MPCH’s Post

View organization page for MPCH, graphic

15,098 followers

🔔 We are very proud to highlight the insightful article by our trusted advisor, Hadley Stern, featured in Blockworks: Wall Street isn’t ready to manage crypto ETFs. In his piece, Hadley articulates crucial points on the security challenges facing crypto ETFs: 1. Concentration of Custodians: Many ETF issuers rely on a few custodians like Coinbase, creating centralization and counterparty risk. 2. Need for Robust Security Solutions: Stronger security measures are necessary to handle the large inflows and complexities of crypto ETFs. 3. Key Management Practices: Proper cryptographic key management is critical to prevent irreparable loss from cyber-attacks. 4. Adaptation of Traditional Finance: Wall Street institutions must adapt to the unique challenges of managing crypto assets to ensure security and trust. At MPCH, we fully support Hadley's perspective on the need for advanced security measures and the vital role of mature infrastructure providers. His expertise underscores the importance of creating resilient and secure frameworks to safeguard investments and ensure long-term stability in the crypto space. As we continue to innovate and strengthen our offerings, we're committed to integrating these principles and leading the way in secure infrastructure solutions. Thank you, Hadley, for your valuable insights and ongoing contributions to the industry. #Bitcoin #Crypto #ETFs #Security #Infrastructure #Innovation #MPCH https://lnkd.in/dBHEJrk5

Wall Street isn’t ready to manage crypto ETFs

Wall Street isn’t ready to manage crypto ETFs

blockworks.co

Mike Anderson, CPP, PSP

Director, Risk Solutions at Crisis24 🚀 Enabling business leaders to operate with confidence anywhere in the world.

1mo

Great insights from Hadley Stern and I totally agree that the need for stronger security practices are necessary for the crypto ETFs to continue to grow. Much can be learned from enterprise software organizations that have developed strong physical security programs over the past 30 years to protect the cryptographic operations processes.

To view or add a comment, sign in

Explore topics