W: www.eci.com
E: sales@eci.com

Eze Castle Cybersecurity Webinar Series

Every Thursday in October, 11:00 am EST I 4:00 pm BST

7 Steps to Create a Business Continuity Plan
October 25, 2018, 11:00 am EST I 4:00 pm BST

When confronted with unexpected business disruptions, investment firms must react swiftly, methodically, and successfully or else risk significant financial loss to the firm. Come learn from Eze Castle's Business Continuity experts on which threats pose a risk to your firm and the steps to create a business continuity plan.
9 Steps to Create an Information Security Plan
October 4th, 2018, 11:00 am EST I 4:00 PM BST

With the ever-changing regulatory and investor landscape, Information Security Plans are critical for alternative investment firms to comply with SEC regulations, due diligence requests and state laws. This webinar will cover the nine steps to create a comprehensive Written Information Security Plan.

Download Now


We're committed to your privacy. Eze Castle Integration uses the information you provide to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. EU residents will only receive these email communications if the above 'GDPR Consent' box is checked. For more information, check out our Privacy Page.

Addressing Common IT Gaps for Investment Management Firms
October 11th, 2018, 11:00 am EST I 4:00 pm GMT

This webinar will highlight common security shortfalls and shed light on how managers can take steps to mitigate and remediate these critical security concerns moving forward. Common gaps we'll discuss include misalignment of security layers to risk profile, vulnerability assessments and remediation, IT asset management and vendor risk management.
Cybersecurity Incident Response: Before, During and After
October 18th, 2018, 11:00 am EST I 4:00 pm BST

When a cybersecurity incident happens, it is crucial to act fast to minimize any inherent risk to your firm. That said, being able to act swiftly requires you to have an Incident Response Plan in place. Join experts to learn the steps to create a plan for before, during and after a cyber incident, including sample incidents and appropriate response steps.