Download Publication
Blockchain/Distributed Ledger Working Group Glossary
Release Date: 12/15/2017
Working Group: Blockchain/Distributed Ledger
Download this Resource
Prefer to access this resource without an account? Download it now.
Acknowledgements
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...
Hillary Baron
Senior Technical Director - Research, CSA
Sabri Khemissa
Sabri is the ICS group cybersecurity officer a French multinational corporation that produce a variety of construction and high-performance materials. He is in charge of developing and maintaining the cybersecurity strategy, building and coordinate a cross-country and cross-business cybersecurity governance, supporting business initiatives, including strategic Smart Manufacturing and IIoT projects with a large shift to cloud services, defin...
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect
Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.
He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...
Arvind Tiwari
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more