Cybersecurity..Is your PE Firm Ready? October 30, 2014

Similar documents
Which Describes Your Cybersecurity Program Eager Beaver or Deer in Headlights? October 29, 2015

2015 Real Estate Industry Update A landscape for change: Transforming for the future

Defining the Gap: The Cybersecurity Governance Study

Keynote Address. MilCIS Mohan Aiyaswami Chief Technology Officer

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

All Eyes: A Security Breach Exercise. Disaster Recovery/Security and Business Continuity Readiness

Welcome to the Webinar A Candid Conversation: The Future of the Health Care CIO. February 25, pm 1pm PST

Cybersecurity. Are you prepared?

PRIORITIZING CYBERSECURITY

Perspectives on Cybersecurity and Its Legal Implications

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Rogers Insurance Client Presentation

Separating Security and Information Management into Two Industry-Leading Technology Companies

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Cybersecurity Risk Management in the Telecom Sector. MUSTAPHA HUNEYD Corporate Information Security

Secure by design: taking a strategic approach to cybersecurity

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Understanding Security Complexity in 21 st Century IT Environments:

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

IC B10 - Vision Panel Discussion: Scaling the Information Security Program Maturity Model: 3 Practitioners Perspectives

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

Cybersecurity Converged Resilience :

Privacy Rights Clearing House

Cybersecurity and the AICPA Cybersecurity Attestation Project

THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED

North Texas ISSA CISO Roundtable

Reputation Impact of a Data Breach Executive Summary

CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)

Agency for State Technology

Exposing the Cybersecurity Cracks: A Global Perspective

How GCs And Boards Can Brace For The Cybersecurity Storm - Law360

Cybersecurity Implications in the US Chemical Industry. Modernization and Greenfield Opportunities

NNIT Cybersecurity. A new threat landscape requires a new approach

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!

Cyber Security solutions

CGI Cyber Risk Advisory and Management Services for Insurers

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

TITLE HERE Subtitle here. Cloud Standards Customer Council Cloud Industry Symposium June 18, 2014 Boston, MA

CFO Changing the CFO Mindset on Cybersecurity

1851 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to (1) require a State to report data under subsection

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

OUR SPONSORS. South Florida Hedge Funds 2011 Industry Outlook. The Miami Finance Forum. Presents A Panel Discussion on.

Examining the Evolving Cyber Insurance Marketplace

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age

Impact of Data Breaches

Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014

PREPARE YOUR INCIDENT RESPONSE TEAM

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

WELCOME TO STS. Our clients can be assured of receiving confidential, personalized services when doing business with us.

Case 2:11-cv R -DTB Document 13 Filed 11/18/11 Page 1 of 7 Page ID #:355 EXHIBIT A

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

COMPETITION TRIGGERS BATTLE FOR TALENT AND ACQUISITIONS

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

Cyber and Data Security. Proposal form

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Wealth Management Built on Integrity and Experience

PROFESSIONAL BACKGROUND. Partner and Chair, Health Law Practice Group

Cybersecurity and Insurance Companies

Transcription:

Cybersecurity..Is your PE Firm Ready? October 30, 2014

What you will learn. Understanding SEC s interest in cybersecurity Mitigating cyber risk at the PE firm and the portfolio companies Developing a plan to protect investor identification and private information, a portfolio company intellectual property and related confidential information Handling the conflict between business access and security Planning for disaster, business continuity and client notification

Why are we discussing it? In April, The SEC Announced It Would Be Spreading More Sunshine on Private Equity by Examining the Industry s Preparedness for Cybersecurity

Why are we discussing it? Dozens of large private equity firms are currently compromised, and they don t even know about it John Watters, chief executive, isight Partners Inc., a cybersecurity intelligence company Source: Wall Street Journal, March 10, 2014

Why are we discussing it? 31% of all targeted cyber attacks in 2013 hit businesses with less than 250 employees Source: Symantec 2013 Internet Security Threat Report

Why are we discussing it? Data breaches cost U.S. companies $5.4 million per breach that amounts to $188 per stolen record Source: Ponemon Institute: 2013 Cost of Data Breach Study: Global Analysis.

Who Will You Hear From Today? Panelists: Joe Campbell, CTO, PEF Services LLC Eric Feldman, Chief Information Officer, The Riverside Company Melinda Scott, Managing Partner, Scott Goldring Associates Moderator: Mark Heil, EVP, Business Development, PEF Services LLC

Joe Campbell, CTO, PEF Services LLC UBS Financial Services, Senior Developer, Consolidated Order Entry System Application Development The Chubb Institute of Technology and Rockland College B.A., Queens College

Eric Feldman, CIO The Riverside Company Instrumental in creating Riverside s Information Security Program and restructuring the global business continuity plan to align with evolving business requirements. Served as the Director of MIS for the Office of the Mayor, City of New York. B.A. from Eastern Illinois University.

Melinda Scott, Managing Partner, Scott Goldring Associates Managing Partner at Scott Goldring Associates in New York City. Specializes in Securities Law and alternative investment vehicles. Graduate of Howard University School of Law Licensed member of the New York State Bar and the Federal Southern District of New York. Qualified to practice law in England and Wales.

Mark Heil EVP-Business Development PEF Services LLC Founder and Managing Director, CereNova Fund Marketing, placement agent for small and emerging managers Board member of Private Investors Forum (Angel Network) and Entrepreneurs Forum of Greater Philadelphia (former president) MBA, Drexel University, Marketing; BS, St. Joseph s University, Marketing & Finance

PEF Services LLC is the leading fund administrator for small to middle market private capital funds. We provide high-quality, costeffective administrative solutions with a specialty in emerging manager and Small Business Investment Companies (SBIC) funds.

The Riverside Company is a global private equity firm focused on investing in growing enterprises valued at up to $250 million/ 200 million. The firm s global portfolio includes more than 75 companies. Since its founding in 1988, Riverside has invested in more than 300 transactions.

Scott Goldring Associates is a boutique law firm specializing primarily in Securities Law. They have expertise in formation and ongoing compliance for Hedge Funds, Private Equity/Venture Capital Funds and Family Offices.

Contact Us PEF Services LLC Joe Campbell 212-203-4685 x 106 joe@pefundservices.com www.pefundservices.com PEF Services LLC Mark Heil 212-203-4679 mark@pefundservices.com www.pefundservices.com The Riverside Company Eric Feldman 212 484 2178 efeldman@riversidecompany.com www. riversidecompany.com Scott Goldring Associates Melinda Scott 646-652-8567 mscott@scottgoldringassociates.com www.scottgoldringassociates.com