• Share
  • Email
  • Print
Get Connected

Untangling the Gordian Knot – Where to Begin When Building Your Cybersecurity Program

February 2015
Presenters: Mark C. Amorosi

Watch recording.

This webinar serves as an introductory roadmap for approaching cybersecurity.

Topics include:

  • Establishing a cybersecurity governance and risk management framework, including how to leverage existing policies and procedures such as Regulation S-P, Regulation S-ID, Massachusetts Information Security Regulations and business continuity plans.
  • Establishing and maintaining a cybersecurity risk assessment program, including how to conduct an inventory of the adviser’s information technology systems, software, websites and interconnectivity.
  • Implementing strategies to protect information technology systems, including technical controls around access management and encryption as well as regular penetration testing.
  • Introduction to developing an incident response plan to manage a cybersecurity event.
  • Oversight of third party vendors, staff training on cybersecurity risks and procedures, introduction to cyber insurance and involvement in cybersecurity information sharing networks.

Speakers:

  • Mark C. Amorosi, Investment Management Partner, K&L Gates LLP
  • Jeffrey Bedser, CEO, iThreat Cyber Group
  • Laura L. Grossman, Assistant General Counsel, Investment Adviser Association
  • Andras P. Teleki, Investment Management Partner, K&L Gates LLP
  • E.J. Yerzak, Vice President of Technology, Ascendant Compliance Management