SlideShare a Scribd company logo
Cybersecurity Best Practices for
Blockchain Technology
Maëva Ghonda
Group Leader
Global Cybersecurity Group for Blockchain Tech
• Innovation Process: Agile Systems Engineering
• 210 Cybersecurity Experts Worldwide
• Multidisciplinary Expertise: Artificial Intelligence,
Quantum Information Science, Cryptocurrency, etc.
• Public-Private Collaboration
• Affiliations: Facebook, Google, Amazon, EY, IBM, HPE,
JPMorgan Chase, KPMG India, Stimson Center,
Mastercard, City of Toronto, PwC, Capgemini, Manulife,
HSBC, Ford Motor Company, Deloitte, American Airlines,
ING, Roche, Walmart, Accenture, Cisco, Blue Cross Blue
Shield, McDermott Will & Emery, Panama National
Authority for Government Innovation, Tata, University of
Prishtina, Halliburton, Fayoum University, Conduent,
Zendesk, King Saud University, Siemens, Cloudflare, Citrix,
Oracle, Sasol,NOKIA, Cognizant, MongoDB, etc.
210
Cybersecurity Blockchain Group Global Distribution
Program Leads Review
and
Section Leads Q&A
Blockchain Networks
• Blockchain Platform (90%)
• Blockchain as a Service (90%)
• SaaS with Blockchain (55%)
Blockchain Types
• Public Blockchain (70%)
• Permissioned Blockchain (85%)
Focus Areas Domains
• Governance (95%)
• Architecture (85%)
• Transaction Layer (90%)
• Operation Layer (80%)
• Infrastructure (65%)
• Highlight survey results.
• Discuss next steps.
• Agree on next catch-up time.
Scope Statement:
The Global Cybersecurity Blockchain Best Practices Group provides guiding principles to enable security integration during the adoption of Blockchain technologies.
Agenda Items
Top 3 Updates – Achievements, Highlights and Next Steps
• 28 volunteers identified from our last call.
• 20 responses were collected from 2nd survey.
• Governance & Transaction Layer scored the highest (90%).
Survey Highlights
• Request for Comments – Document Outline.
• Assign document section leaders/authors.
• Create an Idea Lab Form to collect ideas.
Next Steps
Survey Results – Details – Results with at least 65% of respondents
Governance
Architecture &
Infra. Layer
Operation Layer
Transactional
Layer
Risk Assessment 3rd Party Evaluation Platform Evaluation
Technology Evaluation
Encryption Elevated Admin Access
Backup & Recovery Technology Mapping
Data Immutability Pseudonymity Protection
Automation Compliance Requirements
Smart Contracts
Crypto Exchange
Servers & Databases
Permission Network
Industry Frameworks
APIs & Technology Integration
CSA Domains – In-scope
• AIS (80%)
• AAC (70%)
• CCC (75%)
• DSI (90%)
• EKM (95%)
• GRM (85%)
• IAM (85%)
• IVS (65%)
• SEF (70%)
• TVM (80%)
Other areas to include
• Market Industrial Sector
• Global Regulation Coverage & its
impact
Cybersecurity Best Practices for Blockchain Technology
Execution Phase and Timeline Review
We have completed the Proposal
& Approval phases.
June 2020 - We are now in the
Execution phase. Research is
approved and our official
working group is formed.
Main activities are developing
our plans, setting key milestones
& dates, agreeing on research
structure and beginning the
writing process.
Our goal is to complete this
phase by November 30th, 2020.
Our main objective is to create a
completed draft to be released
for the CSA community for peer
review.
Our goal is for us to issue the
completed draft by November
30th, 2020.
This will allow us to begin the
peer review process by January
2021.
May – June 2020 August – September 2020
June – August 2020 October – November 2020
• Complete scoping and
document layout.
• Assign content lead authors to
each section.
• Establish a communication
plan, including Teams.
• Collect working group
comments for a period of 2-
weeks.
• Lead section authors to address
comments with subject matter
experts.
• Finalize Version 0.5 for release.
• Begin the writing process; lead
authors to start research process.
• Schedule monthly meeting and
monitor progress.
• Draft version 0.5 by August 3rd to be
ready for working group release.
• Begin the writing process of the
version 1.0.
• Draft version 1.0 for community
release by October 30th.
• Finalize Version 1.0 to be ready
for peer review by November
30th .
Execution Phase: Key Milestones
Scoping
Version 0.5 release
Version 0.5 with comments
Version 1.0 release
Peer
Review
Phase
Execute
Phase
Global Cybersecurity Group Structure: Best Practices for Blockchain Technology
Maëva Ghonda
Group Leader
Project Management
● Loredana Mancini*
● <PM Role 2>
● <PM Role 3>
Governance, Risk
Management, Compliance
● Nabeel Shamsi*
● Ashish Mehta*
● Roupe Sahans
● Vishnupriya P T
Transaction Layer
● Gaurav Khanna*
● Urmila Nagvekar*
● Nnamdi Osuagwu
● <Crypto Exchange>
Operational Layer
● Siddharth Durbha*
● Yash Mantha*
● <Incident
Management>
Architecture
● Frederic de Vaulx*
● Madhavsai Chowdary
● <Network Security>
● <Encryption>
Case Studies
● Douglas Capellman*
● Loredana Mancini
● Salman Baset
Advisory Board
● <Cybersecurity>
● <Privacy>
● <Legal>
● <Technology>
Technical Editors
● <Editor 1>
● <Editor 2>
● <Editor 3>
● <Editor 4>
● <Editor 5>
Program Leads * Section Leaders
<> Open Roles
● Anjlica Malla ● Mostafa Elghazaly
Blockchain
Cybersecurity Best Practices
Case Study Research Design
Dr. Doug Capellman, CISSP
Case study research approach
⚫ The case study will be used to examine a case, bounded in time
and place, and will look for background material about the
setting of the case.
⚫ Extensive material will be gathered from multiple sources of
information in order to provide an in-depth picture of the case.
⚫ It will present an in-depth understanding of the case, will cover
multiple sources, and then draw a single set of cross-case
conclusions.
What the case study will accomplish
This study will accomplish the following:
⚫ Explain the presumed contributing association in real-world
interventions that are too complex for survey or experimental
methods.
⚫ Describe an intervention and the real-world context in which it
occurred.
⚫ Illustrate certain topics within an evaluation in a descriptive
mode.
⚫ Explain situations in which the intervention being evaluated has
no clear, single set of outcomes.”
Case study scope:
⚫ The case for this study is blockchain cybersecurity best practices.
⚫ This “case” was a bounded system (blockchain cybersecurity best
practices), bounded by time (one month of data collection) and place
(industry security requirements and blockchain use cases).
⚫
Case study intentions:
⚫ The intent is to report a single, instrumental case study.
⚫ Thus, we are interested in exploring the issue of blockchain
cybersecurity best practices and using multiple cases from
many industries to illustrate the security best practices and
use cases.
Case study data collection:
⚫ We will use extensive information from multiple sources
during the data collection process to provide a detailed in-
depth understanding of blockchain cybersecurity best
practices.
⚫ A table of data collection sources will be documented and
will convince readers of the in-depth picture that we built.
Case study data analysis:
⚫ In the data analysis, we will describe the background/setting and
establish the case for blockchain cybersecurity best requirements.
⚫ We will present several themes (data leakage, compliance risks,
perimeter protection risks, etc.) which will help us to understand
the case.
⚫ The themes will not be presented as an order of events because
they are all important.
Case study claims and conclusions:
⚫ The case study analysis will present claims relating to
industry security requirements and blockchain use cases.
⚫ The hope is to further ground the assertions in current
literature that also addresses blockchain cybersecurity best
practices.
⚫ From the literature review, the case study will explain and
support the descriptive analyses.

More Related Content

PDF
Security Model of Blockchain
PDF
Blockchain based Security Architectures - A Review
PDF
Introduction to Blockchain Governance Models
PPTX
Token Governance in Blockchain Ecosystems
PPTX
The future of data security and blockchain
PPTX
The Blockchain and the Future of Cybersecurity
PDF
Bat38 aouini bogosalvarado_zk-snark_blockchain
PDF
Brief Introduction to Blockchain Security
Security Model of Blockchain
Blockchain based Security Architectures - A Review
Introduction to Blockchain Governance Models
Token Governance in Blockchain Ecosystems
The future of data security and blockchain
The Blockchain and the Future of Cybersecurity
Bat38 aouini bogosalvarado_zk-snark_blockchain
Brief Introduction to Blockchain Security

What's hot (20)

PDF
Komodo Blockchain Security Service Brochure
PDF
Getting Started in Blockchain Security and Smart Contract Auditing
PPTX
Blockchain and Cybersecurity
PDF
Blockchain security a different perspective
PPTX
What is the future of blockchain in cybersecurity
PDF
Blockchain for Business
PPTX
How does hyperledger fabric blockchain work
PDF
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
PDF
Building Blockchain Projects on Enterprise Ethereum [Webinar]
PPTX
Globally Scalable Mobile Digital ID using IEEE P1451.99
PDF
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
PDF
Enterprise Blockchain Application Development using Azure Blockchain Service
PDF
blockchain governance : opportunities and challenges
PDF
A framework for improving the efficiency of the transparency in financial dom...
PDF
Blockchain Security Issues and Challenges
PDF
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
PDF
Blockchain and IOT and the GxP Lab Slides
PPTX
Blockchain in cyber security
PPTX
Comparison Blockchain Developer vs. Blockchain Expert
PDF
How To Become A Certified Blockchain Security Professional?
Komodo Blockchain Security Service Brochure
Getting Started in Blockchain Security and Smart Contract Auditing
Blockchain and Cybersecurity
Blockchain security a different perspective
What is the future of blockchain in cybersecurity
Blockchain for Business
How does hyperledger fabric blockchain work
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Building Blockchain Projects on Enterprise Ethereum [Webinar]
Globally Scalable Mobile Digital ID using IEEE P1451.99
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Enterprise Blockchain Application Development using Azure Blockchain Service
blockchain governance : opportunities and challenges
A framework for improving the efficiency of the transparency in financial dom...
Blockchain Security Issues and Challenges
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Blockchain and IOT and the GxP Lab Slides
Blockchain in cyber security
Comparison Blockchain Developer vs. Blockchain Expert
How To Become A Certified Blockchain Security Professional?
Ad

Similar to Global Cybersecurity Blockchain Group (20)

DOCX
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
PPTX
Cyber Security Landscape in 2024. An In-Depth Exploration of Trends, Challeng...
PDF
Introduction to NIST Cybersecurity Framework
PPTX
Nist 800 53 deep dive 20210813
PDF
Nist cybersecurity framework isc2 quantico
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PPTX
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
PDF
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PPTX
Legal and Ethical Implications of Cybersecurity.pptx
PPTX
afafafafa of afafafafafafaf kingdom.pptx
PPTX
DMSS PPT123456789012345678912348975.pptx
PDF
Cybersecurity Practices to Adopt in 2025_ An All-inclusive Guide for Business...
PDF
2024-Cybersecurity-Outlook for all engineering students
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
The Evolution of Cybersecurity in Software Development for 2025
PPTX
Cybersecurity Capability Maturity Model (C2M2)
PPTX
Policies to mitigate cyber risk
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Cyber Security Landscape in 2024. An In-Depth Exploration of Trends, Challeng...
Introduction to NIST Cybersecurity Framework
Nist 800 53 deep dive 20210813
Nist cybersecurity framework isc2 quantico
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
Legal and Ethical Implications of Cybersecurity.pptx
afafafafa of afafafafafafaf kingdom.pptx
DMSS PPT123456789012345678912348975.pptx
Cybersecurity Practices to Adopt in 2025_ An All-inclusive Guide for Business...
2024-Cybersecurity-Outlook for all engineering students
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
The Evolution of Cybersecurity in Software Development for 2025
Cybersecurity Capability Maturity Model (C2M2)
Policies to mitigate cyber risk
Ad

Recently uploaded (20)

PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Construction Project Organization Group 2.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPT
Mechanical Engineering MATERIALS Selection
PDF
composite construction of structures.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT
Project quality management in manufacturing
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Welding lecture in detail for understanding
CH1 Production IntroductoryConcepts.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
OOP with Java - Java Introduction (Basics)
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Construction Project Organization Group 2.pptx
Foundation to blockchain - A guide to Blockchain Tech
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Mechanical Engineering MATERIALS Selection
composite construction of structures.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Project quality management in manufacturing
UNIT 4 Total Quality Management .pptx
Welding lecture in detail for understanding

Global Cybersecurity Blockchain Group

  • 1. Cybersecurity Best Practices for Blockchain Technology Maëva Ghonda Group Leader
  • 2. Global Cybersecurity Group for Blockchain Tech • Innovation Process: Agile Systems Engineering • 210 Cybersecurity Experts Worldwide • Multidisciplinary Expertise: Artificial Intelligence, Quantum Information Science, Cryptocurrency, etc. • Public-Private Collaboration • Affiliations: Facebook, Google, Amazon, EY, IBM, HPE, JPMorgan Chase, KPMG India, Stimson Center, Mastercard, City of Toronto, PwC, Capgemini, Manulife, HSBC, Ford Motor Company, Deloitte, American Airlines, ING, Roche, Walmart, Accenture, Cisco, Blue Cross Blue Shield, McDermott Will & Emery, Panama National Authority for Government Innovation, Tata, University of Prishtina, Halliburton, Fayoum University, Conduent, Zendesk, King Saud University, Siemens, Cloudflare, Citrix, Oracle, Sasol,NOKIA, Cognizant, MongoDB, etc. 210
  • 3. Cybersecurity Blockchain Group Global Distribution
  • 5. Blockchain Networks • Blockchain Platform (90%) • Blockchain as a Service (90%) • SaaS with Blockchain (55%) Blockchain Types • Public Blockchain (70%) • Permissioned Blockchain (85%) Focus Areas Domains • Governance (95%) • Architecture (85%) • Transaction Layer (90%) • Operation Layer (80%) • Infrastructure (65%) • Highlight survey results. • Discuss next steps. • Agree on next catch-up time. Scope Statement: The Global Cybersecurity Blockchain Best Practices Group provides guiding principles to enable security integration during the adoption of Blockchain technologies. Agenda Items Top 3 Updates – Achievements, Highlights and Next Steps • 28 volunteers identified from our last call. • 20 responses were collected from 2nd survey. • Governance & Transaction Layer scored the highest (90%). Survey Highlights • Request for Comments – Document Outline. • Assign document section leaders/authors. • Create an Idea Lab Form to collect ideas. Next Steps Survey Results – Details – Results with at least 65% of respondents Governance Architecture & Infra. Layer Operation Layer Transactional Layer Risk Assessment 3rd Party Evaluation Platform Evaluation Technology Evaluation Encryption Elevated Admin Access Backup & Recovery Technology Mapping Data Immutability Pseudonymity Protection Automation Compliance Requirements Smart Contracts Crypto Exchange Servers & Databases Permission Network Industry Frameworks APIs & Technology Integration CSA Domains – In-scope • AIS (80%) • AAC (70%) • CCC (75%) • DSI (90%) • EKM (95%) • GRM (85%) • IAM (85%) • IVS (65%) • SEF (70%) • TVM (80%) Other areas to include • Market Industrial Sector • Global Regulation Coverage & its impact
  • 6. Cybersecurity Best Practices for Blockchain Technology Execution Phase and Timeline Review
  • 7. We have completed the Proposal & Approval phases. June 2020 - We are now in the Execution phase. Research is approved and our official working group is formed. Main activities are developing our plans, setting key milestones & dates, agreeing on research structure and beginning the writing process. Our goal is to complete this phase by November 30th, 2020.
  • 8. Our main objective is to create a completed draft to be released for the CSA community for peer review. Our goal is for us to issue the completed draft by November 30th, 2020. This will allow us to begin the peer review process by January 2021.
  • 9. May – June 2020 August – September 2020 June – August 2020 October – November 2020 • Complete scoping and document layout. • Assign content lead authors to each section. • Establish a communication plan, including Teams. • Collect working group comments for a period of 2- weeks. • Lead section authors to address comments with subject matter experts. • Finalize Version 0.5 for release. • Begin the writing process; lead authors to start research process. • Schedule monthly meeting and monitor progress. • Draft version 0.5 by August 3rd to be ready for working group release. • Begin the writing process of the version 1.0. • Draft version 1.0 for community release by October 30th. • Finalize Version 1.0 to be ready for peer review by November 30th . Execution Phase: Key Milestones Scoping Version 0.5 release Version 0.5 with comments Version 1.0 release Peer Review Phase Execute Phase
  • 10. Global Cybersecurity Group Structure: Best Practices for Blockchain Technology Maëva Ghonda Group Leader Project Management ● Loredana Mancini* ● <PM Role 2> ● <PM Role 3> Governance, Risk Management, Compliance ● Nabeel Shamsi* ● Ashish Mehta* ● Roupe Sahans ● Vishnupriya P T Transaction Layer ● Gaurav Khanna* ● Urmila Nagvekar* ● Nnamdi Osuagwu ● <Crypto Exchange> Operational Layer ● Siddharth Durbha* ● Yash Mantha* ● <Incident Management> Architecture ● Frederic de Vaulx* ● Madhavsai Chowdary ● <Network Security> ● <Encryption> Case Studies ● Douglas Capellman* ● Loredana Mancini ● Salman Baset Advisory Board ● <Cybersecurity> ● <Privacy> ● <Legal> ● <Technology> Technical Editors ● <Editor 1> ● <Editor 2> ● <Editor 3> ● <Editor 4> ● <Editor 5> Program Leads * Section Leaders <> Open Roles ● Anjlica Malla ● Mostafa Elghazaly
  • 11. Blockchain Cybersecurity Best Practices Case Study Research Design Dr. Doug Capellman, CISSP
  • 12. Case study research approach ⚫ The case study will be used to examine a case, bounded in time and place, and will look for background material about the setting of the case. ⚫ Extensive material will be gathered from multiple sources of information in order to provide an in-depth picture of the case. ⚫ It will present an in-depth understanding of the case, will cover multiple sources, and then draw a single set of cross-case conclusions.
  • 13. What the case study will accomplish This study will accomplish the following: ⚫ Explain the presumed contributing association in real-world interventions that are too complex for survey or experimental methods. ⚫ Describe an intervention and the real-world context in which it occurred. ⚫ Illustrate certain topics within an evaluation in a descriptive mode. ⚫ Explain situations in which the intervention being evaluated has no clear, single set of outcomes.”
  • 14. Case study scope: ⚫ The case for this study is blockchain cybersecurity best practices. ⚫ This “case” was a bounded system (blockchain cybersecurity best practices), bounded by time (one month of data collection) and place (industry security requirements and blockchain use cases). ⚫
  • 15. Case study intentions: ⚫ The intent is to report a single, instrumental case study. ⚫ Thus, we are interested in exploring the issue of blockchain cybersecurity best practices and using multiple cases from many industries to illustrate the security best practices and use cases.
  • 16. Case study data collection: ⚫ We will use extensive information from multiple sources during the data collection process to provide a detailed in- depth understanding of blockchain cybersecurity best practices. ⚫ A table of data collection sources will be documented and will convince readers of the in-depth picture that we built.
  • 17. Case study data analysis: ⚫ In the data analysis, we will describe the background/setting and establish the case for blockchain cybersecurity best requirements. ⚫ We will present several themes (data leakage, compliance risks, perimeter protection risks, etc.) which will help us to understand the case. ⚫ The themes will not be presented as an order of events because they are all important.
  • 18. Case study claims and conclusions: ⚫ The case study analysis will present claims relating to industry security requirements and blockchain use cases. ⚫ The hope is to further ground the assertions in current literature that also addresses blockchain cybersecurity best practices. ⚫ From the literature review, the case study will explain and support the descriptive analyses.