Security, Privacy, Risk Management, Cryptocurrencies, & Fintech

Follow Security, Privacy, Risk Management, Cryptocurrencies, & Fintech
Share on
Copy link to clipboard

Sharing my experience, knowldedge, and views. #security #privacy #risk #fintech #blockchain #cryptocurrencies

Security, Privacy, Risk, Crypto, & Fintech


    • May 26, 2018 LATEST EPISODE
    • infrequent NEW EPISODES
    • 17m AVG DURATION
    • 17 EPISODES


    Search for episodes from Security, Privacy, Risk Management, Cryptocurrencies, & Fintech with a specific topic:

    Latest episodes from Security, Privacy, Risk Management, Cryptocurrencies, & Fintech

    Lightning, Plasma, Raiden, and State Channels

    Play Episode Listen Later May 26, 2018 7:57


    Blockchains suffer from scaling issues. This is due to the fact that every transaction has to be propagated to all the nodes in the network and after propagation is complete the mining activity to create a block and provide a confirmation. In bitcoin blockchain a confirmation can take about ten minutes. When it comes to the security of a blockchain the number of nodes is directly related to the security of the blockchain, more nodes mean better security. Whereas the performance is indirectly proportional whereby as the number of nodes increases the blockchain starts to slow down as the transactions need to be propagated to more nodes. Transactions Per Second (TPS) for some blockchains are: • Bitcoin Blockchain processes 7 TPS • Ethereum processes 13TPS • Ripple processes 1500 TPS • Visa processes 1700 TPS, if required the system can process up to 56000 TPS

    Smart Cities, AI, Blockchain, and Hedera

    Play Episode Listen Later May 18, 2018 22:41


    Today I will be talking about Hedera, Smart cities, Artificial Intelligence, and how blockchains are being proposed as a solution without really understanding the requirements. Show notes:  https://www.securityprivacyrisk.com/smart-cities-ai-blockchain-hadera/ #blockchain #hadera #machinelearning #artificialintelligence #ICO #smartcities #iot #internetofthings #initialcoinoffering #consensus #theblockchainhub #privacycoins #privacytokens #fungibility Facebook Group: https://www.facebook.com/groups/2028470514075912/admin_activities/ YouTube Channel: https://www.youtube.com/channel/UCQtYBTppBxS0WLeCBx33gNQ?sub_confirmation=1 Apple Podcast Channel: https://itunes.apple.com/ca/podcast/security-privacy-risk-management-cryptocurrencies-fintech/id1341499853 Google Play Podcast: https://partnerdash.google.com/music/podcasts/portal/u/0#p:id=playpodcast/series&a=2354411696828237 TuneIn Radio: https://tunein.com/radio/Security-Privacy-Risk-Management-Cryptocurrencies-p1095473 References • Don't Forget About Storage When Planning For AI And ML • The Difference Between Artificial Intelligence, Machine Learning, and Deep Learning • Hadera Hashgraph

    Brief Introduction To Self - Sovereign Identity

    Play Episode Listen Later May 12, 2018 22:46


    In this brief introduction to self sovereign identity, we will talk about how we build identity systems to create trust. Trust was something that was local and useful for establishing trust in a single domain. The only issue with existing identity systems is that they are not trust worthy. Still there is no good way to prove that you are a certain age, you have an account with a certain bank, etc. It is very difficult for someone else to vouch for you. Initially identity was siloed, then came federated identity, and now it is time for user centric identity, this is what self-sovereign identity is. Facebook Group: https://www.facebook.com/groups/2028470514075912/admin_activities/ YouTube Channel: https://www.youtube.com/channel/UCQtYBTppBxS0WLeCBx33gNQ?sub_confirmation=1 Apple Podcast Channel: https://itunes.apple.com/ca/podcast/security-privacy-risk-management-cryptocurrencies-fintech/id1341499853 Google Play Podcast: https://partnerdash.google.com/music/podcasts/portal/u/0#p:id=playpodcast/series&a=2354411696828237 TuneIn Radio: https://tunein.com/radio/Security-Privacy-Risk-Management-Cryptocurrencies-p1095473 Show notes can be found here:  https://www.securityprivacyrisk.com/brief-introduction-to-self-sovereign-identity/

    GDPR Impacts On Service Providers

    Play Episode Listen Later May 5, 2018 14:32


    GDPR(General Data Protection Regulation) impacts on service providers seems to be a very popular topic. I have published two shows, one explains What is GDPR? and the other about Privacy By Design principles. The idea behind this series is to bring awareness about GDPR and this show focuses on service providers, as they seem to be very confused when it comes to GDPR compliance.  They are getting questions from their customers and are not sure how to respond. Show notes can be found here:  https://www.securityprivacyrisk.com/gdpr-impacts-on-service-providers/ Facebook Group: https://www.facebook.com/groups/2028470514075912/admin_activities/ YouTube Channel: https://www.youtube.com/channel/UCQtYBTppBxS0WLeCBx33gNQ?sub_confirmation=1 Apple Podcast Channel: https://itunes.apple.com/ca/podcast/security-privacy-risk-management-cryptocurrencies-fintech/id1341499853 Google Play Podcast: https://partnerdash.google.com/music/podcasts/portal/u/0#p:id=playpodcast/series&a=2354411696828237 TuneIn Radio: https://tunein.com/radio/Security-Privacy-Risk-Management-Cryptocurrencies-p1095473

    SOC2 Audit Planning

    Play Episode Listen Later Apr 26, 2018 18:08


    Guide on how to plan your very first SOC2 Audit. Show notes can be found here: https://www.securityprivacyrisk.com/soc2-audit-planning/

    Blockchain Security Tools

    Play Episode Listen Later Apr 22, 2018 16:22


    Two weeks ago the show was about Blockchain Security, this week I will be talking about various tools available for some blockchain platforms. Basic blockchain architecture as it pertains to block creation and consensus mechanisms is very sound. The algorithms used to accomplish the cryptographic functions might be questionable. Hence special consideration should be given to key management, key length, hashing algorithms, and the environment that activity is conducted in. To date none of the block chains have been hacked or maliciously modified, hence from that aspect we are safe. If you consider blockchain mechanisms to be the foundation, which are unhackable at this point, the next few layers above is where the problems start. In this show, Show notes can be found here: https://www.securityprivacyrisk.com/blockchain-security-tools/

    What Is A Stable Coin

    Play Episode Listen Later Apr 14, 2018 12:37


    Although crypto currencies are all the rage these days, one of the issues they all share is the stability. Where fiat currencies vary by a few percentage, the variations for crypto currencies can be quite very large make them very unstable from monetary perspective. Just like the issue of privacy & fungibility is being addressed by privacy coins, stable coins are trying to address the issue of stability. In this show I provide an overview and my thoughts.

    Blockchain Security

    Play Episode Listen Later Apr 6, 2018 19:33


    2017 was the year of blockchain, the crypto currencies craze took over the world like a storm. Is all that glitters really gold, or just a hype. Sharing my thoughts on the security aspects of blockchain and how to address them. Show notes can be found here: https://wp.me/p8fC61-B2

    Privacy By Design

    Play Episode Listen Later Mar 30, 2018 17:54


    What is Privacy by Design, and how to implement it in your environment. Show notes can be found here: https://wp.me/p8fC61-AT

    What is GDPR?

    Play Episode Listen Later Mar 24, 2018 34:44


    Information about what GDPR (General Data Protection Regulation) is about and what to look out for to comply.

    Cryptocurrency Anonymity, Privacy, & Fungibility

    Play Episode Listen Later Mar 16, 2018 24:37


    This discussion delves deeper into how the privacy coins are implementing anonymity, privacy, and fungibility. Also discuss the implementations of different solutions into existing tokens.

    What are Privacy Coins?

    Play Episode Listen Later Mar 9, 2018 21:29


    Ever wonder what privacy coins or privacy cryptocurrencies are? In this video, I will provide an overview of why privacy tokens came into existence and list some of the privacy tokens that have been created.

    Impacts To Audits When Moving To The Cloud

    Play Episode Listen Later Feb 22, 2018 10:47


    When organizations outsource their move their compute workloads to the cloud they assume that their cloud service provider will provide all the required assurances. Service providers can only provide assurance for the compute they manage. Any components sitting on top of the compute are solely the responsibility of the customer.

    Introduction To Blockchain

    Play Episode Listen Later Feb 19, 2018 20:54


    Introduction to what a blockchain is, blockchain security, tokens vs cryptocurrencies, and blockchain platforms. Facebook Group: https://www.facebook.com/groups/2028470514075912/admin_activities/ YouTube Channel: https://www.youtube.com/channel/UCQtYBTppBxS0WLeCBx33gNQ?sub_confirmation=1 Apple Podcast Channel: https://itunes.apple.com/ca/podcast/security-privacy-risk-management-cryptocurrencies-fintech/id1341499853 Google Play Podcast: https://partnerdash.google.com/music/podcasts/portal/u/0#p:id=playpodcast/series&a=2354411696828237 TuneIn Radio: https://tunein.com/radio/Security-Privacy-Risk-Management-Cryptocurrencies-p1095473

    What is an ICO?

    Play Episode Listen Later Feb 10, 2018 12:40


    Crypto market hit an all-time high on January 7 when it reached $835.69 billion. Earlier today that number was at $438.88 billion, representing about a 50% drop. Crypto currencies took 2017 by storm and the main catalyst in this meteoric rise was the advent of an ICO , which stands for Initial Coin Offering. ICO's are also known as ITO, Initial Token Offering and TGE, Token Generation Event. This podcast will provide an breif overview of the ICO's

    What to do after the audit report has been issued?

    Play Episode Listen Later Jan 30, 2018 6:43


    Discuss what to do after the audit report has been issued. What normally happens and what should happen. Music: Ice Cream (http://freemusicarchive.org/music/Leo_Rossa/Ice_Cream/Leo_Rossa_-_Ice_Cream) by Leo Rossa (http://freemusicarchive.org/music/Leo_Rossa)

    audit report leo rossa
    SOC2 Reporting and Management Response

    Play Episode Listen Later Jan 24, 2018 5:36


    When a SOC 2 report is issued, in "Description of Tests of Controls and Results of Testing" section, if a control has an exception or a qualification, a management response is included that talks about how the exception or the qualification risk is being managed. This podcast highlights the issues of doing so. Music: Ice Cream (http://freemusicarchive.org/music/Leo_Rossa/Ice_Cream/Leo_Rossa_-_Ice_Cream) by Leo Rossa (http://freemusicarchive.org/music/Leo_Rossa)

    Claim Security, Privacy, Risk Management, Cryptocurrencies, & Fintech

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel