Jon Geater
Overcome your trust issues! In a world of fake data, Data Provenance FTW
#1about 6 minutes
Understanding the risks of the modern software supply chain
Vulnerabilities in common dependencies like Log4j demonstrate how the entire software ecosystem is at risk from a single point of failure.
#2about 12 minutes
Moving beyond software to address the data supply chain
The problem of trust extends from code to data, where AI-generated images and fraudulent documents pose significant business risks.
#3about 4 minutes
The failure of traditional perimeter-based security models
Despite record spending on cybersecurity, high-profile breaches like stolen signing keys show that traditional security approaches are no longer sufficient.
#4about 4 minutes
Introducing a new trust model based on data provenance
A shift to a "verify then trust" model using data provenance provides a more robust way to ensure integrity in a highly connected world.
#5about 4 minutes
Core principles of the IETF standard for integrity
The SCITT standard establishes trust through three key principles: strong identification, immutability, and transparency to prevent equivocation.
#6about 4 minutes
Implementing data provenance with APIs and distributed ledgers
An open source API uses distributed ledger technology to create verifiable, offline receipts for any data attestation, from IoT to SBOMs.
#7about 9 minutes
A live demonstration of creating a verifiable data claim
A simple API call attests a piece of data, creating an immutable and publicly verifiable record on a distributed ledger.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
23:29 MIN
Implementing and enforcing supply chain policies
Securing your application software supply-chain
17:19 MIN
Building trust through transparent data privacy
IKEA Story: Transforming an Iconic Retail Brand
02:46 MIN
Exploring the core domains of supply chain security
Open Source Secure Software Supply Chain in action
03:53 MIN
Why distributed ledger technology matters for business
Demystifying Crypto & Web3: A Technical Journey Through 15 Years of Innovation
09:08 MIN
Defining key standards and terminology in supply chain security
Open Source Secure Software Supply Chain in action
01:58 MIN
Cybersecurity is a foundational necessity not a passing trend
Decoding Trends: Strategies for Success in the Evolving Digital Domain
00:49 MIN
Understanding the challenges of secure data collaboration
TikTok's Privacy Innovation
09:00 MIN
Evaluating AI trustworthiness through data and automation scope
Rethinking Recruiting: What you didn’t know about Responsible AI
Featured Partners
Related Videos
Securing your application software supply-chain
Niels Tanis
Open Source Secure Software Supply Chain in action
Natale Vinto
From Monolith Tinkering to Modern Software Development
Lars Gentsch
Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
Adam Larter
GenAI Security: Navigating the Unseen Iceberg
Maish Saidel-Keesing
The Clean as You Code Imperative
Olivier Gaudin
Exploring 5 Key Applications of AI Abundance with Blockchain Assurance
ED MARQUEZ
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
From learning to earning
Jobs that call for the skills explored in this talk.




Data Tranparency DevOps Engineer
BASF SE
Municipality of Madrid, Spain
Remote
Intermediate
ETL
REST
Azure
DevOps
+3


Audit Manager - Data, Privacy & AI
Edinburgh, United Kingdom








Data Security
Extia
Municipality of Santander, Spain
Linux
Python
Powershell
Elasticsearch
Windows Server
+3






