DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Quotes

“We want to see adequate protective…”

Charles Somers

Reading Time: 1 min read
in Cyber Citizens, Investors, Quotes

 

“We want to see adequate protective systems and controls in place, rigorous and systematic testing of these systems and controls, and regular updates of security software. It’s important to us too that there’s appropriate training of employees and suppliers and that the security team use external specialists to keep up-to-date with industry trends and best practice.” Charles Somers – Portfolio Manager at Schroders

Source: Schroders

About Charles Somers

Charles Somers joined Schroders in 1998. Between 1998 and 2006 he was an analyst covering various sectors and spent time on a secondment in New York as a US equity analyst and fund manager. In 2006 he joined Intrinsic Value Investors before returning to Schroders in 2008 where he is now lead fund manager of the Schroder ISF Global Demographic Opportunities Fund and the global sector specialist for consumer sectors within the global and international equities team. Somers is a CFA charter holder and he enjoys music in his spare time.

Tags: Cyber CitizensCybersecurityInfosecInvestorsInvestors Quotesquotes
ADVERTISEMENT

Related Posts

“Cyber-crime syndicates behind current…”

“Attackers are moving beyond basic web…”

March 21, 2023
“Cyber-crime syndicates behind current…”

“As-a-service software is so dangerous…”

March 21, 2023
“Cyber-crime syndicates behind current…”

“Cyber-crime syndicates behind current…”

March 21, 2023
“People are the weakest link from a cyber…”

“People are the weakest link from a cyber…”

March 16, 2023

More Articles

Ukraine arrests RAT malware developer

March 20, 2023
Cyber Review

Cyber Review: Healthcare Email Dangers

January 25, 2022
Document

Family Online Rules

September 30, 2022
Incidents

California Medical Group’s Ransomware Breach Affects 3.3M

February 13, 2023
Cyber101

Hybrid Entity – Definition

April 4, 2022

Clicker the Cat: Online Children’s Book about Internet Safety Ages 6-8 Preschool

December 14, 2021
Incidents

Royal ransomware claims attack on Queensland University of Technology

January 4, 2023
Alerts

CISA Adds One Known Exploited Vulnerability

May 10, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.