16:45-18:15 Cybersecurity Standards Agenda
- Cybersecurity Information Sharing Alignment for the Crypto Industry (20 minutes)
- Presentation of the Cybersecurity Information Sharing Aignment by Takaya
- How such an alignment can work for the crypto industry and identify what roles should be played in the alignment, leading to a discussion on who will play the roles
- Information Sharing and Analysis Center (ISAC) for crypto (10 minutes)
- Introduction on the establishment of CryptoISAC in the US - what roles do they play?
- Discuss who and how will play the role of sharing industry-specific information and analysis internationally, not in a specific nation
- Responsible Disclosure Practices (40 minutes)
- Researchers and Security Professionals
- What does the Bitcoin community do to ensure security?
- There currently exist "audit firms” that audit, discover and report vulnerabilities especially in smart contracts, and get paid for the services by contracted projects.
- Who are the “security experts” in these firms?
- How can we ensure the reliability of these firms?
- Any incentives for vendors to pay for bug-hunters?
- CVE Program
- Who will be responsible for managing the program and list? MITRE?
- How can we design incentives for vendors to respond to requests for security patches by the CVE Program?
- Is having a centralized entity that manages them against the ethos of crypto?
- Any new data format for the CVE record needed?
- What information is necessary specifically for blockchain and crypto?
- Standardized Vulnerability Database
- Does NIST standardize with additional analysis vulnerabilities in the crypto industry? If not, who will be responsible for the task?
- ISAC
- Do existing ISACs have enough resources to analyze all of the standardized vulnerability data and share it with vendors? How many security experts do they need to do all they want?
- Recent incidents and responses (15 minutes)
- Discuss the types of vulnerability information that should be prioritized for sharing - smart contract, key management by crypto exchanges, bridge/cross-chain protocol hacking, etc
- Next steps (5 minutes)
- Standardize the framework for cybersecurity information-sharing alignment through ISO