
Fundamentals for Newer Directors 2014 (pdf)
The latest edition of ICI’s flagship publication shares a wealth of research and data on trends in the investment company industry.
Stay informed of the policy priorities ICI champions on behalf of the asset management industry and individual investors.
Explore research from ICI’s experts on industry-related developments, trends, and policy issues.
Explore expert resources, analysis, and opinions on key topics affecting the asset management industry.
Read ICI’s latest publications, press releases, statements, and blog posts.
See ICI’s upcoming and past events.
The latest edition of ICI’s flagship publication shares a wealth of research and data on trends in the investment company industry.
Explore expert resources, analysis, and opinions on key topics affecting the asset management industry.
Read ICI’s latest publications, press releases, statements, and blog posts.
See ICI’s upcoming and past events.
ICI Innovate brings together multidisciplinary experts to explore how emerging technologies will impact fund operations and their implications for the broader industry.
ICI Innovate is participating in the Emerging Leaders initiative, offering a heavily discounted opportunity for the next generation of asset management professionals to participate in ICI’s programming.
The Emerging.
Stay informed of the policy priorities ICI champions on behalf of the asset management industry and individual investors.
Explore research from ICI’s experts on industry-related developments, trends, and policy issues.
Explore expert resources, analysis, and opinions on key topics affecting the asset management industry.
Read ICI’s latest publications, press releases, statements, and blog posts.
See ICI’s upcoming and past events.
Cybersecurity gained prominence as a topic of discussion at ICI’s General Membership Meeting (GMM), held last week in Washington, DC. “Hugely important,” said Mary John Miller, the Treasury Department’s under secretary for domestic finance, in her GMM remarks. Likewise, Securities and Exchange Commission Chairman Mary Jo White told GMM attendees that addressing online vulnerabilities must be “a constant focus for both the regulators and the broader business community.”
That focus also was on display May 3 at the Operations and Technology Conference, where a panel of technology experts explored the origins and implications of cyberattacks. Panelists also provided the audience with cybersecurity advice, including the following pointers.
“Any of your service providers could be attacked and could leak data,” said Stewart A. Baker, a partner at Steptoe & Johnson LLP. Baker, who helped formulate U.S. cybersecurity policy as assistant secretary for policy at the Department of Homeland Security and as general counsel of the National Security Agency, urged attendees to get assurances from all service providers about data security arrangements.
Panelist Avivah Litan, vice president and distinguished analyst at Gartner Research, agreed that understanding the security of service providers was essential. “We’re only as strong as the weakest link,” she said.
Cyberattacks can have very sophisticated sponsors (e.g., nation-states such as Iran and North Korea) using advanced technology. Even so, Litan cautioned, no one should discount the danger from more low-tech methods of attack, particularly those involving old-fashioned infiltration via employees who can—knowingly or unknowingly—provide access to networks.
In one instance, she recounted, hackers targeted an organization by befriending workers at a gym near its offices. In another, a print room clerk was paid off. “We spend a lot of time on these more exotic kinds of actors coming in through cyberspace,” said Litan, who worked as a director of financial systems at the World Bank. “We forget sometimes about the guy in the print room.” Thus, Litan stressed the value of a strategy involving multiple layers of security.
Among those layers, of course, should be robust employee education around cybersecurity. John Shea, chief information officer at Eaton Vance Management, emphasized that education about cyberthreats shouldn’t just focus on what employees can or can’t do—it also should clearly explain why such steps are necessary.
As an example, he cited the relatively recent realization that portable flash drives, although convenient, can carry computer viruses or malicious programs. “When you say, ‘Hey, I’m not going to let you plug a USB device into your PC anymore,’ having an education of what the risks are reduces the sting of taking things away,” he said.
Education also involves conveying the nature of the threat. Baker suggested that cybersecurity should be described as nothing less than combat. “You are engaged in a fight with people who want what you have, and who will use a variety of tactics to take it away from you,” he explained.
With people sharing more and more personal information via social networks such as Facebook and LinkedIn, password protection becomes a greater challenge. A mother’s maiden name or a former teacher’s name, for example, is easier information to come by these days. Shea had a simple piece of advice on this topic—invent. For example, if a password challenge is a pet’s or former teacher’s name, make one up.
Use of technology to streamline and automate processes has greatly improved the fund industry’s efficiency—and will continue to do so. But Litan suggested that some back-end fund industry checks that may appear antiquated—such as those involving phone calls or written notifications that flag account activity—can be a “saving grace” when it comes to cybersecurity. “Keep those age-old processes,” she said. “They work really well.”
The panel was moderated by Daniel T. Steiner, executive vice president and general counsel for ICI Mutual.
Latest Comment Letters:
TEST - ICI Comment Letter Opposing Sales Tax on Additional Services in Maryland
ICI Comment Letter Opposing Sales Tax on Additional Services in Maryland
ICI Response to the European Commission on the Savings and Investments Union