{"id":3807,"date":"2016-07-16T03:54:14","date_gmt":"2016-07-15T19:54:14","guid":{"rendered":"https:\/\/www.indataipm.com\/?p=3807"},"modified":"2024-09-20T10:25:48","modified_gmt":"2024-09-20T18:25:48","slug":"ongoing-battle-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/","title":{"rendered":"The Ongoing Battle of Cybersecurity"},"content":{"rendered":"<p>An interesting article in the Institutional Investor \u201c<a href=\"https:\/\/www.institutionalinvestor.com\/article\/b14z9nmw1xdwlv\/the-ongoing-battle-of-cybersecurity\" target=\"_blank\" rel=\"noopener\">The Ongoing Battle of Cybersecurity<\/a>\u201d which made the case for why asset management companies need to become intelligence-driven organizations, \u201cCyber Security is not a technical problem, it is a managerial issue\u2026\u201d<\/p>\n<p>At INDATA, our clients have expressed an increased interest in cybersecurity issues and best practices. The concept that cybersecurity should be classified as a risk management activity, something that investment firms already spend a lot of time on, rather than a technical or IT consideration really frames the issue in a proper light.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An interesting article in the Institutional Investor \u201cThe Ongoing Battle of Cybersecurity\u201d which made the case for why asset management companies need to become intelligence-driven organizations, \u201cCyber Security is not [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":3864,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"image","meta":{"_acf_changed":false,"_stc_notifier_status":"sent","_stc_notifier_sent_time":"2023-01-11 07:00:16","_stc_notifier_request":false,"_stc_notifier_prevent":false,"_stc_subscriber_keywords":"","_stc_subscriber_search_areas":"","content-type":"","footnotes":""},"categories":[177,100,40,38,33],"tags":[49,131,132,83],"class_list":["post-3807","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-ai-investment-management","category-blog-articles","category-cloud","category-data-management","category-industry-topics-category","tag-asset-management","tag-cybersecurity","tag-risk-management","tag-technology","post_format-post-format-image"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Ongoing Battle of Cybersecurity | INDATA<\/title>\n<meta name=\"description\" content=\"The ongoing battle of cybersecurity: How asset managers can protect themselves from attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Ongoing Battle of Cybersecurity | INDATA\" \/>\n<meta property=\"og:description\" content=\"The ongoing battle of cybersecurity: How asset managers can protect themselves from attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"INDATA\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-15T19:54:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-20T18:25:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.indataipm.com\/wp-content\/uploads\/2016\/07\/Capture.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"598\" \/>\n\t<meta property=\"og:image:height\" content=\"322\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Csiki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@indataipm\" \/>\n<meta name=\"twitter:site\" content=\"@indataipm\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Csiki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/\"},\"author\":{\"name\":\"David Csiki\",\"@id\":\"https:\/\/www.indataipm.com\/#\/schema\/person\/31ac2144f306e999a05ada27d5434beb\"},\"headline\":\"The Ongoing Battle of Cybersecurity\",\"datePublished\":\"2016-07-15T19:54:14+00:00\",\"dateModified\":\"2024-09-20T18:25:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/\"},\"wordCount\":96,\"publisher\":{\"@id\":\"https:\/\/www.indataipm.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.indataipm.com\/wp-content\/uploads\/2016\/07\/Capture.jpg\",\"keywords\":[\"asset management\",\"cybersecurity\",\"risk management\",\"technology\"],\"articleSection\":[\"AI Investment Management\",\"Blog Articles\",\"Cloud\",\"Data Management\",\"Industry Topics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/\",\"url\":\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/\",\"name\":\"The Ongoing Battle of Cybersecurity | INDATA\",\"isPartOf\":{\"@id\":\"https:\/\/www.indataipm.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.indataipm.com\/wp-content\/uploads\/2016\/07\/Capture.jpg\",\"datePublished\":\"2016-07-15T19:54:14+00:00\",\"dateModified\":\"2024-09-20T18:25:48+00:00\",\"description\":\"The ongoing battle of cybersecurity: How asset managers can protect themselves from attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.indataipm.com\/wp-content\/uploads\/2016\/07\/Capture.jpg\",\"contentUrl\":\"https:\/\/www.indataipm.com\/wp-content\/uploads\/2016\/07\/Capture.jpg\",\"width\":598,\"height\":322,\"caption\":\"indata cloud graph\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.indataipm.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Ongoing Battle of Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.indataipm.com\/#website\",\"url\":\"https:\/\/www.indataipm.com\/\",\"name\":\"INDATA\",\"description\":\"iPM Intelligent Portfolio Management\",\"publisher\":{\"@id\":\"https:\/\/www.indataipm.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.indataipm.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.indataipm.com\/#organization\",\"name\":\"INDATA\",\"url\":\"https:\/\/www.indataipm.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.indataipm.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.indataipm.com\/wp-content\/uploads\/2022\/08\/indata-ai-logo-sml.png\",\"contentUrl\":\"https:\/\/www.indataipm.com\/wp-content\/uploads\/2022\/08\/indata-ai-logo-sml.png\",\"width\":280,\"height\":51,\"caption\":\"INDATA\"},\"image\":{\"@id\":\"https:\/\/www.indataipm.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/indataipm\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.indataipm.com\/#\/schema\/person\/31ac2144f306e999a05ada27d5434beb\",\"name\":\"David Csiki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.indataipm.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1257edd5d055e5cd9d3ceed07b6b48fd6a252570d3e5a987df87f403e2fb1a9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1257edd5d055e5cd9d3ceed07b6b48fd6a252570d3e5a987df87f403e2fb1a9e?s=96&d=mm&r=g\",\"caption\":\"David Csiki\"},\"description\":\"David Csiki is the Managing Director and President of INDATA, a leading industry provider of software and services for buy-side firms including trade order management (OMS), compliance, portfolio accounting, and front-to-back office technology solutions. Prior to joining INDATA, Csiki was Manager of Marketing and Investor Relations at NYFIX, Inc. and was instrumental in developing the product concept and planning the successful launch of the company\u2019s flagship product, NYFIX, a FIX broker network.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/david-csiki-0a59799\"],\"url\":\"https:\/\/www.indataipm.com\/author\/csiki\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Ongoing Battle of Cybersecurity | INDATA","description":"The ongoing battle of cybersecurity: How asset managers can protect themselves from attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"The Ongoing Battle of Cybersecurity | INDATA","og_description":"The ongoing battle of cybersecurity: How asset managers can protect themselves from attacks.","og_url":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/","og_site_name":"INDATA","article_published_time":"2016-07-15T19:54:14+00:00","article_modified_time":"2024-09-20T18:25:48+00:00","og_image":[{"width":598,"height":322,"url":"https:\/\/www.indataipm.com\/wp-content\/uploads\/2016\/07\/Capture.jpg","type":"image\/jpeg"}],"author":"David Csiki","twitter_card":"summary_large_image","twitter_creator":"@indataipm","twitter_site":"@indataipm","twitter_misc":{"Written by":"David Csiki","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/"},"author":{"name":"David Csiki","@id":"https:\/\/www.indataipm.com\/#\/schema\/person\/31ac2144f306e999a05ada27d5434beb"},"headline":"The Ongoing Battle of Cybersecurity","datePublished":"2016-07-15T19:54:14+00:00","dateModified":"2024-09-20T18:25:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/"},"wordCount":96,"publisher":{"@id":"https:\/\/www.indataipm.com\/#organization"},"image":{"@id":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.indataipm.com\/wp-content\/uploads\/2016\/07\/Capture.jpg","keywords":["asset management","cybersecurity","risk management","technology"],"articleSection":["AI Investment Management","Blog Articles","Cloud","Data Management","Industry Topics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/","url":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/","name":"The Ongoing Battle of Cybersecurity | INDATA","isPartOf":{"@id":"https:\/\/www.indataipm.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.indataipm.com\/wp-content\/uploads\/2016\/07\/Capture.jpg","datePublished":"2016-07-15T19:54:14+00:00","dateModified":"2024-09-20T18:25:48+00:00","description":"The ongoing battle of cybersecurity: How asset managers can protect themselves from attacks.","breadcrumb":{"@id":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#primaryimage","url":"https:\/\/www.indataipm.com\/wp-content\/uploads\/2016\/07\/Capture.jpg","contentUrl":"https:\/\/www.indataipm.com\/wp-content\/uploads\/2016\/07\/Capture.jpg","width":598,"height":322,"caption":"indata cloud graph"},{"@type":"BreadcrumbList","@id":"https:\/\/www.indataipm.com\/ongoing-battle-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.indataipm.com\/"},{"@type":"ListItem","position":2,"name":"The Ongoing Battle of Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.indataipm.com\/#website","url":"https:\/\/www.indataipm.com\/","name":"INDATA","description":"iPM Intelligent Portfolio Management","publisher":{"@id":"https:\/\/www.indataipm.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.indataipm.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.indataipm.com\/#organization","name":"INDATA","url":"https:\/\/www.indataipm.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.indataipm.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.indataipm.com\/wp-content\/uploads\/2022\/08\/indata-ai-logo-sml.png","contentUrl":"https:\/\/www.indataipm.com\/wp-content\/uploads\/2022\/08\/indata-ai-logo-sml.png","width":280,"height":51,"caption":"INDATA"},"image":{"@id":"https:\/\/www.indataipm.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/indataipm"]},{"@type":"Person","@id":"https:\/\/www.indataipm.com\/#\/schema\/person\/31ac2144f306e999a05ada27d5434beb","name":"David Csiki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.indataipm.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1257edd5d055e5cd9d3ceed07b6b48fd6a252570d3e5a987df87f403e2fb1a9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1257edd5d055e5cd9d3ceed07b6b48fd6a252570d3e5a987df87f403e2fb1a9e?s=96&d=mm&r=g","caption":"David Csiki"},"description":"David Csiki is the Managing Director and President of INDATA, a leading industry provider of software and services for buy-side firms including trade order management (OMS), compliance, portfolio accounting, and front-to-back office technology solutions. Prior to joining INDATA, Csiki was Manager of Marketing and Investor Relations at NYFIX, Inc. and was instrumental in developing the product concept and planning the successful launch of the company\u2019s flagship product, NYFIX, a FIX broker network.","sameAs":["https:\/\/www.linkedin.com\/in\/david-csiki-0a59799"],"url":"https:\/\/www.indataipm.com\/author\/csiki\/"}]}},"_links":{"self":[{"href":"https:\/\/www.indataipm.com\/wp-json\/wp\/v2\/posts\/3807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.indataipm.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.indataipm.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.indataipm.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.indataipm.com\/wp-json\/wp\/v2\/comments?post=3807"}],"version-history":[{"count":2,"href":"https:\/\/www.indataipm.com\/wp-json\/wp\/v2\/posts\/3807\/revisions"}],"predecessor-version":[{"id":7241,"href":"https:\/\/www.indataipm.com\/wp-json\/wp\/v2\/posts\/3807\/revisions\/7241"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.indataipm.com\/wp-json\/wp\/v2\/media\/3864"}],"wp:attachment":[{"href":"https:\/\/www.indataipm.com\/wp-json\/wp\/v2\/media?parent=3807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.indataipm.com\/wp-json\/wp\/v2\/categories?post=3807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.indataipm.com\/wp-json\/wp\/v2\/tags?post=3807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}