The Blockchain and Information Security
- LANGUAGE: English DATE: Thursday, March 31, 2016 TIME: 4:00pm AEST
Information security opportunities and challenges with the blockchain’s trustless, distributed architecture
What new risks and solutions will blockchain technologies bring to user identification and authentication, the Internet of Things (IoT), Digital Rights Management and Life Management Platforms (LMP)? Is the use of blockchain technologies always appropriate?
Given the how unprecedented this technology innovation is and the hype surrounding it, IT professionals will soon be faced with the task of protecting blockchain-based services or assessing the risks and opportunities of blockchain adoption within organisations.
- The blockchain today as a distributed ledger, tomorrow as a distributed compute platform
- The trustless security model from an information security perspective
- The blockchain and user identification, authentication and authorisation
- The blockchain and the Internet of Things (IoT): device identification, authentication and management
- The blockchain and digital rights management: proof of ownership, transfer of ownership, digital contracts and smart contracts
- The blockchain and Life Management Platforms: personal user information stores, user-controlled and revocable sharing of personal information with 3rd parties
In this webinar, Ivan Niccolai, Senior Analyst KuppingerCole, will provide a high-level view of how the distributed, trustless approach of blockchain technology works by substituting trusted third parties – which often must rely on arbitrary human judgement – with a computational proof-of-work algorithm.
This approach is not without its shortcomings and risks, as well as benefits, and Ivan will spend the second part of the seminar going into detail with each of the use cases listed previously.
The Antivirus has been proclaimed dead years ago – you’ve probably heard those stories many times. But did you realize that the EDR (Endpoint Detection and Response), which was once supposed to address all its shortcomings, isn’t doing well either? After all, with the sheer number and complexity of modern cyber threats, what’s the point of detecting each one if you have neither time nor qualified manpower to analyze and mitigate them before they turn into major disruptions?
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.