Circle
Events
Blog

Working Group

Blockchain/Distributed Ledger

This group investigates relevant use cases, and security implications of blockchain. Currently they are creating a framework and glossary that would help provide guidance and security around: wallets, exchanges, cryptography and more.
Sign-Up View Current Projects
Crypto-Asset Exchange Security Guidelines
Crypto-Asset Exchange Security Guidelines

Download

Blockchain/Distributed Ledger
Working Group Overview

This group investigates relevant use cases and security implications of blockchain. Currently, they are creating a framework and glossary that would help provide guidance and security around: wallets, exchanges, cryptography, and more. We welcome anyone who would like to join, even if you would like to just listen in on your first call. 


What do we discuss? 

During these meetings, we typically discuss changes in the industry and collaborate on projects the group is currently working on.


Drafts & Important Docs

Working Group Leadership

Ashish Mehta Headshot
Ashish Mehta

Ashish Mehta

Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.

He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...

Read more

Bill Izzo Headshot
Bill Izzo

Bill Izzo

This person does not have a biography listed with CSA.

Publications in ReviewOpen Until
Top Threats to Cloud Computing Pandemic ElevenMay 21, 2022
Third-Party Vendor Risk ManagementJun 13, 2022
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Virtual Meetings

Attend our next meeting. You can just listen in to decide if this group is a good for you or you can choose to actively participate. During these calls we discuss current projects, and well as share ideas for new projects. This is a good way to meet the other members of the group. You can view all research meetings here.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Top Threats to Cloud Computing Pandemic Eleven

Open Until: 05/21/2022

The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the ...

Third-Party Vendor Risk Management

Open Until: 06/13/2022

The increased use of third-party vendors for applications and data processing services is a business model that is likely t...