RIAs need to probe their vendors on their own cybersecurity protocols so that in the event of an issue, they can communicate with clients with some assurances.”
Wes Stillman, President, RightSize Solutions |
Summary: Recent high-profile cyberattacks underscore the importance of tracking how and where client data is used, transferred and stored by third party vendors to RIAs. The reality is, "the cloud" is not – and never was – a cybersecurity solution.
RIAs need to probe their vendors on their own cybersecurity protocols so that in the event of an issue, they can communicate with clients with some assurances.”
Wes Stillman, President, RightSize Solutions |
Your session has expired!
To continue, please log in again.
Your session is about to expire!
You will be logged off in seconds.
Do you want to continue your session?