Cybersecurity Best Practices
Cybersecurity resources, best practices, and tips to help our clients protect their firms from increasing and evolving cyber threats, including ransomware attacks.
Best practices and tips
Myths About Cybersecurity Portfolio Oversight: Myth #3
In part 3 of our series we tackle the myth that "investors don’t care and/or are satisfied with our current approach to cybersecurity."
- Cybersecurity Resources
- Cybersecurity
- Portfolio Company Risk Management
Myths About Cybersecurity Portfolio Oversight: Myth #2
Cyber threats are on the rise, making robust cybersecurity oversight essential for protecting investments. We debunk a common myth about portfolio oversight.
- Cybersecurity Resources
- Cybersecurity
- Portfolio Company Risk Management
Myths About Cybersecurity Portfolio Oversight: Myth #1
Cyber threats are on the rise, making robust cybersecurity oversight essential for protecting investments. We debunk a common myth about portfolio oversight.
- Cybersecurity Resources
- Cybersecurity
- Portfolio Company Risk Management
13 Key Elements for Successful Cybersecurity Portfolio Oversight
Our cyber team has identified the key elements of successful programmatic cyber oversight. By adopting these elements, firms can avoid value destruction, meet investor expectations, and increase valuations of their portfolio.
- Cybersecurity
- Cybersecurity Resources
- Portfolio Company Risk Management
CISO Checklist for First 100 Days of Cybersecurity Program Management
This checklist provides key steps for a new Chief Information Security Officer (CISO) to take to set a cybersecurity program up for success.
- Cybersecurity
- Cybersecurity Resources
SEC Cybersecurity Rule 206(4)-9 Expected to Be Finalized in April 2023
The SEC’s rule will establish new requirements for firms’ cybersecurity programs while strengthening investors’ confidence in the security of their investments.
- Cybersecurity
- Cybersecurity Resources
- SEC