Blockchain Security Services

Security Training

“Before embarking on a distributed-ledger project, ensure your team has the cryptographic skills to understand what is and isn’t possible.”Gartner, Top 10 Strategic Technology Trends for 2018

How can I upskill my security workforce to be at the forefront of blockchain adoption?

A lack of available developers is already being felt by enterprises keen to be at the forefront of blockchain adoption. This skills gap will only become more pronounced as blockchain technology becomes mainstream.

Solution

Since there is currently insufficient talent to meet the blockchain needs of enterprise clients, there is only one obvious solution — upskilling existing developers. Our Blockchain Security Center is home to some the world’s leading blockchain and cryptography trainers, who can provide your developers with the tools and insight they need to start developing blockchain solutions.

Course options include:

Blockchain Theory and Practice

Designed as an introduction to blockchain technologies, this course covers fundamental concepts such as basic cryptography, cryptocurrencies, smart contracts, and decentralized applications. Beyond this, attendees will learn about common security flaws in blockchain solutions, secure development practices, and how to create crypto tokens.

Crypto Attacks and Defenses

This course covers all of the essential components of modern cryptography, including ciphers, hash functions, formal security notions and attack models, elliptic-curve cryptography, and more. Crucially, the course also covers cryptography applications for blockchain solutions.

Why Us

Enterprise blockchain development is challenging and requires a high degree of expertise. Our Blockchain Security Center is home to some of the world’s foremost cryptography experts, who have significant experience in both the execution and teaching of crypto and blockchain concepts.

To find out more about our services, or to arrange a consultation, contact us today.

Blog

  • Building a Vendor Risk Management Program
    by Graeme Payne on October 19, 2020 at 5:05 pm

    Time to update your vendor risk management program? In this article, Graeme Payne, Kudelski Security’s practice leader for strategy, risk, and compliance, covers the four essential areas for consideration in building a robust VRM.  You may have a grasp on your own organization’s security and have good data and threat visibility, but beyond your environment,

  • Business Agility 2020: How to Achieve 360-Degree Security Visibility in the COVID Era
    by Ron Frederick on October 13, 2020 at 3:00 pm

    Among the chief concerns for security leaders today is a lack of visibility into risk and threats in the corporate ecosystem. COVID has only exacerbated the issue as organizations of all sizes and in all industries accelerate digital transformation plans in order to enable a mobile workforce. The ecosystem today has become expanded and fragmented

  • Six Cloudplug Vulnerabilities Disclosed
    by inf0junki3 on October 5, 2020 at 6:39 pm

    In this blog post, we examine six vulnerabilities that we have found in the CloudPlug, a device that collects logs from ICS/SCADA networks and pushes

  • IT vs. OT Security: 6 Strategies You Can Adapt to Secure OT Environments
    by Mark Mattei on October 1, 2020 at 4:00 pm

    The convergence of IT/OT means OT environments are no longer “walled off” from the rest of the organization or even the rest of the world. Exposure to cybersecurity threats in these systems is growing, and a successful attack could be extremely damaging to production, safety, and system availability. Managing security and risk in OT environments

  • Through an Assessor’s Lens: Discovering the Value of a NIST CSF Assessment
    by Cory Steinbicker on September 22, 2020 at 3:00 pm

    NIST CSF, a cybersecurity framework helping uncover unknown risks, set up new controls, break down internal silos, achieve cybersecurity maturity. As cybersecurity continues to mature and be at the top of everyone’s mind, a natural shift has occurred from focusing on meeting regulatory compliance mandates, to involving the business and reducing risks associated with their

In the Press

Let's Talk