Download Publication
Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses
Release Date: 09/27/2021
Working Group: Blockchain/Distributed Ledger
Download this Resource
Prefer to access this resource without an account? Download it now.
Acknowledgements
Hillary Baron
Senior Technical Director - Research, CSA
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect
Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.
He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...
Jyoti Ponnapalli
Jyoti Ponnapalli is the SVP, Head of Blockchain Innovation Strategy at Truist. She has more than 18 years of experience leading emerging technology and complex digital transformations for fortune 500 companies across a range of industries including Finance, Telecom, Airline, Energy, and Food & Beverage. Prior to joining Truist, she was a Director of Blockchain at DTCC leading strategic initiatives in support of efforts to modernize the fina...
Adalberto Valle
Dave Jevans
Kurt Seifried
Chief Innovation Officer, CSA
For over two decades, Kurt has excelled in information security, starting with Windows and Linux, and advancing to cloud computing and AI. With a strong focus on AI security, privacy, and open source, Kurt brings extensive expertise to the Cloud Security Alliance (CSA).
Julio Barragan
John Jefferies
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more