際際滷shows by User: nagib2001 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: nagib2001 / Tue, 19 Mar 2019 18:05:26 GMT 際際滷Share feed for 際際滷shows by User: nagib2001 Secure custody of digital assets - IDC Security conference /slideshow/secure-custody-of-digital-assets-idc-security-conference/137163067 event-securecustody-idc-augustfinal-190319180526
Digital assets and cryptocurrencies hack is a recurring issue that generated losses worth billions of USD over the last couple of years. Numerous exchanges have been hacked and some of them went bankrupt. With the increasing interest of institutional players including stock exchanges and banks, secure protection of digital assets from external and internal attacks as well as from loss is of the utmost importance. Key takeaways of this talk are Context and drivers for secure custody of digital assets How thefts from cryptocurrency exchanges happens ? Why it is difficult to protect digital assets and cryptocurrencies, risks and mitigation techniques. Best practices for crypto custody and cryptocurrencies wallet management (BTC, IOTA,ETH,XLM )]]>

Digital assets and cryptocurrencies hack is a recurring issue that generated losses worth billions of USD over the last couple of years. Numerous exchanges have been hacked and some of them went bankrupt. With the increasing interest of institutional players including stock exchanges and banks, secure protection of digital assets from external and internal attacks as well as from loss is of the utmost importance. Key takeaways of this talk are Context and drivers for secure custody of digital assets How thefts from cryptocurrency exchanges happens ? Why it is difficult to protect digital assets and cryptocurrencies, risks and mitigation techniques. Best practices for crypto custody and cryptocurrencies wallet management (BTC, IOTA,ETH,XLM )]]>
Tue, 19 Mar 2019 18:05:26 GMT /slideshow/secure-custody-of-digital-assets-idc-security-conference/137163067 nagib2001@slideshare.net(nagib2001) Secure custody of digital assets - IDC Security conference nagib2001 Digital assets and cryptocurrencies hack is a recurring issue that generated losses worth billions of USD over the last couple of years. Numerous exchanges have been hacked and some of them went bankrupt. With the increasing interest of institutional players including stock exchanges and banks, secure protection of digital assets from external and internal attacks as well as from loss is of the utmost importance. Key takeaways of this talk are Context and drivers for secure custody of digital assets How thefts from cryptocurrency exchanges happens ? Why it is difficult to protect digital assets and cryptocurrencies, risks and mitigation techniques. Best practices for crypto custody and cryptocurrencies wallet management (BTC, IOTA,ETH,XLM ) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/event-securecustody-idc-augustfinal-190319180526-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Digital assets and cryptocurrencies hack is a recurring issue that generated losses worth billions of USD over the last couple of years. Numerous exchanges have been hacked and some of them went bankrupt. With the increasing interest of institutional players including stock exchanges and banks, secure protection of digital assets from external and internal attacks as well as from loss is of the utmost importance. Key takeaways of this talk are Context and drivers for secure custody of digital assets How thefts from cryptocurrency exchanges happens ? Why it is difficult to protect digital assets and cryptocurrencies, risks and mitigation techniques. Best practices for crypto custody and cryptocurrencies wallet management (BTC, IOTA,ETH,XLM )
Secure custody of digital assets - IDC Security conference from Nagib Aouini
]]>
727 4 https://cdn.slidesharecdn.com/ss_thumbnails/event-securecustody-idc-augustfinal-190319180526-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Keep your data safe and be compliant via a 360属 approach /slideshow/keep-your-data-safe-and-be-compliant-via-a-360-approach/87989791 event-datagovernanceelca060218-180214145210
Keep your data safe and be compliant via a 360属 approach CASB - Cloud Security - GDPR - FINMA compliance]]>

Keep your data safe and be compliant via a 360属 approach CASB - Cloud Security - GDPR - FINMA compliance]]>
Wed, 14 Feb 2018 14:52:10 GMT /slideshow/keep-your-data-safe-and-be-compliant-via-a-360-approach/87989791 nagib2001@slideshare.net(nagib2001) Keep your data safe and be compliant via a 360属 approach nagib2001 Keep your data safe and be compliant via a 360属 approach CASB - Cloud Security - GDPR - FINMA compliance <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/event-datagovernanceelca060218-180214145210-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Keep your data safe and be compliant via a 360属 approach CASB - Cloud Security - GDPR - FINMA compliance
Keep your data safe and be compliant via a 360絮 approach from Nagib Aouini
]]>
439 4 https://cdn.slidesharecdn.com/ss_thumbnails/event-datagovernanceelca060218-180214145210-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Executive summary guild42 elca_blockchain.pptx_v1.0 /slideshow/executive-summary-guild42-elcablockchainpptxv10/82379425 executivesummaryguild42elcablockchain-171120135902
Prsentation Blockchain more than bitcon at Guild42]]>

Prsentation Blockchain more than bitcon at Guild42]]>
Mon, 20 Nov 2017 13:59:02 GMT /slideshow/executive-summary-guild42-elcablockchainpptxv10/82379425 nagib2001@slideshare.net(nagib2001) Executive summary guild42 elca_blockchain.pptx_v1.0 nagib2001 Prsentation Blockchain more than bitcon at Guild42 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/executivesummaryguild42elcablockchain-171120135902-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Prsentation Blockchain more than bitcon at Guild42
Executive summary guild42 elca_blockchain.pptx_v1.0 from Nagib Aouini
]]>
388 3 https://cdn.slidesharecdn.com/ss_thumbnails/executivesummaryguild42elcablockchain-171120135902-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Privacy-preserving techniques using zero knowledge proof in public Ethereum /slideshow/privacypreserving-techniques-using-zero-knowledge-proof-in-public-ethereum/81585254 executivesummarybat38elcazkpcryptoblockchain-171104092300
Public Blockchain technology like Ethereum is gaining interest and growing use case among startup and fintechs. Apart from scalability issues which are going to be solved with new consensus and mining techniques (Ethereum Metropolis and Bitcoin SegWit2x with Lightning network), privacy on transaction is still an issue which is not yet fully addressed yet. Because of the public nature of a Ethereum, many businesses are reluctant to deploy Smart-contract or Dapps solutions for fear of exposing confidential or sensitive information. The use of zk SNARKs (zk-SNARK stands for Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) would essentially solve this dilemma (next EIP improvement of Ethereum called 'Byzantium' include zk SNARKS). The idea of zk-SNARKs is that they allow verification of the correctness of computations, without a verifier having to execute those computations, or even learn what was actually executed. Using zk-SNARKs, a verifier can confirm that a computation happened correctly, with zero-knowledge of the computation. We propose during this talk to have a brief presentation on cryptography and theory around zero-knowledge proof algorithm. Then we will try to showcase the benefits of zk-SNARKS and other privacy-preserving techniques (like zcash) on the public blockchain ecosystem.]]>

Public Blockchain technology like Ethereum is gaining interest and growing use case among startup and fintechs. Apart from scalability issues which are going to be solved with new consensus and mining techniques (Ethereum Metropolis and Bitcoin SegWit2x with Lightning network), privacy on transaction is still an issue which is not yet fully addressed yet. Because of the public nature of a Ethereum, many businesses are reluctant to deploy Smart-contract or Dapps solutions for fear of exposing confidential or sensitive information. The use of zk SNARKs (zk-SNARK stands for Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) would essentially solve this dilemma (next EIP improvement of Ethereum called 'Byzantium' include zk SNARKS). The idea of zk-SNARKs is that they allow verification of the correctness of computations, without a verifier having to execute those computations, or even learn what was actually executed. Using zk-SNARKs, a verifier can confirm that a computation happened correctly, with zero-knowledge of the computation. We propose during this talk to have a brief presentation on cryptography and theory around zero-knowledge proof algorithm. Then we will try to showcase the benefits of zk-SNARKS and other privacy-preserving techniques (like zcash) on the public blockchain ecosystem.]]>
Sat, 04 Nov 2017 09:23:00 GMT /slideshow/privacypreserving-techniques-using-zero-knowledge-proof-in-public-ethereum/81585254 nagib2001@slideshare.net(nagib2001) Privacy-preserving techniques using zero knowledge proof in public Ethereum nagib2001 Public Blockchain technology like Ethereum is gaining interest and growing use case among startup and fintechs. Apart from scalability issues which are going to be solved with new consensus and mining techniques (Ethereum Metropolis and Bitcoin SegWit2x with Lightning network), privacy on transaction is still an issue which is not yet fully addressed yet. Because of the public nature of a Ethereum, many businesses are reluctant to deploy Smart-contract or Dapps solutions for fear of exposing confidential or sensitive information. The use of zk SNARKs (zk-SNARK stands for Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) would essentially solve this dilemma (next EIP improvement of Ethereum called 'Byzantium' include zk SNARKS). The idea of zk-SNARKs is that they allow verification of the correctness of computations, without a verifier having to execute those computations, or even learn what was actually executed. Using zk-SNARKs, a verifier can confirm that a computation happened correctly, with zero-knowledge of the computation. We propose during this talk to have a brief presentation on cryptography and theory around zero-knowledge proof algorithm. Then we will try to showcase the benefits of zk-SNARKS and other privacy-preserving techniques (like zcash) on the public blockchain ecosystem. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/executivesummarybat38elcazkpcryptoblockchain-171104092300-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Public Blockchain technology like Ethereum is gaining interest and growing use case among startup and fintechs. Apart from scalability issues which are going to be solved with new consensus and mining techniques (Ethereum Metropolis and Bitcoin SegWit2x with Lightning network), privacy on transaction is still an issue which is not yet fully addressed yet. Because of the public nature of a Ethereum, many businesses are reluctant to deploy Smart-contract or Dapps solutions for fear of exposing confidential or sensitive information. The use of zk SNARKs (zk-SNARK stands for Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) would essentially solve this dilemma (next EIP improvement of Ethereum called &#39;Byzantium&#39; include zk SNARKS). The idea of zk-SNARKs is that they allow verification of the correctness of computations, without a verifier having to execute those computations, or even learn what was actually executed. Using zk-SNARKs, a verifier can confirm that a computation happened correctly, with zero-knowledge of the computation. We propose during this talk to have a brief presentation on cryptography and theory around zero-knowledge proof algorithm. Then we will try to showcase the benefits of zk-SNARKS and other privacy-preserving techniques (like zcash) on the public blockchain ecosystem.
Privacy-preserving techniques using zero knowledge proof in public Ethereum from Nagib Aouini
]]>
1259 4 https://cdn.slidesharecdn.com/ss_thumbnails/executivesummarybat38elcazkpcryptoblockchain-171104092300-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ICO and Cyber security - How to protect from hackers during ICOs /slideshow/ico-and-cyber-security-how-to-protect-from-hackers-during-icos/81521037 icochain2elcaicocybersecurity-171102172809
Since January 2017, it does not happen a week without a new ICO is launched (more than 200 to date with $ 3Mds raised), but also without an ICO facing attacks of all kinds (Parity Multi-sig wallet bug with $ 30Mln stolen and Scam slack/twitter posts and phishing attacks with DNS spoofing, phishing link ...) During this talk, we will discuss the security principles of an ICO and see how and which elements to protect in order to secure both IT aspects (server hardening, web application firewall, multi-factor ...) and processes aspects (governance, mutli-signature procedure, smart-contract ownership, hot / cold keys storage, secret management ...) Also we will try to give an overview on how to use/secure smart-contract for Token sales and TGE process.]]>

Since January 2017, it does not happen a week without a new ICO is launched (more than 200 to date with $ 3Mds raised), but also without an ICO facing attacks of all kinds (Parity Multi-sig wallet bug with $ 30Mln stolen and Scam slack/twitter posts and phishing attacks with DNS spoofing, phishing link ...) During this talk, we will discuss the security principles of an ICO and see how and which elements to protect in order to secure both IT aspects (server hardening, web application firewall, multi-factor ...) and processes aspects (governance, mutli-signature procedure, smart-contract ownership, hot / cold keys storage, secret management ...) Also we will try to give an overview on how to use/secure smart-contract for Token sales and TGE process.]]>
Thu, 02 Nov 2017 17:28:09 GMT /slideshow/ico-and-cyber-security-how-to-protect-from-hackers-during-icos/81521037 nagib2001@slideshare.net(nagib2001) ICO and Cyber security - How to protect from hackers during ICOs nagib2001 Since January 2017, it does not happen a week without a new ICO is launched (more than 200 to date with $ 3Mds raised), but also without an ICO facing attacks of all kinds (Parity Multi-sig wallet bug with $ 30Mln stolen and Scam slack/twitter posts and phishing attacks with DNS spoofing, phishing link ...) During this talk, we will discuss the security principles of an ICO and see how and which elements to protect in order to secure both IT aspects (server hardening, web application firewall, multi-factor ...) and processes aspects (governance, mutli-signature procedure, smart-contract ownership, hot / cold keys storage, secret management ...) Also we will try to give an overview on how to use/secure smart-contract for Token sales and TGE process. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/icochain2elcaicocybersecurity-171102172809-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Since January 2017, it does not happen a week without a new ICO is launched (more than 200 to date with $ 3Mds raised), but also without an ICO facing attacks of all kinds (Parity Multi-sig wallet bug with $ 30Mln stolen and Scam slack/twitter posts and phishing attacks with DNS spoofing, phishing link ...) During this talk, we will discuss the security principles of an ICO and see how and which elements to protect in order to secure both IT aspects (server hardening, web application firewall, multi-factor ...) and processes aspects (governance, mutli-signature procedure, smart-contract ownership, hot / cold keys storage, secret management ...) Also we will try to give an overview on how to use/secure smart-contract for Token sales and TGE process.
ICO and Cyber security - How to protect from hackers during ICOs from Nagib Aouini
]]>
907 6 https://cdn.slidesharecdn.com/ss_thumbnails/icochain2elcaicocybersecurity-171102172809-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
10th Richmond finance summit - How blockchain will drive innovation in financial services /slideshow/10th-richmond-finance-summit-how-blockchain-will-driver-innovation-in-financial-services/80893340 richmondfinancesummit-nagibaouini-elcav10-171017103252
Blockchain will drive transformation for businesses across multiple sectors, particularly for the financial services. It will simplify banking by increasing the quality of offered products & services and radically Speed up bank processes. The results are improvement in the efficiency of the KYC / AML process, cutting the middle man, performance of fast payments, instantaneous settlements and enablement of execution of smart-contract for insurance. ELCA will be presenting concept and use cases that can be used by financial services for more innovation.]]>

Blockchain will drive transformation for businesses across multiple sectors, particularly for the financial services. It will simplify banking by increasing the quality of offered products & services and radically Speed up bank processes. The results are improvement in the efficiency of the KYC / AML process, cutting the middle man, performance of fast payments, instantaneous settlements and enablement of execution of smart-contract for insurance. ELCA will be presenting concept and use cases that can be used by financial services for more innovation.]]>
Tue, 17 Oct 2017 10:32:52 GMT /slideshow/10th-richmond-finance-summit-how-blockchain-will-driver-innovation-in-financial-services/80893340 nagib2001@slideshare.net(nagib2001) 10th Richmond finance summit - How blockchain will drive innovation in financial services nagib2001 Blockchain will drive transformation for businesses across multiple sectors, particularly for the financial services. It will simplify banking by increasing the quality of offered products & services and radically Speed up bank processes. The results are improvement in the efficiency of the KYC / AML process, cutting the middle man, performance of fast payments, instantaneous settlements and enablement of execution of smart-contract for insurance. ELCA will be presenting concept and use cases that can be used by financial services for more innovation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/richmondfinancesummit-nagibaouini-elcav10-171017103252-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Blockchain will drive transformation for businesses across multiple sectors, particularly for the financial services. It will simplify banking by increasing the quality of offered products &amp; services and radically Speed up bank processes. The results are improvement in the efficiency of the KYC / AML process, cutting the middle man, performance of fast payments, instantaneous settlements and enablement of execution of smart-contract for insurance. ELCA will be presenting concept and use cases that can be used by financial services for more innovation.
10th Richmond finance summit - How blockchain will drive innovation in financial services from Nagib Aouini
]]>
693 9 https://cdn.slidesharecdn.com/ss_thumbnails/richmondfinancesummit-nagibaouini-elcav10-171017103252-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-nagib2001-48x48.jpg?cb=1597488891 Highly accomplished Security Manager with a proven track record of successfully completing complex technical projects, disciplined budget holder, effective communicator with experience in managing multi discipline and multinational teams.Over 18 years of rich experience in IT security, Security Design, worked with government (French Ministry of the Interior for the ePassport project, Kingdom of Morocco for the national ID card program, US Department of Defense DoD for the common access card program) with security clearance (French secret level). Application security design and analysis (using SDLC approach and Threat modelling) with extensive software architecture, design and developme... https://cdn.slidesharecdn.com/ss_thumbnails/event-securecustody-idc-augustfinal-190319180526-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/secure-custody-of-digital-assets-idc-security-conference/137163067 Secure custody of digi... https://cdn.slidesharecdn.com/ss_thumbnails/event-datagovernanceelca060218-180214145210-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/keep-your-data-safe-and-be-compliant-via-a-360-approach/87989791 Keep your data safe an... https://cdn.slidesharecdn.com/ss_thumbnails/executivesummaryguild42elcablockchain-171120135902-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/executive-summary-guild42-elcablockchainpptxv10/82379425 Executive summary guil...