Cryptocurrencies and Security
Cryptocurrencies promise secure efficient anonymous monetary transactions. Do they actually fulfill these promises? What about their use in ransomware? Is it really easy to acquire cryptocurrencies to pay a ransomware ransom? What are the social and environmental effects of cryptocurrencies?
Join us to hear two experts with deep personal experience in these areas discuss the reality of cryptocurrencies.
David Rosenthal retired after more than a half-century working with computers, focused on operating systems, graphics, and peer-to-peer technology. He was a Distinguished Engineer at Sun Microsystems, employee #4 at Nvidia, and most recently founded and spent nearly two decades at Stanford working on the LOCKSS (Lots Of Copies Keep Stuff Safe) peer-to-peer digital preservation system. As part of this project, he with co-authors published a decentralized consensus system using Proof of Work 5 years before Satoshi Nakamoto published the Bitcoin protocol.
Photo Credits: Peter Adams ‘Faces of Open Source’
Bryce is the Director of Intelligence Operations at GroupSense, a leading provider in Digital Risk solutions. Bryce leads the day-to-day intelligence activities of GroupSense's Analyst and Research teams producing finished, tailored intelligence for our diverse clients. Prior to GroupSense, Bryce worked in strategic international education initiatives while pursuing OSINT training and investigations, primarily focused on studying extremist movements, as a passion project.
Responding to COVID-19 Changing the Cybersecurity Landscape
Since the start of the COVID-19 pandemic we have seen a massive increase in cyber-attacks. In this webinar we discuss some of the measures people have taken to help those attacked while disabling some of the attacks. This is being done by companies and also by individual volunteers who have come together to create a taskforce to protect the people and institutions fighting these invisible attackers.
What We Can Learn to Better Prepare for the Next One
In this week's webinar, we discuss innovative methods we can use to gather a complete data set on these attacks, analysis techniques that might be useful in examining this data set and potential recommendations that will arise as a result of the analysis process, and what data is available now and why it's not enough. We also touch on how you can get involved to help now and what we can do to prepare for the future.