Jon Geater
Overcome your trust issues! In a world of fake data, Data Provenance FTW
#1about 6 minutes
Understanding the risks of the modern software supply chain
Vulnerabilities in common dependencies like Log4j demonstrate how the entire software ecosystem is at risk from a single point of failure.
#2about 12 minutes
Moving beyond software to address the data supply chain
The problem of trust extends from code to data, where AI-generated images and fraudulent documents pose significant business risks.
#3about 4 minutes
The failure of traditional perimeter-based security models
Despite record spending on cybersecurity, high-profile breaches like stolen signing keys show that traditional security approaches are no longer sufficient.
#4about 4 minutes
Introducing a new trust model based on data provenance
A shift to a "verify then trust" model using data provenance provides a more robust way to ensure integrity in a highly connected world.
#5about 4 minutes
Core principles of the IETF standard for integrity
The SCITT standard establishes trust through three key principles: strong identification, immutability, and transparency to prevent equivocation.
#6about 4 minutes
Implementing data provenance with APIs and distributed ledgers
An open source API uses distributed ledger technology to create verifiable, offline receipts for any data attestation, from IoT to SBOMs.
#7about 9 minutes
A live demonstration of creating a verifiable data claim
A simple API call attests a piece of data, creating an immutable and publicly verifiable record on a distributed ledger.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
23:29 MIN
Implementing and enforcing supply chain policies
Securing your application software supply-chain
17:19 MIN
Building trust through transparent data privacy
IKEA Story: Transforming an Iconic Retail Brand
02:46 MIN
Exploring the core domains of supply chain security
Open Source Secure Software Supply Chain in action
03:53 MIN
Why distributed ledger technology matters for business
Demystifying Crypto & Web3: A Technical Journey Through 15 Years of Innovation
09:08 MIN
Defining key standards and terminology in supply chain security
Open Source Secure Software Supply Chain in action
01:58 MIN
Cybersecurity is a foundational necessity not a passing trend
Decoding Trends: Strategies for Success in the Evolving Digital Domain
00:49 MIN
Understanding the challenges of secure data collaboration
TikTok's Privacy Innovation
09:00 MIN
Evaluating AI trustworthiness through data and automation scope
Rethinking Recruiting: What you didn’t know about Responsible AI
Featured Partners
Related Videos
Securing your application software supply-chain
Niels Tanis
Open Source Secure Software Supply Chain in action
Natale Vinto
From Monolith Tinkering to Modern Software Development
Lars Gentsch
Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
Adam Larter
GenAI Security: Navigating the Unseen Iceberg
Maish Saidel-Keesing
The Clean as You Code Imperative
Olivier Gaudin
Exploring 5 Key Applications of AI Abundance with Blockchain Assurance
ED MARQUEZ
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
From learning to earning
Jobs that call for the skills explored in this talk.


Senior Data Solutions Architect with AWS
Provectus
Canton de Saint-Mihiel, France
Remote
Senior
ETL
Scala
DevOps
Python
+2
Audit Manager - Data, Privacy & AI
Edinburgh, United Kingdom
Data Steward
TNO
Groningen, Netherlands


