SlideShare a Scribd company logo
Web 3.0
From Buzzword to Security
1
Doug Barbin
Managing Partner &
Chief Growth Officer
Schellman
@DougBarbin
Avani Desai
CEO
Schellman
@AvaniDe
Web 3.0
The next major “release” of the Internet
2
What is Web 3.0?
Transformation from today’s Web 2.0
came from the Web 1.0 of the late
90s and early 2000s
Heavy emphasis on distributed
processing and storage
“Defining features of Web 3.0 include
decentralization; trustlessness and
permissionlessness; artificial
intelligence (AI) and machine learning;
and connectivity and ubiquity.”
Source - Investopedia
3
What is Decentralization and Trustlessness and
what about “the Blockchain”
In Web 3.0 a “database” is not
a single or centralized store
Blockchain technology was
built on the premise of no
single storage location and
nodes are replicated for
redundancy
Cryptocurrencies leverage this
technology to be anywhere or
everywhere making it more
immutable
4
What are the Major Use Cases for Web 3.0 Beyond “Crypto”
NFT
Smart contracts
Identity verification
Gaming
Drone identification
Artificial Intelligence
5
Practicalities of Using Web 3.0 Applications
Distributed and permissionless systems does
not mean permissionless applications
Users still have to interact with applications which
communicate with each other on the Web 3.0 back-end
Mobile applications are the gateways to all
Web 3.0 including cryptocurrency trading
6
Let’s Talk About Security
7
What About Cybersecurity – Five Key Security Implications
● Social engineering attacks are backend agnostic
(e.g. wallet attacks and enhanced spam)
● The front door is always the easy way in
(i.e. mobile applications)
● Compromised creditentials can be reused
like today or people impersonated
● Manipulation and disinformation of data including
configuration/security data
● Inability to trace/log activity creates challenges
for those responding to security incidents
8
Why Identity is Most Important
9
Identity forms and delivery:
● IDs and passwords
● Certificates
● Tokens and biometrics
● Federated credentials
Key Concepts
● Self Sovereign Identity (SSI)
with holders, issuers with
○ Verifiable Credentials
○ Verifiable Data Registries
And It is All About Trust!
10
What Regulatory/ Standards Bodies are
Working On Trust for Web 3.0
Legacy Programs
● AICPA/Canada CPA – WebTrust, SOC
● ISO 27001, 24760, 29003
Growth Programs
● Kantara (Identity/Authentication) US and UK
● Digital Identification and Authentication
Council of Canada (DIACC)
Emerging Programs
● Trust Over IP
● CIO Council Canada
11
What Now?
Always start with context
Do security and privacy by
design
Work with providers and
partners that are investing
in the space
12
THANK YOU
Doug Barbin
Managing Partner & Chief
Growth Officer
Schellman
@DougBarbin
doug.barbin@schellman.co
m
Avani Desai
CEO
Schellman
@AvaniDe
avani.desai@schellman.com

More Related Content

Similar to Web 3.0 – From Buzzword to Security with Schellman

Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
RahimMakhani2
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
Christopher Frenz
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
Jim Kaplan CIA CFE
 
Trends in IoT 2017
Trends in IoT 2017Trends in IoT 2017
Trends in IoT 2017
Dr Ganesh Iyer
 
19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf
KunjJoshi14
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
PROIDEA
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
Mohan Venkataraman
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
SatyaKVivek
 
Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012
Imperva
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
Jason Bloomberg
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
Felipe Prado
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
Vrince Vimal
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
Prateek Panda
 
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
itnewsafrica
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
Conor Bronsdon
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
Pablo Junco
 

Similar to Web 3.0 – From Buzzword to Security with Schellman (20)

Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Trends in IoT 2017
Trends in IoT 2017Trends in IoT 2017
Trends in IoT 2017
 
19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
 
Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 

More from saastr

Workshop Wednesdays with Jason Lemkin, CEO @ SaaStr
Workshop Wednesdays  with Jason Lemkin, CEO @ SaaStrWorkshop Wednesdays  with Jason Lemkin, CEO @ SaaStr
Workshop Wednesdays with Jason Lemkin, CEO @ SaaStr
saastr
 
Workshop Wednesday with HyperGrowth Partners
Workshop Wednesday with HyperGrowth PartnersWorkshop Wednesday with HyperGrowth Partners
Workshop Wednesday with HyperGrowth Partners
saastr
 
SaaStr Workshop Wednesday with CEO of Guru
SaaStr Workshop Wednesday with CEO of GuruSaaStr Workshop Wednesday with CEO of Guru
SaaStr Workshop Wednesday with CEO of Guru
saastr
 
SaaStr Workshop Wednesdays - RevenueCat.pdf
SaaStr Workshop Wednesdays - RevenueCat.pdfSaaStr Workshop Wednesdays - RevenueCat.pdf
SaaStr Workshop Wednesdays - RevenueCat.pdf
saastr
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
saastr
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
saastr
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
saastr
 
SaaStr Workshop Wednesdays: Top 5 Lessons Learned from Databricks' Journey fr...
SaaStr Workshop Wednesdays: Top 5 Lessons Learned from Databricks' Journey fr...SaaStr Workshop Wednesdays: Top 5 Lessons Learned from Databricks' Journey fr...
SaaStr Workshop Wednesdays: Top 5 Lessons Learned from Databricks' Journey fr...
saastr
 
SaaStr Workshop Wednesdays: What I Learned Selling My Company: Insights into ...
SaaStr Workshop Wednesdays: What I Learned Selling My Company: Insights into ...SaaStr Workshop Wednesdays: What I Learned Selling My Company: Insights into ...
SaaStr Workshop Wednesdays: What I Learned Selling My Company: Insights into ...
saastr
 
SaaStr Workshop Wednesdays: From Operator to Founder: What I’m Learning as a ...
SaaStr Workshop Wednesdays: From Operator to Founder: What I’m Learning as a ...SaaStr Workshop Wednesdays: From Operator to Founder: What I’m Learning as a ...
SaaStr Workshop Wednesdays: From Operator to Founder: What I’m Learning as a ...
saastr
 
SaaStr Workshop Wednesdays - 10 Things Founders Should Know About Getting Acq...
SaaStr Workshop Wednesdays - 10 Things Founders Should Know About Getting Acq...SaaStr Workshop Wednesdays - 10 Things Founders Should Know About Getting Acq...
SaaStr Workshop Wednesdays - 10 Things Founders Should Know About Getting Acq...
saastr
 
SaaStr Workshop Wednesdays: Pricing and Packaging for AI Products with Unusua...
SaaStr Workshop Wednesdays: Pricing and Packaging for AI Products with Unusua...SaaStr Workshop Wednesdays: Pricing and Packaging for AI Products with Unusua...
SaaStr Workshop Wednesdays: Pricing and Packaging for AI Products with Unusua...
saastr
 
SaaStr Workshop Wednesdays - From the Other Side: Advice from a Founder-Turne...
SaaStr Workshop Wednesdays - From the Other Side: Advice from a Founder-Turne...SaaStr Workshop Wednesdays - From the Other Side: Advice from a Founder-Turne...
SaaStr Workshop Wednesdays - From the Other Side: Advice from a Founder-Turne...
saastr
 
SaaStr Workshop Wednesdays: Territory Assignment Innovation: High-Velocity Te...
SaaStr Workshop Wednesdays: Territory Assignment Innovation: High-Velocity Te...SaaStr Workshop Wednesdays: Territory Assignment Innovation: High-Velocity Te...
SaaStr Workshop Wednesdays: Territory Assignment Innovation: High-Velocity Te...
saastr
 
SaaStr Workshop Wednesdays: How to Build Out an SDR Function
SaaStr Workshop Wednesdays: How to Build Out an SDR FunctionSaaStr Workshop Wednesdays: How to Build Out an SDR Function
SaaStr Workshop Wednesdays: How to Build Out an SDR Function
saastr
 
Workshop Wednesdays: Customer Service Part 2: AMA with Jason and Nick
Workshop Wednesdays: Customer Service Part 2: AMA with Jason and NickWorkshop Wednesdays: Customer Service Part 2: AMA with Jason and Nick
Workshop Wednesdays: Customer Service Part 2: AMA with Jason and Nick
saastr
 
SaaStr Workshop Wednesdays: Dropbox, Klaviyo, Lightspeed Commerce: 10 Things ...
SaaStr Workshop Wednesdays: Dropbox, Klaviyo, Lightspeed Commerce: 10 Things ...SaaStr Workshop Wednesdays: Dropbox, Klaviyo, Lightspeed Commerce: 10 Things ...
SaaStr Workshop Wednesdays: Dropbox, Klaviyo, Lightspeed Commerce: 10 Things ...
saastr
 
Special Workshop Tuesday: The Future of Customer Success in 2024 with Gainsig...
Special Workshop Tuesday: The Future of Customer Success in 2024 with Gainsig...Special Workshop Tuesday: The Future of Customer Success in 2024 with Gainsig...
Special Workshop Tuesday: The Future of Customer Success in 2024 with Gainsig...
saastr
 
SaaStr Workshop Wednesdays: Lessons (Un)Learned: Successes and Setbacks on th...
SaaStr Workshop Wednesdays: Lessons (Un)Learned: Successes and Setbacks on th...SaaStr Workshop Wednesdays: Lessons (Un)Learned: Successes and Setbacks on th...
SaaStr Workshop Wednesdays: Lessons (Un)Learned: Successes and Setbacks on th...
saastr
 
SaaStr Workshop Wednesdays: State of SaaS with Altimeter Capital
SaaStr Workshop Wednesdays: State of SaaS with Altimeter CapitalSaaStr Workshop Wednesdays: State of SaaS with Altimeter Capital
SaaStr Workshop Wednesdays: State of SaaS with Altimeter Capital
saastr
 

More from saastr (20)

Workshop Wednesdays with Jason Lemkin, CEO @ SaaStr
Workshop Wednesdays  with Jason Lemkin, CEO @ SaaStrWorkshop Wednesdays  with Jason Lemkin, CEO @ SaaStr
Workshop Wednesdays with Jason Lemkin, CEO @ SaaStr
 
Workshop Wednesday with HyperGrowth Partners
Workshop Wednesday with HyperGrowth PartnersWorkshop Wednesday with HyperGrowth Partners
Workshop Wednesday with HyperGrowth Partners
 
SaaStr Workshop Wednesday with CEO of Guru
SaaStr Workshop Wednesday with CEO of GuruSaaStr Workshop Wednesday with CEO of Guru
SaaStr Workshop Wednesday with CEO of Guru
 
SaaStr Workshop Wednesdays - RevenueCat.pdf
SaaStr Workshop Wednesdays - RevenueCat.pdfSaaStr Workshop Wednesdays - RevenueCat.pdf
SaaStr Workshop Wednesdays - RevenueCat.pdf
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
 
SaaStr Workshop Wednesdays: Top 5 Lessons Learned from Databricks' Journey fr...
SaaStr Workshop Wednesdays: Top 5 Lessons Learned from Databricks' Journey fr...SaaStr Workshop Wednesdays: Top 5 Lessons Learned from Databricks' Journey fr...
SaaStr Workshop Wednesdays: Top 5 Lessons Learned from Databricks' Journey fr...
 
SaaStr Workshop Wednesdays: What I Learned Selling My Company: Insights into ...
SaaStr Workshop Wednesdays: What I Learned Selling My Company: Insights into ...SaaStr Workshop Wednesdays: What I Learned Selling My Company: Insights into ...
SaaStr Workshop Wednesdays: What I Learned Selling My Company: Insights into ...
 
SaaStr Workshop Wednesdays: From Operator to Founder: What I’m Learning as a ...
SaaStr Workshop Wednesdays: From Operator to Founder: What I’m Learning as a ...SaaStr Workshop Wednesdays: From Operator to Founder: What I’m Learning as a ...
SaaStr Workshop Wednesdays: From Operator to Founder: What I’m Learning as a ...
 
SaaStr Workshop Wednesdays - 10 Things Founders Should Know About Getting Acq...
SaaStr Workshop Wednesdays - 10 Things Founders Should Know About Getting Acq...SaaStr Workshop Wednesdays - 10 Things Founders Should Know About Getting Acq...
SaaStr Workshop Wednesdays - 10 Things Founders Should Know About Getting Acq...
 
SaaStr Workshop Wednesdays: Pricing and Packaging for AI Products with Unusua...
SaaStr Workshop Wednesdays: Pricing and Packaging for AI Products with Unusua...SaaStr Workshop Wednesdays: Pricing and Packaging for AI Products with Unusua...
SaaStr Workshop Wednesdays: Pricing and Packaging for AI Products with Unusua...
 
SaaStr Workshop Wednesdays - From the Other Side: Advice from a Founder-Turne...
SaaStr Workshop Wednesdays - From the Other Side: Advice from a Founder-Turne...SaaStr Workshop Wednesdays - From the Other Side: Advice from a Founder-Turne...
SaaStr Workshop Wednesdays - From the Other Side: Advice from a Founder-Turne...
 
SaaStr Workshop Wednesdays: Territory Assignment Innovation: High-Velocity Te...
SaaStr Workshop Wednesdays: Territory Assignment Innovation: High-Velocity Te...SaaStr Workshop Wednesdays: Territory Assignment Innovation: High-Velocity Te...
SaaStr Workshop Wednesdays: Territory Assignment Innovation: High-Velocity Te...
 
SaaStr Workshop Wednesdays: How to Build Out an SDR Function
SaaStr Workshop Wednesdays: How to Build Out an SDR FunctionSaaStr Workshop Wednesdays: How to Build Out an SDR Function
SaaStr Workshop Wednesdays: How to Build Out an SDR Function
 
Workshop Wednesdays: Customer Service Part 2: AMA with Jason and Nick
Workshop Wednesdays: Customer Service Part 2: AMA with Jason and NickWorkshop Wednesdays: Customer Service Part 2: AMA with Jason and Nick
Workshop Wednesdays: Customer Service Part 2: AMA with Jason and Nick
 
SaaStr Workshop Wednesdays: Dropbox, Klaviyo, Lightspeed Commerce: 10 Things ...
SaaStr Workshop Wednesdays: Dropbox, Klaviyo, Lightspeed Commerce: 10 Things ...SaaStr Workshop Wednesdays: Dropbox, Klaviyo, Lightspeed Commerce: 10 Things ...
SaaStr Workshop Wednesdays: Dropbox, Klaviyo, Lightspeed Commerce: 10 Things ...
 
Special Workshop Tuesday: The Future of Customer Success in 2024 with Gainsig...
Special Workshop Tuesday: The Future of Customer Success in 2024 with Gainsig...Special Workshop Tuesday: The Future of Customer Success in 2024 with Gainsig...
Special Workshop Tuesday: The Future of Customer Success in 2024 with Gainsig...
 
SaaStr Workshop Wednesdays: Lessons (Un)Learned: Successes and Setbacks on th...
SaaStr Workshop Wednesdays: Lessons (Un)Learned: Successes and Setbacks on th...SaaStr Workshop Wednesdays: Lessons (Un)Learned: Successes and Setbacks on th...
SaaStr Workshop Wednesdays: Lessons (Un)Learned: Successes and Setbacks on th...
 
SaaStr Workshop Wednesdays: State of SaaS with Altimeter Capital
SaaStr Workshop Wednesdays: State of SaaS with Altimeter CapitalSaaStr Workshop Wednesdays: State of SaaS with Altimeter Capital
SaaStr Workshop Wednesdays: State of SaaS with Altimeter Capital
 

Recently uploaded

Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 

Recently uploaded (20)

Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 

Web 3.0 – From Buzzword to Security with Schellman

  • 1. Web 3.0 From Buzzword to Security 1 Doug Barbin Managing Partner & Chief Growth Officer Schellman @DougBarbin Avani Desai CEO Schellman @AvaniDe
  • 2. Web 3.0 The next major “release” of the Internet 2
  • 3. What is Web 3.0? Transformation from today’s Web 2.0 came from the Web 1.0 of the late 90s and early 2000s Heavy emphasis on distributed processing and storage “Defining features of Web 3.0 include decentralization; trustlessness and permissionlessness; artificial intelligence (AI) and machine learning; and connectivity and ubiquity.” Source - Investopedia 3
  • 4. What is Decentralization and Trustlessness and what about “the Blockchain” In Web 3.0 a “database” is not a single or centralized store Blockchain technology was built on the premise of no single storage location and nodes are replicated for redundancy Cryptocurrencies leverage this technology to be anywhere or everywhere making it more immutable 4
  • 5. What are the Major Use Cases for Web 3.0 Beyond “Crypto” NFT Smart contracts Identity verification Gaming Drone identification Artificial Intelligence 5
  • 6. Practicalities of Using Web 3.0 Applications Distributed and permissionless systems does not mean permissionless applications Users still have to interact with applications which communicate with each other on the Web 3.0 back-end Mobile applications are the gateways to all Web 3.0 including cryptocurrency trading 6
  • 7. Let’s Talk About Security 7
  • 8. What About Cybersecurity – Five Key Security Implications ● Social engineering attacks are backend agnostic (e.g. wallet attacks and enhanced spam) ● The front door is always the easy way in (i.e. mobile applications) ● Compromised creditentials can be reused like today or people impersonated ● Manipulation and disinformation of data including configuration/security data ● Inability to trace/log activity creates challenges for those responding to security incidents 8
  • 9. Why Identity is Most Important 9 Identity forms and delivery: ● IDs and passwords ● Certificates ● Tokens and biometrics ● Federated credentials Key Concepts ● Self Sovereign Identity (SSI) with holders, issuers with ○ Verifiable Credentials ○ Verifiable Data Registries
  • 10. And It is All About Trust! 10
  • 11. What Regulatory/ Standards Bodies are Working On Trust for Web 3.0 Legacy Programs ● AICPA/Canada CPA – WebTrust, SOC ● ISO 27001, 24760, 29003 Growth Programs ● Kantara (Identity/Authentication) US and UK ● Digital Identification and Authentication Council of Canada (DIACC) Emerging Programs ● Trust Over IP ● CIO Council Canada 11
  • 12. What Now? Always start with context Do security and privacy by design Work with providers and partners that are investing in the space 12
  • 13. THANK YOU Doug Barbin Managing Partner & Chief Growth Officer Schellman @DougBarbin doug.barbin@schellman.co m Avani Desai CEO Schellman @AvaniDe avani.desai@schellman.com

Editor's Notes

  1. Avani: Web 3.0 is exactly what it sounds like – the next iteration of the Internet.
  2. Avani: Web 1.0 pioneers the language of the Internet, starting with simple private connections to public webpages using static HTML hosted on simple servers. Web 2.0, our current iteration, moved us away from plain webpages to dynamic content and the whole advent the social networking and its impact on how people consume information. Over the last 15 or so years, Web 2.0 has seen its fair share of technology evolution with the increase use of cloud computing and moving to containers and other forms of more advanced cloud computing services. Still in all of these cases, computing assets were largely centrally located and managed, even when doing so was done across a global footprint. Web 3.0 moves towards a more decentralized or distributed model. Applications do not require a central location for storage and processing but multiple ones. They also do not require a broker to manage permissions for access to these resources. While AI, including machine learning, were present and operating under the Web 2.0 infrastructure, their benefits have only begun to be recognized.
  3. Avani: Distributed networks: By nature exist everywhere Think “old school” peer to peer networking As “trusted” intermediary is not required, that creates risk The first use case for distributed computing was crypto currency. [Avani to highlight the additional benefits and her experience.]
  4. Avani There are many use cases for Web 3.0 technology, some of which we have yet to even think about. [Avani to list off and speak to above] Artificial intelligence never really reached its full potential in Web 2.0. It is not only empowered by more distributed computing (think SETI AI) but user will expect it.
  5. Avani: Regardless of how the data is distributed, users still require a means to interact (or to have a robot interact on their behalf). While traditional Web 2.0 front-ends will continue to remain available, increase use of mobile applications will continue and the convergence between business and social application will continue.
  6. Transition to Doug
  7. Doug Sadly, the types of security threats are not unique to Web 3.0 and we saw them very prevalent in Web 2.0. There is some upside – in a distributed storage environment like blockchain, the ability to compromise and encrypt data everywhere by a ransomware attacker could become more difficult. The human factor, social engineering will also be Achilles heel for compromise. Attackers go in through the people to get access to applications where data on distributed environments are stored. As a result, attackers can compromise credentials to access as well as the data itself. While blockchain technology itself helps to reduce the ability to manipulate information, an authorized but compromised credential can be used to manipulate information shared around the world. Last, the anonymity provided by Web 3.0 makes it more difficult for the incident responders and/or forensic professionals to identify who a particular threat actor was.
  8. Doug: The above forms of identity management are not new. Federated identity relies on Web 2.0 concepts to centrally manage and share credentials. In Web 3.0, users need to have control over their own identity and credentials so they’re not just stored in a “database” Your passport is on your phone controlled by you. It doesn’t sit elsewhere but its been issued by a trusted provider and verified by a trusted registry which validates the credential NOT stores it.
  9. Doug In the new Web 3.0 Economy, Trust is the Digital Currency. As of today, legacy compliance frameworks are used but not necessarily specific enough to the technologies being looked at. There are several growing and emerging programs, some self-certification that aim to address this issue. Some are government sponsored, while some are self certification.
  10. Doug What do you do now – continue to wait or plan ahead? It starts with context. Think about your role in Web 3.0, are you a provider, leverage, or user of the technology. Build security and privacy by design, not after the fact. Work with providers that know what they are doing and investing in the space. Avoid buzz words at all cost.