Demystifying Key Ceremonies

preview_player
Показать описание
In this replay of #CVAvirtualseries episode CVA presents:

Demystifying Key Ceremonies
Considerations for a Trusted Setup

It is essential for both digital asset custody technology providers and custodians to follow best practices when private keys are created and stored to reduce the risk of compromize. The initialization phase and methodology of the set-up of the wallet management and private keys is critical to overall cybersecurity, - and therefore should follow a strict protocol usually called "key ceremony".

CVA's Cybersecurity proudly presented the CVA Trusted Key Ceremony Guideline publication during this event, which brought together best practices from dozens of years of experience from the Crypto Valley and beyond. During Demystifying Key Ceremonies we discussed the content of CVA's new publication that aims to improve awareness of protection of digital assets for everybody involved with key ceremonies.

After the topics introduction by Markus Perdrizat, Chair of the CVA Cybersecurity Working Group, and the speech of Jean-Philippe Aumasson, Co-Chair of the CVA Cybersecurity Working Group, we discussed the considerations and recommendations for conducting a key ceremony with leading experts from the security era.

The event was moderated by Emi Lorincz, Board Member at CVA who welcomed the following panelists:

- Markus Perdrizat, Senior Manager of Emerging Technologies Risk Assurance at PwC; Chair of Cybersecurity Working Group at CVA
- Charles Guillemet, Chief Technology Officer at Ledger
- Maria Sommerhalder, Senior Associate of Emerging Technologies Risk Assurance at PwC
- Jean-Philippe Aumasson, Head of Security at Taurus, Co-Chair of Cybersecurity Working Group at CVA
- Vassili Lavrov, Head of Blockchain Program Management at SEBA

Download CVA Trusted Key Ceremony Guidelines:
Рекомендации по теме