Call Us
Client Login
Drawbridge White Logo
  • Who We Serve
    • Who We Serve
    • Hedge Fund Managers
    • Private Equity
    • Broader Alternatives
  • Solutions
    • Cyber Risk Intelligence
      • Cyber Risk Intelligence
      • Cyber Assessment
      • Cyber Analysis
      • Peer Benchmarking
      • Cyber Scoring
      • Remediation Planning
      • Reporting
      • Regulatory Readiness
      • PE Portfolio Analytics
      • PE Portfolio Company Tracking​
    • Services
      • Services
      • Vulnerability Scanning
      • Cybersecurity Training and Awareness
      • Cybersecurity Policies
      • Cloud Assessment
      • Penetration Testing
      • Tabletop Exercise
      • Vendor Risk Assessment
      • Cyber Risk Assessment
  • Supporting Your Growth
    • Supporting Your Growth
    • Raising Capital
    • Regulatory Preparation
    • Responding to Incidents
    • Running the Fund
  • About Us
    • About Us
    • Meet the Team
  • Resources
    • Resources
    • Insights
    • Case Studies
    • Events & Webinars
    • Who We Serve
    • Hedge Fund Managers
    • Private Equity
    • Broader Alternatives
      • Cyber Risk Intelligence
      • Cyber Assessment
      • Cyber Analysis
      • Peer Benchmarking
      • Cyber Scoring
      • Remediation Planning
      • Reporting
      • Regulatory Readiness
      • PE Portfolio Analytics
      • PE Portfolio Company Tracking​
      • Services
      • Vulnerability Scanning
      • Cybersecurity Training and Awareness
      • Cybersecurity Policies
      • Cloud Assessment
      • Penetration Testing
      • Tabletop Exercise
      • Vendor Risk Assessment
      • Cyber Risk Assessment
    • Supporting Your Growth
    • Raising Capital
    • Regulatory Preparation
    • Responding to Incidents
    • Running the Fund
    • About Us
    • Meet the Team
    • Resources
    • Insights
    • Case Studies
    • Events & Webinars
Contact Us
Request A Demo
Contact Us
Request A Demo
Home > Resources > Training > Page 2

Training

  • Events & Webinars
    December 9, 2022

    Webinar Recap: How the SEC’s New Proposed Cybersecurity Rules Could Change Your Firm’s Security Requirements

    The U.S. Securities and Exchange Commission (SEC) has proposed cybersecurity rules that represent a revolutionary approach to cybersecurity and will affect all firms in the alternative investment industry – including yours. Regulatory pressure is rising – and firms must prepare now to ensure they can meet and exceed current and future expectations. But what will the SEC’s…

    Read more: Webinar Recap: How the SEC’s New Proposed Cybersecurity Rules Could Change Your Firm’s Security Requirements
  • Insights
    November 7, 2022

    How Hedge Funds Can Stay Ahead of Ransomware with the Right Incident Response Plans

    There can be no hedging your bets when it comes to defending against ransomware. Funds don’t need to look far for high profile examples of devastating attacks, from Conti’s strike on Costa Rica in April to last year’s infamous Colonial Pipeline breach. And ransomware is on the rise, thanks to the growth of trends like ransomware-as-a-service. Verizon’s 2022…

    Read more: How Hedge Funds Can Stay Ahead of Ransomware with the Right Incident Response Plans
  • Insights
    October 20, 2022

    Are Hackers Phishing in Your Waters? Top Tips to Protect Your Firm

    When cybercriminals go phishing, it’s financial firms they want to land. According to research published last month by the Anti-Phishing Working Group, the financial sector (including banks) was the most frequently victimized by phishing in Q2 2022, accounting for 27.6% of all phishing attacks. And there’s a good reason why. As  a highly lucrative industry predicted to grow…

    Read more: Are Hackers Phishing in Your Waters? Top Tips to Protect Your Firm
  • In the News
    October 13, 2022

    Cybersecurity Awareness Month: ‘See Yourself in Cyber’

    Accelerate and Enhance Your CyberSecurity and Risk Management Program As Cybersecurity Awareness Month 2022 is in full swing, it’s an ideal time for businesses to review their cybersecurity, business continuity and risk management processes. These types of annual events are an easy point in the calendar where companies can take stock of their efforts and engage in…

    Read more: Cybersecurity Awareness Month: ‘See Yourself in Cyber’
  • Insights
    September 29, 2022

    Typo-Squatting: 5 Steps to Avoid Falling Victim

    Today’s hackers constantly look for additional ways to capitalize on cyber security shortfalls and compromise sensitive data and information. Our clients report that social engineering attacks involving typo-squatting techniques are on the increase. Many businesses fail to realize how easily they can fall victim to this type of attack – but as real world instances…

    Read more: Typo-Squatting: 5 Steps to Avoid Falling Victim
  • Insights
    June 27, 2022

    Cyber Security Intelligence: Ransom – Prepare For The Worst

    In this contributed article, Drawbridge CISO Simon Eyre highlights the continuing – and growing – threat of ransomware. He also offers four steps to combat ransomware, which are summarized below. Four steps to combat ransomware Preparation and testing (“It’s critical to be able to access [the incident response] plan at a moment’s notice, so make sure…

    Read more: Cyber Security Intelligence: Ransom – Prepare For The Worst
  • Events & Webinars
    June 8, 2022

    Cybersecurity Webinar: Drawbridge x SEC Compliance Solutions

    As cybersecurity becomes an increasingly hot topic for advisors and their clients, we took the opportunity to discuss how risks are changing and share industry knowledge that can help strengthen your firm’s cyber environment. Listen in as Katie Mogan of SCS and Adam Menkes of Drawbridge address important concerns facing investment advisers and funds, including:…

    Read more: Cybersecurity Webinar: Drawbridge x SEC Compliance Solutions
  • In the News
    May 19, 2022

    RegTech Analyst: Are banks safe in a government-backed cyberwar?

    Drawbridge CISO Simon Eyre was interviewed for this article in RegTech Analyst that explores the potential for cyber warfare in an era of heightened uncertainty and geopolitical conflict. Asked about the kinds of attacks facing banks, Simon commented: “Availability of Services to the public and to businesses is a critical part of today’s modern online…

    Read more: RegTech Analyst: Are banks safe in a government-backed cyberwar?
  • Insights
    April 8, 2022

    Securing Company Devices from Spyware

    Malware has become a critical issue regarding cybersecurity throughout numerous industries. Those firms who work within an online space, securing company devices that handle the personal information and assets of clients, are particularly at risk. Malware can take many forms, but one of the most prevalent is that of spyware. Tips for Security Company Devices…

    Read more: Securing Company Devices from Spyware
  • Insights
    April 1, 2022

    Phishing Tactics Targeting the Financial Sector

    Phishing is a form of social engineering that seeks to accomplish malicious online attacks. This can be anything from the theft of private information to the installation of malware on a home or private network. The financial sector has been hit harder than ever by cyber crime. Phishing is a common tool in the attacker’s arsenal. Read…

    Read more: Phishing Tactics Targeting the Financial Sector
  • Insights
    March 24, 2022

    Six strategic cyber investments for the next six months – and beyond

    The original article appears in Cybersecurity Insiders. We are in the midst of what may be a permanent shift to remote and hybrid working models. At the same time, the types of attacks businesses face continue to evolve—and the volume of attacks continues to grow. Drawbridge CEO Jason Elmer shares his take on six critical investments for…

    Read more: Six strategic cyber investments for the next six months – and beyond
  • Insights
    March 7, 2022

    How to Keep Devices Secure When Traveling

    Travel is a common aspect of business, especially those businesses or firms with employees working in remote locations, or those serving a distributed client base. As personnel will be scattered, using multiple different networks and devices rather than a singular secure network, businesses everywhere have been adapting to these new environments in order to keep…

    Read more: How to Keep Devices Secure When Traveling
«Previous
1 2 3 4
Next»

Raise Your Guard.

Lower Your Risk.

  • LinkedIn

General Contact

Email:
info@drawbridgeco.com

United States:
+1 561-593-1600

United Kingdom:
+44 (0) 208 078 8825

Billing Related Inquiries:
+1 646-907-5695

  • Who We Serve
  • Cyber Risk Intelligence
  • Services
  • Supporting Your Growth
  • About Us
  • Resources
  • Careers
  • Contact Us
  • Request a Demo
Drawbridge White Logo

Drawbridge @ 2025. All rights reserved.

Diversity Statement
Privacy Policy
Terms of Use

Developed by Kontra Agency