SlideShare a Scribd company logo
1 of 7
Making Blockchain Real for Business
Understanding Governance Model in Business Networks
Powered by Blockchain
Nitin Gaur – ngaur@us.ibm.com
Difference in focus points of permission less and
permissioned enterprise-oriented networks
Permission less networks Permissioned enterprise-oriented networks
Designing and implementing
economic systems based on
principles of decentralization,
open or self- governance and
transparency
Creating of crypto-assets
backed by real value
Technology-driven reimagining the
ecosystems, business network,
regulatory compliance,
confidentiality and privacy, and
business models
Building innovative technical
solutions
Creating proof-of-concepts
with quick results
Implementing existing business
processes with blockchain
Decentralization and
disintermediation at core
Involving existing intermediaries
and central parties in developing
common economical incentives
VS
VS
VS
VS
Difference in governance fundamentals of
permission less and permissioned enterprise-
oriented networks
Permission less networks Permissioned enterprise-oriented networks
Economy-base incentives
Network self-management
and coordination
Consortium-defined incentives
and penalties
Consortium-defined semi-
autonomous governance
structures
VS
VS
Page 4© 2017 IBM Corporation IBM Confidential
Building Blocks of Governance model for permissioned enterprise-oriented networks
Industry and use case-specific
which need to factor various
facets and evolution of the
industry itself.
Not only govern participation in
business networks but also an
equitable cost structure that is
fairly spread based on
participant activity.
A discipline that is focused on IT infrastructures,
performance, cost structures, and business risk.
(Blockchain)
Network
Governance
(Information)
Technology
Governance
Business
Network
Governance
Business Network Governance
What is it?
A industry specific and use case specific model that factor various facets and evolution of the
industry itself.
Examples
• Common/shared services management, such as KYC, audits, reporting, etc.
• Network-related charter and communication
• Quality assurance, performance, and network security
• Product and business network evolution
• Enforcement of legal and regulatory frameworks
• Adherence to industry-specific requirements
• Framework, charter, and stewards of technology and network governance frameworks
• Formulate appropriate business models , legal charters, and rules of engagement for network
business operations
What is it?
Not only govern participation in business networks but also an equitable cost structure that is fairly
spread based on participant activity. This also involves a structure that allows for autonomous and
likeminded business entities to engage in business transactions, contracts, and value creation.
Examples
• Membership onboarding/off-boarding
• Equitable and fair cost structure – chargeback models
• Data ownership structure – for business entities joining and leaving the network
• Regulatory oversight provisioning – including a model to act as a delegate to generate
regulatory compliance reporting
• Permissioning structure – key management that can include a model
• that is vote-driven but centrally managed;
• has a federated structure – members inviting other business entities; and
• has a delegated structure – includes services providers that can delegate to other
members
• Business and SLA management – the blockchain business network management
• Network support services – these are business networks, so the governance model should
include network support services, business network SLA enforcement, and membership
services
• Risk optimization – OSSs and BSSs, business continuity services/planning, network alignment
to legal and regulatory requirements, etc.
• network business operations
(Blockchain) Network Governance
(Information) Technology Governance
What is it?
A discipline that is focused on IT infrastructures, performance, cost structures, and business risk
which should accommodate for a model that is inclusive of distributed flexibility and distributed
control.
Examples
• A distributed IT management structure
• Model for distributed maintenance – software/HW updates, upgrades, path management
• Framework utilizing industry standards—COBIT, ITIL, ISO, CMMI, FAIR, etc. – driven by the
business network
• Resource optimization – includes technology procurement, vendor relations, SLA management,
skills, and talent management
• Technology adoption and assessment – leads to keeping up with technology evolution and
economic deployment models, including deployment and operational risks
• Network deployment strategy – Not as simple as an application upgrade but a model that can
encourage and enforce continual technology and security updates and upgrades
• Network support services –should include network support services, IT SLA enforcement, and
membership services
• Risk optimization – operational support services (OSSs) and business support services (BSSs), IT
infrastructure continuity services/planning, technology alignment to legal and regulatory
requirements, etc.
The IT governance model should not only incentivize technology upgrades and security updates
but penalize non-compliant systems/nodes, thereby creating an incentive mechanism to ensure
continued participation.

More Related Content

What's hot

rethinking marketing
rethinking marketingrethinking marketing
rethinking marketingNavneet Singh
 
IT Control Objectives Framework, A Relationship Between COSO Cobit and ITIL
IT Control Objectives Framework, A Relationship Between COSO Cobit and ITILIT Control Objectives Framework, A Relationship Between COSO Cobit and ITIL
IT Control Objectives Framework, A Relationship Between COSO Cobit and ITILAlfid Ardyanto
 
Itil for managed_service_providers_wp_v2_0_w
Itil for managed_service_providers_wp_v2_0_wItil for managed_service_providers_wp_v2_0_w
Itil for managed_service_providers_wp_v2_0_wSunil Sathyavolu
 
Examining IT Strategies Employed at Seven Seas Technologies
Examining IT Strategies Employed at Seven Seas TechnologiesExamining IT Strategies Employed at Seven Seas Technologies
Examining IT Strategies Employed at Seven Seas TechnologiesMichael W. Chitwa
 
Governance, risk and compliance framework
Governance, risk and compliance frameworkGovernance, risk and compliance framework
Governance, risk and compliance frameworkCeyeap
 

What's hot (10)

rethinking marketing
rethinking marketingrethinking marketing
rethinking marketing
 
01 intro-cobit
01 intro-cobit01 intro-cobit
01 intro-cobit
 
Itil V3
Itil V3Itil V3
Itil V3
 
IT Control Objectives Framework, A Relationship Between COSO Cobit and ITIL
IT Control Objectives Framework, A Relationship Between COSO Cobit and ITILIT Control Objectives Framework, A Relationship Between COSO Cobit and ITIL
IT Control Objectives Framework, A Relationship Between COSO Cobit and ITIL
 
Itil for managed_service_providers_wp_v2_0_w
Itil for managed_service_providers_wp_v2_0_wItil for managed_service_providers_wp_v2_0_w
Itil for managed_service_providers_wp_v2_0_w
 
Lawsocpresentation j une2011
Lawsocpresentation j une2011Lawsocpresentation j une2011
Lawsocpresentation j une2011
 
Examining IT Strategies Employed at Seven Seas Technologies
Examining IT Strategies Employed at Seven Seas TechnologiesExamining IT Strategies Employed at Seven Seas Technologies
Examining IT Strategies Employed at Seven Seas Technologies
 
IT Governances
IT GovernancesIT Governances
IT Governances
 
Governance, risk and compliance framework
Governance, risk and compliance frameworkGovernance, risk and compliance framework
Governance, risk and compliance framework
 
LegalHold-FLYER
LegalHold-FLYERLegalHold-FLYER
LegalHold-FLYER
 

Similar to Blockchain governance

Successfully Implementing Knowledge-Based IT
Successfully Implementing Knowledge-Based ITSuccessfully Implementing Knowledge-Based IT
Successfully Implementing Knowledge-Based ITKen Spokas
 
Aws dev ops saif ahmed
Aws dev ops   saif ahmedAws dev ops   saif ahmed
Aws dev ops saif ahmedsaifam
 
IT Operating Model - Fundamental
IT Operating Model - FundamentalIT Operating Model - Fundamental
IT Operating Model - FundamentalEryk Budi Pratama
 
Ict mgmt processes_roles_competencies
Ict mgmt processes_roles_competenciesIct mgmt processes_roles_competencies
Ict mgmt processes_roles_competenciesSalegram Padhee
 
Cloud Services Brokerage Demystified
Cloud Services Brokerage DemystifiedCloud Services Brokerage Demystified
Cloud Services Brokerage DemystifiedZach Gardner
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessAmazon Web Services
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessAmazon Web Services
 
Enterprise Blockchain: Top Considerations Before You Deploy
 Enterprise Blockchain: Top Considerations Before You Deploy Enterprise Blockchain: Top Considerations Before You Deploy
Enterprise Blockchain: Top Considerations Before You DeployKaleido
 
I T E007 Warner 091807
I T E007  Warner 091807I T E007  Warner 091807
I T E007 Warner 091807Dreamforce07
 
School of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComSchool of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComAlleneMcclendon878
 
CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityHaluk Demirkan
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...Alan Yau Ti Dun
 
It infrastructure management
It infrastructure managementIt infrastructure management
It infrastructure managementShoaib Patel
 
Presentation to the AEA (June 23)
Presentation to the AEA (June 23) Presentation to the AEA (June 23)
Presentation to the AEA (June 23) Daljit Banger
 
ITSM Transformation Strategies V 2
ITSM Transformation Strategies V 2ITSM Transformation Strategies V 2
ITSM Transformation Strategies V 2Sukumar Daniel
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingSrinivas Koushik
 
Governance V3 (2)
Governance V3 (2)Governance V3 (2)
Governance V3 (2)guestf73e68
 
Governance Strategies & Tools for Cloud Formation
Governance Strategies & Tools for Cloud Formation Governance Strategies & Tools for Cloud Formation
Governance Strategies & Tools for Cloud Formation Amazon Web Services
 
Ifw framework for banking industry presentation
Ifw framework for banking industry presentationIfw framework for banking industry presentation
Ifw framework for banking industry presentationRavi Sarkar
 

Similar to Blockchain governance (20)

Successfully Implementing Knowledge-Based IT
Successfully Implementing Knowledge-Based ITSuccessfully Implementing Knowledge-Based IT
Successfully Implementing Knowledge-Based IT
 
Aws dev ops saif ahmed
Aws dev ops   saif ahmedAws dev ops   saif ahmed
Aws dev ops saif ahmed
 
IT Operating Model - Fundamental
IT Operating Model - FundamentalIT Operating Model - Fundamental
IT Operating Model - Fundamental
 
Ict mgmt processes_roles_competencies
Ict mgmt processes_roles_competenciesIct mgmt processes_roles_competencies
Ict mgmt processes_roles_competencies
 
Cloud Services Brokerage Demystified
Cloud Services Brokerage DemystifiedCloud Services Brokerage Demystified
Cloud Services Brokerage Demystified
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
Enterprise Blockchain: Top Considerations Before You Deploy
 Enterprise Blockchain: Top Considerations Before You Deploy Enterprise Blockchain: Top Considerations Before You Deploy
Enterprise Blockchain: Top Considerations Before You Deploy
 
I T E007 Warner 091807
I T E007  Warner 091807I T E007  Warner 091807
I T E007 Warner 091807
 
School of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComSchool of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud Com
 
CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT Security
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
 
It infrastructure management
It infrastructure managementIt infrastructure management
It infrastructure management
 
Presentation to the AEA (June 23)
Presentation to the AEA (June 23) Presentation to the AEA (June 23)
Presentation to the AEA (June 23)
 
ITSM Transformation Strategies V 2
ITSM Transformation Strategies V 2ITSM Transformation Strategies V 2
ITSM Transformation Strategies V 2
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud Computing
 
Governance V3 (2)
Governance V3 (2)Governance V3 (2)
Governance V3 (2)
 
Governance Strategies & Tools for Cloud Formation
Governance Strategies & Tools for Cloud Formation Governance Strategies & Tools for Cloud Formation
Governance Strategies & Tools for Cloud Formation
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
Ifw framework for banking industry presentation
Ifw framework for banking industry presentationIfw framework for banking industry presentation
Ifw framework for banking industry presentation
 

More from Nitin Gaur

World wirestablecoinbusinessconsiderations v21
World wirestablecoinbusinessconsiderations v21World wirestablecoinbusinessconsiderations v21
World wirestablecoinbusinessconsiderations v21Nitin Gaur
 
Bluemix digital innovation_platform
Bluemix digital innovation_platformBluemix digital innovation_platform
Bluemix digital innovation_platformNitin Gaur
 
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...Nitin Gaur
 
API First Mobile Strategy
API First Mobile StrategyAPI First Mobile Strategy
API First Mobile StrategyNitin Gaur
 
IBM MobileFirst: Defining a Digital Strategy Communicating to Understand
IBM MobileFirst: Defining a Digital StrategyCommunicating to UnderstandIBM MobileFirst: Defining a Digital StrategyCommunicating to Understand
IBM MobileFirst: Defining a Digital Strategy Communicating to Understand Nitin Gaur
 
IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...
IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...
IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...Nitin Gaur
 
Ibm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcIbm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcNitin Gaur
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefingNitin Gaur
 
Worklight nitin nm
Worklight nitin nmWorklight nitin nm
Worklight nitin nmNitin Gaur
 

More from Nitin Gaur (10)

World wirestablecoinbusinessconsiderations v21
World wirestablecoinbusinessconsiderations v21World wirestablecoinbusinessconsiderations v21
World wirestablecoinbusinessconsiderations v21
 
Bluemix digital innovation_platform
Bluemix digital innovation_platformBluemix digital innovation_platform
Bluemix digital innovation_platform
 
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
 
API First Mobile Strategy
API First Mobile StrategyAPI First Mobile Strategy
API First Mobile Strategy
 
IBM MobileFirst: Defining a Digital Strategy Communicating to Understand
IBM MobileFirst: Defining a Digital StrategyCommunicating to UnderstandIBM MobileFirst: Defining a Digital StrategyCommunicating to Understand
IBM MobileFirst: Defining a Digital Strategy Communicating to Understand
 
IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...
IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...
IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...
 
Ibm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcIbm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dc
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefing
 
2018 jk
2018 jk2018 jk
2018 jk
 
Worklight nitin nm
Worklight nitin nmWorklight nitin nm
Worklight nitin nm
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Blockchain governance

  • 1. Making Blockchain Real for Business Understanding Governance Model in Business Networks Powered by Blockchain Nitin Gaur – ngaur@us.ibm.com
  • 2. Difference in focus points of permission less and permissioned enterprise-oriented networks Permission less networks Permissioned enterprise-oriented networks Designing and implementing economic systems based on principles of decentralization, open or self- governance and transparency Creating of crypto-assets backed by real value Technology-driven reimagining the ecosystems, business network, regulatory compliance, confidentiality and privacy, and business models Building innovative technical solutions Creating proof-of-concepts with quick results Implementing existing business processes with blockchain Decentralization and disintermediation at core Involving existing intermediaries and central parties in developing common economical incentives VS VS VS VS
  • 3. Difference in governance fundamentals of permission less and permissioned enterprise- oriented networks Permission less networks Permissioned enterprise-oriented networks Economy-base incentives Network self-management and coordination Consortium-defined incentives and penalties Consortium-defined semi- autonomous governance structures VS VS
  • 4. Page 4© 2017 IBM Corporation IBM Confidential Building Blocks of Governance model for permissioned enterprise-oriented networks Industry and use case-specific which need to factor various facets and evolution of the industry itself. Not only govern participation in business networks but also an equitable cost structure that is fairly spread based on participant activity. A discipline that is focused on IT infrastructures, performance, cost structures, and business risk. (Blockchain) Network Governance (Information) Technology Governance Business Network Governance
  • 5. Business Network Governance What is it? A industry specific and use case specific model that factor various facets and evolution of the industry itself. Examples • Common/shared services management, such as KYC, audits, reporting, etc. • Network-related charter and communication • Quality assurance, performance, and network security • Product and business network evolution • Enforcement of legal and regulatory frameworks • Adherence to industry-specific requirements • Framework, charter, and stewards of technology and network governance frameworks • Formulate appropriate business models , legal charters, and rules of engagement for network business operations
  • 6. What is it? Not only govern participation in business networks but also an equitable cost structure that is fairly spread based on participant activity. This also involves a structure that allows for autonomous and likeminded business entities to engage in business transactions, contracts, and value creation. Examples • Membership onboarding/off-boarding • Equitable and fair cost structure – chargeback models • Data ownership structure – for business entities joining and leaving the network • Regulatory oversight provisioning – including a model to act as a delegate to generate regulatory compliance reporting • Permissioning structure – key management that can include a model • that is vote-driven but centrally managed; • has a federated structure – members inviting other business entities; and • has a delegated structure – includes services providers that can delegate to other members • Business and SLA management – the blockchain business network management • Network support services – these are business networks, so the governance model should include network support services, business network SLA enforcement, and membership services • Risk optimization – OSSs and BSSs, business continuity services/planning, network alignment to legal and regulatory requirements, etc. • network business operations (Blockchain) Network Governance
  • 7. (Information) Technology Governance What is it? A discipline that is focused on IT infrastructures, performance, cost structures, and business risk which should accommodate for a model that is inclusive of distributed flexibility and distributed control. Examples • A distributed IT management structure • Model for distributed maintenance – software/HW updates, upgrades, path management • Framework utilizing industry standards—COBIT, ITIL, ISO, CMMI, FAIR, etc. – driven by the business network • Resource optimization – includes technology procurement, vendor relations, SLA management, skills, and talent management • Technology adoption and assessment – leads to keeping up with technology evolution and economic deployment models, including deployment and operational risks • Network deployment strategy – Not as simple as an application upgrade but a model that can encourage and enforce continual technology and security updates and upgrades • Network support services –should include network support services, IT SLA enforcement, and membership services • Risk optimization – operational support services (OSSs) and business support services (BSSs), IT infrastructure continuity services/planning, technology alignment to legal and regulatory requirements, etc. The IT governance model should not only incentivize technology upgrades and security updates but penalize non-compliant systems/nodes, thereby creating an incentive mechanism to ensure continued participation.

Editor's Notes

  1. in the genesis of a blockchain-presented value network that is self-governed, censorship-resistant, and whose governance structure was defined by control points and incentive economics to maintain a balance between network-based coordination and network-based decision on transaction finality, the consensus algorithms of these decentralized networks presented a distributed governance structure where the input (transaction initiation) was from various stakeholders (owners of assets, assigned or delegated ownership or simply delegated authority), the input in form of a transaction that went through a series of network-based decentralized processing, and the decision was the output in the form of a transaction finality. The governance structure was fundamentally being based on devised incentive economic driven by consensus in hopes of governing the network. This leads to defining governance—a body (centralized or decentralized) whose sole responsibility is to make binding decisions in a given system by establishing set of law or rules. While the genesis of blockchain, which was largely permissionless (e.g., crypo-asset based networks such as Bitcoin, Litecoin, etc.), relied upon technology-based systemic governance comprising incentives and mechanisms of coordination, this systemic governance has its own set of challenges in the enterprise business networks attempting to exploit the tenets of blockchain technology. In the enterprise world that is largely regulated and relies upon (mostly) permissioned blockchain models, the checks-and-balances system is complicated by transactions between competing entities, often with regulated data and a fiduciary responsibility, which can neither account for the tangible or systemically generated incentives (crypto-assets) nor have network-wide mechanisms of coordination due to privacy and confidentiality issues. On the enterprise side of the divide, the focus was on understanding the technology and reimagining the ecosystems, business network, regulatory compliance, confidentiality and privacy, and business models that impact industry networks. The governance structure is hence an interesting challenge and emerging discipline in the enterprise blockchain world, where the debate around the spectrum that ranges between full decentralization and quasi-decentralization to fully centralized blockchain networks hinges upon the governance structure. In other words, the governance structure and landscape will determine the interaction models, growth (centralized or decentralized), technology design, and overall business operations of the enterprise blockchain network.
  2. In my post on Blockchain Business Models, I briefly discussed a platform that facilitates co-creation and new synergies that will need to be managed, operated with defined levels of SLA, and a robust governance structure that will not only attract new participants but sustain the confidence and business benefit of its founders and existing participants. So there is a close-knit dependency on business models and governance structure that govern various facets of blockchain network operations. A well-thought-out governance structure for blockchain networks provides an important avenue for business continuity, funding and sourcing models, and overall growth driven by the economic and financial structure of the business network powered by the tenets of blockchain technology. systemic governance that relies on purely incentive and network coordination is just inadequate to address the more structured and regulated industries and their use cases. So, based on my experience and work with clients, I have taken the liberty of defining a governance structure and landscape that not only leverage the known and proven existing practices but stitch together a model that is modular and facilitates progression and yet provides a layer of separation of competency concerns between various practitioners. As I discuss this simplified governance structure, I draw inspiration from core tenets of blockchain design and propose a governance model that is inclusive of the core tenets that include principles of incentives, penalties, flexibility, delegation, and network mechanisms of coordination. After all, we are leveraging blockchain technology to device trust networks and attempting to flatten the distinction between the miner and user, and yet enforcing rules of engagement that not only incentivize technology upgrades and security updates but penalize non-compliant systems/nodes, including similar business network rules of engagement, thereby creating an incentive mechanism to ensure continued participation and resulting business benefit and growth from blockchain-powered business networks. This business governance model not only governs participation in business networks, but also an equitable cost structure that is fairly spread based on participant activity. In this section, I am drawing from my past work around Design Principles of Blockchain Network and Blockchain Adoption in Enterprise.