ChaptersEventsBlog
We're exploring how organizations adapt IAM to AI. Take the AI Identity and Risk Readiness Survey by September 5 →

Download Publication

Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2
Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2

Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2

Release Date: 07/31/2019

Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT) have proven their ability to increase security of data during transactions and provide immutable long-term data storage. This document builds on the use cases provided in the previous use case paper, and provides eight use cases for this technology outside of cryptocurrencies.


Related Research | Working Group

Blockchain Use Case:
  • Cross border payments
  • Voting
  • Land registry
  • Food supply chain
  • Media and entertainment
  • Identity
  • Royalties
  • Insurance
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A Ne...
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Secure Agentic System Design: A Trait-Based Approach
Secure Agentic System Design: A Trait-Based App...
"Set It and Forget It” Access Control is No Longer Enough
"Set It and Forget It” Access Control is No Longer Enough
Published: 08/20/2025
Securing the Agentic AI Control Plane: Announcing the MCP Security Resource Center
Securing the Agentic AI Control Plane: Announcing the MCP Security ...
Published: 08/20/2025
Agentic AI and Zero Trust
Agentic AI and Zero Trust
Published: 08/07/2025
From Aware to Actionable: Closing the Cloud Security Resilience Gap
From Aware to Actionable: Closing the Cloud Security Resilience Gap
Published: 08/07/2025

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Sabri Khemissa
Sabri Khemissa

Sabri Khemissa

Sabri is the ICS group cybersecurity officer a French multinational corporation that produce a variety of construction and high-performance materials. He is in charge of developing and maintaining the cybersecurity strategy, building and coordinate a cross-country and cross-business cybersecurity governance, supporting business initiatives, including strategic Smart Manufacturing and IIoT projects with a large shift to cloud services, defin...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training