Goldman Sachs 2015 Annual Report Download - page 45

Download and view the complete annual report

Please find page 45 of the 2015 Goldman Sachs annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 236

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236

THE GOLDMAN SACHS GROUP, INC. AND SUBSIDIARIES
Despite the resiliency plans and facilities we have in place,
our ability to conduct business may be adversely impacted
by a disruption in the infrastructure that supports our
businesses and the communities in which we are located.
This may include a disruption involving electrical, satellite,
undersea cable or other communications, internet,
transportation or other services facilities used by us or third
parties with which we conduct business, including cloud
service providers. These disruptions may occur as a result of
events that affect only our buildings or systems or those of
such third parties, or as a result of events with a broader
impact globally, regionally or in the cities where those
buildings or systems are located, including, but not limited
to, natural disasters, war, civil unrest, terrorism, economic
or political developments, pandemics and weather events.
Nearly all of our employees in our primary locations,
including the New York metropolitan area, London,
Bengaluru, Hong Kong, Tokyo and Salt Lake City, work in
close proximity to one another, in one or more buildings.
Notwithstanding our efforts to maintain business
continuity, given that our headquarters and the largest
concentration of our employees are in the New York
metropolitan area, and our two principal office buildings in
the New York area both are located on the waterfront of
the Hudson River, depending on the intensity and longevity
of the event, a catastrophic event impacting our New York
metropolitan area offices, including a terrorist attack,
extreme weather event or other hostile or catastrophic
event, could negatively affect our business. If a disruption
occurs in one location and our employees in that location
are unable to occupy our offices or communicate with or
travel to other locations, our ability to service and interact
with our clients may suffer, and we may not be able to
successfully implement contingency plans that depend on
communication or travel.
A failure to protect our computer systems, networks
and information, and our clients’ information, against
cyber attacks and similar threats could impair our
ability to conduct our businesses, result in the
disclosure, theft or destruction of confidential
information, damage our reputation and cause losses.
Our operations rely on the secure processing, storage and
transmission of confidential and other information in our
computer systems and networks. There have been several
highly publicized cases involving financial services and
consumer-based companies reporting the unauthorized
disclosure of client or customer information in recent years,
as well as cyber attacks involving the dissemination, theft
and destruction of corporate information or other assets, as
a result of failure to follow procedures by employees or
contractors or as a result of actions by third parties,
including actions by foreign governments.
We are regularly the target of attempted cyber attacks,
including denial-of-service attacks, and must continuously
monitor and develop our systems to protect our technology
infrastructure and data from misappropriation or
corruption. In addition, due to our interconnectivity with
third-party vendors, central agents, exchanges, clearing
houses and other financial institutions, we could be
adversely impacted if any of them is subject to a successful
cyber attack or other information security event.
Despite our efforts to ensure the integrity of our systems
and information, we may not be able to anticipate, detect or
implement effective preventive measures against all cyber
threats, especially because the techniques used are
increasingly sophisticated, change frequently and are often
not recognized until launched. Cyber attacks can originate
from a variety of sources, including third parties who are
affiliated with foreign governments or are involved with
organized crime or terrorist organizations. Third parties
may also attempt to place individuals within the firm or
induce employees, clients or other users of our systems to
disclose sensitive information or provide access to our data
or that of our clients, and these types of risks may be
difficult to detect or prevent.
Goldman Sachs 2015 Form 10-K 33