Security, Privacy, Risk Management, Cryptocurrencies, & Fintech-logo

Security, Privacy, Risk Management, Cryptocurrencies, & Fintech

Technology Podcasts

Sharing my experience, knowldedge, and views. #security #privacy #risk #fintech #blockchain #cryptocurrencies

Location:

Canada

Description:

Sharing my experience, knowldedge, and views. #security #privacy #risk #fintech #blockchain #cryptocurrencies

Twitter:

@secunoid

Language:

English

Contact:

551-226-9650


Episodes
Ask host to enable sharing for playback control

Lightning, Plasma, Raiden, and State Channels

5/27/2018
Blockchains suffer from scaling issues. This is due to the fact that every transaction has to be propagated to all the nodes in the network and after propagation is complete the mining activity to create a block and provide a confirmation. In bitcoin blockchain a confirmation can take about ten minutes. When it comes to the security of a blockchain the number of nodes is directly related to the security of the blockchain, more nodes mean better security. Whereas the performance is indirectly proportional whereby as the number of nodes increases the blockchain starts to slow down as the transactions need to be propagated to more nodes. Transactions Per Second (TPS) for some blockchains are: • Bitcoin Blockchain processes 7 TPS • Ethereum processes 13TPS • Ripple processes 1500 TPS • Visa processes 1700 TPS, if required the system can process up to 56000 TPS

Duration:00:07:56

Ask host to enable sharing for playback control

Smart Cities, AI, Blockchain, and Hedera

5/19/2018
Today I will be talking about Hedera, Smart cities, Artificial Intelligence, and how blockchains are being proposed as a solution without really understanding the requirements. Show notes: https://www.securityprivacyrisk.com/smart-cities-ai-blockchain-hadera/ #blockchain #hadera #machinelearning #artificialintelligence #ICO #smartcities #iot #internetofthings #initialcoinoffering #consensus #theblockchainhub #privacycoins #privacytokens #fungibility Facebook Group: https://www.facebook.com/groups/2028470514075912/admin_activities/ YouTube Channel: https://www.youtube.com/channel/UCQtYBTppBxS0WLeCBx33gNQ?sub_confirmation=1 Apple Podcast Channel: https://itunes.apple.com/ca/podcast/security-privacy-risk-management-cryptocurrencies-fintech/id1341499853 Google Play Podcast: https://partnerdash.google.com/music/podcasts/portal/u/0#p:id=playpodcast/series&a=2354411696828237 TuneIn Radio: https://tunein.com/radio/Security-Privacy-Risk-Management-Cryptocurrencies-p1095473 References • Don't Forget About Storage When Planning For AI And ML

Duration:00:22:38

Ask host to enable sharing for playback control

Brief Introduction To Self - Sovereign Identity

5/13/2018
In this brief introduction to self sovereign identity, we will talk about how we build identity systems to create trust. Trust was something that was local and useful for establishing trust in a single domain. The only issue with existing identity systems is that they are not trust worthy. Still there is no good way to prove that you are a certain age, you have an account with a certain bank, etc. It is very difficult for someone else to vouch for you. Initially identity was siloed, then came federated identity, and now it is time for user centric identity, this is what self-sovereign identity is. Facebook Group: https://www.facebook.com/groups/2028470514075912/admin_activities/ YouTube Channel: https://www.youtube.com/channel/UCQtYBTppBxS0WLeCBx33gNQ?sub_confirmation=1 Apple Podcast Channel: https://itunes.apple.com/ca/podcast/security-privacy-risk-management-cryptocurrencies-fintech/id1341499853 Google Play Podcast: https://partnerdash.google.com/music/podcasts/portal/u/0#p:id=playpodcast/series&a=2354411696828237 TuneIn Radio: https://tunein.com/radio/Security-Privacy-Risk-Management-Cryptocurrencies-p1095473 Show notes can be found here: https://www.securityprivacyrisk.com/brief-introduction-to-self-sovereign-identity/

Duration:00:22:46

Ask host to enable sharing for playback control

GDPR Impacts On Service Providers

5/6/2018
GDPR(General Data Protection Regulation) impacts on service providers seems to be a very popular topic. I have published two shows, one explains What is GDPR? and the other about Privacy By Design principles. The idea behind this series is to bring awareness about GDPR and this show focuses on service providers, as they seem to be very confused when it comes to GDPR compliance. They are getting questions from their customers and are not sure how to respond. Show notes can be found here: https://www.securityprivacyrisk.com/gdpr-impacts-on-service-providers/ Facebook Group: https://www.facebook.com/groups/2028470514075912/admin_activities/ YouTube Channel: https://www.youtube.com/channel/UCQtYBTppBxS0WLeCBx33gNQ?sub_confirmation=1 Apple Podcast Channel: https://itunes.apple.com/ca/podcast/security-privacy-risk-management-cryptocurrencies-fintech/id1341499853 Google Play Podcast: https://partnerdash.google.com/music/podcasts/portal/u/0#p:id=playpodcast/series&a=2354411696828237 TuneIn Radio: https://tunein.com/radio/Security-Privacy-Risk-Management-Cryptocurrencies-p1095473

Duration:00:14:32

Ask host to enable sharing for playback control

SOC2 Audit Planning

4/27/2018
Guide on how to plan your very first SOC2 Audit. Show notes can be found here: https://www.securityprivacyrisk.com/soc2-audit-planning/

Duration:00:18:07

Ask host to enable sharing for playback control

Blockchain Security Tools

4/23/2018
Two weeks ago the show was about Blockchain Security, this week I will be talking about various tools available for some blockchain platforms. Basic blockchain architecture as it pertains to block creation and consensus mechanisms is very sound. The algorithms used to accomplish the cryptographic functions might be questionable. Hence special consideration should be given to key management, key length, hashing algorithms, and the environment that activity is conducted in. To date none of the block chains have been hacked or maliciously modified, hence from that aspect we are safe. If you consider blockchain mechanisms to be the foundation, which are unhackable at this point, the next few layers above is where the problems start. In this show, Show notes can be found here: https://www.securityprivacyrisk.com/blockchain-security-tools/

Duration:00:16:22

Ask host to enable sharing for playback control

What Is A Stable Coin

4/15/2018
Although crypto currencies are all the rage these days, one of the issues they all share is the stability. Where fiat currencies vary by a few percentage, the variations for crypto currencies can be quite very large make them very unstable from monetary perspective. Just like the issue of privacy & fungibility is being addressed by privacy coins, stable coins are trying to address the issue of stability. In this show I provide an overview and my thoughts.

Duration:00:12:36

Ask host to enable sharing for playback control

Blockchain Security

4/7/2018
2017 was the year of blockchain, the crypto currencies craze took over the world like a storm. Is all that glitters really gold, or just a hype. Sharing my thoughts on the security aspects of blockchain and how to address them. Show notes can be found here: https://wp.me/p8fC61-B2

Duration:00:19:33

Ask host to enable sharing for playback control

Privacy By Design

3/31/2018
What is Privacy by Design, and how to implement it in your environment. Show notes can be found here: https://wp.me/p8fC61-AT

Duration:00:17:53

Ask host to enable sharing for playback control

What is GDPR?

3/25/2018
Information about what GDPR (General Data Protection Regulation) is about and what to look out for to comply.

Duration:00:34:44

Ask host to enable sharing for playback control

Cryptocurrency Anonymity, Privacy, & Fungibility

3/17/2018
This discussion delves deeper into how the privacy coins are implementing anonymity, privacy, and fungibility. Also discuss the implementations of different solutions into existing tokens.

Duration:00:24:37

Ask host to enable sharing for playback control

What are Privacy Coins?

3/10/2018
Ever wonder what privacy coins or privacy cryptocurrencies are? In this video, I will provide an overview of why privacy tokens came into existence and list some of the privacy tokens that have been created.

Duration:00:21:26

Ask host to enable sharing for playback control

Impacts To Audits When Moving To The Cloud

2/23/2018
When organizations outsource their move their compute workloads to the cloud they assume that their cloud service provider will provide all the required assurances. Service providers can only provide assurance for the compute they manage. Any components sitting on top of the compute are solely the responsibility of the customer.

Duration:00:10:47

Ask host to enable sharing for playback control

Introduction To Blockchain

2/20/2018
Introduction to what a blockchain is, blockchain security, tokens vs cryptocurrencies, and blockchain platforms. Facebook Group: https://www.facebook.com/groups/2028470514075912/admin_activities/ YouTube Channel: https://www.youtube.com/channel/UCQtYBTppBxS0WLeCBx33gNQ?sub_confirmation=1 Apple Podcast Channel: https://itunes.apple.com/ca/podcast/security-privacy-risk-management-cryptocurrencies-fintech/id1341499853 Google Play Podcast: https://partnerdash.google.com/music/podcasts/portal/u/0#p:id=playpodcast/series&a=2354411696828237 TuneIn Radio: https://tunein.com/radio/Security-Privacy-Risk-Management-Cryptocurrencies-p1095473

Duration:00:20:51

Ask host to enable sharing for playback control

What is an ICO?

2/10/2018
Crypto market hit an all-time high on January 7 when it reached $835.69 billion. Earlier today that number was at $438.88 billion, representing about a 50% drop. Crypto currencies took 2017 by storm and the main catalyst in this meteoric rise was the advent of an ICO , which stands for Initial Coin Offering. ICO's are also known as ITO, Initial Token Offering and TGE, Token Generation Event. This podcast will provide an breif overview of the ICO's

Duration:00:11:15

Ask host to enable sharing for playback control

What to do after the audit report has been issued?

1/31/2018
Discuss what to do after the audit report has been issued. What normally happens and what should happen. Music: Ice Cream (http://freemusicarchive.org/music/Leo_Rossa/Ice_Cream/Leo_Rossa_-_Ice_Cream) by Leo Rossa (http://freemusicarchive.org/music/Leo_Rossa)

Duration:00:05:59

Ask host to enable sharing for playback control

SOC2 Reporting and Management Response

1/25/2018
When a SOC 2 report is issued, in "Description of Tests of Controls and Results of Testing" section, if a control has an exception or a qualification, a management response is included that talks about how the exception or the qualification risk is being managed. This podcast highlights the issues of doing so. Music: Ice Cream (http://freemusicarchive.org/music/Leo_Rossa/Ice_Cream/Leo_Rossa_-_Ice_Cream) by Leo Rossa (http://freemusicarchive.org/music/Leo_Rossa)

Duration:00:05:28