Breakout Session 1 - Blockchain
Blockchain--How can organizations create closed, more security information networks? Blockchain security and privacy protocols are based on using a cryptographic hash function; its own hash key identifies each block of transactions in the chain. The complexity of the crypto hash function reduces the blockchain’s susceptibility to fraud. Because activities and adversaries in cyberspace grow more numerous and dangerous every day, how can the blockchain approach keep the bad actors out while facilitating a free flow of information?
Dan Woolley, Managing Director and Founder, Ponderosa Management Group (moderator)
Dr. Shue-Jane Thompson, Vice President and Partner, Cyber Security & Biometrics Global Business Services, IBM Corporation
Mussie Haile, Founder and CEO, Revolt Cypher
Jeremy Waldstreicher, Senior Manager, Ernst & Young