Cyberguide by TPR, Apollo dazzles, FRC updates standards – the highlights.

December 15, 2023
1 min read

Key points:

  • The Pensions Regulator (TPR) updates its cyber security guidance
  • Apollo Global Management is considering a bid for the Pension Insurance Corporation
  • The Financial Reporting Council (FRC) has published revised standards for pensions

This week saw significant activity in the world of pensions, with important updates coming from the Pensions Regulator (TPR), Apollo Global Management, and the Financial Reporting Council (FRC).

The TPR updated its cyber security guidance, reflecting a continued focus on strengthening cyber security in the pensions sector. This update aims to enhance the industry’s robustness against cyber attacks, ensuring the safety of stakeholders’ information and assets.

In investment news, Apollo Global Management is considering a bid for the Pension Insurance Corporation (PIC). This potential move signifies the growing interest in the pensions sector from private equity firms and could result in significant changes in the pensions landscape.

Lastly, the FRC has published its revised standards for pensions. This publication demonstrates the regulatory body’s commitment to consistently improving the industry’s operational standards and compliance with legal requirements.

These developments highlight ongoing efforts to improve and secure the pensions industry, from enhancing cyber security to potential investment deals and updated regulatory standards. They underline the dynamic nature of the sector, reiterating the need for constant vigilance and adaptation to maintain optimal operations and safeguard stakeholders’ interests.

The digital edition of these updates and more can be found in the archive of Professional Pensions, providing comprehensive coverage on the latest in pensions news, investment, administration, and regulation.

Latest from Blog

Apache’s OFBiz gets new fix for RCE exploits

TLDR: Apache released a security update for OFBiz to patch vulnerabilities, including a bypass of patches for two exploited flaws. The bypass, tracked as CVE-2024-45195, allows unauthenticated remote attackers to execute code