SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
Financial Adviser
Cyber Information Security
What you need to know
IP Sentinel – watching over your intellectual property

ACT NOW
You are responsible for some of the most valuable data in the world. That of your clients’.
It is imperative that you know how to process, protect and manage that information.
The penalties for not doing so can run into the millions and ruin the reputation of your business.
The Financial Conduct Authority (‘FCA’), The Information Commissioner and your PI Insurer all have
requirements you have to meet.
Do you know what your responsibilities are?
Do you understand the threats to the information you hold?
Do you know how to protect yourself?
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

What is Information?
As an adviser you have ‘Identifying Data’ for each and every one of your clients

•

Name, address, email, contact telephone

You also have so much more due to AML & KYC requirements

•

Copies of passport, driving licence, utility bill, bank statements

You could have even more that that

•

Bank account details, investment histories, insurance policy details

This information is valuable to your clients
Your servers probably hold enough information for criminals to steal the identity of every one of your
clients
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

You are responsible for client information
The Financial Conduct Authority

•
•
•

FCA Principle 2
FCA Principle 3
Rule 3.2.6R in the Senior Management Arrangements, Systems and Controls sourcebook
(SYSC)

The Information Commissioner

•

Data Protection Act 1998 and 2003

The PI Insurer

•

Whilst you may have cover in place for a limited third party loss relating to cyber security, it is
unlikely that your existing cover will reinstate any losses to your own business
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

How do you process information?
To manage your client accounts and information

•
•
•
•

Do you have a manual process that is largely paper based?
Or is your process largely email, spreadsheets and word documents?
Or an Intranet workflow integrated with an online Customer Relationship Management (CRM) system
Or a Vendor provided Practice management solution?

Most probably part of your process is outsourced to a vendor or service provider, maybe as part of a
network arrangement.
Would you know if information had gone missing?
What would you do if you discovered that it had?
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

Where do you keep information?
Your clients have given you their information. Do you know where that information is
now?
• On your laptop/PC
• Or in hard copy in a locked filing cabinet in
your office
• Or stored in a document archive offsite
• Or stored as an attachment in your email

•
•
•
•
•

Or saved as a spreadsheet on a file server
Or in a vendor supplied application
Or in the “cloud”
Or hosted on a vendor service
Or on a 3rd party backup service

Probably a little of all of the above
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

How do you protect information?
•

Who should and who actually does have access to
client information?

•

Do you trust them? Does their employment contract
cover their responsibilities?

•
•
•

Who is responsible for Data Protection?
Who is responsible for dealing with a Data loss? Hack
attack? Computer crash?
Who is responsible for Employees joining and leaving,

as well as examining what they bring or take with
them?

•
•
•

Do you encrypt the data? If so how?

•

Do you audit your policies & their implementation
regularly?

How do you communicate? WiFi? iDevice? Laptop?
Do you have an IT policy on passwords? User access
levels?

IP Sentinel can provide you with a solution
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

Your Strategy
Carry on as you are - Sorry that’s not going to work for too long
• The FCA have stated Data Protection is one of their key focus areas. There’s EU legislation on the way to make
sure you do something. It’s all over the news.

Buy Cyber Liability Insurance – Deals with the finance aspects only

•
•

It’s not cheap!
Doesn’t help your reputation or replace your clients.

Let my IT department manage this problem

•
•

Data Protection is a whole business issue
It is a specialist area

If you think you need to do more, IP Sentinel can help
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

Engage IP Sentinel
IP Sentinel is a specialist in Cyber and Information Security in the Adviser and DFM marketplace.
We provide a 4 step program to help you protect your important data and work towards satisfying the Regulators.

Step 1: Recognition
Step 2: Prevention
Step 3: Monitoring & Mitigation
Step 4: Response & Recovery
Regardless of your size or business model you have a duty to protect your client data. If you have any questions about your
responsibilities,
call us today on 01825 701870
Or email info@ip-sentinel.com
Or visit our website http://ip-sentinel.com

info@ip-sentinel.com
http://ip-sentinel.com

Más contenido relacionado

Destacado

Capital Link's Monthly CEF & ETF Newsletter - February 2014
Capital Link's Monthly CEF & ETF Newsletter - February 2014 Capital Link's Monthly CEF & ETF Newsletter - February 2014
Capital Link's Monthly CEF & ETF Newsletter - February 2014 AnnyZhu315
 
IntJEnvHealthEng1150-5515334_151913
IntJEnvHealthEng1150-5515334_151913IntJEnvHealthEng1150-5515334_151913
IntJEnvHealthEng1150-5515334_151913Mohsen Memarzadeh
 
Bluerise introductory presentation
Bluerise introductory presentationBluerise introductory presentation
Bluerise introductory presentationBluerise
 
Mobile apps and services from mPortal - Our Customer Portfolio
Mobile apps and services from mPortal - Our Customer PortfolioMobile apps and services from mPortal - Our Customer Portfolio
Mobile apps and services from mPortal - Our Customer PortfolioHolly Dowden
 
Producer Recruiting: FIVE steps to success
Producer Recruiting: FIVE steps to successProducer Recruiting: FIVE steps to success
Producer Recruiting: FIVE steps to successjareddroy
 
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...Sarah Cohen
 
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach ThemCES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach ThemBen Grossman
 
Water Law and Policy in the U.S.
Water Law and Policy in the U.S.Water Law and Policy in the U.S.
Water Law and Policy in the U.S.Chuck Bowen
 
Portland Visitor's Guide
Portland Visitor's GuidePortland Visitor's Guide
Portland Visitor's GuideMarshallRosario
 
Using Chained .MSI Packages to Componentize Your Windows Installer Setup
Using Chained .MSI Packages to Componentize Your Windows Installer SetupUsing Chained .MSI Packages to Componentize Your Windows Installer Setup
Using Chained .MSI Packages to Componentize Your Windows Installer SetupFlexera
 
C.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
C.H.A.M.P.S. Inc. Marketing Service For College Bound AthletesC.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
C.H.A.M.P.S. Inc. Marketing Service For College Bound AthletesC.H.A.M.P.S. Inc.
 

Destacado (14)

Run For Freedom 2012
Run For Freedom 2012Run For Freedom 2012
Run For Freedom 2012
 
Capital Link's Monthly CEF & ETF Newsletter - February 2014
Capital Link's Monthly CEF & ETF Newsletter - February 2014 Capital Link's Monthly CEF & ETF Newsletter - February 2014
Capital Link's Monthly CEF & ETF Newsletter - February 2014
 
Hurricane preparedness white paper
Hurricane preparedness white paperHurricane preparedness white paper
Hurricane preparedness white paper
 
IntJEnvHealthEng1150-5515334_151913
IntJEnvHealthEng1150-5515334_151913IntJEnvHealthEng1150-5515334_151913
IntJEnvHealthEng1150-5515334_151913
 
Bluerise introductory presentation
Bluerise introductory presentationBluerise introductory presentation
Bluerise introductory presentation
 
Mobile apps and services from mPortal - Our Customer Portfolio
Mobile apps and services from mPortal - Our Customer PortfolioMobile apps and services from mPortal - Our Customer Portfolio
Mobile apps and services from mPortal - Our Customer Portfolio
 
Producer Recruiting: FIVE steps to success
Producer Recruiting: FIVE steps to successProducer Recruiting: FIVE steps to success
Producer Recruiting: FIVE steps to success
 
Konduko institutional
Konduko institutionalKonduko institutional
Konduko institutional
 
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
 
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach ThemCES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
 
Water Law and Policy in the U.S.
Water Law and Policy in the U.S.Water Law and Policy in the U.S.
Water Law and Policy in the U.S.
 
Portland Visitor's Guide
Portland Visitor's GuidePortland Visitor's Guide
Portland Visitor's Guide
 
Using Chained .MSI Packages to Componentize Your Windows Installer Setup
Using Chained .MSI Packages to Componentize Your Windows Installer SetupUsing Chained .MSI Packages to Componentize Your Windows Installer Setup
Using Chained .MSI Packages to Componentize Your Windows Installer Setup
 
C.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
C.H.A.M.P.S. Inc. Marketing Service For College Bound AthletesC.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
C.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Adviser & DFM Cyber & Information security

  • 1. Financial Adviser Cyber Information Security What you need to know
  • 2. IP Sentinel – watching over your intellectual property ACT NOW You are responsible for some of the most valuable data in the world. That of your clients’. It is imperative that you know how to process, protect and manage that information. The penalties for not doing so can run into the millions and ruin the reputation of your business. The Financial Conduct Authority (‘FCA’), The Information Commissioner and your PI Insurer all have requirements you have to meet. Do you know what your responsibilities are? Do you understand the threats to the information you hold? Do you know how to protect yourself? info@ip-sentinel.com http://ip-sentinel.com
  • 3. IP Sentinel – watching over your intellectual property What is Information? As an adviser you have ‘Identifying Data’ for each and every one of your clients • Name, address, email, contact telephone You also have so much more due to AML & KYC requirements • Copies of passport, driving licence, utility bill, bank statements You could have even more that that • Bank account details, investment histories, insurance policy details This information is valuable to your clients Your servers probably hold enough information for criminals to steal the identity of every one of your clients info@ip-sentinel.com http://ip-sentinel.com
  • 4. IP Sentinel – watching over your intellectual property You are responsible for client information The Financial Conduct Authority • • • FCA Principle 2 FCA Principle 3 Rule 3.2.6R in the Senior Management Arrangements, Systems and Controls sourcebook (SYSC) The Information Commissioner • Data Protection Act 1998 and 2003 The PI Insurer • Whilst you may have cover in place for a limited third party loss relating to cyber security, it is unlikely that your existing cover will reinstate any losses to your own business info@ip-sentinel.com http://ip-sentinel.com
  • 5. IP Sentinel – watching over your intellectual property How do you process information? To manage your client accounts and information • • • • Do you have a manual process that is largely paper based? Or is your process largely email, spreadsheets and word documents? Or an Intranet workflow integrated with an online Customer Relationship Management (CRM) system Or a Vendor provided Practice management solution? Most probably part of your process is outsourced to a vendor or service provider, maybe as part of a network arrangement. Would you know if information had gone missing? What would you do if you discovered that it had? info@ip-sentinel.com http://ip-sentinel.com
  • 6. IP Sentinel – watching over your intellectual property Where do you keep information? Your clients have given you their information. Do you know where that information is now? • On your laptop/PC • Or in hard copy in a locked filing cabinet in your office • Or stored in a document archive offsite • Or stored as an attachment in your email • • • • • Or saved as a spreadsheet on a file server Or in a vendor supplied application Or in the “cloud” Or hosted on a vendor service Or on a 3rd party backup service Probably a little of all of the above info@ip-sentinel.com http://ip-sentinel.com
  • 7. IP Sentinel – watching over your intellectual property How do you protect information? • Who should and who actually does have access to client information? • Do you trust them? Does their employment contract cover their responsibilities? • • • Who is responsible for Data Protection? Who is responsible for dealing with a Data loss? Hack attack? Computer crash? Who is responsible for Employees joining and leaving, as well as examining what they bring or take with them? • • • Do you encrypt the data? If so how? • Do you audit your policies & their implementation regularly? How do you communicate? WiFi? iDevice? Laptop? Do you have an IT policy on passwords? User access levels? IP Sentinel can provide you with a solution info@ip-sentinel.com http://ip-sentinel.com
  • 8. IP Sentinel – watching over your intellectual property Your Strategy Carry on as you are - Sorry that’s not going to work for too long • The FCA have stated Data Protection is one of their key focus areas. There’s EU legislation on the way to make sure you do something. It’s all over the news. Buy Cyber Liability Insurance – Deals with the finance aspects only • • It’s not cheap! Doesn’t help your reputation or replace your clients. Let my IT department manage this problem • • Data Protection is a whole business issue It is a specialist area If you think you need to do more, IP Sentinel can help info@ip-sentinel.com http://ip-sentinel.com
  • 9. IP Sentinel – watching over your intellectual property Engage IP Sentinel IP Sentinel is a specialist in Cyber and Information Security in the Adviser and DFM marketplace. We provide a 4 step program to help you protect your important data and work towards satisfying the Regulators. Step 1: Recognition Step 2: Prevention Step 3: Monitoring & Mitigation Step 4: Response & Recovery Regardless of your size or business model you have a duty to protect your client data. If you have any questions about your responsibilities, call us today on 01825 701870 Or email info@ip-sentinel.com Or visit our website http://ip-sentinel.com info@ip-sentinel.com http://ip-sentinel.com