Jon Geater
Overcome your trust issues! In a world of fake data, Data Provenance FTW
#1about 6 minutes
Understanding the risks of the modern software supply chain
Vulnerabilities in common dependencies like Log4j demonstrate how the entire software ecosystem is at risk from a single point of failure.
#2about 12 minutes
Moving beyond software to address the data supply chain
The problem of trust extends from code to data, where AI-generated images and fraudulent documents pose significant business risks.
#3about 4 minutes
The failure of traditional perimeter-based security models
Despite record spending on cybersecurity, high-profile breaches like stolen signing keys show that traditional security approaches are no longer sufficient.
#4about 4 minutes
Introducing a new trust model based on data provenance
A shift to a "verify then trust" model using data provenance provides a more robust way to ensure integrity in a highly connected world.
#5about 4 minutes
Core principles of the IETF standard for integrity
The SCITT standard establishes trust through three key principles: strong identification, immutability, and transparency to prevent equivocation.
#6about 4 minutes
Implementing data provenance with APIs and distributed ledgers
An open source API uses distributed ledger technology to create verifiable, offline receipts for any data attestation, from IoT to SBOMs.
#7about 9 minutes
A live demonstration of creating a verifiable data claim
A simple API call attests a piece of data, creating an immutable and publicly verifiable record on a distributed ledger.
Related jobs
Jobs that call for the skills explored in this talk.
SD Worx
Antwerp, Belgium
Intermediate
Senior
Azure
DevOps
+1
Matching moments
Featured Partners
Related Videos
Securing your application software supply-chain
Niels Tanis
Open Source Secure Software Supply Chain in action
Natale Vinto
Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
Adam Larter
Exploring 5 Key Applications of AI Abundance with Blockchain Assurance
ED MARQUEZ
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
Security Pitfalls for Software Engineers
Jasmin Azemović
Data Science on Software Data
Markus Harrer
Demystifying Crypto & Web3: A Technical Journey Through 15 Years of Innovation
Ed Marquez
Related Articles
View all articles


.gif?w=240&auto=compress,format)
From learning to earning
Jobs that call for the skills explored in this talk.

Datadog
Paris, France
DevOps
Python
Kubernetes
Configuration Management


DoiT
Amsterdam, Netherlands
Remote
Intermediate
Go
Java
Azure
Spark
+9




Universität Duisburg-Essen
Duisburg, Germany
Machine Learning

