DISPELLING THE MYTHS OF CYBER-SECURITY

S P O N S O R E D F E AT U R E
FOCUS ON
DISPELLING THE
MYTHS OF
CYBER-SECURITY
Grigoriy Milis, chief technology officer at RFA (Richard Fleischman &
Associates), explains the misconceptions with cloud technology and
why most cyber risks can be efficiently mitigated
As CTO, Grigoriy
Milis is an IT veteran
with more than 15 years
of experience working in
the financial industry. He is
responsible for managing
all aspects of infrastructure
design and leads the R&D
team in the evaluation and
testing of new technologies. Milis also manages
the systems architecture
team that handles highlevel escalations from all
technical departments.
HFMWeek (HFM): Cloud technology has received a
lot of press coverage in the last year. Have any misconceptions about its security developed from this,
and is cloud technology more or less vulnerable than
more traditional IT storage systems?
Grigoriy Milis (GM): The main misconception around
cloud security is that it does not exist, and that it is impossible to secure the cloud. In actuality, the cloud is not
any more vulnerable to cyber-security threats than traditional IT systems located on premises. When it comes to
security, the issue is not about comparing cloud environments to traditional IT environments, but rather about
the methods utilised to protect either environment. In
addition, not all clouds are created equally. In a public
cloud environment, all data are typically accessed by a
shared application environment. This model requires
shared security, which requires a shared security context.
This model presents or creates more possibilities for cyber breaches when a breach suffered by one client might
compromise the rest of the clients. In comparison, in a
more secure cloud environment, clients are completely
isolated from each other, and while they do sometimes
share underlying platform hardware, all applications and
hardware are completely isolated and have no connection points whatsoever.
HFM: How far has cyber-security developed in the
last year? Has it kept up with the pace of evolving attack strategies?
GM: Cyber-attack methods have continued to evolve
drastically, and hedge funds and other investment
management firms are struggling to keep pace and stay
adequately protected. As a result of ever evolving attack strategies, it is vital for firms to employ a variety of
security tools to ensure that their data stays protected,
including encryption, multi-factor authentication, intrusion detection and outsourced security consulting services. In order to keep up with the attack strategies, many
security vendors are developing next generation security
solutions that will become the front line of defence.
HFM: They say human error is the biggest cause of
successful cyber-attacks. Is this true and can this risk
be mitigated?
GM: Human error and negligence are a large part of
successful cyber-attacks, and while it is impossible to
3 0 A P R – 6 M AY 2 0 1 5
completely eradicate this type of risk, it can certainly be
mitigated. Firms should take time to implement policies,
procedures, and frequent employee training sessions related to cyber-security to ensure that attacks caused by
internal negligence are minimised. Trainings and policies should be focused on educating employees on security best practices, threat response plans and the various
types of security threats to improve awareness. Many of
the advanced attack strategies that plague financial firms
today can be extremely difficult to detect and often come
in the form of an innocuous looking email or phone call.
HFM: What does the RFA cloud offer?
GM: The RFA Cloud Platform is a complete Infrastructure-as-a-Solution (IaaS) offering that enables firms
of all sizes to move applications and data from on-site
servers to the hosted model. RFA develops customised
cloud solutions that are aligned with specific firm needs
and specifications. All clients are designated a separate,
private piece of RFA designed infrastructure in which
all data resides. In addition to providing on-demand
hosted infrastructure for firms that require agility, security and reliability and the daily demands of file hosting
and data storage, the RFA Cloud Platform also includes
a production environment supported by leading-edge
hardware and software, real time DR replication to secondary data centres, intrusion detection services and
nightly data backups.
HFM: What security protocol does it have in place?
GM: The RFA Cloud is supported 24/7/365 by dedicated staff in private, SOC 1/2 SAS70/SSAE16 Type II
audited data centres to ensure maximum reliability and
regulatory compliance. Additionally, all data centres adhere to SEC/FINRA/FCA standards and retain strict
AS A RESULT OF EVER EVOLVING
ATTACK STRATEGIES, IT IS VITAL FOR
FIRMS TO EMPLOY A VARIETY OF
SECURITY TOOLS TO ENSURE THAT
THEIR DATA STAYS PROTECTED
”
perimeter protection and internal protocols, including
a proprietary password and access management system.
As part of the RFA Cloud offering, clients receive a range
of comprehensive security protections, including managed backup, intrusion detection, master data management (MDM), web filtering, next-generation firewalls
and data encryption services.
HFM: How is RFA looking to stay ahead of the game
in cloud security in the coming years?
GM: RFA invests substantial effort in working with the
most advanced emerging security vendors in order to
shape and improve product development. Additionally, RFA continues to partner with the largest and established security vendors in order to leverage their vast
expertise and product portfolio for clients. n
H F M W E E K . CO M 33