Actions and Detail Panel
GFM Cybersecurity Event
Thu 16 March 2017, 08:30 – 14:30 GMT
Sales Have Ended
Sales Have Ended
This event will inform and educate fund managers on all aspects of cyber security, both in terms of how to assess their own internal processes and how to evaluate those of their suppliers. Please note that this event is targeted strictly at fund managers.
It will comprise of four panel discussions with industry experts designed to provide maximum information on how to be cyber-secure, how to deal with a potential cyber attack and how to evaluate your service providers to ensure they are as secure as they should be. This will be focusing on the institutional asset management sector.
Pannel 1 : Sponsored by Eze Castle Integration
Applying operational due diligence
Tackling the issue of how to apply effective due diligence as a way for fund managers to strengthen their cybersecurity posture; and at the same time, for investors to use a due diligence matrix for assessing the cyber preparedness of managers before making allocations.
- Dean Hill, (Panel Chair), Eze Castle Integration
- Simon Eyre, Eze Castle Integration
- Eldon Sprickerhoff, eSentie Inc.
- William Jenkins, Amundi
Panel 2: Adopting social media best practices
This panel will investigate how to combat the growing rise and sophistication of social engineering attacks. With fund managers increasingly using social media channels to develop thought leadership in the marketplace, it is important that all employees pay heed to best practices to remain cyber secure.
- James Williams, (Panel Chair), Hedgeweek
- James Tedman, ACA Aponix
- George Quigley, Cyber Security Partner (London Region)
- Mark Kennedy, Director of Imperial Business Analytics, London Imperial College Business School
Panel 3:Sponsored by Intralinks
How to protect your organisation’s digital footprint
How to stay secure beyond a firm’s network perimeter will be the focus of this panel discussion. Controlling how data is moving within the four walls of an organisation is only half the battle. What happens when that data is shared externally with service providers and investors? How do you know that it is not being compromised or being used on the dark net?
- Trevor Moore, (Panel Chair), Intralinks
- Andrew Flatt, Omni Partners
- Michael Marriott, Research Analyst, Digital Shadows
Panel 4: Sponsored by eSentire
Appropriate Building Blocks for Cybersecurity for RIA's
Recent highly publicized cyber attacks have spurred a growing public awareness of the risk that sensitive personal information might be accessed by unauthorized third parties. Learn how to avoid such data breaches by having a proper IRP in place to limit the financial and reputational toll on your organization.
- Eldon Sprickerhoff,(Panel Chair), eSentire Inc.
- Ed Cowen, CEO, Remora
- Simon Eyre , Eze Castle Integration