SlideShare a Scribd company logo
1 of 13
Download to read offline
ITU Workshop on “Security Aspects of Blockchain”
(Geneva, Switzerland, 21 March 2017)
Blockchains – risk or mitigation?
Patrick Curry OBE CEng
Director, BBFA: patrick.curry@bbfa.info
Director, Kyckr; patrick.curry@kyckr.com
Geneva, Switzerland, 21 March 2017
Internet Governance Forum 2015
Brazil
“Block chain technology is probably
the biggest game changer for the
Internet”
Questions
Is this for good or bad? Will it help to make the Internet safer and
more secure – and more beneficial?
We need block chains to help make the Internet more trusted.
We need block chains to be trusted, which requires other components
around/with block chains
Impact of Various Regulations in the Pipeline
Timing Buy-side
impact
Sell-side
impact
Custodian
impact
FMI impact Gov / LE
Impact
Risk Impact Business
impact
Systems
impact
Data impact
AIFMD
Reporting
Jul 2014 LOW-HIGH LOW-MED MEDIUM LOW LOW LOW-HIGH LOW-HIGH LOW-HIGH LOW-HIGH
TD 2 Jul 2015 LOW LOW LOW LOW MEDIUM LOW LOW LOW LOW
UCITS V Mar 2016 LOW LOW LOW LOW LOW LOW LOW MEDIUM MEDIUM
EMIR June 2016 LOW-HIGH HIGH MEDIUM MED-HIGH MEDIUM MED-HIGH LOW-HIGH LOW-HIGH HIGH
MAR Jul 2016 MEDIUM HIGH MED-HIGH HIGH MEDIUM MEDIUM MEDIUM MED-HIGH HIGH
SFTR >Jan 2017 MED-HIGH HIGH LOW MEDIUM MEDIUM MEDIUM MED-HIGH MED-HIGH HIGH
PRIIPs >Mar 2017 HIGH LOW MED-HIGH LOW MEDIUM MEDIUM HIGH HIGH HIGH
MLD 4 Jun 2017 HIGH HIGH HIGH LOW MEDIUM HIGH MEDIUM HIGH HIGH
CRS Sep 2017 MED-HIGH HIGH HIGH LOW MEDIUM MEDIUM MEDIUM MEDIUM HIGH
Benchmarks Dec 2017 LOW-HIGH HIGH MEDIUM HIGH MEDIUM HIGH HIGH MEDIUM HIGH
ELTIF/MMR Dec 2017? LOW-HIGH LOW MEDIUM LOW LOW LOW MEDIUM MEDIUM MEDIUM
MIFID 2 Jan 2018 HIGH HIGH MEDIUM HIGH LOW MEDIUM HIGH HIGH HIGH
IDD Jan 2018 LOW-HIGH LOW MEDIUM LOW LOW MEDIUM MEDIUM MEDIUM HIGH
PSD 2 Jan 2018 LOW LOW MEDIUM LOW HIGH LOW LOW LOW MEDIUM
GDPR May 2018 HIGH HIGH HIGH HIGH HIGH HIGH HIGH HIGH HIGH
FRTB Q1 2019? LOW HIGH MEDIUM LOW MEDIUM HIGH MED-HIGH HIGH HIGH
CSDR
settlement
Q1 2019? MEDIUM HIGH HIGH MED-HIGH LOW MEDIUM MED-HIGH MED-HIGH HIGH
Source Dr Anthony Kirby 2016
Game Changers
• Bank’s top issue – EU General Data Protection Regulation (GDPR) – fine up
to 4% of global turnover with reputational damage
• Highest impact - data (quality)
• How much and for whom?
– Anti Money Laundering Directive 4
• Requires identification, strong authentication, beneficiary traceability &
persons of significant control (PSC)
• Requires any company to do Know Your Customer (KYC) checks for
payments of €10,000 or more.
• This affects everyone in Europe and every payments block chain
• Includes virtual currencies
• AL5 includes recognition for eIDAS
– Payment Services Directive
PSD2 requires requirement for Secure Customer Authentication, except for
contactless card payments under €50, card not present transaction under €10,
and payments to a payee that the payer has explicitly whitelisted
Other requirements
• Traceability
• Anti-counterfeits
• Compliance
• Authoritative sources
• ….(many more)
Citizen Consumer
Employee - IndustryEmployee - Gov
4 Contexts of Identity
Plus:
•Device ID
•Organisation ID
•Software Authentication
•Data Authentication
Assuring the blockchain internally
• Quality of written data
• Liability and shared risk. Reputation management
• Assured signatures and organisation ID at that time
• Smart contract automation could be a risk
• When do we need proof of work? Replace proof of
work with PKI federation to reduce risks & costs, and
improve performance
• When do we need proof of state? What
alternatives?
• When do we need mining? What alternatives?
Assuring the blockchain externally
• Access control (AAA)
– PKI federation to enable collaborative key
management. ISO 29115/X.1254; ISO 29003; X.509
• Trusted attribute providers
– Requirement for ROLOs (Register of Legal
Organisations). Use other authoritative sources now
– Other TAPs for an increasing range of attributes
• Collaborative governance
– Common Policy and shared risk mitigation
– Federated trust
– Assured supply chains etc. Certification
– Privacy and consent management
New technologies
• 15 identified by the banks
• Disruption
– Blockchains
– Trusted smartphones
– Zero knowledge proof (ZKP)
Existing Standards
• ISO TC307
• ISO JTC1 SC27
• ISO TC68
• ITU-T Block Chain WG
• OASIS
• W3C
National
• NIST
• NASPO
• DIN
• AFNOR
• …. UK BSI
• Identity management
– Authentication (ISO 29115)
– Identity proofing (ISO 29003)
• Access control
• Privacy & de-identification
• Risk management
• Cyber assurance & ISMS
• Cryptography
• Incident management
What is specifically needed?
• Reference Architecture
– Types & categories of block chain -
– Technology options, terminology, architectures
– Proof of Work, Proof of State
– Components
• What’s in the BC
– Data in the BC.
– Rules, processes, actors, lifecycles
– Security, provenance, assurance
– Compliance
– Governance – policies, procedures, mechanisms
• What’s around the BC
– Best practices, terminology and reference architectures
– Access control – Identity management, authentication
– Interoperability, interfaces
– Trusted attribute providers
– Rules, processes, actors
– Security, provenance, assurance
– Governance
Key conclusion
• Many, many uses for block chains but the foundational requirement is
block chains for the Internet itself.
• ID fraud is the top enabler of crime. Must involve law enforcement.
• Takedown Avalanche network in Dec 2016 – 400k domains
• Validate companies for each domain
– Identify fraudulent companies
– Identify shortcomings in the registration process
• Validate remaining 280m domains
• Future registration for any domain name should have a trust rating (e.g.
LoA1-4), based on the LoA of the company
• [same could apply to gov organisations, persons & devices]
• All transaction results could be on a block chain for each TLD & ROLO
• Conversely, consider countries with national eID and national
federated/hierarchical PKI systems.
Geneva, Switzerland, 21 March 2017

More Related Content

What's hot

Blockchain and its Use in the Public Sector - OECD
Blockchain and its Use in the Public Sector - OECDBlockchain and its Use in the Public Sector - OECD
Blockchain and its Use in the Public Sector - OECDOECD Governance
 
Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​EC-Council
 
Wp blockchain ilnas_e-version
Wp blockchain ilnas_e-versionWp blockchain ilnas_e-version
Wp blockchain ilnas_e-versionJonas Mercier
 
Investing in Blockchain Startups (Seminar) C4 MaRS Discovery District Toronto...
Investing in Blockchain Startups (Seminar) C4 MaRS Discovery District Toronto...Investing in Blockchain Startups (Seminar) C4 MaRS Discovery District Toronto...
Investing in Blockchain Startups (Seminar) C4 MaRS Discovery District Toronto...Alyse Killeen
 
Block Chain meets Big Data
Block Chain meets Big DataBlock Chain meets Big Data
Block Chain meets Big DataVihang Patel
 
Software Architecture and Model-driven Engineering for Blockchain Applications
Software Architecture and Model-driven Engineering for Blockchain ApplicationsSoftware Architecture and Model-driven Engineering for Blockchain Applications
Software Architecture and Model-driven Engineering for Blockchain ApplicationsIngo Weber
 
Introduction to Blockchain Business Models
Introduction to Blockchain Business ModelsIntroduction to Blockchain Business Models
Introduction to Blockchain Business ModelsGokul Alex
 
Industry-specific blockchains
Industry-specific blockchainsIndustry-specific blockchains
Industry-specific blockchainsBlockStars.io
 
Blockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsBlockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsSanjeev Verma, PhD
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential InnoTech
 
How do blockchain and internet of things match?
How do blockchain and internet of things match?How do blockchain and internet of things match?
How do blockchain and internet of things match?Bob Peters
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls PresentationBill Lisse
 
Zensar’s Blockchain enablement framework
Zensar’s Blockchain enablement frameworkZensar’s Blockchain enablement framework
Zensar’s Blockchain enablement frameworkZensar Technologies Ltd.
 
Vlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentationVlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentationSebastian Cochinescu
 
Get Rich with Blockchain & Cryptocurrency
Get Rich with Blockchain & CryptocurrencyGet Rich with Blockchain & Cryptocurrency
Get Rich with Blockchain & Cryptocurrencykeerthi678722
 
ZHENG WENJUN The idea of block chain
ZHENG WENJUN The idea of block chainZHENG WENJUN The idea of block chain
ZHENG WENJUN The idea of block chainFIAT/IFTA
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Floyd DCosta
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the BlockchainTudor Stanciu
 

What's hot (20)

Blockchain and its Use in the Public Sector - OECD
Blockchain and its Use in the Public Sector - OECDBlockchain and its Use in the Public Sector - OECD
Blockchain and its Use in the Public Sector - OECD
 
Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​
 
Wp blockchain ilnas_e-version
Wp blockchain ilnas_e-versionWp blockchain ilnas_e-version
Wp blockchain ilnas_e-version
 
Investing in Blockchain Startups (Seminar) C4 MaRS Discovery District Toronto...
Investing in Blockchain Startups (Seminar) C4 MaRS Discovery District Toronto...Investing in Blockchain Startups (Seminar) C4 MaRS Discovery District Toronto...
Investing in Blockchain Startups (Seminar) C4 MaRS Discovery District Toronto...
 
Block Chain meets Big Data
Block Chain meets Big DataBlock Chain meets Big Data
Block Chain meets Big Data
 
Software Architecture and Model-driven Engineering for Blockchain Applications
Software Architecture and Model-driven Engineering for Blockchain ApplicationsSoftware Architecture and Model-driven Engineering for Blockchain Applications
Software Architecture and Model-driven Engineering for Blockchain Applications
 
Introduction to Blockchain Business Models
Introduction to Blockchain Business ModelsIntroduction to Blockchain Business Models
Introduction to Blockchain Business Models
 
Industry-specific blockchains
Industry-specific blockchainsIndustry-specific blockchains
Industry-specific blockchains
 
Blockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsBlockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and Applications
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
 
How do blockchain and internet of things match?
How do blockchain and internet of things match?How do blockchain and internet of things match?
How do blockchain and internet of things match?
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
Zensar’s Blockchain enablement framework
Zensar’s Blockchain enablement frameworkZensar’s Blockchain enablement framework
Zensar’s Blockchain enablement framework
 
Vlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentationVlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentation
 
Get Rich with Blockchain & Cryptocurrency
Get Rich with Blockchain & CryptocurrencyGet Rich with Blockchain & Cryptocurrency
Get Rich with Blockchain & Cryptocurrency
 
Blockchain and Competition – MULLIGAN – June 2018 OECD discussion
Blockchain and Competition – MULLIGAN – June 2018 OECD discussionBlockchain and Competition – MULLIGAN – June 2018 OECD discussion
Blockchain and Competition – MULLIGAN – June 2018 OECD discussion
 
ZHENG WENJUN The idea of block chain
ZHENG WENJUN The idea of block chainZHENG WENJUN The idea of block chain
ZHENG WENJUN The idea of block chain
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
 
Blockchain and Competition – SCHREPEL – June 2018 OECD discussion
Blockchain and Competition – SCHREPEL – June 2018 OECD discussionBlockchain and Competition – SCHREPEL – June 2018 OECD discussion
Blockchain and Competition – SCHREPEL – June 2018 OECD discussion
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
 

Viewers also liked

Blockchain, cryptography, and consensus
Blockchain, cryptography, and consensusBlockchain, cryptography, and consensus
Blockchain, cryptography, and consensusITU
 
Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain SecurityITU
 
Block Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingBlock Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingLERNER Consulting
 
Blockchain in Tunisia: From Experimentations to a Challenging Commercial Launch
Blockchain in Tunisia: From Experimentations to a Challenging Commercial LaunchBlockchain in Tunisia: From Experimentations to a Challenging Commercial Launch
Blockchain in Tunisia: From Experimentations to a Challenging Commercial LaunchITU
 
Blockchain’s Brave New World
Blockchain’s Brave New WorldBlockchain’s Brave New World
Blockchain’s Brave New WorldITU
 
Connected automated cars
Connected automated carsConnected automated cars
Connected automated carsITU
 
AI and Automated Driving : An Ethically Aligned Design
AI and Automated Driving : An Ethically Aligned DesignAI and Automated Driving : An Ethically Aligned Design
AI and Automated Driving : An Ethically Aligned DesignITU
 
Cybersecurity for automated driving
Cybersecurity for automated drivingCybersecurity for automated driving
Cybersecurity for automated drivingITU
 
Satellite network for automated driving
Satellite network for automated drivingSatellite network for automated driving
Satellite network for automated drivingITU
 
Emerging 8K services and their applications towards 2020
Emerging 8K services and their applications towards 2020Emerging 8K services and their applications towards 2020
Emerging 8K services and their applications towards 2020ITU
 
5G and Automative : Cellular V2X (vehicle-to-everything)
5G and Automative : Cellular V2X (vehicle-to-everything)5G and Automative : Cellular V2X (vehicle-to-everything)
5G and Automative : Cellular V2X (vehicle-to-everything)ITU
 
EBU's report on DVB and VR
EBU's report on DVB and VREBU's report on DVB and VR
EBU's report on DVB and VRITU
 
MPEG Immersive Media
MPEG Immersive MediaMPEG Immersive Media
MPEG Immersive MediaITU
 
Blockchain for First Timers with Use Cases
Blockchain for First Timers with Use CasesBlockchain for First Timers with Use Cases
Blockchain for First Timers with Use CasesSimon Burke
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesSébastien Tandel
 
BlockChain Strategists - English presentation
BlockChain Strategists - English presentationBlockChain Strategists - English presentation
BlockChain Strategists - English presentationBlockChain Strategists
 
Blockchain: the solution for transparency in product supply chains
Blockchain: the solution for transparency in product supply chainsBlockchain: the solution for transparency in product supply chains
Blockchain: the solution for transparency in product supply chainsJamie Sandhu
 
Blockchain: Real World Use Cases
Blockchain: Real World Use CasesBlockchain: Real World Use Cases
Blockchain: Real World Use CasesCapgemini
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 

Viewers also liked (19)

Blockchain, cryptography, and consensus
Blockchain, cryptography, and consensusBlockchain, cryptography, and consensus
Blockchain, cryptography, and consensus
 
Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain Security
 
Block Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingBlock Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER Consulting
 
Blockchain in Tunisia: From Experimentations to a Challenging Commercial Launch
Blockchain in Tunisia: From Experimentations to a Challenging Commercial LaunchBlockchain in Tunisia: From Experimentations to a Challenging Commercial Launch
Blockchain in Tunisia: From Experimentations to a Challenging Commercial Launch
 
Blockchain’s Brave New World
Blockchain’s Brave New WorldBlockchain’s Brave New World
Blockchain’s Brave New World
 
Connected automated cars
Connected automated carsConnected automated cars
Connected automated cars
 
AI and Automated Driving : An Ethically Aligned Design
AI and Automated Driving : An Ethically Aligned DesignAI and Automated Driving : An Ethically Aligned Design
AI and Automated Driving : An Ethically Aligned Design
 
Cybersecurity for automated driving
Cybersecurity for automated drivingCybersecurity for automated driving
Cybersecurity for automated driving
 
Satellite network for automated driving
Satellite network for automated drivingSatellite network for automated driving
Satellite network for automated driving
 
Emerging 8K services and their applications towards 2020
Emerging 8K services and their applications towards 2020Emerging 8K services and their applications towards 2020
Emerging 8K services and their applications towards 2020
 
5G and Automative : Cellular V2X (vehicle-to-everything)
5G and Automative : Cellular V2X (vehicle-to-everything)5G and Automative : Cellular V2X (vehicle-to-everything)
5G and Automative : Cellular V2X (vehicle-to-everything)
 
EBU's report on DVB and VR
EBU's report on DVB and VREBU's report on DVB and VR
EBU's report on DVB and VR
 
MPEG Immersive Media
MPEG Immersive MediaMPEG Immersive Media
MPEG Immersive Media
 
Blockchain for First Timers with Use Cases
Blockchain for First Timers with Use CasesBlockchain for First Timers with Use Cases
Blockchain for First Timers with Use Cases
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challenges
 
BlockChain Strategists - English presentation
BlockChain Strategists - English presentationBlockChain Strategists - English presentation
BlockChain Strategists - English presentation
 
Blockchain: the solution for transparency in product supply chains
Blockchain: the solution for transparency in product supply chainsBlockchain: the solution for transparency in product supply chains
Blockchain: the solution for transparency in product supply chains
 
Blockchain: Real World Use Cases
Blockchain: Real World Use CasesBlockchain: Real World Use Cases
Blockchain: Real World Use Cases
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 

Similar to Blockchains : Risk or Mitigation?

Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Donald Malloy
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open SourceDonald Malloy
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementDr Mark Lovatt
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewOCTF Industry Engagement
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low CostDonald Malloy
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Blockchain: everyone wants to sell me that - but is that really right for my ...
Blockchain: everyone wants to sell me that - but is that really right for my ...Blockchain: everyone wants to sell me that - but is that really right for my ...
Blockchain: everyone wants to sell me that - but is that really right for my ...EQS Group
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems Maganathin Veeraragaloo
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 

Similar to Blockchains : Risk or Mitigation? (20)

Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in Procurement
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low Cost
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Blockchain: everyone wants to sell me that - but is that really right for my ...
Blockchain: everyone wants to sell me that - but is that really right for my ...Blockchain: everyone wants to sell me that - but is that really right for my ...
Blockchain: everyone wants to sell me that - but is that really right for my ...
 
IAM
IAMIAM
IAM
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 

More from ITU

Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? ITU
 
Global Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersGlobal Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersITU
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsITU
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...ITU
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GITU
 
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...ITU
 
Connected Cars & 5G
Connected Cars & 5GConnected Cars & 5G
Connected Cars & 5GITU
 
5G for Connected and Automated Driving
5G for Connected and Automated Driving5G for Connected and Automated Driving
5G for Connected and Automated DrivingITU
 
Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of AutomotiveITU
 
The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. ITU
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesITU
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learningITU
 
Machine learning for 5G and beyond
Machine learning for 5G and beyondMachine learning for 5G and beyond
Machine learning for 5G and beyondITU
 
Efficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsEfficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsITU
 
AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportITU
 
Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15ITU
 
One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim ITU
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsITU
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...ITU
 
Enhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesEnhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesITU
 

More from ITU (20)

Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected?
 
Global Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersGlobal Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturers
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT Ecosystems
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5G
 
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
 
Connected Cars & 5G
Connected Cars & 5GConnected Cars & 5G
Connected Cars & 5G
 
5G for Connected and Automated Driving
5G for Connected and Automated Driving5G for Connected and Automated Driving
5G for Connected and Automated Driving
 
Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of Automotive
 
The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities.
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devices
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learning
 
Machine learning for 5G and beyond
Machine learning for 5G and beyondMachine learning for 5G and beyond
Machine learning for 5G and beyond
 
Efficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsEfficient Deep Learning in Communications
Efficient Deep Learning in Communications
 
AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 Report
 
Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15
 
One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGs
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
 
Enhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesEnhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable cities
 

Recently uploaded

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 

Recently uploaded (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

Blockchains : Risk or Mitigation?

  • 1.
  • 2. ITU Workshop on “Security Aspects of Blockchain” (Geneva, Switzerland, 21 March 2017) Blockchains – risk or mitigation? Patrick Curry OBE CEng Director, BBFA: patrick.curry@bbfa.info Director, Kyckr; patrick.curry@kyckr.com Geneva, Switzerland, 21 March 2017
  • 3. Internet Governance Forum 2015 Brazil “Block chain technology is probably the biggest game changer for the Internet” Questions Is this for good or bad? Will it help to make the Internet safer and more secure – and more beneficial? We need block chains to help make the Internet more trusted. We need block chains to be trusted, which requires other components around/with block chains
  • 4. Impact of Various Regulations in the Pipeline Timing Buy-side impact Sell-side impact Custodian impact FMI impact Gov / LE Impact Risk Impact Business impact Systems impact Data impact AIFMD Reporting Jul 2014 LOW-HIGH LOW-MED MEDIUM LOW LOW LOW-HIGH LOW-HIGH LOW-HIGH LOW-HIGH TD 2 Jul 2015 LOW LOW LOW LOW MEDIUM LOW LOW LOW LOW UCITS V Mar 2016 LOW LOW LOW LOW LOW LOW LOW MEDIUM MEDIUM EMIR June 2016 LOW-HIGH HIGH MEDIUM MED-HIGH MEDIUM MED-HIGH LOW-HIGH LOW-HIGH HIGH MAR Jul 2016 MEDIUM HIGH MED-HIGH HIGH MEDIUM MEDIUM MEDIUM MED-HIGH HIGH SFTR >Jan 2017 MED-HIGH HIGH LOW MEDIUM MEDIUM MEDIUM MED-HIGH MED-HIGH HIGH PRIIPs >Mar 2017 HIGH LOW MED-HIGH LOW MEDIUM MEDIUM HIGH HIGH HIGH MLD 4 Jun 2017 HIGH HIGH HIGH LOW MEDIUM HIGH MEDIUM HIGH HIGH CRS Sep 2017 MED-HIGH HIGH HIGH LOW MEDIUM MEDIUM MEDIUM MEDIUM HIGH Benchmarks Dec 2017 LOW-HIGH HIGH MEDIUM HIGH MEDIUM HIGH HIGH MEDIUM HIGH ELTIF/MMR Dec 2017? LOW-HIGH LOW MEDIUM LOW LOW LOW MEDIUM MEDIUM MEDIUM MIFID 2 Jan 2018 HIGH HIGH MEDIUM HIGH LOW MEDIUM HIGH HIGH HIGH IDD Jan 2018 LOW-HIGH LOW MEDIUM LOW LOW MEDIUM MEDIUM MEDIUM HIGH PSD 2 Jan 2018 LOW LOW MEDIUM LOW HIGH LOW LOW LOW MEDIUM GDPR May 2018 HIGH HIGH HIGH HIGH HIGH HIGH HIGH HIGH HIGH FRTB Q1 2019? LOW HIGH MEDIUM LOW MEDIUM HIGH MED-HIGH HIGH HIGH CSDR settlement Q1 2019? MEDIUM HIGH HIGH MED-HIGH LOW MEDIUM MED-HIGH MED-HIGH HIGH Source Dr Anthony Kirby 2016
  • 5. Game Changers • Bank’s top issue – EU General Data Protection Regulation (GDPR) – fine up to 4% of global turnover with reputational damage • Highest impact - data (quality) • How much and for whom? – Anti Money Laundering Directive 4 • Requires identification, strong authentication, beneficiary traceability & persons of significant control (PSC) • Requires any company to do Know Your Customer (KYC) checks for payments of €10,000 or more. • This affects everyone in Europe and every payments block chain • Includes virtual currencies • AL5 includes recognition for eIDAS – Payment Services Directive PSD2 requires requirement for Secure Customer Authentication, except for contactless card payments under €50, card not present transaction under €10, and payments to a payee that the payer has explicitly whitelisted
  • 6. Other requirements • Traceability • Anti-counterfeits • Compliance • Authoritative sources • ….(many more)
  • 7. Citizen Consumer Employee - IndustryEmployee - Gov 4 Contexts of Identity Plus: •Device ID •Organisation ID •Software Authentication •Data Authentication
  • 8. Assuring the blockchain internally • Quality of written data • Liability and shared risk. Reputation management • Assured signatures and organisation ID at that time • Smart contract automation could be a risk • When do we need proof of work? Replace proof of work with PKI federation to reduce risks & costs, and improve performance • When do we need proof of state? What alternatives? • When do we need mining? What alternatives?
  • 9. Assuring the blockchain externally • Access control (AAA) – PKI federation to enable collaborative key management. ISO 29115/X.1254; ISO 29003; X.509 • Trusted attribute providers – Requirement for ROLOs (Register of Legal Organisations). Use other authoritative sources now – Other TAPs for an increasing range of attributes • Collaborative governance – Common Policy and shared risk mitigation – Federated trust – Assured supply chains etc. Certification – Privacy and consent management
  • 10. New technologies • 15 identified by the banks • Disruption – Blockchains – Trusted smartphones – Zero knowledge proof (ZKP)
  • 11. Existing Standards • ISO TC307 • ISO JTC1 SC27 • ISO TC68 • ITU-T Block Chain WG • OASIS • W3C National • NIST • NASPO • DIN • AFNOR • …. UK BSI • Identity management – Authentication (ISO 29115) – Identity proofing (ISO 29003) • Access control • Privacy & de-identification • Risk management • Cyber assurance & ISMS • Cryptography • Incident management
  • 12. What is specifically needed? • Reference Architecture – Types & categories of block chain - – Technology options, terminology, architectures – Proof of Work, Proof of State – Components • What’s in the BC – Data in the BC. – Rules, processes, actors, lifecycles – Security, provenance, assurance – Compliance – Governance – policies, procedures, mechanisms • What’s around the BC – Best practices, terminology and reference architectures – Access control – Identity management, authentication – Interoperability, interfaces – Trusted attribute providers – Rules, processes, actors – Security, provenance, assurance – Governance
  • 13. Key conclusion • Many, many uses for block chains but the foundational requirement is block chains for the Internet itself. • ID fraud is the top enabler of crime. Must involve law enforcement. • Takedown Avalanche network in Dec 2016 – 400k domains • Validate companies for each domain – Identify fraudulent companies – Identify shortcomings in the registration process • Validate remaining 280m domains • Future registration for any domain name should have a trust rating (e.g. LoA1-4), based on the LoA of the company • [same could apply to gov organisations, persons & devices] • All transaction results could be on a block chain for each TLD & ROLO • Conversely, consider countries with national eID and national federated/hierarchical PKI systems. Geneva, Switzerland, 21 March 2017