Home IT & Cybersecurity

IT & Cybersecurity

Security of money
With deepfakes, spoofed e-mails and business e-mail compromise on the rise, private equity CFOs must rethink how they verify every transaction.
Cybersecurity padlock
As scrutiny on data and tech intensify, good cybersecurity practices don’t just protect value, they’re a differentiator. Gen II’s CISO Randy Siegel outlines the key components of a strong cybersecurity regime.
Business performance monitoring concept, businessman using smartphone Online survey filling out, digital form checklist, blue background.
The survey also found that GPs are negotiating fund terms more often, further adding to their compliance burden.
Compliance rule law and regulation graphic interface for business quality policy planning to meet international standard.
The fund administrator and fiduciary services provider reports that while many firms are currently employing AI, these GPs also expect governance issues will limit their use in the years to come.
The risks of using generative AI may be too costly for PE firms, law firm Debevoise & Plimpton said.
Private equity firms are placing cybersecurity providers on retainer to shrink incident response times.
Cybersecurity padlock
Given the stakes and complexity of cybersecurity, it might be time to hire a chief information security officer. Here are some guidelines for when and how to bring aboard a CISO.
pfcfo
pfcfo

Copyright PEI Media

Not for publication, email or dissemination