How Fund Managers Can Identify and Prepare for Ransomware Threats (Part Two of Two)

Although a fund manager’s response to ransomware will depend on its risk tolerance, each manager should have in place a firm and comprehensive response plan suited to its needs. This second installment of our two-part series on ransomware offers insights from technical and legal experts on effective response measures, including bringing in experts to help understand what happened and why, as well as whether a fund manager should pay a ransom. It will also examine how cryptocurrency is changing the cybersecurity landscape. The first article covered the current methods of attack and their risks, as well as prevention techniques and ways fund managers can be prepared for one of these attacks. For more on fund manager cybersecurity, see our three-part series on how fund managers should structure their cybersecurity programs: “Background and Best Practices” (Mar. 22, 2018); “CISO Hiring, Governance Structures and the Role of the CCO” (Apr. 5, 2018); and “Stakeholder Communication, Outsourcing, Co-Sourcing and Managing Third Parties” (Apr. 12, 2018).

To read the full article

Continue reading your article with a HFLR subscription.