Jon Geater
Overcome your trust issues! In a world of fake data, Data Provenance FTW
#1about 6 minutes
Understanding the risks of the modern software supply chain
Vulnerabilities in common dependencies like Log4j demonstrate how the entire software ecosystem is at risk from a single point of failure.
#2about 12 minutes
Moving beyond software to address the data supply chain
The problem of trust extends from code to data, where AI-generated images and fraudulent documents pose significant business risks.
#3about 4 minutes
The failure of traditional perimeter-based security models
Despite record spending on cybersecurity, high-profile breaches like stolen signing keys show that traditional security approaches are no longer sufficient.
#4about 4 minutes
Introducing a new trust model based on data provenance
A shift to a "verify then trust" model using data provenance provides a more robust way to ensure integrity in a highly connected world.
#5about 4 minutes
Core principles of the IETF standard for integrity
The SCITT standard establishes trust through three key principles: strong identification, immutability, and transparency to prevent equivocation.
#6about 4 minutes
Implementing data provenance with APIs and distributed ledgers
An open source API uses distributed ledger technology to create verifiable, offline receipts for any data attestation, from IoT to SBOMs.
#7about 9 minutes
A live demonstration of creating a verifiable data claim
A simple API call attests a piece of data, creating an immutable and publicly verifiable record on a distributed ledger.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
00:05 MIN
Understanding the synergy of AI and blockchain technology
Exploring 5 Key Applications of AI Abundance with Blockchain Assurance
02:08 MIN
Using blockchain for data traceability and transparency
How to Build for Decentralized Systems
23:29 MIN
Implementing and enforcing supply chain policies
Securing your application software supply-chain
26:59 MIN
Q&A on blockchain, pentesting, and ethical implications
Reverse Vending Machine (RVM) Security: Real World Exploits / Vulnerabilities
02:46 MIN
Exploring the core domains of supply chain security
Open Source Secure Software Supply Chain in action
17:19 MIN
Building trust through transparent data privacy
IKEA Story: Transforming an Iconic Retail Brand
22:08 MIN
Exploring practical blockchain use cases for the retail sector
Coffee with Developers
06:18 MIN
Ensuring AI training data integrity with a consensus service
Exploring 5 Key Applications of AI Abundance with Blockchain Assurance
Featured Partners
Related Videos
Securing your application software supply-chain
Niels Tanis
Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
Adam Larter
Open Source Secure Software Supply Chain in action
Natale Vinto
Exploring 5 Key Applications of AI Abundance with Blockchain Assurance
ED MARQUEZ
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
Security Pitfalls for Software Engineers
Jasmin Azemović
Unlocking Value from Data: The Key to Smarter Business Decisions-
Taqi Jaffri, Kapil Gupta & Farooq Sheikh and Tomislav Tipurić
Demystifying Crypto & Web3: A Technical Journey Through 15 Years of Innovation
Ed Marquez
Related Articles
View all articles.gif?w=240&auto=compress,format)



From learning to earning
Jobs that call for the skills explored in this talk.






AI Governance Consultant
TRUSTEQ GmbH
Munich, Germany


Software Engineer - Data & Analytics Governance
Datadog
PostgreSQL
Kubernetes
Apache Kafka
Data analysis
Microservices

Research Center Trustworthy Data Science and Security
Technische Universität Dortmund
Remote
Intermediate
Machine Learning