Wed, Jan 23, 2019
A A A
Welcome Guest
Free Trial RSS
Get FREE trial access to our award winning publications
Private Equity Strategies

Why private equity firms are at risk of cyber-attacks

Friday, September 29, 2017

By: Steve Schoener, Chief Technology Officer, Eze Castle Integration

Threats to private equity firms continue to grow both in scope and sophistication, meaning cyber strategies and practices require equally complex and progressive thought. Particularly for firms with limited (or nonexistent) security resources, it can be a daunting task to stay on top of the new and evolving risks at hand. But meticulous attention needs to be employed to mitigate these ongoing threats.

Today’s hackers and cyber criminals are not only targeting IT systems, but humans as well. Attacks vary in target, size and motive, but all pose serious risks to a firm’s wellbeing, thus it’s vital to be aware of common threat types targeting the private equity community. Threats to be mindful of include:

  • Malware/ransomware: Virtual cyber threats impacting firm systems and networks often taking advantage of system flaws, legacy technology and/or insufficient cyber protections

      Social engineering: Deceptive scams, e.g. phishing, intended to manipulate users into divulging confidential data or leaving open a gateway to said information

    • Insider threats: Unintentional or malicious activity on the part of a firm’s employee resulting in leaked, stolen or compromised information

    Unfortunately, once hackers gain access to your network or data, there is a lot that they can do to wreak havoc for private equity firms. In fact, with their roguish hands on the right information, the consequences can be downright destructive for a firm’s business operations and integrity.

    • With stolen passwords and login credentials, hackers can gain access to company systems and networks – not an insignificant feat.

    • Inside your email, a hacker can access, send and delete communications at will, potentially intercepting company sensitive material, financial data or personal details they can use to further infiltrate networks.

    • Hackers can decipher corporate hierarchies and send phishing emails to CFOs, for example, requesting fund transfers to provided bank account numbers.

    • A stolen or shared password could also unlock access to a firm’s CRM or accounting system, which may contain customer and potential customer information (company and personal), financials, investor analysis, sales forecasting data, etc.

    • With their hands on deal flow or portfolio acquisition information, there’s a chance hackers could disrupt M&As or deal agreements or leak company material in advance of confidential negotiations.

    To gain a comprehensive understanding of your security posture, private equity firms should conduct a thorough risk assessment on a regular basis. Risk assessments can take many forms (technical, regulatory, etc.) and should be conducted broadly to ultimately provide firms with a roadmap that identifies risks and provides guidance on future security initiatives. What should those initiatives include?

    Private equity firms may consider exploring industry frameworks to design comprehensive cyber programs. For example, the National Institute of Standards in Technology (NIST), focuses on building layers of security across an organization. Their primary layers – Identify, Protect, Detect, Respond and Recover – assist firms in mapping specific strategies and safeguards to ensure a comprehensive security program is designed to mitigate risk. Following are a few examples of strategies and protections firms can employ to thwart cyber-attacks:

    IDENTIFY: Risk assessments, network inventory audits

    PROTECT: Access control, security awareness training, email and endpoint security, patch management, phishing simulations, encryption

    DETECT: Intrusion detection/prevention, vulnerability assessments

    RESPOND: Incident response, remediation

    RECOVER: Backup services, disaster recovery

    Mitigating Third Party Risk

    Many private equity firms simply don’t have the necessary technical resources in-house to manage technology and security – hence, outsourcing. Outsourcing all or portions of technology and cybersecurity responsibilities to a managed service provider provides many advantages. And while relying outsourcing is a welcome relief for many firms, it does not absolve them of their responsibility to manage their own firm’s risk. In fact, on top of managing your own risk, outsourcing means also managing the risk associated with your vendors and service providers.

    A few key reminders on vendor due diligence and risk management:

    • Understand who your outsourced providers are, what functions they provide and what data/systems they have access to

    • Consider sending requests for proposals (RFPs) and DDQ documentation requests to any third parties you are evaluating and review engaged third parties annually

    • Continuously evaluate and monitor to ensure all parties are achieving their end goals and meeting expectations

    • Understand Service Level Agreements (SLAs), contractual loopholes and any third party operational practices that may affect migration plans or your firm’s security standing in the short and long-term

 
This article was published in Opalesque's Private Equity Strategies our monthly research update on the global private equity landscape including all sectors and market caps.
Private Equity Strategies
Private Equity Strategies
Private Equity Strategies


Today's Exclusives Today's Other Voices More Exclusives
Previous Opalesque Exclusives                                  
More Other Voices
Previous Other Voices                                               
Access Alternative Market Briefing


  • Top Forwarded
  • Top Tracked
  • Top Searched
  1. News Briefs: The Jeff Bezos divorce: $136bn and Amazon in the middle, Bridgewater Associates partners with consulting firm, Cyprus no longer Mediterranean haven for Russian businesses, Goldman Sachs on course to launch cash management in mid-2020[more]

    The Jeff Bezos divorce: $136bn and Amazon in the middle From Mint: The announcement by Amazon founder Jeff Bezos, the world's wealthiest man, and his wife that they will divorce has captivated the imagination -- how will they split his giant fortune, estimated at $136 billion? And what wi

  2. Institutional Investors: Institutional investors plot large property allocations, Qatar Investment Authority aims to reach $45bn in U.S. investments, Louisiana Teachers assigns $200m, SoftBank move to slash WeWork investment sends shockwaves[more]

    Institutional investors plot large property allocations From FT: Institutional investors plan to make large allocations to property in 2019, taking them closer to their desired targets. At least €72.4bn of new capital is expected to flow into real estate this year, according to a

  3. Legal: Attorney sues after Tampa hedge fund goes under, Hedge funds showing increased interest in litigation claims, Argentina sued again by hedge fund on bonds tied to GDP growth[more]

    Attorney sues after Tampa hedge fund goes under A Tampa hedge fund company may be in legal trouble after the firm that was holding its money was sued by a lawyer who claimed "gross negligence" caused the fund to lose tens of millions of dollars. James Cordier, the head of optionseller

  4. Activists: MGM hands board seat to activist hedge fund Corvex's Meister, PG&E shareholder BlueMountain challenges bankruptcy plans, Gulfport pledges share buybacks after hedge fund demand, PPG Paints itself into a corner[more]

    MGM hands board seat to activist hedge fund Corvex's Meister From Reuters: MGM Resorts International has struck a deal with hedge fund Corvex Management's founder, Keith Meister, to give him a board seat, one week after a rival activist investor was seen building a position in the casino

  5. Opinion: Can you beat Warren Buffett's investment returns using data?[more]

    From Seeking Aplha: The ideal hedge fund portfolio would use leverage to take a variety of uncorrelated risks that all cancel each other out, leaving the fund with little to no net exposure. For example, if you could invest in enough items with no correlation to the business cycle, like earthqua