Naoris Protocol
The Universal
Trust Layer
The world’s first Post-Quantum,
Sub-Zero Blockchain, powered by
a Decentralized Cyber Security Mesh
Winner 2023 Finalist 2023 Winner 2021 Finalist 2021 Finalist 2021 Winner 2020 Finalist 2020 Winner 2020 Winner 2020 Winner 2019
(Became Investor) (Became Contributor) (Became Investor/Partner)
2
Visionary tech and business luminaries
David Holtzman Kjell Grandhagen Mick Mulvaney Ahmed Réda Chami
Former CTO & Chief Scientist at Former Chairman of NATO Former White House Chief of Staff, Former CEO Microsoft North Africa
IBM, designer of DNS System & Intelligence Committee, ex- Head also served in the U.S. House of & Microsoft President of South East
former Cybersecurity advisor to of Norwegian Intelligence Service & Representatives & director of the Asia and new Technologies
White House under three Major General of Norwegian Office of Management and Budget Ambassador for Morocco to the EU.
Presidential campaigns. Military. (OMB).
3
Navigating IoT Security Challenges: A Paradigm Shift in
Cyber Defense
“As IoT grows, the vulnerabilities grow with it, not linearly, but
exponentially Decentralized Quantum Resistance is a must now, to David Holtzman
ensure all secrets and all computing is kept into the future.” Former Chief Scientist and CTO at
IBM, CyberSecurity Advisor to the
White House under 3 presidential
campaigns & current CSO at Naoris
Protocol
“ We don’t need to play a better game against cyber-
criminals and nation-state level threat actors, we need to Kjell GrandHagen
play a different game, Naoris Protocol is it.” Former Chairman NATO
Intelligence Committee & Early
Supporter of Naoris Protocol.
4
Problem: Centralized Security is Failing
Single Points Cannot Trust Long Breach
of Failure Device Reporting Detection
Centralized solutions create Centralized architecture can't Web2 networks are easily
siloed and vulnerable devices be trusted to report accurate breached with a 277-day
that can’t adapt to new device cyber-status. average detection time. (IBM)
threats.
As the total number of IoT devices crosses 50 Billion, by 2025 Cybercrime will cost $10 Trillion
5
Systems Must Evolve from Castles to Communities
The original enterprise model of a single central Shared Processing, Cloud Data, and Multi-party
control for security and processes is changing Systems require a new approach to sharing
as systems become more complex. cybersecurity status and results.
The future lies in Validated Cyber Assurance that can be shared as proof in real-time
6
The Quantum Threat to Enterprises
Q-Day Quantum Computing Threat
Q-Day: Quantum computing threatens
traditional cryptography & public/private key
security
Breaking Global Cryptography
Shor's and Grover's algorithms threaten to break all
encryption, risking global data and communication.
7
Quantum Attack Scenario – Electricity Grid
Texas winter storm, February
2021
Unprecedented but manageable
Clear plan now in place to repair damage
Financial impact – c.$200bn
A quantum attack on the SCADA
protocol
Unauthorised and repeated power cuts and surges will melt down transformers
Similar to an Electro-Magnetic Pulse(EMP) attack
Potentially irrecoverable consequences
Direct economic cost > $8.6tn over 18 months
“GDP at Risk” > $20tn for more than 8 years - an entire
year’s output for the US economy
This excludes human losses, civil unrests and the global
impact from a US economy which has gone dark
8
Solution: Post-Quantum, Sub-Zero Trust Layer
For All Devices
Post-Quantum Consensus Driven Universal Trust
Cryptography Physical Infra Layer
L1 blockchains use Naoris Protocol extends these Secures any devices &
cryptographic principles principles to the physical processes & third parties, at
driven by consensus infrastructure, creating a any level, in all environment.
mechanisms for their security Universal Trust layer
and protection.
Naoris Protocol Makes Networks Stronger As They Grow Not Weaker
9
Naoris Protocol Creates New Possibilities
Real Time Device Seamless Increased
Validation Integration Data Quality
Secures Web2 & Web3 The protocol supports Unix, Enforces cyber-trust, validating
through real-time device Linux, Win, Mac & embedded devices, networks & processes,
monitoring and validation OS designed to create DePINs while enhancing data quality and
under post-quantum by default. integrity
consensus
All Web2 & Web3 physical infrastructure is measured under consensus in real time
10
Naoris Protocol: Immutable Real Time Proof
Naoris Protocol
Naoris Protocol Devices Post-Quantum Blockchain
Validator Node Network
Reference Measurement Chain Immutable Results Chain
Vulnerabilities Device Measurement
Device Operations Naoris Protocol Agent Validator Verification
Malware
Validator Device Identity Privacy & Evidence
Smart Contract
Naoris Protocol
Rules, Privacy, Control
Global Known Risks
Ai Reporting
Community input
Open Source & Bounties/Rewards
Digital Proof
Subscription Events
Analysis
Monitoring Notification
Enterprise Customers Partners Regulator Suppliers Government
11
Naoris Protocol: How It Works
Agent (The Power of Continuous Interrogation)
Software agents installed on devices collect operations and security data
Validator Network (The Power of Decentralization)
Agents send device data to randomly selected validators from a global network
for evaluation against cyber threats
Validators form a consensus under dPoSec on the data and record evidence
permanently on-chain
Decentralized network of rewarded validators ensures integrity and eliminates
the need to trust a single entity
12
Naoris Protocol: How It Works
Post-Quantum Blockchain (The Power of a Proof)
Validation results are recorded on-chain as tamper-proof records and references for
ecosystem parties
Records prove the agent's integrity and the execution of cybersecurity controls,
reducing customer risk and liability
Records are used to maintain and upgrade security across the entire network
Decentralized Swarm AI (The Power of Collective Intelligence)
Validators use a shared, on-chain library of known threats as a common source for all
operations
Swarm AI learns from unknown events, creates new definitions, and updates the threat
library, which is applied across the mesh in real-time
The network monitors device states, isolates and repairs abnormal devices, and
reintroduces them when secure
13
Product: Decentralized Trust Mesh
Incentivized Academia Backed A Product for
Infrastructure Technology Web2 & Web3
Incentivized devices form a All frontier technologies behind Zero Trust Architecture designed
Decentralized Trust Mesh, Naoris Protocol are developed in for Web2 & Web3 infrastructure
continually validating Web2 & Web3 collaboration with EU/US significantly increases data quality.
infrastructure. Universities
Participating Devices are Incentivized to Contribute to the Decentralized Trust Mesh
14
Naoris Protocol: Digital Transformation
Our protocol ensures data sovereignty by
Automation of Processes keeping data within your local infrastructure.
AI and smart contracts can automate routine tasks increasing
efficiency and reducing operational costs. Our blockchain ensures transparency and
immutability of records, providing reliable audit
trails and fostering trust.
Collective Intelligence
We leverage decentralized swarm AI, utilizing the collective
Data Assurance: We guarantee data integrity,
intelligence of a network to enhance adaptability, problem- accuracy, and reliability throughout its
solving, and security. lifecycle.
Our decentralized infrastructure enables
scalable, customizable applications, enhancing
Future-Proof Security performance and security.
Naoris Protocol is designed to withstand evolving threats,
including those posed by quantum computing, ensuring long-
term protection and viability. Our AI capabilities improve decision-making
through advanced data analytics.
15
The Quantum Space Race
is Here...
Trajectory of Technology Evolution for
Quantum Computers
Doubly Exponential Growth
Moore's Law of Exponential Growth vs.
Neven's Law of Doubly Exponential Growth Trajectory of Technology Evolution for
Classical Computers
Exponential Growth
Computing
Power,
Log Scale
The world is nearing a quantum computing Large Agendas by Public
Investment dedicated to quantum Companies - Big Tech & Pure Play
inflection point where Moore's law for classic
research as part of China's 5 year Quantum
computers is reaching its limit. Capabilities of strategic plan
Quantum computers are advancing at a "doubly
$15B $5T+ Market Cap Value
exponential rate” and are closer than ever to
commercialization and projected to reach a TAM Government Supperpowers Battling for
of US$9+ Billion by 2027 Quantum Supremacy
16
Post-Quantum’s Market Ready Products
Digital Multi-Party Quantum-Safe Verified Software
Identity Approval Cryptography Messaging Wrapper
Quantum-safe Secure PQ Software
Authentication & Quorum
Encryption Communications Wrapper
Non-Repudiation Authorisation
17
Naoris Protocol: Telecos
Currently integrating and testing the
Decentralized Mesh with IBM's core
Integrations Banking
infrastructure
Winners of T-Mobile T Challenge Awards in
May 2023, now integrating with T-Mobile US
Health
POC integrated with Level 1 who supply
Robotics/IoT robotics to OEMs for automotive and smart
cars inc. Tesla
Smart Cities One of our first POCs proving that Naoris
Protocol mitigates risk for the banking
sector
Smart Cars Custom build integration for all BDO clients
and partners across Africa
Defence Global network of independent accounting &
consulting for international business & financial
needs.
Supply Chains
18
Our Partners from Web2 to Web3
19
About the Founder and CSO
Ethical hacker for 20 years
The youngest Global CISO in the EU
David Carvalho David Holtzman
Nation State level and Critical Infrastructure advisor on CyberWar,
CyberTerrorism and Cyber Espionage matters
Founder, CEO & Chief Scientist https://www.linkedin.
Chief Strategy Officer
20+ years com/in/david-h-
CTO Network Solutions,
At age 30 was CISO (Chief Information Security Technical/C-Suite roles in Architect of the DNS System,
Officer) of Global Multi-billion Companies >100,000 regulated & critical areas. Key holtzman-6686005/
Chief Scientist IBM, CTO &
people Advisor to multi $billion Cybersecurity advisor to White
business & nation-states in House under 3 x presidential
In 2017 founded Naoris R&D project to investigate cyber espionage,cyber war & campaigns now advising web3
the adoption of blockchain in cybersecurity cyber terrorism mitigation, and blockchain / post-
data protection legislation. quantum.
In 2021 Founded Naoris Protocol
David Carvalho David Holtzman
20
Core Team
David Carvalho Monica Oravcova Sumit Chauhan
Founder, CEO & Chief Scientist Co-founder & Chief Operating Officer Chief Technology Officer
20+ years Technical/C-Suite roles in regulated & critical
areas. Advisor to multi $billion business & nation-state 15+ years IT & Cybersecurity in various industries. led CTO & Advisor with 20+ years building/developing
projects in cyber espionage, cyber war & terrorism operations for FTSE100 clients AT&T, IBM, Apple and enterprise level solutions using blockchain & AI for
managed budgets of $100M+ cybersecurity, IoT, and Fintech businesses
Youssef El Maddarsi David Holtzman Scott MacAndrew
Global Head of Business Development Chief Strategy Officer Chief of Finance
CEO Naoris Consulting. 10+ years as an entrepreneur. FinTech & CTO Network Solutions, Chief Scientist IBM, CTO & 25 Years Global Finance Portfolio & Hedge Fund
AI from Wharton, blockchain and tech from INSEAD, Duke. Cybersecurity advisor to White House under 3 x Manager, Trader, Market-Maker, Investor. Focus :
Certified by Yale and École Polytechnique. presidential campaigns now advising web3/blockchain banking, capital markets, crypto, tokenomics,
blockchain
21
Advisors
Mick Mulvaney Ahmed Réda Chami Inge Kampenes Brigadier-General Knut Grandhagen Brendan Holt Dunn Steven Sprague
Former White House Chief President of CESE, Minister of Former Chief of Norwegian Carlos Ribeiro Head of Comms,Norwegian CEO of Holdun Family Pioneering Trusted
of Staff Industry, Trading/new Technologies Armed Forces Cyber Defence Former Chief of Portuguese Armed Armed Forces Cyber Defence Office Computing Visionary
Ambassador of Morocco to the EU Forces Communications and
Information Systems, and Cyber
Defence
Elena Gaudette Predrag Puharic Jayson E. Street James Diorio Sean Burke Nuno Almeida, PhD Miguel Oliveira, PhD
Chief of Staff at Cisco Cyber Security Advisor Hacker, Helper & Human Award winning author, CEO, Expert Blockchain, IoT, AI, University Professor at
Cyber Security Director at University
Cloud Security Crypto asset manager Instituto Superior Técnico
of Aveiro
Dr. Magda Lilia Jane Frankland Richard Baylie Svein-Erik Nilsen CJ Fabrizio Lorini Jack Melnick
Chelly, PhD Cybersecurity Executive CIO at OCS Group Cyber and Decentralization CyberSecurity Consultant, Crypto Compliance Advisor Head of DeFi @ Polygon
Award-winning global Ambassador Trader and Investor Labs
cybersecurity leader
Naoris Protocol makes networks
stronger as they grow, not weaker.
Thank you.
naorisprotocol.com