* Assess robustness of architectures and data protection mechanisms.
* Define guidelines for Blockchain usage.
* Collaborate with cryptography and data security experts.
* Guide projects on appropriate protection techniques (encryption, anonymization, masking).
* Develop POCs with emerging technologies (e.g., homomorphic encryption).
* Perform risk analysis and define countermeasures.
* Establish security requirements and crypto-agility strategies.
* Present and explain security topics to both technical and non-technical audiences.