SlideShare a Scribd company logo
1 of 37
Blockchain &
Cyber Security
Algeria 28 Mar 2018
Jorge Sebastiao, CISSP
CTO Eco-system
Huawei
http://linkedin.com/in/sebastiao/
Twitter: @4jorge
Disclaimer & Copyright
• Please note that this presentation is for informational, knowledge sharing and educational purposes only. Any
comments or statements made herein do not necessarily reflect the views of Huawei. The information is intended
for the recipient's use only and should not be cited, reproduced or distributed to any third party without the prior
consent of the authors. Although great care is taken to ensure accuracy of information neither the author, nor
Huawei can be held responsible for any decision made on the basis of the information cited.
• The content of this presentation is based on information gathered in good faith from both primary and
secondary sources and is believed to be correct at the time of publication. The author can however provide no
guarantee regarding the accuracy of this content and therefore accepts no liability whatsoever for any actions
taken that subsequently prove incorrect.
• The practices listed in the document are provided as is and as guidance and the author and Huawei do not claim
that these comprise the only practices to be followed. The readers are urged to make informed decisions in their
usage.
• The information presented in this presentation is not intended to be, and should not be construed as, an offer to
sell any products or services or a solicitation of an offer to buy any products or services . Any such offer or sale will
be made pursuant to, and the information presented at this meeting is qualified in its entirety by, authorized
offering documents and related disclosure schedules or similar disclosure documentation.
• All logos and brand names belong to their respective owners and we do not claim any relationship or association,
implied or otherwise, with them.
• Use of any materials by virtue of relationships and associations, if any, are mentioned explicitly.
• Author has taken care to attribute all sources for external materials used in this presentation, and any oversight is
regretted. If you, as owner, or as viewer, find any reason to dispute the use of these materials kindly communicate
the same to author.
• Any omissions, in terms of attribution, may be due to an error of author and not intentional.
Are you ready Crypto
Cyber Security Challenges?
1. Complex Attacks
2. Maturity Technology
3. Wallet & Exchanges
4. Malware
5. Vulnerabilities
6. Social Engineering
7. Best practices
Hackers Focus where the money is
MtGox- Fake Bitcoins attack
2011
•Hacker created fake Bitcoins (BTC)
•Price online from $17.50-$. in 30min
•2 million fake BTC manipulating
trading DB
•Compromised administrator account
•Assigned $1M fake cash to account
•Thief got away 2000 authentic BTC
Tracing Bitcoin – Bigdata
Everything is connected…
3000 Bitcoin Miners Exposed
1. SSH
2. Telenet
3. Default Passwords
CodeFork Malware Miner
1. Filess Malware
2. Monero Miner
3. APT
Hidden Miners
PirateBay & CBS's Showtime
caught mining crypto-coins
in viewers' web browser
CryptoJacking everywhere
•Browser
• Plants
• Super Computers
• Cars
• Mobiles
FCC Threats Miners emissions
•LTE
•S4
•T-Mobile
•Interference
North Korea War Chest
1. Bitcoin
2. War Chest
3. South Korea Exchange Attacks
$150M Raised DAO Attack $60M
Hackers are looking for your
Coins
Intense Scan for
• Coins
• Wallets
• Miners
Bug in Pariti Multi-Sig Wallet
Frozen
$400M
Ethereum
Bitcoins Lost Forever
Crypto Exchanges Hacked
1. Aug 2016 – Bitfinex - $61.8M
2. Jul 2016 – Kraken - $???
3. Jul 2016 – itBit – Attempt
4. May 2016: Gatecoin - $2M
5. May 2016: SimpleFX – Email
6. Apr 2016: Shapeshift - $230K
7. Apr 2016: Yaykuy- Hacked Offline
8. Mar 2016: BitQuick – Customer Data
9. Mar 2016: Cointrader- All Data
10. Jan 2016: Cryptsy-13K-BTC Offline
11. Dec 2017 NiceHash $64M Social Engineering
12. Jan 2018: Black Wallet $400K
13. Feb 2018: Bitgrail $217M
Zaif Japan Bitcoin at $0USD
Mobile as your Identity
1. SS7 Vunerabilities
2. Intercept / Impersonate Calls
3. Intercept / Impersonate SMS
4. Reset Accounts Gmail…
5. Erase Cloud Storage
6. Erase Devices
Hacking Wallet Video
Smart Contracts Vulnerable
34,000 Smart Contracts Vulnerable
Cold Storage Wallets Vulnerability
Cold Wallet MitM Attack
St-Petersburg Blogger Robbed $425K
0 Day Exploits - Guaranteed
Hiding Bitcoin Transactions
NSA is tracking Bitcoin
Social Engineering Attacks
Exchanges Phishing
Social engineering
UK dealer charged in US over
multimillion-dollar fake Bitcoin
site scam
Fake trading platform for the
cryptocurrency Bitcoin
$5M in Mauritius, Morocco
SCAM Influencers
Fixing Blockchain Smart Contracts
Best Practices
Audits
Governance
Legislation
Crypto Countermeasures
1. Securing your email account
2. Securing your social media
3. Enabling 2-factor authentication,
biometrics
4. Vulnerability Management
5. Threat Management
6. Security Awareness Training
7. Incident Response Drills
Apply - A6 - Process
Business
Risk
Maturity
Proper Security Metrics &
Countermeasures
Questions
Jorge Sebastiao, CISSP
CTO Eco-system
Huawei
http://linkedin.com/in/sebastiao/
Twitter: @4jorge

More Related Content

What's hot

What's hot (9)

Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
Sj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_belief
 
Osint
OsintOsint
Osint
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Policy Briefing Presentation
Policy Briefing PresentationPolicy Briefing Presentation
Policy Briefing Presentation
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 

Similar to Blockchain & cyber security Algeria Version 1.1

NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...
NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...
NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...
Lucky Gods
 

Similar to Blockchain & cyber security Algeria Version 1.1 (20)

13 Things to Look for in a Token Project by Edith Yeung
13 Things to Look for in a Token Project by Edith Yeung13 Things to Look for in a Token Project by Edith Yeung
13 Things to Look for in a Token Project by Edith Yeung
 
10 Things to Look for in a Token Project - June 2018 @ Money Conference
10 Things to Look for in a Token Project - June 2018 @ Money Conference10 Things to Look for in a Token Project - June 2018 @ Money Conference
10 Things to Look for in a Token Project - June 2018 @ Money Conference
 
Blockchain Solution in China eCommerce
Blockchain Solution in China eCommerceBlockchain Solution in China eCommerce
Blockchain Solution in China eCommerce
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH edition
 
Simple Token 6.0 (OLD version) - for 14 November, 2017 ICO
Simple Token 6.0 (OLD version) - for 14 November, 2017 ICO Simple Token 6.0 (OLD version) - for 14 November, 2017 ICO
Simple Token 6.0 (OLD version) - for 14 November, 2017 ICO
 
Simple Token - V7.0 Project Deck for 14 November, 2017 ICO
Simple Token - V7.0 Project Deck for 14 November, 2017 ICOSimple Token - V7.0 Project Deck for 14 November, 2017 ICO
Simple Token - V7.0 Project Deck for 14 November, 2017 ICO
 
NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...
NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...
NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...
 
Hacking the blockchain
Hacking the blockchainHacking the blockchain
Hacking the blockchain
 
CryptoCamp Version 1.0 as of Mar. 15, 2019
CryptoCamp Version 1.0 as of Mar. 15, 2019CryptoCamp Version 1.0 as of Mar. 15, 2019
CryptoCamp Version 1.0 as of Mar. 15, 2019
 
Simple Token - V5.7 (Older version) -- Follow link below for Version 7.0 for ICO
Simple Token - V5.7 (Older version) -- Follow link below for Version 7.0 for ICOSimple Token - V5.7 (Older version) -- Follow link below for Version 7.0 for ICO
Simple Token - V5.7 (Older version) -- Follow link below for Version 7.0 for ICO
 
Cryptopreneur - Business Model
Cryptopreneur - Business ModelCryptopreneur - Business Model
Cryptopreneur - Business Model
 
Security is broken V3.0
Security is broken V3.0Security is broken V3.0
Security is broken V3.0
 
How Will Our Business Adapt to & Use New Financial Technologies (Caltech/Stat...
How Will Our Business Adapt to & Use New Financial Technologies (Caltech/Stat...How Will Our Business Adapt to & Use New Financial Technologies (Caltech/Stat...
How Will Our Business Adapt to & Use New Financial Technologies (Caltech/Stat...
 
Cryptocurrency And NSE Stock Market: A Comparative Data Analysis
Cryptocurrency And NSE Stock Market: A Comparative Data AnalysisCryptocurrency And NSE Stock Market: A Comparative Data Analysis
Cryptocurrency And NSE Stock Market: A Comparative Data Analysis
 
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
 
Introduction to blockchain_hcmc_20170820
Introduction to blockchain_hcmc_20170820Introduction to blockchain_hcmc_20170820
Introduction to blockchain_hcmc_20170820
 
ICO Pitchnight #1 by Catena Capital & Herdius and friends
ICO Pitchnight #1 by Catena Capital & Herdius and friendsICO Pitchnight #1 by Catena Capital & Herdius and friends
ICO Pitchnight #1 by Catena Capital & Herdius and friends
 
Using Blockchain to Increase Supply Chain Transparency
Using Blockchain to Increase Supply Chain TransparencyUsing Blockchain to Increase Supply Chain Transparency
Using Blockchain to Increase Supply Chain Transparency
 
Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency
 

More from Jorge Sebastiao

More from Jorge Sebastiao (20)

Real estate tokenization and blockchain
Real estate tokenization and blockchainReal estate tokenization and blockchain
Real estate tokenization and blockchain
 
Blockchain and covid19 v3
Blockchain and covid19 v3Blockchain and covid19 v3
Blockchain and covid19 v3
 
Top tech shapping startups
Top tech shapping startupsTop tech shapping startups
Top tech shapping startups
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3
 
The road to blockchain 5.0
The road to blockchain 5.0The road to blockchain 5.0
The road to blockchain 5.0
 
How AI is Disrupting Traffic Management in Smart City
How AI is DisruptingTraffic Management in Smart CityHow AI is DisruptingTraffic Management in Smart City
How AI is Disrupting Traffic Management in Smart City
 
Ai and traffic management application v1.0
Ai and traffic management application v1.0Ai and traffic management application v1.0
Ai and traffic management application v1.0
 
Practical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsPractical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threats
 
Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3
 
Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3
 
IGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance ForumIGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance Forum
 
ADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and Gas
 
AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?
 
Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7
 
A6 pragmatic journey into cyber security
A6 pragmatic journey into cyber securityA6 pragmatic journey into cyber security
A6 pragmatic journey into cyber security
 
CYMASS Security Awareness Version 1.2
CYMASS Security Awareness Version 1.2CYMASS Security Awareness Version 1.2
CYMASS Security Awareness Version 1.2
 
Togaf Version 9.1 Introduction Overview
Togaf Version 9.1 Introduction OverviewTogaf Version 9.1 Introduction Overview
Togaf Version 9.1 Introduction Overview
 
Protecting cloud computing using big data v11
Protecting cloud computing using big data v11Protecting cloud computing using big data v11
Protecting cloud computing using big data v11
 
Infosec is Broken “did you bring a knife to a gun fight?"
Infosec is Broken “did you bring a knife to a gun fight?"Infosec is Broken “did you bring a knife to a gun fight?"
Infosec is Broken “did you bring a knife to a gun fight?"
 
Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Blockchain & cyber security Algeria Version 1.1

  • 1. Blockchain & Cyber Security Algeria 28 Mar 2018 Jorge Sebastiao, CISSP CTO Eco-system Huawei http://linkedin.com/in/sebastiao/ Twitter: @4jorge
  • 2. Disclaimer & Copyright • Please note that this presentation is for informational, knowledge sharing and educational purposes only. Any comments or statements made herein do not necessarily reflect the views of Huawei. The information is intended for the recipient's use only and should not be cited, reproduced or distributed to any third party without the prior consent of the authors. Although great care is taken to ensure accuracy of information neither the author, nor Huawei can be held responsible for any decision made on the basis of the information cited. • The content of this presentation is based on information gathered in good faith from both primary and secondary sources and is believed to be correct at the time of publication. The author can however provide no guarantee regarding the accuracy of this content and therefore accepts no liability whatsoever for any actions taken that subsequently prove incorrect. • The practices listed in the document are provided as is and as guidance and the author and Huawei do not claim that these comprise the only practices to be followed. The readers are urged to make informed decisions in their usage. • The information presented in this presentation is not intended to be, and should not be construed as, an offer to sell any products or services or a solicitation of an offer to buy any products or services . Any such offer or sale will be made pursuant to, and the information presented at this meeting is qualified in its entirety by, authorized offering documents and related disclosure schedules or similar disclosure documentation. • All logos and brand names belong to their respective owners and we do not claim any relationship or association, implied or otherwise, with them. • Use of any materials by virtue of relationships and associations, if any, are mentioned explicitly. • Author has taken care to attribute all sources for external materials used in this presentation, and any oversight is regretted. If you, as owner, or as viewer, find any reason to dispute the use of these materials kindly communicate the same to author. • Any omissions, in terms of attribution, may be due to an error of author and not intentional.
  • 3. Are you ready Crypto Cyber Security Challenges? 1. Complex Attacks 2. Maturity Technology 3. Wallet & Exchanges 4. Malware 5. Vulnerabilities 6. Social Engineering 7. Best practices
  • 4. Hackers Focus where the money is
  • 5. MtGox- Fake Bitcoins attack 2011 •Hacker created fake Bitcoins (BTC) •Price online from $17.50-$. in 30min •2 million fake BTC manipulating trading DB •Compromised administrator account •Assigned $1M fake cash to account •Thief got away 2000 authentic BTC
  • 8. 3000 Bitcoin Miners Exposed 1. SSH 2. Telenet 3. Default Passwords
  • 9. CodeFork Malware Miner 1. Filess Malware 2. Monero Miner 3. APT
  • 10. Hidden Miners PirateBay & CBS's Showtime caught mining crypto-coins in viewers' web browser
  • 11. CryptoJacking everywhere •Browser • Plants • Super Computers • Cars • Mobiles
  • 12. FCC Threats Miners emissions •LTE •S4 •T-Mobile •Interference
  • 13. North Korea War Chest 1. Bitcoin 2. War Chest 3. South Korea Exchange Attacks
  • 14. $150M Raised DAO Attack $60M
  • 15. Hackers are looking for your Coins Intense Scan for • Coins • Wallets • Miners
  • 16. Bug in Pariti Multi-Sig Wallet Frozen $400M Ethereum
  • 18. Crypto Exchanges Hacked 1. Aug 2016 – Bitfinex - $61.8M 2. Jul 2016 – Kraken - $??? 3. Jul 2016 – itBit – Attempt 4. May 2016: Gatecoin - $2M 5. May 2016: SimpleFX – Email 6. Apr 2016: Shapeshift - $230K 7. Apr 2016: Yaykuy- Hacked Offline 8. Mar 2016: BitQuick – Customer Data 9. Mar 2016: Cointrader- All Data 10. Jan 2016: Cryptsy-13K-BTC Offline 11. Dec 2017 NiceHash $64M Social Engineering 12. Jan 2018: Black Wallet $400K 13. Feb 2018: Bitgrail $217M
  • 19. Zaif Japan Bitcoin at $0USD
  • 20. Mobile as your Identity 1. SS7 Vunerabilities 2. Intercept / Impersonate Calls 3. Intercept / Impersonate SMS 4. Reset Accounts Gmail… 5. Erase Cloud Storage 6. Erase Devices
  • 22. Smart Contracts Vulnerable 34,000 Smart Contracts Vulnerable
  • 23. Cold Storage Wallets Vulnerability
  • 26. 0 Day Exploits - Guaranteed
  • 28. NSA is tracking Bitcoin
  • 31. Social engineering UK dealer charged in US over multimillion-dollar fake Bitcoin site scam Fake trading platform for the cryptocurrency Bitcoin $5M in Mauritius, Morocco
  • 33. Fixing Blockchain Smart Contracts Best Practices Audits Governance Legislation
  • 34. Crypto Countermeasures 1. Securing your email account 2. Securing your social media 3. Enabling 2-factor authentication, biometrics 4. Vulnerability Management 5. Threat Management 6. Security Awareness Training 7. Incident Response Drills
  • 35. Apply - A6 - Process Business Risk Maturity
  • 36. Proper Security Metrics & Countermeasures
  • 37. Questions Jorge Sebastiao, CISSP CTO Eco-system Huawei http://linkedin.com/in/sebastiao/ Twitter: @4jorge