
Fundamentals for Newer Directors 2014 (pdf)
The latest edition of ICI’s flagship publication shares a wealth of research and data on trends in the investment company industry.
Stay informed of the policy priorities ICI champions on behalf of the asset management industry and individual investors.
Explore research from ICI’s experts on industry-related developments, trends, and policy issues.
Explore expert resources, analysis, and opinions on key topics affecting the asset management industry.
Read ICI’s latest publications, press releases, statements, and blog posts.
See ICI’s upcoming and past events.
The latest edition of ICI’s flagship publication shares a wealth of research and data on trends in the investment company industry.
Explore expert resources, analysis, and opinions on key topics affecting the asset management industry.
Read ICI’s latest publications, press releases, statements, and blog posts.
See ICI’s upcoming and past events.
ICI Innovate brings together multidisciplinary experts to explore how emerging technologies will impact fund operations and their implications for the broader industry.
ICI Innovate is participating in the Emerging Leaders initiative, offering a heavily discounted opportunity for the next generation of asset management professionals to participate in ICI’s programming.
The Emerging.
Stay informed of the policy priorities ICI champions on behalf of the asset management industry and individual investors.
Explore research from ICI’s experts on industry-related developments, trends, and policy issues.
Explore expert resources, analysis, and opinions on key topics affecting the asset management industry.
Read ICI’s latest publications, press releases, statements, and blog posts.
See ICI’s upcoming and past events.
As the asset management industry adopts employee monitoring programs to bolster cybersecurity, it’s also moving to protect employee privacy—and build trust. The January 26, 2018, edition of Focus on Funds examines how firms are striking a balance.
Stephanie Ortbals-Tibbs, media relations director, ICI: Employee monitoring is on the rise in the fund industry, as part of its larger cybersecurity effort. So how should that look for companies and their employees? What do you need to know about how that might work best? How can employees build trust in the system that is being created? At ICI’s Cybersecurity Forum, I got some advice on all of that.
Janet Oren, chief information security officer, Legg Mason: It’s important that people have trust in the people who are doing the monitoring, so we want to make sure that the people actually seeing the information understand that that data is confidential—that they’re not walking around the business gossiping about something they read about someone because they were doing a monitoring activity. That just erodes the trust in the people who are actually looking at the data. It really is those employees who are doing the monitoring—because they are literally reading people’s email, which can be very private—so they have to understand that.
Ortbals-Tibbs: And it sounds like the way you build that trust is through training the people who will be monitoring them—and you put a big emphasis on that.
Oren: Yes, absolutely. There is a big emphasis on training them. Because the compliance department is doing a part of the business, it has to be taken very seriously, so they need to have that trust.
Ortbals-Tibbs: You deal with many challenges as part of this. Of course, first, you’re dealing with this fundamental issue of making sure that monitoring staff is comfortable. Then you really have to work on introducing a lot of new concepts and new rules to people, and that takes a lot of time and education, it sounds like.
Oren: You really have to have a good communications plan. You start six months ahead of time, and let people know what’s coming and how it’s going to impact them. Give people an opportunity to ask questions—have maybe one-on-one sessions to really get personal about how they think it might impact them.
Because people do care, particularly with BYOD [bring your own device] and the personal devices. People care about what you’re monitoring on there, and they want to know exactly what you’re doing. So, having those conversations, having a really solid communications plan, is really essential.
Ortbals-Tibbs: You do bring up phones, and phones are a big challenge. This is a new area.
Oren: Phones are a challenge, just because they’re a different technology. There are ways to monitor some of the things you do on phones. But text messaging, for instance—there isn’t a good way to archive or get copies of text messages. So they are a challenge.
In all of our organizations, we have to look at technologies constantly, because you have to figure out, can that technology be secured? Can that technology be monitored appropriately, from a regulatory compliance standpoint? And have a review process to look at anything new that you’re bringing into the environment.
So it is a challenge. All of our businesses on the panel recognize that, and we have different ways of dealing with it. But it’s something that we have to look at every single day.
Ortbals-Tibbs: It sounds like this is another one of these areas where cybersecurity is really getting integrated into the business, far more than it used to be.
Oren: Absolutely—it has to. My number-one goal at Legg Mason is to make sure people understand, cybersecurity is everybody’s job, and that we all take it seriously and understand what we’re responsible for.
Latest Comment Letters:
TEST - ICI Comment Letter Opposing Sales Tax on Additional Services in Maryland
ICI Comment Letter Opposing Sales Tax on Additional Services in Maryland
ICI Response to the European Commission on the Savings and Investments Union