NASDAQ BGCP 5.50 +0.01 +0.18% Volume: 1,283,995 October 21, 2021

BGC Cyber-Security Policy

BGC PARTNERS, INC.
CYBER-SECURITY PROGRAM POLICY STATEMENT

BGC Partners, Inc. (“BGC”) has approved the following global policy with respect to BGC and its subsidiaries.

The following policy reflects its commitment to cyber-security and forms part of its governance standards.

Expand All

Commitment

BGC is committed on a global basis to combatting the global threat of cyber-security and to securing its business to operate with confidence, through a deep understanding of cyber risks, vulnerabilities, mitigations, and threats.

Program Measures

BGC’s cyber-security program supports the following organizational missions:

  • Protect the Company’s people, technology and assets from outside threats
  • Protect the Company’s data from accidental and malicious disclosure
  • Protect the Company from insider threats

The program has been established under an umbrella of current global policies and standards, including ISO-27000 and NIST-800. Controls are framed through the CIS20 and their effectiveness is illustrated via the NIST CSF. The program is updated and revised frequently in response to evolving global standards and events.

Governance

The Information Security Group is led by BGC’s Chief Information Security Officer (the “CISO”), who reports to senior management frequently and to the Company’s Board of Directors on a periodic basis. The CISO provides governance for all information security matters, including priorities, setting the supporting strategies and developing the Information Security Group to deliver the cyber-security program.

The Information Security Group provides cyber defense, operations, architecture, engineering, cyber risk and threat management. The Information Security Group also engages in:

  • Regular liaisons with industry and government to keep pace with the evolving threats;
  • Expert third parties to evaluate and monitor the effectiveness of the program; and
  • Developing policies, documented operational procedures and regular cyber-security employee and Board training globally.