Randy D Bishop
General Manager
Introduction to Guardtime and KSI Blockchain
Randy D Bishop
General Manager Electric Infrastructure
Introduction to Guardtime and KSI Blockchain Randy D Bishop Randy - - PowerPoint PPT Presentation
Introduction to Guardtime and KSI Blockchain Randy D Bishop Randy D Bishop General Manager General Manager Electric Infrastructure Guardtime KSI at a Glance Systems engineering company, inventors of Keyless Signature Infrastructure (KSI)
Randy D Bishop
General Manager
Randy D Bishop
General Manager Electric Infrastructure
Technological Advantage:
Use Cases Digital and Physical Supply Chain SLA Attestation and Transparency Transactive energy Cross platform transactions, monitoring and verification Digital contracts Competitive Advantage: A battle-hardened blockchain stack, in production since 2008 with governments and enterprises relying on the platform today.
Guardtime Infrastructure 3
Based on the lessons learned from the 2007 state sponsored cyber-attacks, our scientists were given a challenge: re-think information governance by designing and building a massive scale signature system for electronic data which could prove the time, integrity and identity (human or machine) without reliance on centralized trust authorities.
DATA SIGNATURE
4
KSI Blockchain Introduction 5
The root cause for ineffective cybersecurity is the lack of integrity of systems, networks, processes and data. For the last 40 years security has come to mean confidentiality of data in motion. Today with the opening of networks, IOT, and Cloud the integrity of systems becomes paramount.
The Absence of Compromise
A V A I L A B I
I T Y INTEGRITY CONFIDEN- TIALITY
SECURITY MODEL
Integrity Breach Confidentiality Breach
Your car Your braking system stops working Your braking patterns are exposed Your flight Your plane’s instruments report that you are 1,000 feet lower than you actually are Your flight plan is posted on Internet (note: it already is) Your local power station Critical systems compromised leading to shutdown and catastrophic failure Your electricity bill is published online Your pacemaker Shutdown and death Your heartbeat becomes public knowledge Your home Your security system is remotely disabled Your smart TV is watching you… The contents of your fridge are ‘leaked’. You drink how much beer?
7 Keyless Signature Infrastructure
Upon verification, KSI Signature proves:
Background:
provider that runs the biggest smart grid installation in the world – over 500,000 smart meters installed.
provides open API-s for various service providers to build their services based on gathered data.
custody for personal user data moving through multiple service providers?
Presentation title (Insert > Header & Footer) 9
10
Big Data Platform 24 service providers
Smart metering infrastructure Residential / commercial customer Service provider
11
Big data storage & analytics Identity management API API
Service Provider Liability Management
data and actions
case of a dispute arising from data usage is quick, irrefutable and final.
means for liability allocation, but also shapes Service Provider behavior prior to any incidents.
Presentation title (Insert > Header & Footer) 12
Regulatory Compliance
sensitive personal information
to the regulators how the PII was handled
requirements considerably.
Data Integrity
status of the data collected, stored and processed in their data exchange platform.
Problems solved:
› Malware detection systems depend on known vulnerabilities and can’t protect against zero- day attacks, digital certificates that may or may not be authentic. › The monitoring systems of infected industrial infrastructure can convey a tampered feedback that shouldn't be trusted.
Industrial assets are OK Zero-day vulnerability Integrty instrumented control system Forged certificate Malware source Integrity instrumented monitoring
Data Centric Security
Current Environment:
departments or agencies
as cloud or managed services infrastructures
enterprise enclaves
malicious change
targets that centralized identity providers
The Challenge:
creation
any type of identity data
independently verify
trusted platform the identities will flow through
MFA leverages a combination of the following factors:
(two-factor authentication)
fingerprint , facial construct, voice, or heartbeat (three-factor authentication) Secure IdAM platforms need a new factor:
trust and real-time tamper detection for the IdAM platform providing the MFA services
16
Guardtime Blockchain and KSI provide independent evidence that the platform components and identity data have integrity and can be independently verified with various methods that support both connected and disconnected systems
17
Characteristic Guardtime Solution Support multiple server and host-based operating systems YES Be immediately available and proven in a commercial environment YES Demonstrate means for operation within latent or disconnected network environments YES Demonstrated in an operational environment integrated with industry standard network domain management such as Microsoft’s Active Directory Domain Services YES The Guardtime solution guarantees a scalable, interoperable authentication solution to reduce reliance on passwords and smart card-based authentication across myriad systems and applications
The Problem:
data and manage complex transactive and DER exchanges.
speed and scale.
The Solution:
resilience of energy delivery systems at the edge
timeline for incident analysis
network appliance and sensor infrastructure
SWIFT 18
Randy D. Bishop General Manager Electric Infrastructure