Cybersecurity remains a hot topic for regulators and investors alike. See “SEC Enforcement Action Illustrates Focus on Investment Adviser Obligation to Secure Client Information” (Jun. 23, 2016). The Hedge Fund Association (HFA) recently presented its Cybersecurity Challenges and Solutions for Emerging Managers symposium, which covered the basics of cybersecurity preparedness, responding to cyber incidents, vendor management, cyber insurance and cloud services. Robert G. Sawyer, a partner at law firm Foley Hoag and regional director of the HFA, moderated the discussion, which featured Colin J. Zick, a partner at Foley Hoag; Rob Fitzgerald, a principal consultant at cybersecurity firm Mandiant/FireEye; William M. Steers, principal/president of global insurance brokerage Gunn, Steers & Company, LLC; and Frederick Howell, Jr., a manager at tax and consulting firm RSM US LLP. This article summarizes the key insights from the symposium. For coverage of another recent HFA program, see our two-part series on the recent Global Regulatory Briefing, offering insight from U.S., U.K. and offshore regulators: “Best Ways for Hedge Fund Managers to Approach Regulation” (May 12, 2016); and “Views on Cybersecurity, AML, AIFMD, Advertising and Liquidity Issues Affecting Hedge Fund Managers” (May 19, 2016).
Jul. 7, 2016
-
TOPICS
-
ENTITIES
-
PEOPLE
HFA Symposium Offers Perspectives From Cybersecurity Industry Professionals on Preparedness, Vendor Management, Cyber Insurance and Cloud Services
- Vincent PitaroHedge Fund Law Report
To read the full article
Continue reading your article with a HFLR subscription.
Other Cybersecurity Articles
-
May 19, 2022
How to Measure Whether Your Company Is Ready to Catch Lots of Phish (Part Two of Two) -
May 12, 2022
As Email Scams Surge, Training Lessons From 115 Million Phishing Messages (Part One of Two) -
Apr. 7, 2022
Cyber Insurance Litigation Trends Amid Rising Ransomware Attacks -
Mar. 24, 2022
SEC Proposes Cyber Risk Management Rules for Advisers -
Mar. 17, 2022
First Steps Fund Managers Should Take When Responding to a Ransomware Attack (Part One of Two)