Hi [[ session.user.profile.firstName ]]

KYC: Know Your Custody – Crypto Asset Ownership Models

Join Celsius Network, Blocktower Capital and Keyfi Inc. in this virtual panel hosted by Unbound Tech to discuss the current and evolving crypto asset custody models across the Centralized (CeFi) and Decentralized (DeFi) industry landscape.
Recorded Mar 31 2020 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ari Paul, CIO, Blocktower Capital; Jason Stone, CEO, KeyFi; Nuke Goldstein, CTO, Celsius Network; Alex Rabke, Unbound Tech
Presentation preview: KYC: Know Your Custody – Crypto Asset Ownership Models

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • @ the CORE of IT - Google Cloud in Southeast Asia Recorded: Jul 14 2021 32 mins
    Unbound Security, Google Cloud, Akar Inti Teknologi
    Join thought leaders from Google Cloud, AIT and Unbound Security as they discuss the evolution of cloud in Southeast Asia.
  • WhatWorks in Deploying Effective and Efficient Key Management Services Recorded: Jun 21 2021 56 mins
    John Pescatore, SANS Institute and Mathew Newfield, Unisys
    Business damages from ransomware and phishing attacks have made it clear that sensitive business information and application must be better protected. Increased enforcement of national- and state-level privacy laws, as well as the need to secure data across multiple cloud environments, has highlighted the need for reliable and transparent data encryption services to protect information while enabling business access.

    During this SANS WhatWorks, Mathew Newfield, CIO and CSO at Unisys, will provide details about the selection and deployment of Unbound Securitys CORE Key Management product across the Unisys business environment. The deployment supported code signing, digital certificates, and encryption key management across the entire business services life cycle, from app dev to service delivery and transaction support.

    Join SANS Director of Emerging Security Trends John Pescatore and Mathew Newfield to hear details on the selection, deployment, and experience using Unbound Security's cryptographic key management capabilities. The webcast will feature a discussion of lessons learned and best practices as well as detail the key security gains achieved.
  • Cyber Security Summit (Silicon Valley) - Cloud Security Panel Recorded: Jun 21 2021 46 mins
    Michael Hughes, Chief Business Officer - Unbound Security
    Over the past few years, the number of organizations that have adopted cloud-based systems has grown exponentially, largely due to the COVID-19 pandemic. In turn, cloud security has become a critical issue for IT security executives and their teams. McAffee reported an increase of 630% in attacks by external actors targeting cloud services between January and April of 2020. This uptick in cloud security breaches is projected to persist even after the pandemic as many companies continue to utilize the cloud and leverage its benefits.

    While migrating to the cloud offers numerous advantages, it also poses certain threats and challenges. In a recent report by Oracle & KPMG, over 90% of IT Professionals felt their organization had a cloud security readiness gap. A significant concern for many who are adapting to a cloud-based workforce is misconfigurations and gaps in cloud security programs. Additionally, cloud-based infrastructure requires adopting new security policies and processes. Many companies believe their existing security teams lack the necessary skillsets and knowledge that the cloud environment requires, especially as organizations turn to multi-cloud, hybrid cloud, and distributed cloud models.

    This panel will highlight the areas where cloud systems can leave enterprises vulnerable, ways to minimize common misconfiguration errors, and other best practices to mitigate threats when migrating to the cloud. Our lineup of Industry Experts will provide their expertise on developing a robust cloud security strategy that addresses these issues and insight on how to stay secure in the future of cloud security.
  • @ the CORE of IT - Evolution of Cloud Recorded: Jun 16 2021 24 mins
    Microsoft MVP and Conversational Geek CEO, Nick Cavalancia and Unbound’s Chief Business Officer, Michael Hughes
    Join Microsoft MVP and Conversational Geek CEO, Nick Cavalancia and Unbound’s Chief Business Officer, Michael Hughes as they discuss the challenges of key management in the cloud.
  • @ the CORE of IT - Machine Identity with Venafi Recorded: Jun 16 2021 20 mins
    Venafi’s VP, Security Strategy & Threat Intelligence, Kevin Bocek and Unbound’s CEO, Prof. Yehuda Lindell
    Venafi’s VP, Security Strategy & Threat Intelligence, Kevin Bocek and Unbound’s CEO, Prof. Yehuda Lindell discuss the challenges of protecting machine identities.
  • Cyber Security Summit (Dallas) - Cloud Security Panel Recorded: Jun 11 2021 46 mins
    Michael Hughes, Chief Business Officer - Unbound Security
    Watch our panel discussion from the May 13, 2021 Dallas Cyber Security Summit virtual event, where we discussed the threats and challenges of cloud migrations in the Future of Cloud Security panel.
  • The Future of Payment Security: Digital Wallet Edition Recorded: Apr 6 2021 51 mins
    Unbound CEO, Prof. Yehuda Lindell; Global Sales Leader for IBM Systems Digital Assets, Peter Demeo; BRD CEO, Adam Traidman
    Wallet technology is evolving and traditional financial institutions entering this digital arms race to become the financial hub where the consumer begins and ends their day financially. Unlike other digital assets like consumer sales data, consumer behavior data, real time analytics data, etc., -- money has its own set of critical requirements. Regulatory mandates, legal liability, consumer privacy, data security, reliability, and integrity, are all key to customer success – and security and privacy controls cannot be bolted on after the fact with these applications. Security and privacy controls MUST be built in from the inception stage of these projects or waste valuable time and money.

    Join Unbound’s CEO, Prof. Yehuda Lindell, Global Sales Leader for IBM Systems Digital Assets, Peter Demeo, and BRD’s CEO, Adam Traidman to discuss…
    - The payment sector’s unique security requirements
    - How security and regulation intersect in the digital payments industry
    - Approaches to building security into your payment architecture from the ground up
  • Simplify Authentication with Trust - CORE for Securing Identity Recorded: Mar 28 2021 17 mins
    Prof. Yehuda Lindell – world-renowned cryptographer & co-founder/CEO
    Join our latest whiteboard session with Professor and Unbound CEO Yehuda Lindell as he maps out how CORE can streamline authentication practices to support Go-passwordless initiatives and software only authentication with trust. .
  • Secure Digital Assets with Trust - CORE for Crypto Assets Recorded: Mar 28 2021 12 mins
    Prof. Yehuda Lindell – world-renowned cryptographer & co-founder/CEO
    Join our latest whiteboard session with Professor and Unbound CEO Yehuda Lindell as he maps out how digital assets are transferred, stored, and approved, on HSMs, and their virtualization with CORE, leveraging blockchain.
  • Encryption Key Management - CORE for Information Security Recorded: Mar 26 2021 27 mins
    Prof. Yehuda Lindell – world-renowned cryptographer & co-founder/CEO
    Join our latest whiteboard session with Professor and Unbound CEO Yehuda Lindell as he maps out how keys are managed in multiple encryption scenarios, inclusive of a code signing situation and other legacy solution.
  • Orchestration & Automation: Build Next-Gen Security From Tools You Already Have Recorded: Mar 25 2021 51 mins
    Guy Peer
    View this panel session from Dark Reading's virtual event: Cybersecurity’s Next Wave: What Every Enterprise Should Know, featuring Unbound's VP, R&D, Guy Peer.

    For many enterprises, the challenge of 2021 will not be which new cybersecurity technologies to implement, but how to make their old cybersecurity technologies work better together. In some cases, enterprises are seeking better ways to integrate and orchestrate their disparate security systems. In other cases, organizations seek to better automate the operation of these security tools so that they can detect new threats faster, with less human intervention. In this panel discussion, experts will offer advice on how to make orchestration work in complex IT environments, as well as recommendations on how to automate security tasks and processes.
  • Advancing HSMs - CORE Key Management Recorded: Mar 25 2021 25 mins
    Prof. Yehuda Lindell – world-renowned cryptographer & co-founder/CEO
    Join our latest whiteboard session with Professor and Unbound CEO Yehuda Lindell where he maps out the difference between how keys are managed and stored in Hardware Security Modules (HSMs), vs. virtual HSMs – and how the combination can enhance key management and security.
  • Unifying Diverse Key Stores for Business Recorded: Mar 15 2021 3 mins
    Prof. Yehuda Lindell – world-renowned cryptographer & co-founder/CEO
    Today's cryptographic key management space is extremely fragmented. Unbound CORE virtualizes cryptography to make it modular, interoperable, and flexible to move where your business needs it to.
  • Four Reasons Legacy Key Management Solutions Hinder Business Recorded: Mar 14 2021 3 mins
    Prof. Yehuda Lindell – world-renowned cryptographer & co-founder/CEO
    Today's data environments include dozens of key stores meant to be highly interconnected. Here's why legacy key management solutions fall short of today's standards.
  • Beyond HSM: Key Orchestration for the Enterprise Recorded: Mar 11 2021 60 mins
    Michael Hughes, Chief Business Officer - Unbound Security and Guy Peer, VP R&D and co-founder - Unbound Security
    This CyberRisk Alliance webinar examines how and where organizations are storing encryption keys, how they are managed and the challenges and risks associated. We also review the technical and business considerations for a Key Orchestration platform for the enterprise.
  • Cryptography Deep Dive: Understanding Key Management Risks and Technologies Recorded: Mar 10 2021 94 mins
    Prof. Yehuda Lindell, world-renowned cryptographer & co-founder/CEO, and Guy Peer, VP R&D & co-founder
    Text: Ultimate IT Security's Randy Franklin Smith joins Unbound Security's CEO, Yehuda Lindell and VP, R&D Guy Peer for an in-depth discussion on encryption and the modern applications of cryptography for the prevention of key theft or misuse.
  • Introduction to Multiparty Computation Recorded: Feb 15 2021 88 mins
    Prof. Yehuda Lindell
    In this virtual meetup, Yehuda will give an introduction secure multiparty computation, including examples of how MPC is being used for in practice today.
    This session will be rather technical, but does not require any a priori knowledge of cryptography.
  • Data Protection in Personal Finance: Security Reimagined Recorded: Jan 18 2021 23 mins
    Prof. Yehuda Lindell
    MPC visionary, Professor and Unbound’s CEO Yehuda Lindell talks about how cryptography is transforming the digital landscape. With the recent breaches reported by SolarWinds, Mimecast and Kucoin, it’s time to rethink security and see how solid cryptography can secure personal finance, key management, and data protection in the face of major data breaches in 2020 – both for organizations and end-users alike.
  • Secure Multiparty Computation Recorded: Jan 4 2021 5 mins
    Prof. Yehuda Lindell
    Secure multiparty computation explained and with real world examples by Unbound CEO and world-class cryptographer, Prof. Yehuda Lindell. Watch the video to learn how secure multiparty computation helps solve today's challenges in protecting private data.
  • Enterprise Blockchain: Calls for immediate changes in future implementations Recorded: Dec 6 2020 55 mins
    Rebecca Aspler, Unbound. Omid Malekan , Citi Ventures. Adam Mastrelli, IBM.
    As demand increases for blockchain technology, enterprises have to balance between scalability vs. usability while preserving strict privacy standards. According to Gartner, the demand will only increase with estimates that by 2021, 90% of current enterprise blockchain platform implementations will require replacement to remain competitive, secure, and avoid obsolescence.

    Join us as we discuss the rapid evolution of the blockchain platform market, and how organizations should prepare for the not so distant future.
Cutting-edge key protection techniques for enterprise and blockchain
Learn about enterprise key management, blockchain key management, and cryptography from the cryptographic experts.

Unbound Tech serves Fortune 100 companies with their cryptographic key management needs - and we're backed by world-renowned experts. Our co-founders, Prof. Nigel Smart and Prof. Yehuda Lindell, have taken what was once deemed impossible: taken the academic theory of multi-party computation and turned it into a hardware-free, FIPS-ceritifed security platform for businesses of all kinds.

IT professionals, fintech executives, and cryptography junkies - we have content that will make you think.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: KYC: Know Your Custody – Crypto Asset Ownership Models
  • Live at: Mar 31 2020 6:00 pm
  • Presented by: Ari Paul, CIO, Blocktower Capital; Jason Stone, CEO, KeyFi; Nuke Goldstein, CTO, Celsius Network; Alex Rabke, Unbound Tech
  • From:
Your email has been sent.
or close