SlideShare une entreprise Scribd logo
1  sur  29
Scott Perry CPA, CISA
Principal – Scott S. Perry CPA, PLLC
Audit Expertise
CISA since 1992
Owner of one of seven US WebTrust Firms
Auditor/Advisor of DigiCert – one of the
largest CAs
WebTrust Auditor of the US GSA and DoD
Big 4 Background – 25 + years in industry
PKI Audit SME
Blockchain Expertise
Member, Sovrin Governance Working Group
Author, Sovrin Trust Assurance Framework
Task Force Member – Payments and Compliance
Board of Advisors - CU Ledger
Governance Advisor – Corda and Corda Foundation
Advisor - Evernym
Drummond Reed
Chief Trust Officer - Evernym
Expertise
20 Years in Internet Identity
14 Years (all 29 instances) of Internet
Identity Workshop
15 Years in Internet Identity Standards
W3C
OASIS
IETF
OpenID Foundation
Hats
Chief Trust Office, Evernym
Trustee, Sovrin Foundation
Chair Sovrin Governance Framework
Working Group
Principal Investigator, U.S. DHS DID and
DKMS Projects
Co-Editor, W3C DID Spec
Topics
The Definition of Trust
Attributes of Digital Trust
Unique Attributes of Blockchain Trust
Novel Applications for Blockchains
Components of the Blockchain Trust Stack
Q&A
Definition of Trust
Miriam Webster:
“Assured reliance on the character, ability, strength or truth of
something or someone”
Associated Terms
HOPE, CREDIT, CARE, CUSTODY, BELIEVE, DEPEND
My Definition:
Predicted level of confidence in an attribute’s occurrence
Attributes of Trust
• Context
• Perception of Risk
• Calculated Vulnerability
• Benefit Value
• Established Reputation or Track Record
• Demonstrated Competence
• Foundational Optimism
• Underlying Motivation
Risks to Digital Trust
Human Frailty
Systems Development Life Cycle
Hardware Failures
Network Failures
Bad Actors
Criminal
Espionage
Corporate Competitiveness
AICPA Digital Trust Principles
Security
Availability
Confidentiality
Privacy
Processing Integrity
Trust Criteria
Procedures
&
Operations
Information
Technology
Criteria Accreditation Body
TRUST
F
R
A
M
E
W
O
R
K
Vendor
Attest
Standards
Attest
Criteria
Audit Accreditation
Body
Auditor
Accredits
Applies
Provides Evidence
Asserts Compliance
Creates
Attest
Guidance
C
r
e
a
t
e
s
U
p
d
a
t
e
s
Evaluates
Relies Upon
Issues TrustMark/Seal
Oversees
Referential Trust Model
Users
What is a Blockchain?
• Database
• Records Cryptographically Linked
• Redundant Copies Replicated among Stewards /
Nodes
• Consensus Protocol – Who gets to write a new
record
• Ability to execute automated processes using
Smart Contracts
• Can interoperate with Digital Currency
Digital Trust Attributes of Blockchain
Networks
Immutability
Non-repudiation
Zero-Knowledge Proof
Redundancy
Availability
The Hyperledger Greenhouse
Bruce Schneier Comments on Trust
2018 Hyperledger Conference
“Blockchain shifts trust in people and institutions to
trust in technology”
Bruce Schneier Comments on Trust
February 2019 Blog
(https://www.schneier.com/blog/archives/2019/02/blockchain_and_.html)
• What blockchain does is shift some of the trust in people and
institutions to trust in technology. You need to trust the
cryptography, the protocols, the software, the computers and the
network. And you need to trust them absolutely, because they're
often single points of failure.
• Blockchain doesn't eliminate the need to trust human institutions.
There will always be a big gap that can't be addressed by
technology alone. People still need to be in charge, and there is
always a need for governance outside the system.
Novel Uses for Blockchains
• Provenance
• Diamonds
• Title
• Assets
• Supply Chain
• Stored Value
• Cryptographic Token
• Stored Value – Mileage Points, Timeshare Exchange
• Transaction Record
• Financial Exchange
• Books of Record
• Self Sovereign Identity
• Verifiable Credentials
SSI in a nutshell
16
The Self-Sovereign Identity (SSI) Model
Blockchain
Connection
Digital Wallet
w/ Private Keys
& Credentials
Digital Wallet
w/ Private Keys
& Credentials
Your Agent Peer Agent
Public Key Public KeyDIDDID
Solves the decentralized PKI (public key infrastructure) problem for
verifying digital signatures on digital credentials
The Verifiable Credential Trust Triangle
Holder/
Prover
Issuer Verifier
Verifiable
Credential
Proof
Trust
Blockchain
Public KeyDID
Write Read
Sign
✗No integration needed!
Verify
The Verifiable Credential Trust Triangle
Displays Audit Accreditor
Credential
Policies &
Procedures
Information
Technology
Governance Authority
TRUST
F
R
A
M
E
W
O
R
K
Trust Anchor
Accreditor
Standards
Attest
Criteria
Audit
Accreditor
Auditor
Accredits
Applies
Provides Evidence
Asserts Compliance
Creates
Attest
Guidance
Evaluates
Relies Upon
Issues Auditor Credential
Oversees
Level 3
Criteria
Level 2 Criteria
Level 1 Criteria
Credential Registry
Issues Trust Anchor and
Credential Registry Credentials
Displays Auditor
Credential
Displays Trust Anchor Credential
Accredits
Issues Audit Accreditor
Credential
Creates
Updates
Issues Credentials
Complianc
e Reports
AssertsCompliance
Applies
Referential Trust Model
Blockchain Referential Trust Model
Layer One:
DID Registries
(Public Ledgers)
Layer Two:
DIDComm
Agent/Wallet/Hub
Connection
Pairwise Pseudonymous Peer DIDs
Issuer Verifier
Holder
Trust
Layer Three:
Credential
Exchange
Verifiable
Credentia
l
Agent/Wallet/Hub
Layer Four:
Governance
Frameworks
Trust
Anchor
Insurer
Governance
Authority
Auditor Auditor
Accreditor
Credential
Registry
Hardware
Developer
Software
Developer
Agency
Transaction
Author
Transaction
Endorser
Steward
DID
Method
DID Registry
DID
Method
DID Registry
DID
Method
DID Registry
Trust over IP Technology Stack Trust over IP Governance Stack
Network Governance Frameworks
Provider Governance Frameworks
Credential Governance Frameworks
Technical Trust
Human Trust
Governance
Authority
Publishes
Governance
Framework
Metasystem Governance Frameworks
Proof
Trust Over IP Stack
Blockchain Trust Layers
Governance
User
Data
Ledger
System
Centric
Human
Centric
Ledger Management Layer
Steward/Node Agreements
Consensus Protocol
Role of Validators and Observers
Blockchain Code
Compute Power
Network Availability
Fork Management
Data Management Layer
Read Access
Write Access
Tombstones
Smart Contracts
Token Management
User Management Layer
Permissioned / Permissionless Systems
Trusted Roles
Administrators
Users
IAM Systems
Enrollment
Provisioning
Network Governance Layer
Risk Assessment / Management
Trust Criteria
Policies
Procedures
Trust Principles
Voting Protocol
Audit / Accreditation
Warranty / Insurance
Legal / Regulatory
History Repeating Itself?
Age of the Internet
• Internet Service Providers
• America Online
• CompuServe
• EarthLink
• Communication Innovators
• Modem
• DSL/Satellite/Cable
• Browsers
• World Wide Web
• Mosaic
• Netscape Navigator
• Communications Protocol
• TCP/IP
Age of The Blockchain
• Blockchain Networks
• Sovrin
• Corda
• BitCoin
• Communication Innovators
• 5G
• Fiber Optics
• SmartPhone
• Digital Wallets
• Phone Apps
• Smart Contracts
• Communications Protocol
• Trust Over IP
Blockchain Training Courses
on sight…
Exam and certification fees will be included in the training price.
www.pecb.com/events
THANK YOU
?
scott@scottperrycpa.com https://www.linkedin.com/in/scott-perry-1b7a254/
Drummond.reed@Evernym.com https://www.linkedin.com/in/drummondreed/

Contenu connexe

Tendances

Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Ignyte Assurance Platform
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
PECB
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
 
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Ulf Mattsson
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
PECB
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 

Tendances (20)

Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security Simulation
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
 

Similaire à Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in 2020

Jerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).pptJerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).ppt
MehediHasanShaon1
 

Similaire à Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in 2020 (20)

Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
 
How to Integrate Blockchain Technology into Your Applications
How to Integrate Blockchain Technology into Your ApplicationsHow to Integrate Blockchain Technology into Your Applications
How to Integrate Blockchain Technology into Your Applications
 
Blockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership EditionBlockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership Edition
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Vinod Rebello
Vinod RebelloVinod Rebello
Vinod Rebello
 
Introduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business OpportuntiesIntroduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business Opportunties
 
ATAGTR2017 Blockchain Based Testing
ATAGTR2017 Blockchain Based TestingATAGTR2017 Blockchain Based Testing
ATAGTR2017 Blockchain Based Testing
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Blockchain Introduction - Canada Nov 2017.pptx
Blockchain Introduction - Canada Nov 2017.pptxBlockchain Introduction - Canada Nov 2017.pptx
Blockchain Introduction - Canada Nov 2017.pptx
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
 
Jerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.pptJerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.ppt
 
Jerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).pptJerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).ppt
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
What's in Blockchain For Chartered Accountants
What's in Blockchain For Chartered AccountantsWhat's in Blockchain For Chartered Accountants
What's in Blockchain For Chartered Accountants
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 

Plus de PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

Plus de PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in 2020

  • 1.
  • 2. Scott Perry CPA, CISA Principal – Scott S. Perry CPA, PLLC Audit Expertise CISA since 1992 Owner of one of seven US WebTrust Firms Auditor/Advisor of DigiCert – one of the largest CAs WebTrust Auditor of the US GSA and DoD Big 4 Background – 25 + years in industry PKI Audit SME Blockchain Expertise Member, Sovrin Governance Working Group Author, Sovrin Trust Assurance Framework Task Force Member – Payments and Compliance Board of Advisors - CU Ledger Governance Advisor – Corda and Corda Foundation Advisor - Evernym
  • 3. Drummond Reed Chief Trust Officer - Evernym Expertise 20 Years in Internet Identity 14 Years (all 29 instances) of Internet Identity Workshop 15 Years in Internet Identity Standards W3C OASIS IETF OpenID Foundation Hats Chief Trust Office, Evernym Trustee, Sovrin Foundation Chair Sovrin Governance Framework Working Group Principal Investigator, U.S. DHS DID and DKMS Projects Co-Editor, W3C DID Spec
  • 4. Topics The Definition of Trust Attributes of Digital Trust Unique Attributes of Blockchain Trust Novel Applications for Blockchains Components of the Blockchain Trust Stack Q&A
  • 5. Definition of Trust Miriam Webster: “Assured reliance on the character, ability, strength or truth of something or someone” Associated Terms HOPE, CREDIT, CARE, CUSTODY, BELIEVE, DEPEND My Definition: Predicted level of confidence in an attribute’s occurrence
  • 6. Attributes of Trust • Context • Perception of Risk • Calculated Vulnerability • Benefit Value • Established Reputation or Track Record • Demonstrated Competence • Foundational Optimism • Underlying Motivation
  • 7. Risks to Digital Trust Human Frailty Systems Development Life Cycle Hardware Failures Network Failures Bad Actors Criminal Espionage Corporate Competitiveness
  • 8. AICPA Digital Trust Principles Security Availability Confidentiality Privacy Processing Integrity
  • 9. Trust Criteria Procedures & Operations Information Technology Criteria Accreditation Body TRUST F R A M E W O R K Vendor Attest Standards Attest Criteria Audit Accreditation Body Auditor Accredits Applies Provides Evidence Asserts Compliance Creates Attest Guidance C r e a t e s U p d a t e s Evaluates Relies Upon Issues TrustMark/Seal Oversees Referential Trust Model Users
  • 10. What is a Blockchain? • Database • Records Cryptographically Linked • Redundant Copies Replicated among Stewards / Nodes • Consensus Protocol – Who gets to write a new record • Ability to execute automated processes using Smart Contracts • Can interoperate with Digital Currency
  • 11. Digital Trust Attributes of Blockchain Networks Immutability Non-repudiation Zero-Knowledge Proof Redundancy Availability
  • 13. Bruce Schneier Comments on Trust 2018 Hyperledger Conference “Blockchain shifts trust in people and institutions to trust in technology”
  • 14. Bruce Schneier Comments on Trust February 2019 Blog (https://www.schneier.com/blog/archives/2019/02/blockchain_and_.html) • What blockchain does is shift some of the trust in people and institutions to trust in technology. You need to trust the cryptography, the protocols, the software, the computers and the network. And you need to trust them absolutely, because they're often single points of failure. • Blockchain doesn't eliminate the need to trust human institutions. There will always be a big gap that can't be addressed by technology alone. People still need to be in charge, and there is always a need for governance outside the system.
  • 15. Novel Uses for Blockchains • Provenance • Diamonds • Title • Assets • Supply Chain • Stored Value • Cryptographic Token • Stored Value – Mileage Points, Timeshare Exchange • Transaction Record • Financial Exchange • Books of Record • Self Sovereign Identity • Verifiable Credentials
  • 16. SSI in a nutshell 16
  • 17. The Self-Sovereign Identity (SSI) Model Blockchain Connection Digital Wallet w/ Private Keys & Credentials Digital Wallet w/ Private Keys & Credentials Your Agent Peer Agent Public Key Public KeyDIDDID Solves the decentralized PKI (public key infrastructure) problem for verifying digital signatures on digital credentials
  • 18. The Verifiable Credential Trust Triangle
  • 19. Holder/ Prover Issuer Verifier Verifiable Credential Proof Trust Blockchain Public KeyDID Write Read Sign ✗No integration needed! Verify The Verifiable Credential Trust Triangle
  • 20. Displays Audit Accreditor Credential Policies & Procedures Information Technology Governance Authority TRUST F R A M E W O R K Trust Anchor Accreditor Standards Attest Criteria Audit Accreditor Auditor Accredits Applies Provides Evidence Asserts Compliance Creates Attest Guidance Evaluates Relies Upon Issues Auditor Credential Oversees Level 3 Criteria Level 2 Criteria Level 1 Criteria Credential Registry Issues Trust Anchor and Credential Registry Credentials Displays Auditor Credential Displays Trust Anchor Credential Accredits Issues Audit Accreditor Credential Creates Updates Issues Credentials Complianc e Reports AssertsCompliance Applies Referential Trust Model Blockchain Referential Trust Model
  • 21. Layer One: DID Registries (Public Ledgers) Layer Two: DIDComm Agent/Wallet/Hub Connection Pairwise Pseudonymous Peer DIDs Issuer Verifier Holder Trust Layer Three: Credential Exchange Verifiable Credentia l Agent/Wallet/Hub Layer Four: Governance Frameworks Trust Anchor Insurer Governance Authority Auditor Auditor Accreditor Credential Registry Hardware Developer Software Developer Agency Transaction Author Transaction Endorser Steward DID Method DID Registry DID Method DID Registry DID Method DID Registry Trust over IP Technology Stack Trust over IP Governance Stack Network Governance Frameworks Provider Governance Frameworks Credential Governance Frameworks Technical Trust Human Trust Governance Authority Publishes Governance Framework Metasystem Governance Frameworks Proof Trust Over IP Stack
  • 23. Ledger Management Layer Steward/Node Agreements Consensus Protocol Role of Validators and Observers Blockchain Code Compute Power Network Availability Fork Management
  • 24. Data Management Layer Read Access Write Access Tombstones Smart Contracts Token Management
  • 25. User Management Layer Permissioned / Permissionless Systems Trusted Roles Administrators Users IAM Systems Enrollment Provisioning
  • 26. Network Governance Layer Risk Assessment / Management Trust Criteria Policies Procedures Trust Principles Voting Protocol Audit / Accreditation Warranty / Insurance Legal / Regulatory
  • 27. History Repeating Itself? Age of the Internet • Internet Service Providers • America Online • CompuServe • EarthLink • Communication Innovators • Modem • DSL/Satellite/Cable • Browsers • World Wide Web • Mosaic • Netscape Navigator • Communications Protocol • TCP/IP Age of The Blockchain • Blockchain Networks • Sovrin • Corda • BitCoin • Communication Innovators • 5G • Fiber Optics • SmartPhone • Digital Wallets • Phone Apps • Smart Contracts • Communications Protocol • Trust Over IP
  • 28. Blockchain Training Courses on sight… Exam and certification fees will be included in the training price. www.pecb.com/events