SlideShare a Scribd company logo
Blockchain
&
Cybersecurity
Presented by
Jason R. Cope
Blockchain and Cybersecurity
What Is Blockchain?
A technology that:
• Permits transactions to be gathered into
blocks and recorded
• Cryptographically chains blocks in
chronological order creating a “Trustless
system”
• Allows the resulting ledger to be
accessed by different servers (i.e. a
distributed ledger)
What Is A Distributed Ledger?
Centralized
Ledger
Distributed Ledger
• There are multiple ledgers, but Bank holds the
“Master Copy”
• Each client must reconcile its own ledger against that
of the Bank, and must convince Bank of the “true
state” of the Bank ledger if discrepancies arise
• There is one ledger. All Nodes have some level of
access to that ledger.
• All Nodes agree to a protocol that determines the
“true state” of the ledger at any point in time. The
application of this protocol is sometimes called
“achieving consensus”
Trustless System?
• Doesn’t mean it’s a system you can’t
trust
• No trust is required between participants
in a transaction
• How is this accomplished?
– Data is mined into blocks
– Together these blocks form a chain
– Each block in the chain includes data from
the previous block
– The resulting “blockchain” is a ledger of
transactions that automatically verifies itself
How Does It Work?
Using Blockchains
Smart contracts
• Flexible mechanism that serves as the
middleman for all manner of agreements
and data exchanges
– Identity management
– Voting
– Digital rights management
– Supply chain management
– Point-of-sale applications
– Healthcare
– Currency exchange
– Ride sharing
How Is Blockchain
Related To Bitcoin?
•Blockchain enables the existence of
cryptocurrency
•There are more than 1,600
cryptocurrencies today
•Bitcoin is the name of the best-know
cryptocurrency
•Facebook is actively working on creating a
cryptocurrency
Cryptocurrency
Benefits and Issues
Benefits:
• Offers cheaper and faster peer-to-peer
payment options
• No need to provide personal details
• Gaining acceptance as a payment option
Issues:
• Price volatility
– Less buying and selling of goods and
services
– More speculative trading of the currency
itself
Benefits of Blockchain
• Increased transparency
• Accurate tracking
• Permanent unmodifiable ledger
• Cost reduction
Blockchain Unknowns
• Complex technology
• Regulatory implications
• Implementation challenges
• Competing platforms
• Cybersecurity
CYBERSECURITY
Blockchain and Cybersecurity
Notable Breaches
• Target (2013)
– 110 million customers credit/debit card
information compromised
– Hackers gained access through a third-party
HVAC vendor to the point-of-sale card readers
– Cost the company $18.5 million, plus
additional compliance requirements
Notable Breaches
• Uber (2016)
– 57 million Uber users and 600 thousand
drivers personal information exposed
– Uber failed to disclose the breach for more
than one year
– Paid the hackers a “bug bounty” fee of $100
thousand to destroy the data with no way to
verify the destruction occurred
– Valuation dropped from $68 billion to $48
billion
Notable Breaches
• Equifax (2017)
– Personal information (including Social Security
Numbers, birthdates, addresses, drivers’ license
numbers) of 143 million consumers compromised
– Caused by a website application vulnerability;
using old outdated systems
– Setup a dedicated website to take care of
consumers
– Provided free credit monitoring for one year for all
consumers affected
– Cost the Company $700 million after reaching a
settlement with the government
Notable Breaches
• Capital One (July 30, 2019)
– Personal information of 100 million
consumers compromised (names, addresses,
phone numbers, email addresses, dates of
birth, annual income disclosures)
– Outside individual gained access to the
network by exploiting a misconfigured web
application firewall
– Will provide free credit monitoring for one year
for all consumers affected
Local Incidents
• Texas Lawbook survey states four out of five
law firms operating in Texas in 2017 and
2018 were victimized by a cyber attack.
• 40% of small and mid-sized companies that
experience data breaches are out of business
within six months.
• Smaller businesses that devote fewer
resources to cybersecurity end up with
information that is more accessible to cyber
attacks
Vulnerability Assessment
• Intended to identify and assign a criticality
rating to potential security weaknesses in
an organization’s technical environment,
but not to exploit the weaknesses
• External
• Internal
Vulnerability Assessment
• External
– Checks for vulnerabilities between the
external network and the internet.
• Internal
– In-depth analysis of the organization’s internal
network.
– Estimated that approximately 80% of security
breaches occur from inside the internal
network.
Vulnerability Assessment
• Deliverables
– Technical vulnerability assessment report
– Recommendations for remediation
Penetration Testing
• Identifies the ease and likelihood with
which a malicious attacker could
compromise the target environment
• Finds weaknesses in the target
environment and attempts to exploit them.
Social Engineering Assessmen
• Consist of various methods to determine
susceptibility to common people-based
attacks to obtain credentials, convince
users to circumvent security controls,
install unauthorized software, disclose
sensitive information, or enable assess to
unauthorized areas.
• Focus is on humans rather than
weaknesses in the IT infrastructure.
Social Engineering Assessmen
• Common scams:
– Phishing
– Ransomware
– Media drops
– Tailgating
Blockchain and Cybersecurity
CONTACT US
Jason R. Cope
Goldin Peiser & Peiser, LLP
(214) 635-2508
Jcope@GPPcpa.com

More Related Content

PPTX
Blockchain in cyber security
zaarahary
 
PPTX
What is the future of blockchain in cybersecurity
Blockchain Council
 
PPTX
Blockchain Security
Munawar Hussain
 
PPTX
Blockchain in cyber security
Prateek Panda
 
PDF
Understanding Blockchain Security
ITU
 
PDF
Blockchain Security Issues and Challenges
Merlec Mpyana
 
PDF
Blockchain Security and Privacy
Anil John
 
PPTX
Blockchain Explained | How Does A Blockchain Work | Blockchain Explained Simp...
Simplilearn
 
Blockchain in cyber security
zaarahary
 
What is the future of blockchain in cybersecurity
Blockchain Council
 
Blockchain Security
Munawar Hussain
 
Blockchain in cyber security
Prateek Panda
 
Understanding Blockchain Security
ITU
 
Blockchain Security Issues and Challenges
Merlec Mpyana
 
Blockchain Security and Privacy
Anil John
 
Blockchain Explained | How Does A Blockchain Work | Blockchain Explained Simp...
Simplilearn
 

What's hot (20)

PDF
How does blockchain work
Shishir Aryal
 
PDF
Blockchain Technology Fundamentals
Experfy
 
PPTX
Blockchain
Jaison Peter
 
PPTX
Blockchain concepts
Murughan Palaniachari
 
PDF
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Edureka!
 
PPTX
Blockchain
PedramDehghanpour
 
PPTX
Cybersecurity aspects of blockchain and cryptocurrency
Tony Martin-Vegue
 
PPTX
Blockchain
Amit Kumar
 
PDF
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Edureka!
 
PPTX
Blockchain Consensus Protocols
Melanie Swan
 
PPTX
Blockchain Introduction Presentation
Amr Alaa Yassen
 
PPTX
Blockchain
Liam Moore
 
PPTX
Blockchain Technology
Mithileysh Sathiyanarayanan
 
PDF
Blockchain
Sai Nath
 
PPTX
Block chain technology and its applications
ABHISHEK JAIN
 
PPTX
Types of Blockchains
Vikram Khanna
 
PDF
6 Key Blockchain Features You Need to Know Now
101 Blockchains
 
PPTX
Network security
Madhumithah Ilango
 
PDF
An Introduction to Blockchain
NexThoughts Technologies
 
PPT
Hash crypto
Harry Potter
 
How does blockchain work
Shishir Aryal
 
Blockchain Technology Fundamentals
Experfy
 
Blockchain
Jaison Peter
 
Blockchain concepts
Murughan Palaniachari
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Edureka!
 
Blockchain
PedramDehghanpour
 
Cybersecurity aspects of blockchain and cryptocurrency
Tony Martin-Vegue
 
Blockchain
Amit Kumar
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Edureka!
 
Blockchain Consensus Protocols
Melanie Swan
 
Blockchain Introduction Presentation
Amr Alaa Yassen
 
Blockchain
Liam Moore
 
Blockchain Technology
Mithileysh Sathiyanarayanan
 
Blockchain
Sai Nath
 
Block chain technology and its applications
ABHISHEK JAIN
 
Types of Blockchains
Vikram Khanna
 
6 Key Blockchain Features You Need to Know Now
101 Blockchains
 
Network security
Madhumithah Ilango
 
An Introduction to Blockchain
NexThoughts Technologies
 
Hash crypto
Harry Potter
 
Ad

Similar to Blockchain and Cybersecurity (20)

PPTX
CFO Half-Day Conference
gppcpa
 
PDF
Blockchain and Cybersecurity-Liveplex Report.pdf
Liveplex
 
PDF
Blockchain for CyberSecurity | Blockchain and CyberSecurity
feriuyolasyolas
 
PDF
slides-NPTEL-BlockchainTechnologyApplications.pdf
Senthilkumar Ramaraj
 
PPTX
Blockchain as a new cyber strategy for your business
David Joao Vieira Carvalho
 
PPTX
Blockchain Security and Demonstration
Yao Yao
 
PPTX
Second line of defense for cybersecurity : Blockchain
Ahmed Banafa
 
PDF
Blockchain: everyone wants to sell me that - but is that really right for my ...
EQS Group
 
PPTX
Blockchain Technology + Cyber Security Presentation.pptx
princesstanya2304
 
PPTX
Fintech & blockchain technology 06.12.2021
Oluwaseyi Adeniyan
 
PDF
Role of Blockchain Technology in Cybersecurity.pdf
imoliviabennett
 
PPTX
How might cryptocurrencies impact
OliviaJune1
 
PDF
Blockchain Technology in Cybersecurity.pdf
SoluLab1231
 
PPTX
5 Industries that Blockchain will Disrupt | Blockchain Technology | Blockchai...
Simplilearn
 
PPTX
Cybersecurity Challenges in Blockchain Technology By Azgari Lipshy
Azgari Lipshy
 
PDF
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
PDF
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
PDF
Cybersecurity 101: Protecting Data, Accounts, and Digital Assets in a Connect...
YellowSlice1
 
PDF
Cybersecurity
YellowSlice1
 
PDF
How Blockchain Ensures Data Security & Prevents Cyber Attacks
dmthetatechnolabs
 
CFO Half-Day Conference
gppcpa
 
Blockchain and Cybersecurity-Liveplex Report.pdf
Liveplex
 
Blockchain for CyberSecurity | Blockchain and CyberSecurity
feriuyolasyolas
 
slides-NPTEL-BlockchainTechnologyApplications.pdf
Senthilkumar Ramaraj
 
Blockchain as a new cyber strategy for your business
David Joao Vieira Carvalho
 
Blockchain Security and Demonstration
Yao Yao
 
Second line of defense for cybersecurity : Blockchain
Ahmed Banafa
 
Blockchain: everyone wants to sell me that - but is that really right for my ...
EQS Group
 
Blockchain Technology + Cyber Security Presentation.pptx
princesstanya2304
 
Fintech & blockchain technology 06.12.2021
Oluwaseyi Adeniyan
 
Role of Blockchain Technology in Cybersecurity.pdf
imoliviabennett
 
How might cryptocurrencies impact
OliviaJune1
 
Blockchain Technology in Cybersecurity.pdf
SoluLab1231
 
5 Industries that Blockchain will Disrupt | Blockchain Technology | Blockchai...
Simplilearn
 
Cybersecurity Challenges in Blockchain Technology By Azgari Lipshy
Azgari Lipshy
 
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
Role of Blockchain Technology in Cybersecurity
SoluLab1231
 
Cybersecurity 101: Protecting Data, Accounts, and Digital Assets in a Connect...
YellowSlice1
 
Cybersecurity
YellowSlice1
 
How Blockchain Ensures Data Security & Prevents Cyber Attacks
dmthetatechnolabs
 
Ad

More from gppcpa (20)

PDF
The Hazards of Unpaid Payroll Taxes
gppcpa
 
PPTX
Surviving a Refundable Credit Due Diligence Audit
gppcpa
 
PPTX
Build Homes, Not Your Tax Bills: How the new tax law impacts home builders
gppcpa
 
PPTX
The IRS Passport Revocation For Unpaid Taxes: A Primer
gppcpa
 
PPTX
The Impact of the Tax Cuts & Jobs Act on High Tax Bracket Individuals - Show ...
gppcpa
 
PPTX
Tax Reform Update for Businesses and Individuals
gppcpa
 
PPTX
The New Tax Law: Here's What You Should Know
gppcpa
 
PPTX
International Tax Reform - Tax Cuts and Jobs Act of 2017
gppcpa
 
PPTX
Financial Strategies for 2018 for Foreign Investors
gppcpa
 
PPTX
Alternatives to IRS Enforced Collections - Installment Agreements and Account...
gppcpa
 
PPTX
What Every Business Owner Needs to Know About Selling a Business
gppcpa
 
PDF
A Cybersecurity Planning Guide for CFOs
gppcpa
 
PPTX
Occupational Fraud and Electronic Evidence Investigations
gppcpa
 
PPTX
Subchapter S Corporations & Estates Trusts as Shareholders
gppcpa
 
PPTX
Occupational Fraud - What Dentists Need to Know
gppcpa
 
PPTX
Are your medical office practices putting you at risk for a lawsuit?
gppcpa
 
PDF
Reporting Requirements for US Citizens with Foreign Assets
gppcpa
 
PPTX
Us tax presentation
gppcpa
 
PPTX
Divorce & Estates: Tax and Other Financial Considerations
gppcpa
 
PPTX
Embezzlement: What Dentists Need to Know
gppcpa
 
The Hazards of Unpaid Payroll Taxes
gppcpa
 
Surviving a Refundable Credit Due Diligence Audit
gppcpa
 
Build Homes, Not Your Tax Bills: How the new tax law impacts home builders
gppcpa
 
The IRS Passport Revocation For Unpaid Taxes: A Primer
gppcpa
 
The Impact of the Tax Cuts & Jobs Act on High Tax Bracket Individuals - Show ...
gppcpa
 
Tax Reform Update for Businesses and Individuals
gppcpa
 
The New Tax Law: Here's What You Should Know
gppcpa
 
International Tax Reform - Tax Cuts and Jobs Act of 2017
gppcpa
 
Financial Strategies for 2018 for Foreign Investors
gppcpa
 
Alternatives to IRS Enforced Collections - Installment Agreements and Account...
gppcpa
 
What Every Business Owner Needs to Know About Selling a Business
gppcpa
 
A Cybersecurity Planning Guide for CFOs
gppcpa
 
Occupational Fraud and Electronic Evidence Investigations
gppcpa
 
Subchapter S Corporations & Estates Trusts as Shareholders
gppcpa
 
Occupational Fraud - What Dentists Need to Know
gppcpa
 
Are your medical office practices putting you at risk for a lawsuit?
gppcpa
 
Reporting Requirements for US Citizens with Foreign Assets
gppcpa
 
Us tax presentation
gppcpa
 
Divorce & Estates: Tax and Other Financial Considerations
gppcpa
 
Embezzlement: What Dentists Need to Know
gppcpa
 

Recently uploaded (20)

PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
Buy Chaos Software – V-Ray, Enscape & Vantage Licenses in India
PI Software
 
PDF
FOHO: The Rental Platform Transforming Housing for Asian Renters in the U.S.
Evan Han
 
PDF
Why Is MCP Server Development Trending Now.pdf
SoluLab1231
 
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Corey Perlman, Social Media Speaker and Consultant
 
PPTX
BIS-Certification-for-CCTV-Recorders ppt.pptx
Diligence Certification
 
PPTX
Mining Services and Iron Ore Transportation in India.pptx
Naaraayani Minerals Pvt.Ltd
 
PDF
NewBase 29 July 2025 Energy News issue - 1807 by Khaled Al Awadi_compressed.pdf
Khaled Al Awadi
 
PPTX
6 Timeless Japanese Concepts to Improve Business Processes
RUPAL AGARWAL
 
PDF
Keppel Ltd. 1H 2025 Results Presentation Slides
KeppelCorporation
 
PPTX
BUSINESS FINANCE POWER POINT PRESENTATION
JethSrey
 
PPTX
Communications Recruiter Melbourne.pptx
ReithGordon
 
PPTX
Helicopters in the Brazilian Oil Industry – Executive Summary
Vitor Pereira Xavier
 
PDF
Danielle Oliveira New Jersey - A Seasoned Lieutenant
Danielle Oliveira New Jersey
 
PDF
A Complete Guide to Data Migration Services for Modern Businesses
Aurnex
 
PPTX
NTE 2025/20: Updated End User Undertaking (EUU) Form and Guidance
RT Consulting Limited
 
PDF
TriStar Gold Corporate Presentation August 2025
Adnet Communications
 
PPTX
Unlocking Creativity Top Adobe Tools for Content Creators Buy Adobe Software...
PI Software
 
PDF
The FMS General Management Prep-Book 2025.pdf
psbhandkar4148
 
PDF
Unveiling the Latest Threat Intelligence Practical Strategies for Strengtheni...
Auxis Consulting & Outsourcing
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Buy Chaos Software – V-Ray, Enscape & Vantage Licenses in India
PI Software
 
FOHO: The Rental Platform Transforming Housing for Asian Renters in the U.S.
Evan Han
 
Why Is MCP Server Development Trending Now.pdf
SoluLab1231
 
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Corey Perlman, Social Media Speaker and Consultant
 
BIS-Certification-for-CCTV-Recorders ppt.pptx
Diligence Certification
 
Mining Services and Iron Ore Transportation in India.pptx
Naaraayani Minerals Pvt.Ltd
 
NewBase 29 July 2025 Energy News issue - 1807 by Khaled Al Awadi_compressed.pdf
Khaled Al Awadi
 
6 Timeless Japanese Concepts to Improve Business Processes
RUPAL AGARWAL
 
Keppel Ltd. 1H 2025 Results Presentation Slides
KeppelCorporation
 
BUSINESS FINANCE POWER POINT PRESENTATION
JethSrey
 
Communications Recruiter Melbourne.pptx
ReithGordon
 
Helicopters in the Brazilian Oil Industry – Executive Summary
Vitor Pereira Xavier
 
Danielle Oliveira New Jersey - A Seasoned Lieutenant
Danielle Oliveira New Jersey
 
A Complete Guide to Data Migration Services for Modern Businesses
Aurnex
 
NTE 2025/20: Updated End User Undertaking (EUU) Form and Guidance
RT Consulting Limited
 
TriStar Gold Corporate Presentation August 2025
Adnet Communications
 
Unlocking Creativity Top Adobe Tools for Content Creators Buy Adobe Software...
PI Software
 
The FMS General Management Prep-Book 2025.pdf
psbhandkar4148
 
Unveiling the Latest Threat Intelligence Practical Strategies for Strengtheni...
Auxis Consulting & Outsourcing
 

Blockchain and Cybersecurity

  • 3. What Is Blockchain? A technology that: • Permits transactions to be gathered into blocks and recorded • Cryptographically chains blocks in chronological order creating a “Trustless system” • Allows the resulting ledger to be accessed by different servers (i.e. a distributed ledger)
  • 4. What Is A Distributed Ledger? Centralized Ledger Distributed Ledger • There are multiple ledgers, but Bank holds the “Master Copy” • Each client must reconcile its own ledger against that of the Bank, and must convince Bank of the “true state” of the Bank ledger if discrepancies arise • There is one ledger. All Nodes have some level of access to that ledger. • All Nodes agree to a protocol that determines the “true state” of the ledger at any point in time. The application of this protocol is sometimes called “achieving consensus”
  • 5. Trustless System? • Doesn’t mean it’s a system you can’t trust • No trust is required between participants in a transaction • How is this accomplished? – Data is mined into blocks – Together these blocks form a chain – Each block in the chain includes data from the previous block – The resulting “blockchain” is a ledger of transactions that automatically verifies itself
  • 6. How Does It Work?
  • 7. Using Blockchains Smart contracts • Flexible mechanism that serves as the middleman for all manner of agreements and data exchanges – Identity management – Voting – Digital rights management – Supply chain management – Point-of-sale applications – Healthcare – Currency exchange – Ride sharing
  • 8. How Is Blockchain Related To Bitcoin? •Blockchain enables the existence of cryptocurrency •There are more than 1,600 cryptocurrencies today •Bitcoin is the name of the best-know cryptocurrency •Facebook is actively working on creating a cryptocurrency
  • 9. Cryptocurrency Benefits and Issues Benefits: • Offers cheaper and faster peer-to-peer payment options • No need to provide personal details • Gaining acceptance as a payment option Issues: • Price volatility – Less buying and selling of goods and services – More speculative trading of the currency itself
  • 10. Benefits of Blockchain • Increased transparency • Accurate tracking • Permanent unmodifiable ledger • Cost reduction
  • 11. Blockchain Unknowns • Complex technology • Regulatory implications • Implementation challenges • Competing platforms • Cybersecurity
  • 14. Notable Breaches • Target (2013) – 110 million customers credit/debit card information compromised – Hackers gained access through a third-party HVAC vendor to the point-of-sale card readers – Cost the company $18.5 million, plus additional compliance requirements
  • 15. Notable Breaches • Uber (2016) – 57 million Uber users and 600 thousand drivers personal information exposed – Uber failed to disclose the breach for more than one year – Paid the hackers a “bug bounty” fee of $100 thousand to destroy the data with no way to verify the destruction occurred – Valuation dropped from $68 billion to $48 billion
  • 16. Notable Breaches • Equifax (2017) – Personal information (including Social Security Numbers, birthdates, addresses, drivers’ license numbers) of 143 million consumers compromised – Caused by a website application vulnerability; using old outdated systems – Setup a dedicated website to take care of consumers – Provided free credit monitoring for one year for all consumers affected – Cost the Company $700 million after reaching a settlement with the government
  • 17. Notable Breaches • Capital One (July 30, 2019) – Personal information of 100 million consumers compromised (names, addresses, phone numbers, email addresses, dates of birth, annual income disclosures) – Outside individual gained access to the network by exploiting a misconfigured web application firewall – Will provide free credit monitoring for one year for all consumers affected
  • 18. Local Incidents • Texas Lawbook survey states four out of five law firms operating in Texas in 2017 and 2018 were victimized by a cyber attack. • 40% of small and mid-sized companies that experience data breaches are out of business within six months. • Smaller businesses that devote fewer resources to cybersecurity end up with information that is more accessible to cyber attacks
  • 19. Vulnerability Assessment • Intended to identify and assign a criticality rating to potential security weaknesses in an organization’s technical environment, but not to exploit the weaknesses • External • Internal
  • 20. Vulnerability Assessment • External – Checks for vulnerabilities between the external network and the internet. • Internal – In-depth analysis of the organization’s internal network. – Estimated that approximately 80% of security breaches occur from inside the internal network.
  • 21. Vulnerability Assessment • Deliverables – Technical vulnerability assessment report – Recommendations for remediation
  • 22. Penetration Testing • Identifies the ease and likelihood with which a malicious attacker could compromise the target environment • Finds weaknesses in the target environment and attempts to exploit them.
  • 23. Social Engineering Assessmen • Consist of various methods to determine susceptibility to common people-based attacks to obtain credentials, convince users to circumvent security controls, install unauthorized software, disclose sensitive information, or enable assess to unauthorized areas. • Focus is on humans rather than weaknesses in the IT infrastructure.
  • 24. Social Engineering Assessmen • Common scams: – Phishing – Ransomware – Media drops – Tailgating
  • 26. CONTACT US Jason R. Cope Goldin Peiser & Peiser, LLP (214) 635-2508 [email protected]