Cassio Goldschmidt

Cassio Goldschmidt

Vice President-Security Science Practise
Stroz Friedberg

Biography

As Vice President in Stroz Friedberg’s Security Science Practice, Cassio Goldschmidt leads engagements that help clients proactively identify, validate and prioritize information and cyber risk. With almost 20 years of experience working with global organizations, Mr. Goldschmidt brings a balanced technical and business perspective to aid organizationsin managing both product and program level security.

Prior to joining Stroz Friedberg, Mr. Goldschmidt was deputy CISO for Intuit Financial Services business unit. This unit was purchased by National Cask Register, and Mr. Goldschmidt was responsible for establishing and maintaining the enterprise vision, strategy, procedures and program to insure the protection of information assets and technologies at the business level. He also, led Symantec’s Global Application Security Team.

Mr. Goldschmidt received a B.S. in Computer Science from Pontificia Universidade Catolica do Rio Grande do Sul, a M.S. in Software Engineering from Santa Clara University, and an M.B.A. from the University of Southern California. Mr. Goldschmidt’s certifications include the CSSLP(Certified Software Security Lifecycle Professional), CIPP/US(Certified Information Privacy Professional/United States) CIPT (Certified Information Privacy Technologist), CCSP( Certified Cloud Security Professional, and CBP(Certified Bitcoin Professional).

Presentation Title

Presentation: Dissecting Bitcoin Architecture and Security

Presentation Overview

Bitcoin is not only a currency. It’s a system, a platform and an invention. Many human activities that previously required centralized institutions or organizations to function as authoritative or trusted points of control can now be decentralized. This has profound implications for security. To take full advantage of this new paradigm, traditional security concepts need to be redefined.
This presentation will review and dissect some of bitcoin’s core components and their security controls. The speaker will analyze and explain the controls and how they could be repurposed in other domains.