At GAIM Ops Cayman, Anthony J. D’Ambrosi, CEO of Abacus Group, moderated a panel with two multi-billion-dollar investment managers, tackling the cyber threat landscape facing alternative investment firms. The session titled “Going Undercover: 2025 Cyber Threats Targeting Alternative Investment Firms” offered real-world perspectives on what’s working, what’s evolving, and what is keeping firms on high alert.
This recap captures the core themes and actionable insights shared during the conversation, spanning everything from data governance to AI-driven defense.
The session opened with a nod to the SEC’s 2025 exam priorities, which specifically calls out data loss prevention. This set the stage for a discussion on how firms are stepping up their efforts around data visibility, classification, and access control.
Many are leveraging automated tools to identify where sensitive data lives, especially personally identifiable information and financial records. With global regulations like GDPR, SEC Reg-SP, and DORA in effect, firms are expected to treat data governance as a central pillar of their security program.
It was noted that security efforts must “take a holistic approach to the entire infrastructure,” understanding the architecture from top to bottom and identifying all digital “entrances and exits.” Knowing what data you have and where it is stored is the foundation for preventing breaches and maintaining compliance.
Most firms now operate in a hybrid cloud environment that combines on-premise systems with public cloud infrastructure. While platforms like Microsoft 365 have become standard, migrating legacy systems into modern cloud architecture remains complex.
The panel emphasized that for newer firms, full cloud adoption is often the default. But for many legacy firms, that path is far less straightforward. Older infrastructure often isn’t built with public cloud compatibility in mind, and migration can introduce more risk than reward if not handled carefully. In some cases, maintaining a hybrid environment, rather than forcing a full shift, can be the more secure option.
Firms are also investing in advanced security techniques like microsegmentation and zero trust frameworks to contain threats and enforce strict access controls. The takeaway was clear: hybrid cloud is here to stay, but securing it requires more than standard configuration. It takes a strategic approach to architecture, training, and constant vigilance.
Technology may form the first layer of defense, but human behavior still determines whether it holds. The panel highlighted that successful firms are embedding cyber awareness into daily operations, moving beyond annual training to continuous reinforcement. That includes frequent phishing simulations, monthly bite-sized trainings, and even red-team-style social engineering tests to evaluate real-world readiness.
These aren’t just compliance exercises—they help foster an organizational culture where every employee takes ownership of cyber risk. Internal teams are now expected to recognize and report anomalies, even when the threat is subtle or disguised.
As firms mature their security programs, leadership alignment and cultural buy-in are proving just as critical as the tech stack itself.
Artificial intelligence is rapidly becoming a central force in cybersecurity strategy. The conversation explored how AI is helping teams automate workflows, normalize unstructured data, and enhance surveillance over electronic communication. The ability to detect behavior-based risks and filter out false positives is becoming essential in environments saturated with digital noise.
At the same time, AI is also enabling more sophisticated cyber threats. Deepfakes, synthetic voice attacks, and AI-generated phishing content are growing in both quality and frequency. The panel stressed that strong vendor management and robust data governance are essential safeguards, especially when third-party tools incorporate sensitive data into AI models.
Machine learning isn’t a magic solution. But when implemented responsibly, it plays a powerful role in both identifying threats and optimizing day-to-day security operations.
This panel made it clear that the stakes have never been higher. Regulatory expectations are increasing, threat actors are growing more sophisticated, and the pace of technological change is accelerating. Thriving in this environment requires a proactive, integrated approach to cybersecurity. That includes robust data management, secure cloud operations, strong cultural awareness, and responsible use of AI.
Cybersecurity is no longer just about protecting systems. It is about protecting trust, reputation, and the future of the firm.
Abacus Group partners with firms to build resilient, secure, and scalable technology environments. Contact us to learn how we support cybersecurity readiness across the alternative investments space.
These Stories on Blog