Securing Digital Trust: The Emergence of Open Standards for Authenticating Data (CRESTCon Europe)

preview_player
Показать описание
With almost every industry now going digital and increasingly relying on automated decisions there’s a new frontier in digital trust: data. While organiwations have become adept at authenticating people and devices for network access, the sheer volume of data exchanged daily requires a new approach. Everything from operating data to invoices to firmware updates, needs to be authenticated before being relied on for decision making, and old manual processes don’t scale to meet the digital challenge.

Building on the principles of transparency and integrity coming from the distributed ledger space there are now several open standards efforts seeking to address this issue including Coalition for Content Provenance and Authenticity (C2PA), Content Authenticity Initiative (CAI), and the Internet Engineering Task Force (IETF) Supply Chain Integrity, Transparency and Trust (SCITT) Working Group. Overcoming the challenge of trust in digital operations and bringing a new layer of trustworthy data to the internet is a huge task, but one that will change the world for the better.

Co founder and CTO, Jon brings his deep expertise in cryptography, cybersecurity, and blockchains to RKVST. Jon held senior global technical roles at Thales e-Security, Trustonic, ARM, and nCipher where he built chip-to-cloud solutions for mobile, IoT, payments, and smart cities while managing large global teams and driving corporate strategy. Jon is a serial leader of open standards at board committee level having served GlobalPlatform, Trusted Computing Group, OASIS, the Digital Twin Consortium, and Linux Foundation’s Hyperledger. He is currently co-chair of the IETF Supply Chain Integrity, Transparency and Trust (SCITT) working group.

Find out more about CREST:

Follow CREST on social media:
Рекомендации по теме