News |
Why cybersecurity governance is essential for institutional investors
This post was originally posted on Pensions & Investments.
For institutional investors traditionally concerned about liquidity, management and strong returns, 2019 will be the year a new primary threat comes to light — financial fraud. Cybersecurity attack vectors, including phishing, wire transfer fraud and vendor payment fraud are more common than ever before. As employees and vendors succumb to manipulation from sophisticated bad actors, they unwittingly share access to private capital and sensitive data at the expense of client trust and corporate reputation.
- Develop, regularly update and test a comprehensive incident response plan.
- Implement mandatory risk reviews and stakeholder meetings to discuss relevant updates and recent threat intelligence.
- Perform regular systems testing to provide assurances that established controls and protocols are working as designed.
- Engage with vendors to ensure their own security standards comply with critical cybersecurity protocols.
- Review all relevant local, state and federal cybersecurity and data security legislation, developing relationships with regulatory bodies along the way.
Developing an incident response plan
- Securing data through necessary patches or fixes, testing for any gaps in the security process simultaneously.
- Developing an accurate data map, which enables you to quickly detect if financial information, Social Security numbers, medical records and other personal information were exposed.
- Detailing who is on the incident response team, what their responsibilities are, how the scope of a breach is determined, how to notify clients and investors, how to meet legal and compliance requirements, and how to manage internal and external communications.
Cyber risk reviews
Systems testing
- Penetration tests — simulated cyberattacks to evaluate security protocols.
- Phishing tests — assessments to review the ability to recognize and report phishing emails.
- Vulnerability tests — thorough review of potential cyber weaknesses within company network.
- Tabletop exercises — mock IR exercises for key personnel to review their responsibilities in the event of an attack.