Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity NewsBanking/Finance/Insurance

A call for industry coordination around DLT security

By Stephen Scharf
The Long and Winding Road to Cyber Recovery
July 28, 2020

Over the last 50 plus years, technology has taken over financial services and is now a crucial part of how the industry continues to progress and succeed. In fact, over the course of a few short months, we’ve seen firsthand how technology has enabled success through our collective workforces’ ability to effectively work remotely. This recent shift to remote working is an important reminder of the value of consistently assessing and evolving technology approaches within organizations.

As the financial services industry moves toward an ever-greater dependence on technology, we must always keep an eye on the future to ensure that any new technological advancement or implementation delivers the same, if not better, benefits and risk management capabilities. One emerging area that has garnered a lot of attention in recent years is Distributed Ledger Technology (DLT) - a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time. In addition to verifying transactions, in its customized form for enterprises, DLT is used to control deliveries and monitor workplace operations. 

Yet while DLT holds great promise, there is currently no clear path around how to implement the technology in a way that addresses documented and evolving security risks. The adoption of any technology requires a robust cyber risk assessment, as cyber threats impact not only individual firms but can create systemic risk. For instance, a rise in tele/video-conferencing during the COVID-19 pandemic has been coupled with a rise in “Zoom-bombing.” This is just one reminder that, as an industry, we must anticipate the security consequences that come along with anything new and unproven. When considering emerging technology, firms have a responsibility to ensure that the systems are secure, for their benefit and the wider industry.

My team at DTCC along with other industry experts have taken a closer look at DLT from a risk management perspective, and over the course of that assessment, have identified some of the ways the technology can be introduced to promote the safety of the financial services ecosystem. DLT offers great potential, but with it comes risk. To address these gaps, DTCC, along with a number of our peers, key stakeholders and industry organizations like the Cloud Security Alliance and the InterWork Alliance are working to assess the range of risks from DLT in order to create a fulsome framework for approaching DLT implementations, before the technology reaches widespread adoption to create a meaningful, secure foundation.

 

Working towards an industry framework and standards

The focus on this critical topic by industry participants, key stakeholders and organizations is an important step towards the ultimate goal: the establishment of a strong industry framework incorporating commonly held best practices and a set of standards which create increased levels of DLT security across the industry. The framework should look at topics including risk management and oversight, cybersecurity controls, third-party management and incident  and event management. It will need to tackle these complex topics through a multi-dimensional perspective, first with risk evaluations across an individual firm’s security assessments, and then addressing all aspects of the DLT key management lifestyle. This framework should also provide further security guidance and practices to bridge the gap between DLT and traditional IT environments. Through these varying viewpoints, the framework and resulting standards should be able to address any DLT implementation consideration, without the rigidity of a one-size-fits-all approach.

Finally, a strong framework creates standards across the use of DLT, which can be invaluable by reducing fragmentation in the DLT ecosystem and creating a shared language. A detailed framework and established standards will create a DLT environment where each industry participant is singing from the same songbook, both in how they implement DLT in their firm and how they approach DLT and security impacts when working with others.

 

Act before wide implementation

DLT is still considered an emerging technology, but that is exactly why now is the moment to have these comprehensive and critical conversations across the industry. By bringing industry leaders together early in the technology’s development, risks can be effectively identified and addressed ahead of implementation. This can lead to the development of a robust framework, a standardized language around DLT technology and a strong foundation as this technology becomes commonplace.

Finally, and most importantly, ensuring on-going dialogue today will help to keep focus and momentum around this important and evolving topic. The steps taken by the Cloud Security Alliance, InterWork Alliance, market participants, technology and infrastructure providers and others are an important start to sharing current knowledge and practices. From there, the industry can create agreement around best practices, benchmarks and industry standards. It is clear that the potential of DLT is great, but we must work collectively now, across firms and organizations, to effectively address the foundational considerations around security and effective risk management for the benefit of all DLT implementations and the broader industry.

KEYWORDS: cyber security financial services information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Scharf stephen

Stephen Scharf is Chief Security Officer (CSO) at The Depository Trust & Clearing Corporation. With more than 25-years of experience in Information Technology and a twenty-year concentration in Information Security, Scharf is responsible for centralizing and aligning the firm’s global information security, physical security, employee safety, and crisis/incident management functions, ensuring a comprehensive and holistic approach to risk management and resilience across the organization. Previously, he worked at Experian where he served as Global Chief Information Security Officer, accountable for the overall strategy, leadership and governance of Experian’s global information security, physical security and business continuity programs. Prior to that, Scharf was Global Chief Security Officer for Bloomberg, LP. and Managing Security Architect for security consulting firm @stake. He has achieved the Certified Information Systems Security Professional (CISSP), and previously held certifications as Microsoft Certified Systems Engineer (MCSE), Checkpoint Certified Systems Engineer (CCSE), and Cisco Certified Network Administrator (CCNA). He is a regular speaker at security events, including talks at the United Nations. He has also authored multiple articles on security topics, including forensics, security administration, business continuity planning, and outsourcing. As part of his industry activities, Scharf  is currently a member of the Boards of Sheltered Harbor and the Financial Systemic Analysis and Resilience Center (FSARC). He was a member of the International Board of Directors for ASIS from 2011 to 2013. He has also served as a past member of the Advisory Board for the ASIS CSO Roundtable and a past member of the ASIS Committee for Enterprise Risk Management. He has also served on the Information Systems Security Association (ISSA) International Board of Directors. Scharf received a Bachelor of Arts degree from Ithaca College with a major in History and a minor in English.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-security-freepik1170x658x9.jpg

    Log4Shell a huge wake-up call for 95% of security leaders

    See More
  • Software-as-a-Service

    FIRST Updates Coordination Principles for Multi-Party Vulnerability Coordination and Disclosure

    See More
  • quantum

    A call to arms: Preparing for the quantum apocalypse

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!