CYBER 101

  • Alerts
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Documents
  • Domains
  • Entertainment
  • FAQ
  • Incidents
  • Quotes
  • Tools
  • Tutorials

Join our newsletter

FOLLOW US

Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial
No Result
View All Result

“We want to see adequate protective…”

Charles Somers

1 min read
in Cyber Citizens, Investors, Quotes

 

“We want to see adequate protective systems and controls in place, rigorous and systematic testing of these systems and controls, and regular updates of security software. It’s important to us too that there’s appropriate training of employees and suppliers and that the security team use external specialists to keep up-to-date with industry trends and best practice.” Charles Somers – Portfolio Manager at Schroders

Source: Schroders

About Charles Somers

Charles Somers joined Schroders in 1998. Between 1998 and 2006 he was an analyst covering various sectors and spent time on a secondment in New York as a US equity analyst and fund manager. In 2006 he joined Intrinsic Value Investors before returning to Schroders in 2008 where he is now lead fund manager of the Schroder ISF Global Demographic Opportunities Fund and the global sector specialist for consumer sectors within the global and international equities team. Somers is a CFA charterholder and he enjoys music in his spare time.

Related

Tags: Charles SomersCyber CitizensCybersecurityInfosecInvestorsInvestors Quotesquotes
27
VIEWS
ADVERTISEMENT

Related Posts

“App stores are filled with applications that…”

“App stores are filled with applications that…”

July 22, 2022
“Cybersecurity threats are evolving as…”

“Cybersecurity threats are evolving as…”

July 18, 2022
“Cybersecurity threats are evolving as…”

“Cybersecurity threats are evolving as I speak…”

July 18, 2022
“Startups are incredibly vulnerable to…”

“Startups are incredibly vulnerable to…”

July 18, 2022

More Articles

Malicious software: System or boot-record infectors

September 22, 2020
Alerts

Mozilla Security Advisory – Thunderbird

November 3, 2021
Alerts

Atlassian Releases Security Advisory

June 2, 2022
Alerts

PingPull APT remote access tool

June 13, 2022
Alerts

Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities

November 17, 2021
Alerts

Kaseya VSA Supply-Chain Ransomware Attack

July 2, 2021
Incidents

Crypto scammers have reportedly stolen ₹1000 crore off Indian users

June 22, 2022

Hacker Highschool

May 14, 2021
Load More

World’s number one cybersecurity repository. Find everything you need about cybersecurity.

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Attackers
    • Incidents
    • Threats
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Quotes

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.