The definition of blockchain and its potential applications are fluid. Outside of bitcoin, implementations vary in functionality and many proposed solutions have not yet emerged from the conceptual stage. Unfortunately, the evangelistic marketing hype that can accompany blockchain distracts from the actual potential use cases. Note that blockchain nears the Peak of Inflated Expectations on the Gartner Hype Cycle for Emerging Technologies, 2016.
As devices, data, transactions and identities increase, so do the management and storage requirements of related artifacts. CISOs need a secure and scalable approach to ensure that they can succeed in coming years. Scalability is currently considered a risk; however, researchers are currently looking into options that would move away from traditional distributed consensus mechanisms toward scalable methods. This risk may actually become a benefit in the future.
Read More: The CIO’s Guide to Blockchain
A recent attack on the Distributed Autonomous Organization exploited the weaknesses in smart contracts and raised red flags about security. Bitcoin has relatively few vulnerabilities and is lauded for its resilient nature, but the burden of security has moved from the network to the endpoints that are writing to the blockchain. Vulnerabilities typically occur in operating systems, networking protocols and some security-related areas.
Difficult risk assessment
With the increasing range of blockchain offerings, it is difficult to construct a detailed threat model on which to perform a risk assessment. Blockchain is a complex technological system, and can lack the clarity of oversight and auditability that more traditional systems offer. As an additional complication, blockchain lacks common standards or regulations. “Overall, blockchain is new and people don't understand it; it is complex, and therefore accurately assessing risk and exposure is a challenge,” Mr. Care said. “In addition, this is exacerbated because there are currently no common standards or regulations.”