fbpx
Reports & Whitepapers

Security Ledger works with its clients and underwriters to produce research reports and whitepapers on a variety of information/cyber security topics. See the list below for examples of some of our recent work. Use the link provided to download and read our research reports and whitepapers.


Bastille Networks: Cellular and IoT on Wall Street: Changes in Compliance Requirements, Cellular and IoT Devices in Capital Markets

Bastille Networks: Cellular and IoT on Wall Street: Changes in Compliance Requirements, Cellular and IoT Devices in Capital Markets

Webinars
  • The securities industry has among the most stringent regulations of any industry on communications. And with good reason. With hundreds of billions of dollars at stake on any given day, ensuring the integrity of markets and trades is critical. But as the avenues for communication have expanded from telephones to pagers to mobile phones, texting, social media and – now- wearable devices, regulated firms and their employees face ever more scrutiny and risk.

What’s the best approach to securing these borderless wireless and wired environments? On April 27th, 2017 Security Ledger hosted a webinar that brought together securities law, compliance, Internet of Things and cyber security specialists for an in-depth discussion of capital markets compliance in the face of ever more sophisticated technologies and the changing regulations around trade compliance in the EU and US.

Bastille Networks: Deconstructing the top IoT Attacks of 2016

Bastille Networks: Deconstructing the top IoT Attacks of 2016

Webinars

As 2016 has come and gone, it is time to review the top Internet of Things Attacks of 2016. What can we learn from these attacks in order to be more prepared for the inevitable increase in internet connected threats in 2017?

The IoT attacks and vulnerabilities discussed are:
– Mirai BotNet
– The ZigBee worm
– Rogue Cell Tower in a Printer
– Eavesdropping devices
– Pagers and Critical Infrastructure

Bastille Networks: Managing BYOD Risk

Bastille Networks: Managing BYOD Risk

Webinars

Bring your own device (or BYOD) may be standard policy at your organization. But it is also a serious and unmanaged risk to the security of your corporate network, sensitive data and intellectual property. Join Bastille Networks and Security Ledger to learn how undetected cellular devices including smart phones can provide access to your sensitive IT assets and how forward looking firms are tapping new tools to identify, track and manage cellular and wireless devices in their environment.

Bastille Networks: Who let the IoT in?

Bastille Networks: Who let the IoT in?

Webinar

Paul speaks with Bastille Chief Engineer Bob Baxley, Drew Fry of PWC’s Cyber Threat Detection group and Ted Harrington of Independent Security Evaluators about how Internet of Things devices are working their way into enterprise IT environments.

BeyondTrust: Crush Common Cybersecurity Threats with Privileged Access Managenment

BeyondTrust: Crush Common Cybersecurity Threats with Privileged Access Managenment

Webinars
  • Post-mortem analysis of recent cybersecurity attacks and how you could mitigate against similar threats
  • Evaluation of password breakdowns in protecting your organization
  • Review of a high level threat model of privileged accounts
  • How Privilege Access Management can significantly reduce your attack surface and improve your cybersecurity posture

Tune into this session, which help you better grasp how you can reduce risk and shutdown multiple attack vectors by maturing various privileged management controls.

GreatHorn Inc.: Stop Business Email Compromise Attacks with Full Lifecycle Email Security

GreatHorn Inc.: Stop Business Email Compromise Attacks with Full Lifecycle Email Security

Webinars

Email security requires a more holistic approach to guard against business email compromise, impersonations, and credential theft attacks. In this webinar, security expert Paul Roberts of Security Ledger and GreatHorn CEO Kevin O’Brien discuss the limits of awareness training, how to make it more effective, the importance of integrated incident response, and why “100% prevention” should be a red flag.

LookingGlass Cyber Solutions: Proactive Cybersecurity: Modeling Adversarial Behavior

LookingGlass Cyber Solutions: Proactive Cybersecurity: Modeling Adversarial Behavior

Webinars

Cyber threats are becoming more frequent and more targeted. Bad actors are more adept at social engineering and investigating your network and infrastructure to understand your organization’s cyber strengths and weaknesses. Security teams need to focus on who or what will seek to exploit them and how they are likely to do so, instead of being hyper-focused on just the threat itself.

This webinar delves into how one of the world’s top financial services firms developed and implemented a robust threat model capable of repelling the world’s most sophisticated hackers and nation-state actors. Join LookingGlass Product Manager, Dan Martin, and Security Ledger Editor-in-Chief, Paul Roberts for an introduction to scoutTHREAT™, a threat management platform that helps security analysts streamline threat analysis work and extract the maximum value from threat intelligence.

LookingGlass Cyber Solutions: The Round the Clock Third Party Advantage

LookingGlass Cyber Solutions: The Round the Clock Third Party Advantage

Webinars

Vendors, suppliers, and independent subsidiaries are gaining more and more access to your network and sensitive data because today’s business models include outsourcing of non-mission critical programs and tasks, which brings a whole new world of risk to your organization. These not so new cyber risks make traditional perimeter defense no longer enough. Companies need continuous visibility and monitoring of their external partners threat landscapes. Use a cyber situational awareness platform that provides you with a map of your cyber risks you can identify vulnerabilities before the adversary does.

In this webinar, LookingGlass Product Manager, Brandon Dobrec and Security Ledger Editor-in-Chief, Paul Roberts will discuss what you need to assess vendors in the modern cyber environment, providing you with the right map to assess your external risk.

LookingGlass Cyber Solutions: Surgical Threat Mitigation: Sharpen Your Response

LookingGlass Cyber Solutions: Surgical Threat Mitigation: Sharpen Your Response

Webinars

Cyber threat intelligence – when properly gathered, refined, and applied – can help organizations identify business risks and target both protections and mitigations. But what distinguishes high-quality and actionable threat intelligence from low-quality security “noise”? How are cutting edge CISOs and IT security teams applying threat intelligence to respond to incidents and slam shut windows of compromise?

Find out in this webinar moderated by Paul Roberts, the Editor in Chief at The Security Ledger. Paul will be joined by LookingGlass’ product manager Brandon Dobrec, and Chris Roberts, Founder, CISO, and Chief Geek of One World Labs, an assessment remediation, and research facility in the Front range area of Colorado. Together they will review the value of threat intelligence to organizations, discuss how cutting edge firms are using threat intelligence to their advantage, and review how to orchestrate threat intelligence to automate mitigation and combat third party risk.

RSA: Managing the Risk in your Digital Transformation

RSA: Managing the Risk in your Digital Transformation

Webinar

Google “digital transformation success strategies,” and you’ll get links to some great articles discussing the importance of strategy, executive leadership, talent and culture change. But what’s missing from many of these articles is a discussion of risk management. Risk management is an often over-looked key to successful digital transformation.

Find out why risk management is so critical and learn how companies are addressing digital risk in this upcoming webinar, the second in our C-Leader series on digital risk management. Join RSA and industry thought leaders as they discuss the top risk management challenges digital transformation presents and  share case studies of organizations that are effectively managing digital risk.

If you want your organization’s digital transformation initiatives to pay off, you need to learn to manage the risks.

DUO: Security for the People: End-User Authentication Security on the Internet

DUO: Security for the People: End-User Authentication Security on the Internet

Webinars

Despite the continued success by attackers to brute-force accounts, phish credentials, and otherwise impact the online security of consumers, a large portion of the sites and services consumers utilize still don’t take authentication security seriously enough.

This presentation reviews security expert Mark Stanislav’s recent research into the state of end-user-facing authentication security as it relates to strong authentication, transport security, breach history, security transparency, and complementary browser security features.


Comments are closed.