DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?



Similar documents
DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

MERCER WEBCAST MEETING TODAY S CHALLENGES FOR 401(K) SPONSORS OCTOBER 22, Liana Magner Amy Reynolds

CONNECTICUT RETIREMENT SECURITY BOARD DISCUSSION GUIDE FOR ANNUITY AND IRA ACCOUNT TYPES

CHALLENGES FOR WEALTH MANAGEMENT FIRMS IN 2016: ARE YOU PREPARED?

INVESTMENT MANAGER FEES: A CRITICAL LOOK

TARGET DATE FUNDS 10 YEARS LATER AND BEYOND

HEALTH WEALTH CAREER WHY DC PLANS NEED TO CONSIDER BROAD FINANCIAL WELLNESS AND OTHER ISSUES IN 2016

WHOLE OF LIFE SUPERANNUATION

CYBERSECURITY EXAMINATION SWEEP SUMMARY

RATING REPORTS ON GLOBAL INVESTOR PROGRAMME ( GIP ) FUNDS

OCIE CYBERSECURITY INITIATIVE

HEALTH WEALTH CAREER FIDUCIARY INVESTMENT ADVICE NEW DOL RULE IMPLICATIONS FOR RETIREMENT PLAN SPONSORS MAY 19, 2016

ENDOWMENT & FOUNDATION GOVERNANCE: FIDUCIARY OVERSIGHT AND IMPLEMENTATION MAY 2013

How to improve your employees retirement security at minimal cost Authors: Bruce Cadenhead Partner, Retirement, New York Steve Vernon FSA Research

Cybersecurity. Are you prepared?

MEMO. Comparing Traditional and Roth IRAs. Connecticut Retirement Security Board. Mercer Traditional vs. Roth IRA. contributions.

OCIE Technology Controls Program

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Creating, Developing and Instituting an Effective Incident Response Plan. Webinar. 15 April 2015

White Paper on Financial Industry Regulatory Climate

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

F G F O A A N N U A L C O N F E R E N C E

Cyber Security. Moderator: Marla J. Kreindler, Partner, Morgan, Lewis & Bockius LLP

NATIONAL CYBER SECURITY AWARENESS MONTH

Common Data Breach Threats Facing Financial Institutions

Ayla Networks, Inc. SOC 3 SysTrust 2015

Collateral Effects of Cyberwar

Attachment A. Identification of Risks/Cybersecurity Governance

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Cybersecurity: Protecting Your Business. March 11, 2015

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cybersecurity: What CFO s Need to Know

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Cyber Risks in the Boardroom

Stocks: Quick-start guide part 3 - Orders & Tickets

Internet threats: steps to security for your small business

Client Update SEC Releases Updated Cybersecurity Examination Guidelines

Cybersecurity Awareness. Part 1

SEC Cybersecurity Findings May Establish De Facto Standard

Logging In: Auditing Cybersecurity in an Unsecure World

VENDOR MANAGEMENT. General Overview

HIGH YIELD BONDS UNDER STRESS?

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

Questions You Should be Asking NOW to Protect Your Business!

Is Your IT Environment Secure? November 18, Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

August State of Nevada Deferred Compensation Plan. Manager Due Diligence Education Session

is held and maintained at GAIN Capital who serves as the clearing agent and counterparty to your trades. GAIN Capital is a

Cybersecurity..Is your PE Firm Ready? October 30, 2014

10 Smart Ideas for. Keeping Data Safe. From Hackers

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Managing Cyber Risk through Insurance

Table of Contents Chapter 1 Introduction Goals & Objectives Required Review Applicability...

Top Fraud Trends Facing Financial Institutions

Click to edit Master title style

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Cybersecurity Risks, Regulation, Remorse, and Ruin

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

How-To Guide: Cyber Security. Content Provided by

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

Presented By: Corporate Security Information Security Treasury Management

MULTI-ASSET STRATEGIES REDEFINING THE UNIVERSE APRIL 2014

THE ROLE OF LIQUID ALTERNATIVES IN WEALTH MANAGEMENT

The Business Case for Security Information Management

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

How To Protect Your Data From Being Hacked

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

Cybersecurity and the Threat to Your Company

SaxoTraderGO. Saxo Academy. Placing Forex Trade Orders. academy.tradingfloor.com

Cyber Security. John Leek Chief Strategist

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

Cybercrime and Regulatory Priorities for Cybersecurity

SaxoTraderGO. Saxo Academy. Trading Forex on Live Prices. academy.tradingfloor.com

THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS

The Top Ten of Information Security - For 2015

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January kpmg.com

SEC Convenes Cybersecurity Roundtable: Highlights Importance of Cybersecurity for Public Companies and Financial Market Participants

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

PACB One-Day Cybersecurity Workshop

PROPOSED INTERPRETIVE NOTICE

Information Security Addressing Your Advanced Threats

INDUSTRY OVERVIEW: HEALTHCARE

Big Data, Big Risk, Big Rewards. Hussein Syed

Perspectives on Cybersecurity in Healthcare June 2015

RETHINKING CYBER SECURITY Changing the Business Conversation

LIGC-ACC Presentation November 9, 2015

FINANCIAL SERVICES Model Cybersecurity Contract Terms and Guidance for Investment Managers to Manage Their Third-Party Vendors

Information for Management of a Service Organization

YEARENDED31DECEMBER2013 RISKMANAGEMENTDISCLOSURES

Cybersecurity and Insurance Companies

Vulnerability Assessment & Compliance

Cybersecurity Opportunities. Presented to: National Professional Science Masters Association November 13, 2013

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Cybersecurity y Managing g the Risks

PREPARE YOUR INCIDENT RESPONSE TEAM

Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?

THE WORLD MARKETS COMPANY PLC DESCRIPTION OF SERVICES AND CONFLICTS OF INTEREST DISCLOSURE STATEMENT MARCH 1, 2015

Transcription:

HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? FREEMAN WOOD HEAD OF MERCER SENTINEL NORTH AMERICA GREGG SOMMER HEAD OF OPERATIONAL RISK ASSESSMENTS MERCER 2015 0

THERE ARE ONLY TWO TYPES OF COMPANIES: THOSE THAT HAVE BEEN HACKED, AND THOSE THAT WILL BE. ROBERT MUELLER FBI DIRECTOR, 2012 MERCER 2015 1

CYBERSECURITY BREACHES TARGET JPMORGAN CODE SPACES SONY PENTAGON SEC reported that 74% of advisors and 88% of broker-dealers have had unauthorized access to their network 1 1 SEC cyber-security examination sweep summary Feb 3, 2015 OCIE Volume IV, Issue 4 MERCER 2015 2

HOW BIG IS THE PROBLEM? 270% increase in identified victims and exposed losses 1 Cyber crime costs the global economy over $400 billion annually 1 122 successful attacks per week 3 90% of large organizations reported a breach 2 Over the last four years cyber attacks on businesses have increased by 144% and the average time to resolve has increased by 221%4 1 Merrill Lynch CIO Reports 2 Security Breaches Survey PWC 2015 3 Ponemon Institute 4 CYREN Cyber Threat Report, 2015 MERCER 2015 3

WHY THE GLOBAL TREND WILL CONTINUE ROLE OF TECHNOLOGY CONTINUES TO EXPAND MOTIVATION Financial gain Malicious intent Promote beliefs Challenge Risk / Reward analysis MERCER 2015 4

CYBERCRIME INCIDENTS INVESTMENTS, BANKING AND FINANCE FINANCIAL FRAUD 36% DENIAL OF SERVICE ATTACKS 29% FINANCIAL LOSSES COMPROMISED RECORDS 23% 23% IDENTITY THEFTS NO INCIDENTS 20% 20% 0% 5% 10% 15% 20% 25% 30% 35% 40% SOURCE: PWC CYBERCRIME REPORT MERCER 2015 5

MULTIPLE POINTS OF ENTRY MOBILE DEVICES BUSINESS CONTACTS WEBSITE & MARKETING SOCIAL MEDIA 3 RD PARTY VENDORS 3 RD PARTY VENDORS EMPLOYEES EMPLOYEES ORGANIZATION 3 RD PARTY VENDORS FAMILY- FRIENDS SOCIAL MEDIA MOBILE DEVICES DATA STORAGE (CLOUD) CLIENTS EMPLOYEES NETWORK HARDWARE MERCER 2015 6

INDUSTRY AND REGULATORY GUIDANCE NIST CYBERSECURITY FRAMEWORK 1 SEC RISK ALERT 2 BEST PRACTICES Identify Protect Detect Respond Recover Cybersecurity governance (policies, procedures, and oversight) Risk associated with remote customer access and fund transfer requests Risks associated with vendors and any third parties Detection of unauthorized activity Experiences with cyber threats Governance and policies Employee training Technology Third party assessment 1 National Institute of Standards and Technology (NIST) website. 2 Morgan Lewis summary of the SEC risk alert Feb 2015 MERCER 2015 7

BEST PRACTICES GOVERNANCE AND POLICIES CULTURE Senior management engagement Accountable oversight Proactive approach PROCESSES Documented information Security policy Cybersecurity and risk assessment test Cyber insurance risk transfer Monitor cash activity daily Third party / Vendor due diligence policy MERCER 2015 8

BEST PRACTICES EMPLOYEE TRAINING AWARENESS Passwords Public Wi-Fi Local drives Email communication Scam preparation Phishing MERCER 2015 9

BEST PRACTICES TECHNOLOGY SECURITY Network, physical, data, logical SYSTEMS Malware / Anti-virus Patching and updates Intrusion prevention system and testing Cloud technology Backup process and testing MERCER 2015 10

BEST PRACTICES THIRD PARTY ASSESSMENT TOOLS Classify vendors Define assessment process SLAs and contract management Monitor business relationships Plan For vendors that fail to meet requirements Independent assessments (SSAE16, SOC testing) MERCER 2015 11

INVESTMENT PROGRAM RISK MANAGEMENT EXTENSIVE AND OVERLAPPING AREAS OF RISK MARKET RISKS Interest rates Commodity Credit spread Correlations Equity FX Liquidity Risk mgmt. failure Leverage 3 rd party internal risk taking / positions ENTERPRISE INVESTMENT RISK MANAGEMENT & GOVERNANCE COUNTERPARTY AND TRANSACTION RISKS Credit default Excess transaction costs Excess fees / costs Poor capabilities Morale Hazard 3 rd party errors Transaction errors Fraud Reputation Compliance Technology OPERATIONAL, FINANCIAL AND COMPLIANCE RISKS Trading errors Excess operations costs Regulatory and Legal risk Financial controls breakdowns MERCER 2015 12

WHERE DOES CYBER RISK ASSESSMENT FIT IN? FRAMEWORK GOVERNANCE ORGANIZATIONAL STRUCTURE OPERATING MODEL OVERSIGHT COMPLIANCE & AUDIT RISK MANAGEMENT FUNCTIONS VALUATION AND ADMINISTRATION TRANSACTION EXECUTION 3RD PARTY SERVICE PROVIDERS FINANCE / ACCOUNTING SUPPORTING RESOURCES TECHNOLOGY HR LEGAL BC & DR December 18, 2015

CONCLUSIONS OPERATIONAL RISK CAN BE MATERIAL AND VERY COMPLEX CYBER RISK WILL CONTINUE TO RISE ASSESSMENT AGAINST INDUSTRY BEST PRACTICES IS IMPORTANT REGULAR MONITORING OF INVESTMENT ORGANIZATIONS AND THIRD PARTIES SHOULD OCCUR PARTNERING WITH EXPERT PROVIDERS MAY BE BENEFICIAL MERCER 2015 14

QUESTIONS? QUESTIONS Please type your questions in the Q&A section of the toolbar and we will do our best to answer as many questions as we have time for. To submit a question while in full screen mode, use the Q&A button, on the floating panel, on the top of your screen. CLICK HERE TO ASK A QUESTION TO ALL PANELISTS FEEDBACK Please take the time to fill out the feedback form at the end of this webcast so we can continue to improve. The feedback form will pop-up in a new window when the session ends. MERCER 2015 15

Important notices References to Mercer shall be construed to include Mercer LLC and/or its associated companies. 2015 Mercer LLC. All rights reserved. This contains confidential and proprietary information of Mercer and is intended for the exclusive use of the parties to whom it was provided by Mercer. Its content may not be modified, sold or otherwise provided, in whole or in part, to any other person or entity, without Mercer s prior written permission. The findings, ratings and/or opinions expressed herein are the intellectual property of Mercer and are subject to change without notice. They are not intended to convey any guarantees as to the future performance of the investment products, asset classes or capital markets discussed. Past performance does not guarantee future results. Mercer s ratings do not constitute individualized investment advice. Information contained herein has been obtained from a range of third party sources. While the information is believed to be reliable, Mercer has not sought to verify it independently. As such, Mercer makes no representations or warranties as to the accuracy of the information presented and takes no responsibility or liability (including for indirect, consequential or incidental damages), for any error, omission or inaccuracy in the data supplied by any third party. This does not constitute an offer or a solicitation of an offer to buy or sell securities, commodities and/or any other financial instruments or products or constitute a solicitation on behalf of any of the investment managers, their affiliates, products or strategies that Mercer may evaluate or recommend. For the most recent approved ratings of an investment strategy, and a fuller explanation of their meanings, contact your Mercer representative. For Mercer s conflict of interest disclosures, contact your Mercer representative or see www.mercer.com/conflictsofinterest. Mercer universes: Mercer s universes are intended to provide collective samples of strategies that best allow for robust peer group comparisons over a chosen timeframe. Mercer does not assert that the peer groups are wholly representative of and applicable to all strategies available to investors. The value of your investments can go down as well as up, and you may not get back the amount you have invested. Investments denominated in a foreign currency will fluctuate with the value of the currency. Certain investments carry additional risks that should be considered before choosing an investment manager or making an investment decision. MERCER 2015 16

MERCER 2015 17