Millennials Possible Threat to Cybersecurity
As digital natives, the younger generation is not used to being given guidelines on how to use technology within a firm, panelists said.

John Polis, chief technology officer for Star Mountain Capital, said during the North American Buy-Side Technology Summit that security training for the younger generation should emphasize the importance of protecting professional data.
“The younger generation has a different sense of technology. They’ve grown up with technology, the internet, and they think once you click on something you should be able to get around easily and not really worry about anything,” Polis said. “They’re the ones who probably pose a bigger threat so we really focus on educating them extensively.”
He added that firms need to personalize the impact of cyber threats rather than talk about the harm to the business to really hammer in the importance of security.
MacKay Shields managing director and head of global information technology Anthony Vigilante, who moderated the panel, said millennials entering the workforce have grown up with smartphones that can be wiped if compromised, and they may no longer be very familiar with a desktop computer, which is difficult to protect from cyber threats.
But it is not just the younger generation that needs to undergo cybersecurity training. Polis said education should be at the core of information technology protection policies. The good news, he said, is that employees are more receptive.
“We’re not getting pushback anymore when we ask for devices to be upgraded for security,” Polis said.
Cybersecurity education also includes constant reminders about email security, other panel members said, particularly because phishing scams still continue today and are more targeted than ever before. Vulnerable individuals like the company’s chief financial officer should be taken aside and given additional training on how to know if they are being targeted in a scam. Everyone in the firm is encouraged to question every email received and if in doubt to contact the cybersecurity team immediately.
The work of monitoring extends to third-party service providers as well. BNY Mellon Investment Management chief security information officer Jeff Brown said it’s important to lay down expectations from third and fourth parties early.
“One of the key points with third-party services is that they may be a third party but it’s your risk,” Brown said. “There are going to be a lot of questions about your policies so we have to think about contracts right from the start, make sure expectations are legally outlined and make sure that we have a level of ongoing monitoring over our third and fourth parties.”
If service providers update a system and do not sufficiently inform the bank or fund, any issue may be hard to identify and when it comes out to the press, it is the financial institution that could be blamed, he added.
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: https://subscriptions.waterstechnology.com/subscribe
You are currently unable to print this content. Please contact info@waterstechnology.com to find out more.
You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.
Copyright Infopro Digital Limited. All rights reserved.
As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (point 2.4), printing is limited to a single copy.
If you would like to purchase additional rights please email info@waterstechnology.com
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (clause 2.4), an Authorised User may only make one copy of the materials for their own personal use. You must also comply with the restrictions in clause 2.5.
If you would like to purchase additional rights please email info@waterstechnology.com
More on Regulation
DORA delay leaves EU banks fighting for their audit rights
The regulation requires firms to expand scrutiny of critical vendors that haven’t yet been identified.
Citi gears up for EU T+1 climb
The bank has a dedicated team examining what it needs to do to ensure a successful transition to T+1 in Europe.
The great disappearing internet—and what it could mean for your LLM
AI-generated content, bots, disinfo, ads, and censorship are killing the internet. As more of life continues to happen online, we might consider whether we’re building castles atop a rotting foundation.
AI’s next gig: The rising cost of off-channel communications compliance
As the cost of analyzing communications increases, what tools can firms deploy to save time and money while avoiding penalties?
CAT on life support after appeals court ruling
Ahead of a comprehensive review promised by the SEC, lawyers believe that the recent overturn of the Consolidated Audit Trail’s funding order could herald its demise.
Euroclear readies upgrade to settlement efficiency platform
Euroclear, Taskize, and Meritsoft are working together to deliver real-time insights and resolution capabilities to users settling with any of Euroclear’s CSDs.
Messaging’s chameleon: The changing faces and use cases of ISO 20022
The standard is being enhanced beyond its core payments messaging function to be adopted for new business needs.
TT partners Thoma Bravo, Fitch launches GenAI solution, AI infrastructure woes, and more
The Waters Cooler: EquiLend acquires Trading Apps, Ultumus and BMLL partner for ETF data and analytics, and more in this week’s roundup.