0% found this document useful (0 votes)
253 views22 pages

Enterprise Deck - Naoris

Enterprise Deck Naoris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
253 views22 pages

Enterprise Deck - Naoris

Enterprise Deck Naoris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Naoris Protocol

The Universal
Trust Layer
The world’s first Post-Quantum,
Sub-Zero Blockchain, powered by
a Decentralized Cyber Security Mesh

Winner 2023 Finalist 2023 Winner 2021 Finalist 2021 Finalist 2021 Winner 2020 Finalist 2020 Winner 2020 Winner 2020 Winner 2019
(Became Investor) (Became Contributor) (Became Investor/Partner)
2

Visionary tech and business luminaries

David Holtzman Kjell Grandhagen Mick Mulvaney Ahmed Réda Chami

Former CTO & Chief Scientist at Former Chairman of NATO Former White House Chief of Staff, Former CEO Microsoft North Africa
IBM, designer of DNS System & Intelligence Committee, ex- Head also served in the U.S. House of & Microsoft President of South East
former Cybersecurity advisor to of Norwegian Intelligence Service & Representatives & director of the Asia and new Technologies
White House under three Major General of Norwegian Office of Management and Budget Ambassador for Morocco to the EU.
Presidential campaigns. Military. (OMB).
3

Navigating IoT Security Challenges: A Paradigm Shift in


Cyber Defense

“As IoT grows, the vulnerabilities grow with it, not linearly, but
exponentially Decentralized Quantum Resistance is a must now, to David Holtzman
ensure all secrets and all computing is kept into the future.” Former Chief Scientist and CTO at
IBM, CyberSecurity Advisor to the
White House under 3 presidential
campaigns & current CSO at Naoris
Protocol

“ We don’t need to play a better game against cyber-


criminals and nation-state level threat actors, we need to Kjell GrandHagen
play a different game, Naoris Protocol is it.” Former Chairman NATO
Intelligence Committee & Early
Supporter of Naoris Protocol.
4

Problem: Centralized Security is Failing

Single Points Cannot Trust Long Breach


of Failure Device Reporting Detection

Centralized solutions create Centralized architecture can't Web2 networks are easily
siloed and vulnerable devices be trusted to report accurate breached with a 277-day
that can’t adapt to new device cyber-status. average detection time. (IBM)
threats.

As the total number of IoT devices crosses 50 Billion, by 2025 Cybercrime will cost $10 Trillion
5

Systems Must Evolve from Castles to Communities

The original enterprise model of a single central Shared Processing, Cloud Data, and Multi-party
control for security and processes is changing Systems require a new approach to sharing
as systems become more complex. cybersecurity status and results.

The future lies in Validated Cyber Assurance that can be shared as proof in real-time
6

The Quantum Threat to Enterprises

Q-Day Quantum Computing Threat

Q-Day: Quantum computing threatens


traditional cryptography & public/private key
security

Breaking Global Cryptography

Shor's and Grover's algorithms threaten to break all


encryption, risking global data and communication.
7

Quantum Attack Scenario – Electricity Grid


Texas winter storm, February
2021
Unprecedented but manageable
Clear plan now in place to repair damage
Financial impact – c.$200bn

A quantum attack on the SCADA


protocol
Unauthorised and repeated power cuts and surges will melt down transformers
Similar to an Electro-Magnetic Pulse(EMP) attack
Potentially irrecoverable consequences
Direct economic cost > $8.6tn over 18 months
“GDP at Risk” > $20tn for more than 8 years - an entire
year’s output for the US economy
This excludes human losses, civil unrests and the global
impact from a US economy which has gone dark
8

Solution: Post-Quantum, Sub-Zero Trust Layer


For All Devices

Post-Quantum Consensus Driven Universal Trust


Cryptography Physical Infra Layer

L1 blockchains use Naoris Protocol extends these Secures any devices &
cryptographic principles principles to the physical processes & third parties, at
driven by consensus infrastructure, creating a any level, in all environment.
mechanisms for their security Universal Trust layer
and protection.

Naoris Protocol Makes Networks Stronger As They Grow Not Weaker


9

Naoris Protocol Creates New Possibilities

Real Time Device Seamless Increased


Validation Integration Data Quality

Secures Web2 & Web3 The protocol supports Unix, Enforces cyber-trust, validating
through real-time device Linux, Win, Mac & embedded devices, networks & processes,
monitoring and validation OS designed to create DePINs while enhancing data quality and
under post-quantum by default. integrity
consensus

All Web2 & Web3 physical infrastructure is measured under consensus in real time
10

Naoris Protocol: Immutable Real Time Proof

Naoris Protocol
Naoris Protocol Devices Post-Quantum Blockchain
Validator Node Network

Reference Measurement Chain Immutable Results Chain


Vulnerabilities Device Measurement
Device Operations Naoris Protocol Agent Validator Verification
Malware
Validator Device Identity Privacy & Evidence

Smart Contract
Naoris Protocol
Rules, Privacy, Control
Global Known Risks
Ai Reporting
Community input

Open Source & Bounties/Rewards


Digital Proof
Subscription Events
Analysis
Monitoring Notification

Enterprise Customers Partners Regulator Suppliers Government


11

Naoris Protocol: How It Works


Agent (The Power of Continuous Interrogation)
Software agents installed on devices collect operations and security data

Validator Network (The Power of Decentralization)


Agents send device data to randomly selected validators from a global network
for evaluation against cyber threats

Validators form a consensus under dPoSec on the data and record evidence
permanently on-chain

Decentralized network of rewarded validators ensures integrity and eliminates


the need to trust a single entity
12

Naoris Protocol: How It Works


Post-Quantum Blockchain (The Power of a Proof)
Validation results are recorded on-chain as tamper-proof records and references for
ecosystem parties

Records prove the agent's integrity and the execution of cybersecurity controls,
reducing customer risk and liability

Records are used to maintain and upgrade security across the entire network

Decentralized Swarm AI (The Power of Collective Intelligence)


Validators use a shared, on-chain library of known threats as a common source for all
operations

Swarm AI learns from unknown events, creates new definitions, and updates the threat
library, which is applied across the mesh in real-time

The network monitors device states, isolates and repairs abnormal devices, and
reintroduces them when secure
13

Product: Decentralized Trust Mesh

Incentivized Academia Backed A Product for


Infrastructure Technology Web2 & Web3
Incentivized devices form a All frontier technologies behind Zero Trust Architecture designed
Decentralized Trust Mesh, Naoris Protocol are developed in for Web2 & Web3 infrastructure
continually validating Web2 & Web3 collaboration with EU/US significantly increases data quality.
infrastructure. Universities

Participating Devices are Incentivized to Contribute to the Decentralized Trust Mesh


14

Naoris Protocol: Digital Transformation


Our protocol ensures data sovereignty by
Automation of Processes keeping data within your local infrastructure.
AI and smart contracts can automate routine tasks increasing
efficiency and reducing operational costs. Our blockchain ensures transparency and
immutability of records, providing reliable audit
trails and fostering trust.
Collective Intelligence
We leverage decentralized swarm AI, utilizing the collective
Data Assurance: We guarantee data integrity,
intelligence of a network to enhance adaptability, problem- accuracy, and reliability throughout its
solving, and security. lifecycle.
Our decentralized infrastructure enables
scalable, customizable applications, enhancing
Future-Proof Security performance and security.
Naoris Protocol is designed to withstand evolving threats,
including those posed by quantum computing, ensuring long-
term protection and viability. Our AI capabilities improve decision-making
through advanced data analytics.
15

The Quantum Space Race


is Here...
Trajectory of Technology Evolution for
Quantum Computers
Doubly Exponential Growth
Moore's Law of Exponential Growth vs.
Neven's Law of Doubly Exponential Growth Trajectory of Technology Evolution for
Classical Computers
Exponential Growth

Computing
Power,
Log Scale

The world is nearing a quantum computing Large Agendas by Public


Investment dedicated to quantum Companies - Big Tech & Pure Play
inflection point where Moore's law for classic
research as part of China's 5 year Quantum
computers is reaching its limit. Capabilities of strategic plan
Quantum computers are advancing at a "doubly
$15B $5T+ Market Cap Value
exponential rate” and are closer than ever to
commercialization and projected to reach a TAM Government Supperpowers Battling for
of US$9+ Billion by 2027 Quantum Supremacy
16

Post-Quantum’s Market Ready Products


Digital Multi-Party Quantum-Safe Verified Software
Identity Approval Cryptography Messaging Wrapper

Quantum-safe Secure PQ Software


Authentication & Quorum
Encryption Communications Wrapper
Non-Repudiation Authorisation
17

Naoris Protocol: Telecos


Currently integrating and testing the
Decentralized Mesh with IBM's core

Integrations Banking
infrastructure

Winners of T-Mobile T Challenge Awards in


May 2023, now integrating with T-Mobile US
Health

POC integrated with Level 1 who supply


Robotics/IoT robotics to OEMs for automotive and smart
cars inc. Tesla

Smart Cities One of our first POCs proving that Naoris


Protocol mitigates risk for the banking
sector
Smart Cars Custom build integration for all BDO clients
and partners across Africa

Defence Global network of independent accounting &


consulting for international business & financial
needs.
Supply Chains
18

Our Partners from Web2 to Web3


19

About the Founder and CSO


Ethical hacker for 20 years

The youngest Global CISO in the EU

David Carvalho David Holtzman


Nation State level and Critical Infrastructure advisor on CyberWar,
CyberTerrorism and Cyber Espionage matters
Founder, CEO & Chief Scientist https://www.linkedin.
Chief Strategy Officer

20+ years com/in/david-h-


CTO Network Solutions,
At age 30 was CISO (Chief Information Security Technical/C-Suite roles in Architect of the DNS System,
Officer) of Global Multi-billion Companies >100,000 regulated & critical areas. Key holtzman-6686005/
Chief Scientist IBM, CTO &
people Advisor to multi $billion Cybersecurity advisor to White
business & nation-states in House under 3 x presidential
In 2017 founded Naoris R&D project to investigate cyber espionage,cyber war & campaigns now advising web3
the adoption of blockchain in cybersecurity cyber terrorism mitigation, and blockchain / post-
data protection legislation. quantum.

In 2021 Founded Naoris Protocol


David Carvalho David Holtzman
20

Core Team

David Carvalho Monica Oravcova Sumit Chauhan


Founder, CEO & Chief Scientist Co-founder & Chief Operating Officer Chief Technology Officer
20+ years Technical/C-Suite roles in regulated & critical
areas. Advisor to multi $billion business & nation-state 15+ years IT & Cybersecurity in various industries. led CTO & Advisor with 20+ years building/developing
projects in cyber espionage, cyber war & terrorism operations for FTSE100 clients AT&T, IBM, Apple and enterprise level solutions using blockchain & AI for
managed budgets of $100M+ cybersecurity, IoT, and Fintech businesses

Youssef El Maddarsi David Holtzman Scott MacAndrew


Global Head of Business Development Chief Strategy Officer Chief of Finance
CEO Naoris Consulting. 10+ years as an entrepreneur. FinTech & CTO Network Solutions, Chief Scientist IBM, CTO & 25 Years Global Finance Portfolio & Hedge Fund
AI from Wharton, blockchain and tech from INSEAD, Duke. Cybersecurity advisor to White House under 3 x Manager, Trader, Market-Maker, Investor. Focus :
Certified by Yale and École Polytechnique. presidential campaigns now advising web3/blockchain banking, capital markets, crypto, tokenomics,
blockchain
21

Advisors

Mick Mulvaney Ahmed Réda Chami Inge Kampenes Brigadier-General Knut Grandhagen Brendan Holt Dunn Steven Sprague
Former White House Chief President of CESE, Minister of Former Chief of Norwegian Carlos Ribeiro Head of Comms,Norwegian CEO of Holdun Family Pioneering Trusted
of Staff Industry, Trading/new Technologies Armed Forces Cyber Defence Former Chief of Portuguese Armed Armed Forces Cyber Defence Office Computing Visionary
Ambassador of Morocco to the EU Forces Communications and
Information Systems, and Cyber
Defence

Elena Gaudette Predrag Puharic Jayson E. Street James Diorio Sean Burke Nuno Almeida, PhD Miguel Oliveira, PhD
Chief of Staff at Cisco Cyber Security Advisor Hacker, Helper & Human Award winning author, CEO, Expert Blockchain, IoT, AI, University Professor at
Cyber Security Director at University
Cloud Security Crypto asset manager Instituto Superior Técnico
of Aveiro

Dr. Magda Lilia Jane Frankland Richard Baylie Svein-Erik Nilsen CJ Fabrizio Lorini Jack Melnick
Chelly, PhD Cybersecurity Executive CIO at OCS Group Cyber and Decentralization CyberSecurity Consultant, Crypto Compliance Advisor Head of DeFi @ Polygon
Award-winning global Ambassador Trader and Investor Labs
cybersecurity leader
Naoris Protocol makes networks
stronger as they grow, not weaker.
Thank you.

naorisprotocol.com

You might also like