The Blockchain and Information Security
- LANGUAGE: English DATE: Thursday, March 31, 2016 TIME: 4:00pm AEST
What new risks and solutions will blockchain technologies bring to user identification and authentication, the Internet of Things (IoT), Digital Rights Management and Life Management Platforms (LMP)? Is the use of blockchain technologies always appropriate?
Given the how unprecedented this technology innovation is and the hype surrounding it, IT professionals will soon be faced with the task of protecting blockchain-based services or assessing the risks and opportunities of blockchain adoption within organisations.
- The blockchain today as a distributed ledger, tomorrow as a distributed compute platform
- The trustless security model from an information security perspective
- The blockchain and user identification, authentication and authorisation
- The blockchain and the Internet of Things (IoT): device identification, authentication and management
- The blockchain and digital rights management: proof of ownership, transfer of ownership, digital contracts and smart contracts
- The blockchain and Life Management Platforms: personal user information stores, user-controlled and revocable sharing of personal information with 3rd parties
In this webinar, Ivan Niccolai, Senior Analyst KuppingerCole, will provide a high-level view of how the distributed, trustless approach of blockchain technology works by substituting trusted third parties – which often must rely on arbitrary human judgement – with a computational proof-of-work algorithm.
This approach is not without its shortcomings and risks, as well as benefits, and Ivan will spend the second part of the seminar going into detail with each of the use cases listed previously.
Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.