUFFICIENT LEVELS OF PROTECTION
HFM: Does cloud technology face a stigma after recent high-profile cases of hacking?
PA: Public cloud technology presents a particularly appealing target for hackers. There are new attack vectors
and vulnerabilities in public cloud platforms emerging
regularly and with the cross pollination potential, public
clouds provide an obvious high-return target for hackers
and cyber criminals.
Public cloud technology is relatively young when compared to private cloud technology and like any new technology offering a fundamental change in the practice and
delivery of IT services, it has been met with caution from
uncertainty. Recent high-profile cases do hamper the
cloud’s appeal, however with the amount of high-profile
hacking cases spread across the media in relation to more
than just cloud services, it more serves to highlight the
fundamental requirement of a strong, professional endto-end security position across all IT services rather than
stigmatise one service specifically.
1 2 H F M W E E K . CO M
”
HFM: How can cloud technology move forward
from here?
PA: Technology trends invariably follow the demands
for them. The cost-efficiencies and services that cloud
technology can deliver are growing rapidly and are in
high demand as they clearly demonstrate a real tangible business benefit. The controls and security of public
cloud services have yet to catch up however and are at
the moment reliant on either private cloud, in-house
systems or even complex system integrations to put the
security wrapper around them.
The immediate hurdle for public cloud technology to
move forward is very apparent; it must provide a very
efficient standard service controlled by the Service Provider, but enable the consumer to customise it and apply
their own controls and security to meet their individual
requirements. A challenge, certainly, however the demand for it is most definitely there. Q
CYBER RISK AND SECURITY 2015
BE PREPARED
MCGLADREY’S ALAN ALZFAN AND DAIMON GEOPFERT SPEAK TO HFMWEEK ABOUT THE REALITY OF THE THREAT
FACING HEDGE FUNDS THROUGH CYBER ATTACK
Daimon Geopfert,
McGladrey’s national
leader for the security
and privacy practice,
specialises in penetration
testing, vulnerability and
risk management, security
monitoring, incident
response, digital forensics
and investigations, and
compliance frameworks
within heavily regulated
industries.
HFMWeek (HFM): Security software providers have
an obvious incentive to highlight the risks of cybercrime, are the risks exaggerated?
Alan Alzfan (AA): Cyber-crime is a very real and dangerous risk in today’s business world and the financial
services community is a prime target based on the fact
that these organisations obtain sensitive personal information about their clients, most of who are high-networth individuals. The US’ Securities and Exchange
Commission (SEC) has identified cyber security as a
very important topic, with the Office of Compliance Inspections and Examinations (OCIE) publishing a risk
alert on the topic recently based on an OCIE Cybersecurity Examination Initiative conducted in 2014 on brokerdealers and investment Advisors.
Daimon Geopfert (DG): No, the risk is not exaggerated
because it is simply stating reality. If you compare cyber
crimes against any other criminal enterprise you’ll see
that the opportunity to make
money versus the chances of be
brought to account by law enforcement (or other criminals)
is very low. There is a level of
technical knowledge that will
currently provide some type of
barrier to entry for a large number of criminals, but that barrier
is getting lower every month
as more powerful but easier to
use tools are sold on the underground market.
the entire organisation to an attack through opening an email from an unknown source, visiting a suspect website or
downloading an infected file.
An organisation must balance the levels of security
based on the identified sensitivity of the information. An
organisation must make sure the most sensitive data has
the highest level of protection, but also balance the cost of
the protection of other information and the ability not to
reduce productivity or make the protocols so complex that
people try and go around them.
DG: The big concept here is to know what you have and
what it is worth. If 95% of the systems and data in your
environment do not touch, store, or process sensitive data
then those systems can be maintained at a lower level of
security than the 5% of system that do. However, once you
start maintaining different levels of security for different
systems you need to do everything in your power to keep
those systems separate. It creates an extremely dangerous
scenario when a system with
poor security, such as a user
desktop, is sitting right next to a
highly sensitive system such as
a server with customer data on
it. One of the most immediate
and useful things you can do
to lower your risk profile is to
identify these critical systems
and segment them off from the
rest of the network so that only
the necessary components are
exposed. That way even if an
attacker can compromise a low
risk system they still have a lot of work to do to get to the
valuable systems.
EACH MEMBER OF THE
ORGANISATION NEEDS TO BE
TRAINED ON CYBER SECURITY
”
Alan Alzfan is a partner
based in the New York
office of McGladrey LLP.
He serves as the national
hedge fund leader and
northeast strategic financial
services lead. He works with
a diverse range of clients
in the financial services
industry including start-up
funds to multi-billion-dollar
fund groups.
14 H F M W E E K . CO M
HFM: When it comes to data protection, how do managers identify sensitive data and what is best practice
for keeping it secure?
AA: The alternative investment industry has many different levels of data they need to protect. Some are more
sensitive than others and each should be analysed for the
type of security that is needed. Examples of your most sensitive data would be your investor’s personal and sensitive
information. Other information that could be deemed to
be highly sensitive could be your detailed trading information or algorithms, your position reports or research.
Each member of the organisation needs to be trained on
cyber security and they need to understand they are an important part of the plan. It only takes one person to open
HFM: Are there certain elements of cyber security that
hedge funds need to be especially aware of?
AA: Many hedge funds maintain streamlined organisations and do not have a dedicated IT personnel. In addition, the cost of a full cyber security program can be very
expensive. There are many excellent consultants and thirdparty solutions that can be utilised, but a key element is
having top management understand the importance of the
threat and making sure it is an important part of the culture
of the organisation. One incident can cost the organisation
not only a lot of money and time but ruin the reputation
C O N S U LT I N G
of the organisation and have a severe impact
on the trust of current and future investors.
HFM: When it comes to data protection
and cyber security audits, what are the
key points that all fund managers or risk
managers should consider?
DG: Many organisations operate under
two very dangerous mindsets: that hacking
is ‘hard’, and that no hacker would be interested in their organisation because you are
the wrong size, industry, etc. Both of these
trains of thought are wrong and will get you
in trouble in a hurry. First, many aspects of
hacking are surprisingly simple but effective
such as social engineering. Social engineering is a fancy
name for ‘con games’ in which an attacker simply tricks a
user into doing something that will allow access to the environment. It only takes a few minutes to create a fake website and send a user an email with a link asking them to visit
the website to download updates, vacation photos, audit
reports, or any number of false pretences in order to compromise their system. On the second aspect, companies
need to understand that the vast majority of breaches were
not targeted against any specific organisation. The attackers are simply shooting at anything on the internet hoping
that they will be successful. Once their attack works and
they gain access they only then know which organisation
that got in to, and then they figure out how they will monetise their access. If you are vulnerable somebody will find
you, you cannot simply assume you are hiding because you
are small.
THE IMPORTANCE OF UPDATING
THE PROGRAM CANNOT BE OVER
EMPHASISED AS NEW THREATS ARE
CONSTANTLY BEING DEPLOYED
AA: Dealing with cyber security must be made an important part of the overall culture of an organisation. Top
management must stress this area just as they stress other
important compliance issues. Everyone must constantly
be reminded of how one incident can ruin an organisation
”
and how important each person in the organisation is to the program. Like any other
compliance program, cyber security must
be constantly reviewed and updated. The
importance of updating the program cannot be over emphasised as new threats are
constantly being deployed and your organisation is constantly being attacked, either
directly or indirectly.
HFM: What can an organisation do to
best prevent against these attacks?
DG: The first, and most critical, piece of advice is simply to have a plan. Most organisations do not have any type of incident
response plan, and if they do, it is generic with minimal
detail. Put in the effort to think through what you’d do if
something like this came to pass, and then make sure you
exercise that plan so your people don’t have to learn it during the heat of a real event.
Make sure a major part of your plan is pre-arranged
relationships with incident response specialists. It is very
unlikely that many organisations have full time forensic
investigators on staff so it is important to have found them
and contracted with them early. In this same mindset,
when there is an incident the organisation has to make the
very difficult decision to do as little as possible on the network until those forensic experts are on-site. It can be very
painful as a responder to have to explain to a client that
their initial actions destroyed evidence that was necessary
to fully control a breach or answer key questions such as
how long it had been occurring.
AA: I agree with Daimon. Have a plan. Reach out to your
service providers as well as industry colleagues and ask
about the actions they are taking in this important area.
It may help identify additional areas of consideration for
your plan. Q
H F M W E E K . C O M 15
TECHNOLOGY
CYBER RISK AND SECURITY 2015
GETTING STRONGER TOGETHER
BOB GUILBERT OF EZE CASTLE INTEGRATION EXPLAINS WHY SO MANY FUNDS ARE OPTING FOR CLOUD SOLUTIONS
AND HOW THE INDUSTRY CAN WORK TOGETHER TO TACKLE CYBERCRIME
With more than 25 years
of IT experience, Bob
Guilbert is responsible
for leading all of Eze Castle
Integration’s marketing,
partnership and product
development functions.
The scope of his efforts
ranges from maximising
the value of the company’s
brand, establishing core
strategic partnerships, and
developing new product
lines for the company.
HFMWeek (HFM): What are the security implications
of moving to a cloud system?
Bob Guilbert (BG): Firms looking to move to the cloud
need to consider which provider is right for them and can
service their operational and security needs. A firm needs
to consider the security protocols in their office as well
as in the cloud and work with someone that covers both
sides, including the virtual and physical elements.
It’s also vital that firms understand the ‘response and
remedy’ services that cloud providers offer, the quality of
which can vary hugely between public and private clouds.
HFM: Can the quality of security offered differ significantly between cloud providers?
BG: Absolutely, which is why IT due diligence is so important. At Eze Castle Integration, we’ve taken a defencein-depth approach to cloud
security starting right at the
foundation. We have layers of security all the way
through the infrastructure
including access controls,
continuous security monitoring, and intrusion detection and intrusion prevention systems.
You are only as strong as
your last defence. You must
have all the right locks on
all the right doors and multiple locks on those doors in
order to thwart any hacker’s
attempts to access your
private information. You
must also invest in employee training because even the
best locks won’t help against many social engineering
techniques. These can only be combatted with good due
diligence and best practice regarding security awareness
training for all staff and senior management.
When evaluating a cloud provider it is also important
to understand the security protocols followed within the
provider’s corporate infrastructure. At Eze Castle Integration, for example, we’ve invested heavily in our own firm’s
security to ensure there aren’t any backdoors to allow a
hacker to access the cloud and data of our clients.
leveraged when needed for our clients. In-house deployments very often won’t have the same size of staff and also
won’t have a budget that allows them to cover all areas of
cyber-security to the same degree. Small firms, especially,
will never be able to enjoy the scope of security and technological power through their own means that they could
by partnering with us.
HFM: Do you predict using cloud services will become
the norm in the future?
BG: I think it’s actually reached that stage now. If you
look at the number of start-up hedge funds that launch
annually, I would say 95%+ of them consider launching on a cloud provider’s platform. One reason for this
is the capital expenditure difference between setting up
the hardware and software in-house versus selecting an
established private cloud
provider. Firms get all the
benefits of proper management and security to run
the environment, and they
have predictability in their
monthly costs.
YOU MUST HAVE ALL THE RIGHT
LOCKS ON ALL THE RIGHT DOORS
AND MULTIPLE LOCKS ON THOSE
DOORS IN ORDER TO THWART ANY
HACKER’S ATTEMPTS TO ACCESS
YOUR PRIVATE INFORMATION
HFM: Are established
funds, considering their
historic investment in inhouse IT infrastructure,
slower to adopt a cloud
solution than start-up
funds?
BG: We find there are typically three inflection points
where an established firm
evaluates a move to the cloud. These are office relocation,
technology refresh and adding a new application. A physical move of offices provides an opportunity as firms don’t
want to invest in moving and setting up old equipment at a
new office. A technology refresh is another logical switching point as firms weigh the costs of doing a whole system
upgrade as opposed to moving to the cloud.
In some cases very large funds are still inclined to invest
in building their own infrastructure. However, they will
look to the private cloud for application hosting. This may
be due to the CTO wanting to have the data within the
premises of the office. However, Eze Castle Integration
has several clients with multi-billion dollar AUMs on our
cloud platform. At the highest AUM levels, it often comes
down to personal preference and existing investments in
internal IT staff and infrastructure.
”
HFM: So outsourcing to a cloud platform gives more
protection than an in-house product?
BG: I would say so, yes. We are offering enterprise level security, and we have a deep pool of specialists, which can be
H F M W E E K . C O M 17
CYBER RISK AND SECURITY 2015
TECHNOLOGY
HFM: What are ‘Written Information Security Plans’
(WISPs)?
BG: WISPs are plans that cover the administrative and
technical safeguards a firm has in place to ensure data is
protected. They include details on incident response, remediation and communication procedures should a firm
be subject to a cyber-breach. They answer questions such
as: have you identified the chief information security officer in the organisation? In the event of a breach what
action will you take and what communication paths will
you follow?
Having written information security plans is emerging
as a requirement for firms. As part of its cyber-security
questionnaire, the Security and Exchange Commission
(SEC) is asking about WISPs. And investors are increasingly asking to review WISPs as part of their due diligence.
Overall, the security questions being asked by investors
and regulators are getting much broader and deeper. Both
groups are asking for more details on whether there have
been breaches in the past and the process that was taken.
Investors are also beginning to ask these details from not
only the remedial third party but also all the providers
they are using.
THERE IS STILL A LONG WAY TO
GO, BUT WE ALL HAVE A COMMON
ENEMY IN KEEPING MALICIOUS
ACTIVITY OUTSIDE OF THE HEDGE
FUND INDUSTRY
18 H F M W E E K . CO M
”
HFM: So investors have become much more sophisticated on cyber issues then?
BG: Yes, they have. With increasing numbers of successful breaches in the marketplace and more visibility around
cyber-security and cyber-crimes, investors are becoming
more savvy, aware and concerned.
HFM: What do you expect from the SEC looking
ahead?
BG: The SEC has already said cyber-security is a top priority for them in 2015/16. They are planning to conduct
much wider and deeper examinations of funds to ensure
they have the best cyber-security practices in place. They
also want to see if a fund’s employees have been trained
and tested on the firm’s WISP policy.
I believe there is going to be a broader sweep in terms of
who is looked at. A number of firms use outsourced functions, and the SEC will soon start to look at these thirdparty providers in a lot more detail.
There is still a long way to go, but we all have a common
enemy in keeping malicious activity outside of the hedge
fund industry, and through effective dialogue between the
public and private sectors, we can get stronger together. Q
Up-to-the-minute technology news and
insight for the global hedge fund space
Try
HFMTechnology
for free
HFMTechnology provides the latest news, trend analysis,
regulatory updates and comment on the biggest technology
issues affecting the hedge fund market, making it an
essential business resource for anyone involved with hedge
fund technology.
From the publishers of:
For your complimentary trial visit:
www.HFMTechnology.com
CYBER RISK AND SECURITY 2015
FEEL SAFE WITH
MANAGED SECURITY
HFMWEEK CATCHES UP WITH MARCUS LEWIS, OF CAPITAL SUPPORT, TO DISCUSS
THE COMPANY’S NEW CYBER-SECURITY SUITE
Marcus Lewis is
responsible for the continual
design, development and
review of our managed
services catalogue. Lewis is
ITIL and Prince II qualified,
and his ability to look at
the periphery as well as the
point of focus is essential
to successfully maintaining
a large set of services that
works in harmony to meet
the needs of our customers.
HFMWeek (HFM): What was the motivation behind
the creation of this new cyber-security suite?
Marcus Lewis (ML): In April 2014 the SCC published
new guidance for cyber-security around the financial sector. What was clear was the level of security consciousness
around compliance was quite traditional, such as do you
have anti-virus software, is there software in place, etc? We
realised there was definitely a opportunity in the IT sector for delivering something more robust and holistic. We
therefore began a project to deliver something that was
more than just a plug-in application and was focused on
offering a comprehensive security service.
HFM: How does this new suite fill the gap in the market for a more substantial cyber-security service?
What features will it have?
ML: We came up with three core offerings. This has been
collated into part of our new cyber security offering under the banner of ‘Managed Security’. The first is
best practice. This doesn’t
automatically require new
technology, it could just be
about making a technology
you have more efficient. An
example being, have you
got high-level password
protection for your system? This requires making
it company policy to ensure all users have a strong
password that is changed
regularly.
The second area is consultancy on security and risk management. Our ISO credited chief information security officer carries out a gap
analysis and creates a comprehensive report which will
highlight the risk that a client may have. From that we can
then discuss these risks with the clients and clarify what
that risk means to them; this is vital because an exposure
can be highly important for one company to mitigate but
not so key for another.
For example, if your website is just a brochure site with
only your own contact information included, that is very
different to a website that may request sensitive and confidential information from its users. The consequences of a
successful hacking attempt on the first website is marginal
compared to the second. Therefore your investment in security for either type of site can be very different. While
our clients choose which services they subscribe to, it is
our responsibility to give the best possible advice so that
they understand the risks to make the right business decisions.
HFM: What guidelines do you use for your own best
practice standards?
ML: We use ISO 27001:2013 standard and the government Cyber Essentials and Cyber Essentials Plus as guidance along with security reference sites eg, NIST and the
Centre of Internet Security (CIS) tools, which has server
and desktop benchmarking that acts as a good yardstick
for us. For example the CIS has 245 separate recommendations on how to ‘harden’ a server, which we can use as
a template. We also take on advice from our security partners and all this combines to give us a solid foundation for
our security procedures.
HFM: What happens if
you find your client’s current protection software is
inadequate?
ML: If our report concludes
that new security devices
are recommended then we
move onto the third area of
our service where we have
several products that come
as part of our suite offering.
First is Cyber Secure Protect
and Detect. This adds a next
generation firewall which
scans data as it enters and leaves the network. It scans
for viruses and rogue activity as well as web and application filtering. Examples of app filters could be that we can
manipulate the settings so that users who wants to access
Dropbox or Facebook can download data but cannot upload it, meaning no data can leak out that way.
We can adapt the system further so that most users are
unable to access or upload to Facebook except the specific
members of the marketing department, who have legitimate, work-related reasons to do so.
Historically, firewalls could be considered as an open or
shut door. It looks at an email’s details but not what is actually in it. Next-generation firewalls, like ours, will scan the
NEXT-GENERATION FIREWALLS, LIKE
OURS, WILL SCAN THE ACTUAL
CONTENTS TO THE POINT WHERE
WE CAN SET IT TO LOOK FOR…
BANK ACCOUNT NUMBERS
”
20 H F M W E E K . CO M
TECHNOLOGY
YOU CAN HAVE THE BEST LOCKS
IN THE WORLD BUT IF YOU
LEAVE THE FRONT DOOR
WIDE OPEN THEY AREN’T
GOING TO HELP
”
HFM: Does your security advice revolve exclusively
around the cyber element?
ML: No, our security advice is around protecting information assets and is not just about technology, it is also
about people and processes. Risk management can’t just
be about IT, it’s got to include the bigger picture.
We ask our clients what is the most business critical asset and then look at the controls, for example, their policy
on leaving data around the office, what’s the entry policy
for your building? What’s your HR policy regarding new
or leaving staff? Do you allow data to leave the building
and is it monitored? All these things might have an IT solution but require a HR document which staff can follow.
We do also have some software available that creates a secure method for staff to access and send data remotely if
there is a significant exposure to data loss or manipulation.
actual contents to the point where we can set it to look for
things like a specific set of bank account numbers that the
clients is especially keen to avoid leaking.
In addition to the firewall we also offer a SIEM service
(security information and event management). This service monitors event logs for all the data moving around
your system on all devices. Several million entries can be
created per day, which would be impossible for staff to effectively study for possible discrepancies. Therefore the
SIEM service uses a correlation engine that follows a predefined set of rules to analyse the information for things
such as multiple failed entry requests from a foreign IP
address.
This service is very sophisticated and can even recognise when several smaller logs that wouldn’t raise concern
by themselves actually form a pattern that is suspicious.
Monitoring the events and alerts using our manned 24/7
Security Operations Centre, we alert clients of potential
threats and actions they should take to eradicate potential
weaknesses in their network
HFM: The technology industry is incredibly
fast-paced. How do you ensure any new offerings are
future-proof, or is this impossible?
ML: In part the on-going success of our product is down
to people and processes. You can have the best locks in the
world but if you leave the front door wide open they aren’t
going to help. That’s why personnel training and education
is so important.
No system is future-proof as technology is constantly
advancing and so is the sophistication of cyber criminals.
With regard to the software we use, there are a few
things we can do to stay ahead of the enemy. Our firewall
is updated daily in order to keep abreast of the forms of
attack that might come. Everything has to come through
our firewall so if we know what an attack looks like we can
always stop it.
On the hardware side, we can incorporate any new technology into our SIEM engine and create new rules around
it. We can’t know everything all the time but considerable
investment, by us and our technology partners, go into
making sure what we don’t know now we will soon and
this will continue in the future. Q
H F M W E E K . C O M 21
Your data is
attacked
hundreds
of times a day.
Do you still like
your odds?
Power comes from being understood.®
It’s no longer a question of if you’ll suffer a cyber breach, it’s a question of when. How quickly you detect and
how effectively you respond to and contain that breach could shape the future of your business.
McGladrey understands. Over the last 50 years, McGladrey has served more than 1,500 investment companies.
We understand more than cyber security—we understand it within the context of your complex
operational, reporting and compliance environment.
Want to improve your odds?
Watch http://mcgladrey.com/hedgefund and experience the power of being understood.
McGladrey LLP is the U.S. member firm of RSM International, a global network of independent
accounting, tax and consulting firms. MCG-0315JH
TECHNOLOGY
CYBER RISK AND SECURITY 2015
STANDING OUT FROM
THE CROWD
JOHN BRYANT, HEAD OF TECHNOLOGY AT OPTIONS IT, TALKS TO HFMWEEK ABOUT WHY THE COMPANY’S
OFFERING IS THE CLEAR CHOICE FOR FUNDS EVEN IN A BUSY FINANCIAL MARKETPLACE
O
John Bryant was
named head of technology
for Options in November
2012 after joining the
company in mid-2008 as
head of technology for
Europe, where he oversaw
the development of the
European Momentum and
Velocity low-latency market
data product portfolios and
managed the company’s
European data centre
expansion program.
ptions is the leading managed service and
IT infrastructure products provider to the
global financial services sector. Founded
in 1993, the company began life as a
hedge fund technology services provider.
More than a decade ago, the company
made a strategic decision to become the first provider
to offer cloud services to the
financial sector. Today, more
than 150 firms globally leverage the Options platform, including the leading global investment banks, hedge funds,
funds of funds, private equity
houses and exchanges.
comparison, are focused in one region or service. Our focus on building the platform to exacting standards means
that many of the features that are expensive add-ons with
competitors are base features with Options. Examples
include DR, replication and hot-redundancy, daily backups to tape, carrier diversity and in-region data centre
resiliency. Feedback from customers is that the majority of competitors either treat
these fundamental features as
up-sell or in some cases don’t
offer them at all. In London,
for instance, a number of firms
base all their services from data
centres in the Thames flood
plain – a design that would be
immediately thrown out in any
top tier firm.
Another thing that sets Options apart is the focus on building security and transparency
into our processes and procedures. Options has been leading the market in this regard for
many years. We were among the first service provider of
our kind to be SOC accredited (since it was first introduced in 2011) and we’ve made our cyber-security policies
and best practice recommendations open and available for
download online. We have been making a substantial investment in the leading security related technologies for a
WE HAVE A GLOBAL TEAM AND
GLOBAL INFRASTRUCTURE,
ALLOWING OUR CUSTOMERS
WITH GLOBAL OPERATIONS TO
WORK WITH A SINGLE VENDOR
HFMWeek (HFM): There
are now several IT service
providers to the financial
sector. What makes Options’ offering stand out?
John Bryant (JB): From
day one we set out to deliver
bullet proof, ‘investment bank’ grade infrastructure and
service, leveraging a global technology platform. Having
such a clear vision has allowed us to stand out on multiple fronts. We have a global team and global infrastructure, allowing our customers with global operations to
work with a single vendor; most of our competitors, by
”
H F M W E E K . C O M 23
CYBER RISK AND SECURITY 2015
TECHNOLOGY
number of years now and will continue to do so. Penetration tests are a case in point, both Options and our leading
customers do regular pen tests and we are happy to share
our results with customers and prospects.
and taking the necessary actions to address them, and here
again we see a positive and accelerating trend.
HFM: Options has a global market presence. Which
areas are most sophisticated in their service demands
and which are more reluctant to invest in cybersecurity?
JB: Had you asked me that question two years ago, my
answer would have been that our US and UK institutional
client base was much more sophisticated in terms of security demands – with SLAs stipulating schedules for security patching, server reboots, login audits, penetration
tests, intrusion prevention log reviews, etc. Historically,
the adoption of fundamental security best practices such
as password expiry or complexity was an unwelcome hurdle for some hedge fund COOs. However, in the last 18
months, with increased scrutiny both from regulators and
investors, hedge funds display an increasing awareness of
the risks posed by a laissez-faire attitude to security. Many
no longer see it as a burden, instead using their firm’s security policies and infrastructure as a positive to attract
institutional investment.
HFM: What are the must-have features of a cybersecurity offering in today’s fund industry?
JB: Any security offering in this space should combine
both the need to actively scrutinise each layer of your IT
architecture as a point of potential weakness with the need
for service uptime and operational flexibility.
As an example, our security offering combines best
practice security building blocks (e.g. IPS-enabled firewalls, access-lists, platform agnostic anti-spam/malware
and vulnerability scanning tools) one might expect, together with automation and the operational rigour to
check all security-related data for signs of unwanted behaviour, and review security bulletins for the latest vulnerabilities exploited in the wild. Without the foundation
of those processes and the efficiency of that automation
these tools would fail to reach the full potential of our investment in them.
Although the zeitgeist may today be around mobile
malware and anti-DoS appliances, it pays to do the age old
fundamentals well – audit your systems regularly, ensure
your data is backed up, log all activity, reboot PCs and
servers so they get the latest security patches, and reduce
the potential attack entry points (disable portable media,
use web filtering, filter spam).
Lastly, do not overlook the benefits of end user IT security training and awareness. Your cyber-security infrastructure is only half the story.
HFM: When it comes to sensitive data management
and protection, are managers sufficiently aware of the
risks posed by cyber-attacks?
JB: The order of magnitude increase in media attention
given to the topic of cyber risk over the past year alone has
certainly heightened the awareness of the business community at large, and broadly we do see an appropriate level
of awareness to the wider issues at work here. The question is are those managers committed to budgeting for
24 H F M W E E K . CO M
HFM: With cyber-attacks becoming more and more
common as well are varied in their methods, how can
Options offer security to its clients?
JB: Options has invested significantly in our infrastructure
in order to meet the increasing security demands service
providers are facing in this space. All of the components
we touched on above are key building blocks that form
our security offering to clients. We’ve built and matured
the Options global private network over the past 10 years,
enabling best-in-class information security for our clients.
While other vendors in the space continue to use VPNs,
customers leveraging the Options platform can harness a
fully resilient and secure global platform with high bandwidth and low latency.
OPTIONS HAS INVESTED
SIGNIFICANTLY IN OUR
INFRASTRUCTURE IN ORDER TO
MEET THE INCREASING SECURITY
DEMANDS SERVICE PROVIDERS ARE
FACING IN THIS SPACE
”
In the past 12 months alone we have invested in a
number of security and compliance products to enhance
our security offering including Active Directory auditing,
Windows file system auditing, BYOD management, and
a web filtering platform refresh, to name but a few. All of
these additions come at no extra cost – they are bundled
within the service charge.
HFM: Which aspects of your offering are you looking
to develop in the next year?
JB: One of the latest initiatives we have committed to is
to use Splunk as our enterprise SIEM product. We already
use the Splunk platform in our day-to-day IT operations.
Over the next few months we will bring all relevant security data such as firewall, web filtering, IPS and antivirus
logs together into a single information repository. The
new platform will also replace our current vulnerability
scanning tool.
This represents a huge leap forward in our capabilities
in this space, allowing us to react much more swiftly to
detect new threats, diagnose anomalous behaviour, conduct forensic investigations and perform security analysis
in real time.
Additionally, we have recently introduced monthly
management packs that report on key security metrics in
order to provide clients with the transparency they need.
While still in beta, these are due to be rolled out to our client base in due course. Q
I exploit your weaknesses.
It’s my job. And I take it seriously.
What do you do?
Economic cyber crime does not discriminate.
It is truly global. No industry or organisation is immune.
The fallout isn’t just the direct costs. Economic cyber crime seriously damages
brands, tarnishes reputations beyond repair and impacts market share.
As society becomes less tolerant of unethical behaviour, businesses
need to make sure they are building – and keeping – trust.
Against a backdrop of data loss, IP theft and financial fraud, ENCODE’s
Extrusion Testing™ and Cyber Readiness Assessment service, a simulated
cyber attack providing you with the insight you need to address the threats that
matter, combined with the Cyber Operation and Intelligence service, which
delivers the visibility, early detection and adaptive response you need to
protect your organisation against obscure, targeted cyber attacks.
Take control.
+44 (0)207 406 7535
www.encodegroup.com
Encode Group, 5 Chancery Lane, London WC2A 1LG, UK
TECHNOLOGY
CYBER RISK AND SECURITY 2015
CHANGE STARTS
FROM WITHIN
WARREN FINKEL, OF ACE IT, EXPLAINS WHY CYBER-SECURITY MUST INCLUDE
A TOP-DOWN APPROACH TO SECURITY AWARENESS
Warren Finkel is the
managing partner of ACE
IT Solutions and brings
decades of business and
technology experience
when consulting with
clients in the alternative
asset space to help them
build a robust and secure IT
infrastructure and connect
their business initiatives
to focused technology
strategies and solutions.
HFM: What is ACE IT Solutions’ approach to cybersecurity and its main principles?
Warren Finkel (WF): Our cyber-security solutions are
tailored to help firms be proactive and meet compliance
requirements. The fact is, your firm will get hacked; it’s no
longer a matter of if but when.
The key to minimising risk is using threat intelligence
to get ahead of hackers. With up-to-date, customised intelligence about current and future threats, and a deep understanding of how well your security strategy stands up to
these threats, you can better manage your defences while
reducing risk and making smarter investments. Threat intelligence also help you understand which threats are applicable to your businesses. A one-size-fits-all approach
does not work as well as a customised approach to taming
your firm’s threat landscape.
This includes security awareness training to help employees understand how they put their firm at risk, training
them about cyber-security best practices and how to recognise phishing emails – a primary entry point for hackers.
security posture. Employees are a key link in the security
of a business’ technology infrastructure and company data.
Without end-user training on security best practices and
policies, it is impossible to secure your information resources or ensure data privacy. The effort to create a ‘security aware culture’ must include everyone in the company.
Additionally, end-user training on security best practices
and privacy awareness is essential to any organisation’s
compliance and risk management initiatives.
HFM: ACE IT Solutions partnered with IBM, which
was rated number one by Gartner for threat intelligence. What is ‘threat intelligence’ and how is it employed against cybercrime?
WF: The more information you have about the threats
that are out there, the better prepared firms can be to deal
with the risks. Threat intelligence can be used to defend
against attacks, but it is incredibly useful for helping recognise an attack and dealing with it. Think about it like this:
we know company A, B, and C got hacked and this is how
it happened. How can we use that information to mitigate
a cyber-attack on our own firm?
Even the US government is getting behind this approach. It recently passed a bill that would push companies to share information about security breaches. This is
important because businesses can no longer fight the bad
guys individually. We must use the compiled threat intelligence from the whole industry to fight them.
We also educate people on the weaknesses of certain
cloud apps and ensuring employees don’t have admin access that allows them to download applications and access
back-office functions.
As an IMB partner we can offer our clients access to its
security operation centres and the X-Force threat intelligence team, but if you don’t have the basics of an educated
and aware staff then it won’t help prevent a breach.
HFM: There is a clear need to educate your clients’ staff
to employ best practice and avoid a breach through
phishing techniques, etc. How do you approach this?
WF: We are doing a lot of employee training on safe internet use, including phishing exercises to help them recognise phishing emails. Teaching employees to be aware
of an organisation’s security requirements can be one of
the most effective ways to enhance the company’s overall
26 H F M W E E K . CO M
THE KEY IS THAT CHANGE IS
DRIVEN FROM THE TOP
”
HFM: What is the most important feature of your staff
education process?
WF: The key is that change is driven from the top. We often
speak to IT staff from a fund who are obviously very aware
of the dangers of cyber-attacks and how to avoid a breach
but more often than not when I speak to CFOs or CEOs
they don’t even know what basic controls their fund has in
place. Senior management must be made aware and then
drive best practice procedures. Information security polices and incident response plans are also critical to a cybersecurity programme. The SEC is now requiring these plans
to be in place and that you have a penetration test.
Ultimately, we have all the services a client could want
and we understand the SEC’s requirements but the best
cyber-defence mechanism has to start internally by creating a culture of awareness and training employees to comply with laws, regulations and policies to reduce the risk of
exposure. Q
SUBSCRIBE TO
ISSU
.hfm
www
THE BEST
READ IN THE
HEDGE FUND
INDUSTRY
wee
ES
t of it
DOWN PLE MOV
PEO
STEP
the shor
and
K TO
06
RUDDIC August
ES
SIMON over from
DOWN PEO PLE MOV
CEO
STEPS l
RNE se to take
D
FUNDfrom 1 Apri
ALBOU John Clais
r
RE FUN NCH
AJARO
Partner
ARM manage
ONSHO
LAU
lead
$450M
NCHES
become
FOR
LAU
to
PM Denny
NGTON Stanley
Oliver
WARRI gan
SED out of Mor
-BA
s
DALLAS er spin
2 Apr
il 201
5
WO ND BE ISTING LYSI S
ANA
MILIBAHIS BLACKL
OUT
05
The
E 374
G
ETIN
TARG CROWNCIES
THE NDENR LEADER EDRY
CAR
DEPE
LABOUABLE TO THREAT ?
ULD
k .com
long
21
POWE
10
r
rtne
n pa
reva os
Ex-Bdies Roklaunch
rea ital for
Cap
trad
Options
R
ab, est
office ng as
family worki ing
3,
ord
kos’
at Ro in 201 O, acc kedIn
lished and CO tive Lin
Andrea
CRO ir respec
d its
and
mitte riward ctors of
to the s.
al sub autho
dire
as Ho
profile Capit FCA
in thee
Nichol listed as nch
Rokostion for and is
vic
French rofile lau
ek
lica
its ser lus
we
g
t
app
las
n-p
rcin
high-p IN LEITNER
rd
sation s of sou the $1bstands.
s
Howa
BY JASM
e thi
AN
Theko
s has proces ers for eek under inv esmad
long
BREV
c
kosthe provid MW
and
an
ER ris Ro Ro
m,
who’s
HF
Coma to
firm
and shorfun
FORM r Ch
t ofd,it
By nu pro at
eals r 30 list
new
tne
ry
ent
.
stood s
par
Ma ation
PVEem members
we
eek rev
under ile for
ed his nag
ff MS direc- tor rel is also
nam al MaManstaTEA
, wh head
HFMW estor po
a WIT
firm
coYS IS
pital,
r as
Ca pit ed senior age
the
g,
acquiredorpHo-SCIENS
hs
ed
Ca
ing an Sac
inc $437ed
ar’s inv
tradin n
AN AL
www
joinDIS
ye.hfm
reveal kos is list ently
cro
ect m beON
bee
TRESSE
ADMrec
wee k
Goldm
Ro the
is exp gestof Italia
fic Dma also
nr non
IN ich
.com
aci
me
M&
big
s.
DEB
-per
of Luxembo
has
a-P
A CON
r’s
, whurg yea
T ort ko s
ng- of Asi form
tor
TIN
aloUES
firm the
to repFUNRo
Riley,ing
D LAU
loan
firm mak
art
14
rated one of
nches,es and AS Stu
ording s of t clear,NCH
LAU
EX-JAM
d lau Howardfirst mov
to MAITLAacc det ails
to be
IO N
funISO
are no NCH 05
ing e hired, ND BUY
Marge
act
tegy cro
N PM, accord s. into UKExmar
OR AT
hed
wan
cholas
ket stra S PHO
NiYou
STA
ord ays
ma ENI,X 03
al’s
LL AB
nesnch
recRTS
side a Fre
spinuse
rcl , Capit globalADMlik
ely
COM
s
INISTR
MO t a
r Ba nch
RY CO
Andre anies Hoforout
meMas
ATIO N
sar
FreCapital DITbuY HED seems
LATO
07
Compward, a or, and Brevan
Manfoc us GE
RE GU
ect
at
Ho
es agement FUND
ing dir partner
d rol
ST OF
manag usly a both hel
COLAU
G
e
NCH 10
vio
IN
hav
pre rd,
HFMWE
OW
Howa
EK FIN
E GR
LIQ
M
TH
ENT
s1 indd
ISSUE
16
3751516
3/20
31/0
April
LIQUI
SEES D ALTS
CONS GROWINSPACE
OLIDAT G
UID ALT DS THAION
Lon
see don boro
fund rise in heughs
inves dge
ting
COM
16
T MA
ERN
VING ATIVE STR NY
A TOU
ATE
GH TIM GIES
E
ANA
ARE HA
LYSI S
1
21
Most
2015
cou
April
Labour ncils allo
376 23
anti-h despite lea cating areISSUE to
edge
the
fund der ’s
the res UK gen
IS JOSS
stance
eral
earch
ELY
BY CHR
ww w.h
fmw
eek .co
m
ER
N
that moUNDhas
THER
-FongO Lost hedge funalso reveleealctioedn,
am
increa E HAS BE
NE COityCEpen
OsioF ndon’s locd investors
EN EY
assets se in the CH
a 36. ENcon
trolledSn funds areal author
5%
amoun EF
D councils. Labour sion London
Six N
t of FU
sch
bor IN D
of theS ON
funds emes allo oug
h penGEcurren WARN
eigIChtAT
in
- funRTZ tly allo
ED
OR
years, the past cate toHhed
RHETcating boroughs
accord three and UA
geRT FIE ds RY
are Lab
res
NON-D
03
ing to
AMS 05
earch.
ST
a f INthe
threeARDSour-ledNEto
DUST
WS hedge
Y EX
N
HFMW halTIinvest
The
CURITe REG ULATIO
AN
K AW bigges , includ
eek
R-SE
dom findings,
andEE ors – En t hedge funing
based
CYBE gramm
of
field,
Lam
HFMW
and ind inform
cate abo beth
Camd d
VE OF tech pro
atio on free
07
GE
–
epe
ND WA er lead on
BITRA ULATIO N that eight ndent res n requests - 15%, £10ut £121m which alloen
($1
REG
S SECO as cyb
ER AR
cate £55 counci earch, sho
9m
and
VEAL s agency
l schem
£105m ($160m 77m) or
MERG ge funds
w
0m
EDfun
r join
SEC RE
ER’ UK activist hed
VEAL ($517ds com ($806m) to es allo- respectively ($154m) ) or 9%,
Hetne
UT
RE
is
hit
Electe
Chr
hed
to hed or 10%
SIS 89.6m pared
TO ‘NErules will
ARCH
ge fun
OKS
er
RESE names AN ALY Amid ) at the endto £403mge form d councillor
UR LO takeov
big
TANT
rhetor rising ant
of 201
fun d’s a significa s typica ds.
Oppo
LABO warn new
NSUL number of
nt par
lly
sition
pen
T CO
Labouric emerg i-hedge 1. This
a
Experts
fund
ing
compar sio n com t of a
leade
TMEN wth from
par
the fin
ES
fro
ty in
which
gro
m
mi
es to
r Ed
an
the bui the
had
11 bor tte e.
EEK INV strong
allo
ld-up close to
oughs
propo cial sector Miliband ha
HFMWstudy shows
C
allo cated
the
g
The lon
and
the sho
rt of
it
S
p’s U
Groud debt
n
a
e
M ress aled
dist m reve
tea
OMM
New
ENT
001_
003_
HFM
375_
New
s.ind
d 1
OM
HEACDLAMPDOWN
A
R
E
G
DAN
BI G BR
OT
end of
sals to
or we
cating
re
at
2011.
03
HE R
M US T
ALW AY
reform
in his
s
sig
taxati hts with
on rul
es
AN AL
S BE
AL LO
YS IS
25
W ED
gmana
TO W
ATCH
iously Capital,
,
prev
14
years
was at Perry
Paige ector ed for 18 ars at
ye
dir work
The long
ing
t 10 rclays,
he
and d
spen
short ofwhere Mason
rs/Ba month
son anthe
g
he
Ma
ot
it
on
while an Br join next
, Eric eight-str
14/0
4/20
15
Paige SS&
hm
is
17:0
joinC RIV
y will Sachs.
Le
th
4
y
Rick
kle
an
OakleAdminis ALS PRE
d Oa
in ed
vNed
trator com SSED DOan m Goldm ar ris jo der, ha ww w.h fmw
great
J TO EXA
ER
plaints d fro
eek .com
n H head tra rk ed at t
team
LEITN
led to
sse
Ja so MIN
MIN
antitrus
to take e
E
wo
en
t prob
BY JAS DEUTSCHE US distre ther
th as ADlyVEN agem u
rs
agers
ge
mon e io us MTanDEA
DeAWM
Lansh
P’SPLA ng to
RM now ing prev pital ADM
searche miTFO
n man ly on reve
Him
GROU
ar
cos for catteam SEE
Ca with INIS
anaKS
TRen
w
t
ATIO
AN
are
EVE
re
on
rs
ISSUE
M
N st03
as -DR on,
ns -strong bon. d and
to
MNT
377 30
estm
CIT
N CRE
Lawye deciding pe
Y pla
April 201
LondIVEnio
r inv iro, inve vid
debt
FU
eight e strategy e GLGmulti-st
inrate
anND
gy, man
5
sh STRATS
se age KuDIT
MA
th
Fun
Da ro
if
n thNAGEG,
widthof man
i rs
21
GLMENTstrategy Sheth Taish
so
to ru
an d
care tion in Eu
aged an
accoun
st, SEA ent as r
rry lyst,
hired of M
nities erCEA
PeSES
YS IS
08ot he
TRA t an aly vestmRCH
Part Opportu tsfosus
rmtainedrtn
AN AL
solicita
en G tz, in
the welltwoeryea mDIN
t
by
s rs of hw
ar
a
g pa
g up
Selec
Sc lossesmakin ing to
be ledm an ag in who wa
ild
will
cord
lati,
LAT
ich
SUR E 10
tal
to bu s ciate, its, acCLO
EST
Gu
pi
wh
15
.
,
u
Ca
ry 20 e firm’
recru d source d Man of 31
ansh
ADMIN DATA ONKTH 14
Him in Februa lead th space.
E TOP
S,
place on-liste bn as
d
20
AND PRI AUINDITU
OR
hired m and tresse Paige,
Lond
$72.9 aims 03
ME BR S, CUSTODIA
dis
tea
A TE
OKERS
the into the i are Rick ctor/ managed 2014, ial
NS 22/04/2015
re
er
ec
L D EB
move ng Gulat ing di ectors Decemb h the sp
TI CA
ANA LYS
nc
Joini manag ging dir kley,
IS 16
PO LI
is
to lau
na
Oa
IN G
who and ma d Ned ta nd s.
AT
an
E
rs
al,
n,
leg
CR
un de
Maso
NDS
Eric W ee k
FU
GE
H FM
Citi s
in funees 22% d
makesds as SS&Crop
big ga
ins
THE HF
APHA MWEEK/
PROVIDPIPE SERVICE
ER SNAP
SHOT
IN SI D ER
ED
HFMW
T H
ee
MEN
shows k/AlphaPipe
res C O Mter
BNY Me
clients
llon she earch
with
RAuM
dding
from
BY CHR
falling
$217.9b
IS MAT
15%,
The
THEWS
n to
TR AD IN
G RU LE
S
ban
$1
Januar k confirm 84.7bn.
y
CITIGR
ed on
book that it was
15
up
pu
reduc OUP SAW
tio
it into for sale and tting the
of he n in the A 22%
dg
looked Citi Holding moving
admini e funds it number
for a bu
s while
stratio
yer
pro
At
it
.
vides
the tim
n to in
HFMW
book
eek
of $380 e, Citi had
ly resear /AlphaPipe the latest
bn glo
ch sur
quarter- HFMWeek
a
bally.
vey.
Th e
only cov /AlphaP
The
ipe
reg ist res ear ch
ers
ere
of SE
Ex pe rts SEC filing sur vey
Q1 fili d firm s,
s.
ha ve
ba sed C- raised
ngs, als
Mello
pre vio
con
on str
o sho
n
usl y
uggle cerns that
from saw a 7% fall ws BNY
60
given to sell the admCiti may
in fun
increa 6 to 565,
the
ds,
in bo
nu
alt
sed
funds
expect mber of hed ok
firm ing RAuM by hough it
ed to
ge
SS&C
tions las HF MW eek 8%, conappe leave.
bigges
’s rev
t winne ars to be
ding sm t year that it
ela
the
was she - funds
aller clie
r,
Part 1:
onboard with 90
Citi’s
d- inc
nts.
HFMW
new
ed in
rease
417 to book dro
eek
Q1, an
that
insider
pp
324 fun
int o
sees
sec on
ds ove ed from
trading examines ho
it
move
d
Cit
r the qu
w
rules are
across
ar- sta co in the qu pla ce be hin
arterly
d
nding
the glo
changin
COMM
s.
be
AROU
ND
THE W
ORLD
ENT H
OW
001_
003_
HFM377_
News.ind
d 1
g
03
DO YO
U SOL
VE
A PRO
B
LEM L
IKE U
CITS?
AN ALYS
IS
20
14
EVERY WEEK YOU WILL RECEIVE Ô More exclusive stories than any other hedge fund
publication Ô All the latest searches and investment news Ô Exclusive data on launches and
performance Ô Investment strategy analysis Ô Topical comment from leading industry figures
Ô Exclusive research surveys Ô Regulatory developments Ô People on the move
As a subscriber, you will also receive full registration to www.hfmweek.com,
where you can access:
Ô Daily updated performance data Ô Exclusive research Ô Daily news alerts
Ô Industry events information Ô Service directory listings and much more...
F O R M O R E I N F O R M AT I O N P L E A S E CO N TA C T
v OR email membership@hfmweek .com
The Membership Team at +44 (0)207 832 6511
O R V I S I T H F M W E E K . CO M FO R D E TA I L S
2015
CYBER RISK AND SECURITY 2015
THE ATTACK HAS EVOLVED,
HAVE YOU?
DAN BONNET, SALES DIRECTOR, DELL SECUREWORKS, TALKS TO HFMWEEK ABOUT THE MUST HAVE FEATURES OF A
CYBER-SECURITY SERVICE PROVIDER
T
Dan Bonnet is
director of sales for North
America medium business
for Dell SecureWorks. Dell
SecureWorks is a leading
provider of managed
security, security consulting,
threat intelligence and
incident response services
to the financial services
industry.
he US Security and Exchange Commission (SEC) has provided cyber security
risk guidance for investment management
firms. Hedge fund firms are spending more
for cyber security to align with the guidance but are missing many opportunities
to optimally secure their networks. The focus should
be on security. Once that is taken care of, the SEC recommendations will automatically fall into place.
If you have not yet focused on cyber security, you are not
alone. In the SANS Institute report (Securing the Human
2015 Security Awareness), the cyber security institute discovered that half of the organisations surveyed currently
do not have an awareness programme or have an immature
programme that is solely focused on compliance. Focusing on compliance gives organisations a stronger security
posture but could leave out important processes in securing a network. Most organisations have put a few protective
and detective security devices,
software products and security policies in place, and think
they are secure. However, if
you are not looking beyond
your network and into your
endpoints, employees and
processes, then client trust
and reputation is at risk.
A recent survey of global institutional investors by KPMG
found that 79% of investors
would be discouraged from
investing in a business that has
been hacked. Security today is not based on devices alone.
It is based on a combination of people, process and technology. Organisations that don’t have their own full-time
team of security analysts need to collaborate with experts
who can consult and advise them on security matters,
and who can monitor their networks 24/7 to help them
get threats out of their networks before damage has been
done. Perhaps you have already invested in a SIEM, a new
firewall, or a threat protection device, or are considering
buying them. Once they’re in your possession, how will
you incorporate necessary changes as the attacks change?
Who is going to make certain they are consistently configured to present accurate alerts? I’m not talking about alerts
that keep going off when nothing is really wrong. I’m talking about accurate alerts so that your security team doesn’t
ignore that one alert out of thousands that really is a network breach. In a typical week an organisation can receive
an average of nearly 17,000 malware alerts, but only 19%
of these alerts are deemed to be reliable, according to the
2015 Ponemon report The Cost of Malware Containment.
Before you have been breached, you should have already
thought about and have answered the following questions:
• Who is going to analyse the threats that are discovered?
• Who is going to assess what damage has been done
thus far?
• Will this person have the tools and a database of billions of threats and threat activities, all necessary to
analyse the suspicious activity to determine exactly
what malware is in your network?
• Who is going to find out where in your network the
threats are and how the intruders entered?
• Who is going to be able to
remove the threat?
Before investing in any cyber
security infrastructure, answer
those questions. If you’ve spent
thousands of dollars on a device
that is not being patched, managed, and configured consistently, your firm’s assets aren’t
properly protected. Just as a
hedge fund needs a fund manager, hedge funds firms need security experts to help them manage
their networks.
At a hedge fund management
seminar in September 2014, the SEC said, “Compliance
policies and procedures must be specifically tailored to
your firm’s advisory business, and should evolve and grow
with your business... It is crucial that policies and procedures be reviewed and updated as your business changes,
as regulations change, and as new guidance is issued”.
Those are principles your cyber security strategy should
encompass. As your business changes, so does your network, which is why you need operational and technical
controls to protect it. However, you can’t decide what controls to implement without knowing where your network
is at risk. So a risk assessment should be one of the first
steps you take when analysing your security. This will help
you assess risk based on probability, impact and cost.
You also should conduct a vulnerability assessment to
SECURITY TODAY IS NOT
BASED ON DEVICES ALONE. IT
IS BASED ON A COMBINATION
OF PEOPLE, PROCESS AND
TECHNOLOGY
”
28 H F M W E E K . CO M
TECHNOLOGY
discover current weaknesses in your network.
An automated scanner may scan for firewall
configuration weaknesses, open ports and default login credentials. However, an expert is
needed to delve deeper into your network to
manually scan it in order to find errors that automated tools often make and to review security policies and logs, and personnel processes
to discover other weaknesses.
You should next conduct a penetration test,
or pen test. By simulating an attack without
harming your network, this test assesses how
well your deployed security controls are working and to what extent an attacker could cause
damage.
One of the biggest problems organisations
face is they don’t know when they are being targeted or when they have been compromised. In
the 2014 Ponemon research report The Year of
the Megabreach, it took one-third of the organisations represented in this research two or more years after
an incident to discover they had been breached. 20% were
unable to determine when the breach was discovered, making it difficult to determine the extent of the breach and the
root cause. Threat intelligence and 24-hour monitoring can
help you know when your adversaries are targeting you and
how to stop them before they reach your assets.
Security professionals who have the know-how and experience can help you create a long-term security strategy
to develop and maintain a secure network. A vendor that
has knowledge of only some network security operations
but does not have its own threat database and incident response team won’t have all the knowledge that is needed
to combat threats, and could leave you with gaps in your
cyber security programme.
To secure your client database, trading algorithms, proprietary trading secrets, strategies and business processes, you need the utmost security. Experts who work in security
full time need to do many things in order to
truly understand the tactics, techniques and
procedures threat actors use.
The best security experts for hedge funds
and financial services should provide the following services:
• Monitor the networks of more than 1,000
financial services clients to have firsthand knowledge of their targeted attacks
• Can provide you with knowledge of
threat actors who are targeting you so you
can stop them before they reach your assets
• Have a personal global view of the threat
landscape from monitoring thousands of
networks around the world to see exactly
the type of threats that are out there and
to advise you what you need to do to protect yourself
• Monitor the threat underground to understand the
attackers and catch threats before they hit you
• Be able to continually manage, configure and provide updates to your protective devices so that they
actually block the threats as they were designed to do
• Provide countermeasures for the most recent threats
• Conduct incident response engagements, to provide
insider knowledge as to who the threat actors are and
how they work
• Consistently analyse malware and its activities so
when you get strange activity in your network, they
can identify it and remove it. Q
THREAT INTELLIGENCE
AND 24-HOUR MONITORING
CAN HELP YOU KNOW WHEN
YOUR ADVERSARIES ARE
TARGETING YOU AND HOW
TO STOP THEM BEFORE THEY
REACH YOUR ASSETS
”
H F M W E E K . C O M 29
CYBER RISK AND SECURITY 2015
S E R V I C E D I R E C TO R Y
Capital Support Limited, Nigel Brooks, Managing Partner // T: +44(0)20 7458 1250 Carrie Saunderson, Executive Director of Sales //
T: +44 (0)20 7458 1250
Capital Support specialises in implementing and supporting end-to-end IT solutions for a large portfolio of global finance sector customers. The company ethos is to
make IT simple for its customers, providing intelligently designed tailored solutions that span the breadth of regulated firms’ requirements. Capital Support’s vision is
to be the most trusted and respected managed IT services provider. 2015 is seeing a continued rise in the number of cyber-attacks suffered by businesses across all
sectors. Finance sector firms are amongst the most prized targets for cyber criminals. Capital Support’s managed security services provide peace-of-mind to businesses,
investors and regulators.
Dell Secureworks, Dan Bonnet, Sales Director // [email protected] // T: +1 404 486 4478
Dell Inc. listens to clients and delivers innovative technology and services that give them the power to do more. Recognized as an industry leader by top analysts, Dell
SecureWorks provides world-class information security services to help organizations of all sizes, including asset management firms, protect their IT assets comply with
regulations and reduce security costs.
eSentire, Mark Sangster, VP of Marketing // Tel: +1 519 651 2200 // 1 Penn Plaza, Suite 4501, New York, NY 10119 // www.esentire.com
eSentire® is the leader in Active Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen
cyber threats. eSentire’s flagship offering, Network Interceptor, challenges legacy security approaches, combining behaviour-based analytics, immediate mitigation and
actionable intelligence on a 24x7x365 basis. The company’s dedicated team of security experts continuously monitors customer networks to detect and block cyber
attacks in real-time. Protecting more than $2trn in combined assets, eSentire is the trusted choice for security decision-makers in financial services. In 2014 eSentire was
named Best Security Service Winner at HFM's US Services Awards. For more information visit www.esentire.com and follow @esentire.
Eze Castle Integration, Dean Hill, Executive Director // +44 (0)207 071 6802 Simon Eyre, Director of Service // +44 (0)207 071 6835
Interpark House, 7 Down Street, London, W1J 7AJ, email: www.eci.com
Eze Castle Integration is the leading provider of IT solutions and private cloud services to more than 650 alternative investment firms worldwide, including more than 100
firms with $1 billion or more in assets under management. Since 1995, Eze Castle Integration has developed financial vertical-specific IT solutions including infrastructure
design and management (both in our Eze Private Cloud and on premise), telecommunications, business continuity planning and disaster recovery, archiving, storage,
and internet services. These solutions are complemented by a broad service organisation that delivers outsourced IT support, including a 24x7x365 help desk, project
and technology management services, consulting services and more. Eze Castle has presence in major financial centres including 8 US offices, a Singapore office, and
a Hong Kong office in addition to its London office.
Matsco Solutions Ltd, Jim Serpi, Director of Global Operations // London +44 (0)20 7821 4950 // Hong Kong +852 8101 8418 // Singapore +65 6100
1090 // New York +1 866 446 9226 // Beijing +86 400 120 2782 // email: [email protected] Jilbert El-Zmetr, Director of Asian Operations,
Hong Kong +852 3973 8900 // email: [email protected]
Matsco Solutions is a leading IT services and support company founded in 2002 with offices in London, New York, Connecticut, California, Hong Kong, Singapore and
Beijing. Specialising in the financial services industry, Matsco Solutions provides IT services and support for a full range of business operations and requirements from
sole traders, small and medium size enterprises (SME) and large multi-nationals. We provide 24/7 support and project solutions to a wide range of businesses across
the globe. We specialise in company start-up services, support and monitoring, business consulting, private cloud services, IT engineering and design, outsourcing,
project management, start-up projects and implementations.
Alan D. Alzfan, Partner, Financial Services Practice - North America // T: +1 212-372-1380 // [email protected]
Lynne Weil, Partner, Financial Services Practice, N America // T: + 1 312.634.4568 // [email protected]
With more than 50 years of experience serving the financial services community in key financial hubs, McGladrey professionals help organizations navigate complex reporting,
governance and regulatory issues to achieve their business objectives. Based on the knowledge that comes from serving alternative investment companies, investment
advisors, investment partnerships/hedge funds, private equity funds, business development companies, mutual funds, broker-dealers and futures commission merchants,
we understand the complex operational, financial reporting and compliance issues facing the industry. We provide industry insight, advice and solutions to financial services
organizations across the country and around the world. That’s what you can expect from McGladrey. Experience the Power of Being Understood.SM
netConsult Ltd, Level 3, 75 Wells Street, London W1T 3QH // www.netconsult.co.uk // David Mansfield, COO // T:+44 (0)20 71003310 // dmansfi[email protected] // Laura Zverko, commercial director // T:+44 (0)20 71003310 // [email protected] //
Established in 2002, netConsult is an award winning provider of managed IT Services to the global alternative investment industry. We aim to provide a high level of
technical expertise to our clients combined with a dedication to customer service. Our ethos is based upon designing secure IT platforms which are manageable over
the long term. We are a trusted technology provider to a large portfolio of clients ranging from small start ups to large global funds. netConsult provides a bespoke
service to its clients and provides a full suite of IT services including cloud services, outsourced IT, BCP, virtual CTO and IT security.
3 0 H F M W E E K . CO M
Enterprise Business
Technology That Provides
Guaranteed Security,
Resilience & Uptime.
Speak to netConsult
on 020 7100 3310
• IT Security &
Business Continuity
• High Availability
Cloud Platform
• 24x7x365 Support
• Central London
Head Office
Established in 2002, netConsult is an award winning provider of
managed IT Services to the global alternative investment industry.
We aim to provide a high level of technical expertise to our clients
combined with a dedication to customer service. Our ethos is based
upon designing secure IT platforms which are manageable over the
long term.
We are a trusted technology provider to a large portfolio of clients
ranging from small start ups to large global funds. netConsult provides
a bespoke service to its clients and provides a full suite of IT services
including Cloud Services, Outsourced IT, BCP, Virtual CTO and IT
Security. For more information visit www.netconsult.co.uk
Level 3, 75 Wells Street
London, W1T 3QH
Tel: 020 7100 3310
www.netconsult.co.uk