The Blockchain and Information Security
- LANGUAGE: English DATE: Thursday, March 31, 2016 TIME: 4:00pm AEST
What new risks and solutions will blockchain technologies bring to user identification and authentication, the Internet of Things (IoT), Digital Rights Management and Life Management Platforms (LMP)? Is the use of blockchain technologies always appropriate?
Given the how unprecedented this technology innovation is and the hype surrounding it, IT professionals will soon be faced with the task of protecting blockchain-based services or assessing the risks and opportunities of blockchain adoption within organisations.
- The blockchain today as a distributed ledger, tomorrow as a distributed compute platform
- The trustless security model from an information security perspective
- The blockchain and user identification, authentication and authorisation
- The blockchain and the Internet of Things (IoT): device identification, authentication and management
- The blockchain and digital rights management: proof of ownership, transfer of ownership, digital contracts and smart contracts
- The blockchain and Life Management Platforms: personal user information stores, user-controlled and revocable sharing of personal information with 3rd parties
In this webinar, Ivan Niccolai, Senior Analyst KuppingerCole, will provide a high-level view of how the distributed, trustless approach of blockchain technology works by substituting trusted third parties – which often must rely on arbitrary human judgement – with a computational proof-of-work algorithm.
This approach is not without its shortcomings and risks, as well as benefits, and Ivan will spend the second part of the seminar going into detail with each of the use cases listed previously.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.