Archive for Cybersecurity Leader

Detection & Response First. Prevention Second.

Experience and research shows us that while effective prevention strategies are essential, detection and response are even more important, for three reasons.

SEC Warns of Fraudsters

The SEC issued a warning to the public concerning fraudsters, who are impersonating the SEC in an attempt to trick potential victims to steal both personal information and money.

Office 365 for Hedge Funds and Private Equity

With Microsoft Office 365 being the dominant email platform in the alternative investment space, we thought it worth discussing some of the top considerations when securing Office 365.

The Four Dimensions to Cybersecurity That Really Matter

Best-in-breed cybersecurity rests on four pillars. At Agio, we’ve coined it ADEPT, reflective of Agio Diligence, Expertise, Process, and Technology.

The Time We Hacked a Private Equity Firm…from Their Lobby

This test was part of the client’s Cybersecurity Risk Assessment within Agio’s larger SEC Cybersecurity Readiness Program.

In Cybersecurity, Governance Trumps Technology

A strong cybersecurity program depends on governance to ensure broad participation, establish clear authority, and enable fully informed decision-making.

Forecasting in the Clouds

Just as weather anomalies have been dominating conversation at the dinner table, another type of cloud has emerged in the mainstream news at a record-setting pace: cloud computing.

Private Equity vs. Hedge Fund: Which Is Harder to Secure?

Do private equity firms pose a bigger cybersecurity challenge than hedge funds?

School, Security & SHR Solutions

Hackers target organizations that have access to personal health information (PHI), meaning educational and health care institutions have a bullseye on their backs.

The CIA Triad of Information Security: Availability

The third part of the CIA triad — availability — often surprises people. Contrary to popular belief, being “secure” does not mean locking down your information.

The CIA Triad of Information Security: Integrity

As the “I” in the CIA triad, integrity is essential to a strong information security program.

The CIA Triad of Information Security: Confidentiality

The CIA triad is a base standard that every organization needs. In this first blog in a series of three, we examine the nuances of confidentiality.