ETSI’s annual flagship event on Cyber Security, the ETSI Security Conference will take place from 6 to 9 October 2025, in ETSI HQ, Sophia Antipolis, France.
This exclusive face-to-face event is an exceptional annual opportunity for the security community to come together to exchange with an experts' audience, network with peers, and share facts and opinions around the most relevant subjects of cybersecurity standardization. The intensive 4-day programme typically gathers speakers from government agencies, other standards bodies, academia and various industry sectors.
Subscribe to the ETSI Events mailing list and/or the ETSI Security Events Mailing list to get the latest news about this event!
About the 2024 ETSI Security Conference
Agenda, Presentations given in 2024
Interviews
![]() ![]() ![]() ![]() ![]() |
The Security Conference Programme Committee is pleased to share a stable draft of the programme. It will slightly evolve until the end of August.
- Monday 6 October - Conference Day 1
Conference Day 1 - Monday 6 October
9.15: Check-in and Welcome Coffee
10:00 OPENING
- Opening message
Alex Leadbeater, Conference Programme Committee Chair, ETSI TC Cyber Chair - Welcome address
Jan Ellsberger, ETSI Director-General
10:30 SESSION D1-1 : Global cyber security landscape 2025 - KEYNOTES
Session Chair: Alex Leadbeater, ETSI TC Cyber Chair, GSMA
This session will explore the current state of the Global Cyber Security Landscape, including emerging trends and regulatory initiatives.- 10:30 Status from the European Commission
Filipe Jones-Mourao, EC DG CONNECT - 11:00 Our collective challenges in the next decade of telecommunications
Ollie Whitehouse, NCSC - 11:30 When AI meets cybersecurity: the new frontier of intelligence
Mattia Siciliano - Italian Intelligence Society- SOCINT
12:00 - 13:30: Networking lunch including posters and demonstration visits
13:30 SESSION D1-2 : Global cyber security landscape 2025 - KEYNOTES
Session Chair: Alex Leadbeater, ETSI TC Cyber Chair, GSMA
This session will explore the current state of the global cyber security landscape, including emerging trends and regulatory initiatives.- 13:30 ENISA perspective on European standardisation and certification
Apostolos Malatras, ENISA - 14:00 Presentation Title tbc
Christian Horchert, Open Source Community - 14:30 From assessment to alignement: our CRA Journey so far
EUSR Chair - 14:50 Panel Discussion with all keynote speakers
15.30 - 16.00: Coffee break including posters and demonstration visits
16:00 SESSION D1-3: Cyber skills gaps
Session Chair: Michaela Klopstra, Accenture
Cyber security skills are critical to every product or service with a digital element. This session will explore efforts to reduce the cyber skills gap and how both standards and education about standards have a role to play in ensuring a secure future for all.- 16:00 Contributions to European priorities in cybersecurity standardisation: Insights from StandICT.eu.
Luigi Colucci, Trust-itservices - 16:20 Cyber skills, past present and future
Ian McCormack, NCSC - 16:40 Standardisation education: A strategic tool to bridge the cybersecurity skills gap
Claire d'Esclercs and Howard Benn, ETSI - 17:00 Panel Discussion with session speakers
17:45 - 19:00 Day Networking Event
- Opening message
- Tuesday 7 October - Conference Day 2
Conference Day 2 - Tuesday 7 October
8:30: Check-in
09:00 KEYNOTE: Whispers and shouts: ensuring safey amidst LLM Noise
Daniel Cuthbert, Banco Santander09:20 SESSION D2-1 : Security in the intelligent age (part 1)
Session Chair: Gerry McQuaid, Ofcom
This session will explore the paradox between AI-driven cybersecurity risks and the rapid implementation of AI without necessary initial security safeguards in place. The session will consider the implications for security and privacy and how adequate baseline security controls can be applied in all AI deployment scenarios.- 09:20 Saving the future: how to fix Artificial Intelligence before we all die because of it
David Rogers, Copper Horse - 09:35 Cyber security requirements for AI
Michaela Klopstra, Accenture - 09:50 On risk management of AI systems: challenges and opportunities for standardization
Vangelis Gazis, Huawei - 10:05 How does (Artificial) Intelligence threaten security?
Scott Cadzow, C3L
10:20 - 11:00 Coffee break including posters and demonstration visits
11:00 SESSION D2-2 Security in the intelligent age (part 2)
Session Chair: Scott Cadzow,C3L
This session will explore the paradox between AI-driven Cyber Security risks and the rapid implementation of AI without necessary initial security safeguards in place. The session will consider the implications for security, data, and privacy.- 11:00 Fighting deepfakes thru provenance attestation
Asaf Shen, Qualcomm - 11:15 AI Literacy and trust in cybersecurity audits
Angela Fessl, KNOW Center - 11:30 Smart AI-based cyberattack detection and mitigation
Erol Gelenbe, Institute of Theoretical and Applied Informatics, Polish Academy of Science (IITIS-PAN) - 11:45 Panel Discussion with sessionS D2.1 an D2.2 speakers
12.30 - 13.45: Networking lunch including posters and demonstration visits
13:45 SESSION D2-3: Fraud reduction and security convergence
Session Chair: Nataliya Stanetsky, Google Ireland Limited
Historically Cyber Security and Fraud were frequently treated as isolated challenges. With the increasing complexity of Fraud and malicious end user attacks including AI enabled Deep Fakes, this session will examine the benefits of Cyber Security and Fraud prevention convergence to protect both networks and end users. The session will explore industry initiatives and progress- 13:45 Global Anti-Scam Alliance (GASA) Perspective
Speaker to be confirmed - 13:55 The Cyber Defense Alliance perspective
Craig Rice, Cyber Defense Alliance - 14:15 The App Defense Alliance: Strengthening application security through standards
Brooke Davis, Google - 14:35 Panel discussion
15:15 - 15:45: Coffee break including posters and demonstration visits
15:45 Consumer Vertical KEYNOTE: Singapore Perspective
Melvyn Kuan, CSA16:15 SESSION D2-4: Consumer Verticals (part 1)
Session Chair: Issy Hall, DSIT
It has been 5 years since ETSI initially published EN 303 645. While EN 303 645 and other industry initiatives have clearly had an impact, IoT security continues to be in the news for all the wrong reasons. From a standards and industry perspective, have we done enough, to secure the IoT eco-system or what more could we do?
The session will explore IoT Security trends over the last 10 years, impacts of regulatory interventions and highlight where progress has or has not been made.- 16:15 UK Product Security Act and EN 303 645 Reflections
Irfan Hemani, DSIT - 16:30 Germany EN 303 645 Reflections
Jan-Philipp Sommer, BSI - 16:45 Panel Discussion on EN 303 645 Effectiveness
- Irfan Hemani, DSIT
- Melvyn Kuan, Singapore CSA
- Mizuki Kitajima, METI
- Huan MunHui, KISA Digital Product Certification Team
- Jan-Philipp Sommer, BSI
17:45 - 19:00 Day Networking Drink
- 09:20 Saving the future: how to fix Artificial Intelligence before we all die because of it
- Wednesday 8 October - Conference day 3
Conference Day 3 - Wednesday 8 October
09:00 SESSION D3-1 : Communications technology evolution
Session Chair: Dario Sabella, xFlow Research Inc.
2025 has seen initial progress on the standardisation journey for “6G”. With 5G advance still under development, this session will explore the ongoing evolution of communications technology from a security perspective. The session will consider how technologies such as NTNs, O-RAN and edge cloud are set to play a greater role, how legacy weakness could finally be mitigated and how the industry will evolve towards IMT2030 objectives.- 09:00 3GPP SA3 Update
Mirko Cano Soveri, ETSI - 09:15 Towards 6G standardisation – What to consider for 6G security
Bengt Salin, Ericsson - 09:30 The threat landscape of 5G MEC and private networks
Nauman Khan, STC - 09:45 Secure Space-air-ground Integrated Network (SAGIN): Advancing 6G network security
Leyi Zhang, ZTE - 10:00 Enhancing security and privacy in distributed AI for 6G network
Madhusanka Liyanage, University College Dublin - 10:15 Panel Discussion: 6G Security Priorities
Moderated by Dario Sabella, xFlow Research Inc.
Panelists from Session D3-1
10:45: Coffee break including posters and demonstration visits
11:15 SESSION D3-2 : Consumer Verticals (part 2)
Session Chair: tbc
It has been 5 years since ETSI initially published EN 303 645. While EN 303 645 and other industry initiatives have clearly had an impact, IoT security continues to be in the news for all the wrong reasons. From a standards and industry perspective, have we done enough, to secure the IoT eco-system or what more could we do?
The session will explore IoT Security trends over the last 10 years, impacts of regulatory interventions and highlight where progress has or has not been made.- 11:15 Securing enterprise devices: research insights and policy levers
Alex S, NCC Group, Warda Hassan, DSIT - 11:30 The importance of scalability in certification
Axel Keskikangas, Axis Communications - 11:45 Do your gadgets have ears? Why IoT regulation must include data privacy
Ken Munro, Pen Test Partners - 12:00 Yay or nay? Vulnerability management in Consumer IoT one year before the CRA
Cédric Levy-Bencheton & Rayna Stamboliyska, Cetome & RS Strategy
12.15 - 13.45: Networking lunch including posters and demonstration visits
13:45 SESSION D3-3 : Zero trust
Session Chair: George Sharkov, European DIGITAL SME Alliance & SBS
Zero Trust as a concept is not new, it is security by design in action and provides functional security. Not everyone is yet a ZT true believer.
This session will explore ZT use cases and implementations.- 13:45 Reducing noise at source: Applying Zero Trust principles for efficient security event monitoring and anomaly detection
Hans Christiaan de Raad, OpenNovations - 14:00 When trust meets AI-agentic networks: How the next-generation communication network should be designed?
Xin Kang, Huawei - 14:15 Zero trust in motion
Galina Pildush, Palo Alto Networks - 14:30 Zero trust for every device: rethinking network security in the industrial IoT
Piet De Vaere, Product Security Guru GmbH
14:45 SESSION D3-4: Panel Discussion: Measuring Secure by Design: secure software development across the operational lifecycle
moderated by Curt Dukes, CISAchieving secure software development across the operational lifecycle is the central challenge in cyber security today. The objective is known as Secure by Design or DevSecOps, and reflected in national programmes and legislation - especially the EU CRA. Measuring this objective is essential to verification.
For nearly a year, CIS together with SAFECode undertook an initiative to develop a global specification for measuring secure by design suitable for publication by ETSI.
Moderated by Curt Dukes, CIS
- Helen L, NCSC
- Jan Philipp Sommer, BSI
- Irfan Hemani, DSIT15:15 - 15:45: Coffee break including posters and demonstration visits
15:45 SESSION D3-5: Digital sovereignty & societal impact, are we in the age of the splinternet?
Session Chair: Alex Cadzow, C3L
This session with explore the risk of the creation of the Splinternet and how different groups use online services and networks provides challenges for one size fits all security approaches. This session will explore how this impacts security, privacy and safety.- 15:45 Beyond performance: Structuring 6G security around societal needs and values
Eleni Chamou, NOVA Telecommunications & Media - Katrina Petersen, Public Safety Communication Europe - 16:00 Do we understand?
Alex Cadzow, C3L
16:15 SESSION D3-6: Quantum
Session Chair: Colin Whorlow, NCSC
Why is quantum a security problem, not just a problem?
This session will review the state of the art in quantum development and the implications for industry preparedness for a post quantum world.- 16:15 ETSI CYBER QSC update
Matt Campagna, ETSI Cyber QSC Chair - 16:30 ETSI QKD ISG update
Martin Ward , ETSI ISG QKD Chair - 16:45 Deploying an Indian hybrid QKD network: lessons learned and industry readiness for a post-quantum world
Dilip Singh, QNu Labs - 17:00 Securing constrained devices in a post-quantum world: The MARS Approach
Shahram Mossayebi, Crypto Quantique - 17:15 PQC migration for GlobalPlatform management protocols of secure chips
Hans Sebastian, GlobalPlateform - 17:30 Making industry sectors quantum-safe: lessons from Government, Telecom and Finance
Zygmunt Losinski, IBM Research - 17:45 Pragmatic requirements for enterprises to deploy PQC in production environments
Tim Callan, Sectigo
18:00 End of Day 3
- 09:00 3GPP SA3 Update
- Thursday 9 October - Conference Day 4
Conference Day 4 - Thursday 9 October
09:00 KEYNOTE: Telecom during the war time - Kyivstar
Volodymyr Lutchenko, Kyivstar09:00 SESSION D4-1 : Cybersecurity at the crossroads of geopolitics and information warfare
Session Chair: Bjorn Fanta, Fabasoft
This session will explore the evolving landscape of cybersecurity in the face geopolitical uncertainty, cyber espionage, intellectual property theft, and deliberate disruption of critical national infrastructure.- 09:30Turning threats into strategy: Insights from salt typhoon and SK telecom attacks
Silke Holtmans, Blue Hour - 09:45 Securing the Open AI frontier: addressing cybersecurity risks of ppen-weight LLMs through technical realities and standardisation
Alfonso De Gregorio, Zeronomicon
10:00 SESSION D4-2 : Cyber skills gap (part 2)
Session Chair: Davide Pratone, Huawei.- 10:00 Developer 2.0: Cyber Soldiers Training @Intel
Marcin Kolasinski, Intel - 10:15 Reasonable Use of Digital Products and Systems by Reasonable People
Gill Whitney, ANEC Expert - 10:30 European Cybersecurity Skills Framework- the reference EU framework for cyber skills
Speaker to be confirmed, ENISA
10:45 - 11.15: Coffee break, posters and demonstration visits
11:15 SESSION D4-3 : CRA Progress and Perspectives
Session Chair: tbc- 11:15 Lesson learnt from the ERATOSTHENES and CERTIFY projects regarding IoT security lifecycle
Jesus Garcia Rodriguez, Universidad de Murcia - 11:30 Mastering EU IoT compliance: How AI simplifies Cyber Resilience Act obligations through standardisation
Isaac Dangana, Red Alert Labs - 11:45 A practical guide of EU Cyber Resilience Act for open source project
Roman Zhukov, Red Hat - 12:00 ETSI ESI EUDI wallet update. A secure and seamless digital identity solution for Europe
Iñigo Barreira, SECTIGO - 12:15 Cyber Resilience Act: why standardisation matters for the EU and global market
Federica Bozzi, Next G Cloud
12.30- 13.45: Networking lunch including posters and demonstration visits
13:45 SESSION D4-4 : Cyber resilience
Session Chair: Charles Brookson, ZEATA Security
This session will explore strategies for achieving cyber resilience, including data longevity in the face of increasing complexity and unpredictability in the cyber landscape.- 13:45 Ministry of Defense: Jamming / Spectrum
Ian Bryant, Ministry of Defense - 14:00 Sec-Gemini and the defender's dilemma: AI agents on the cybersecurity frontier
Luca Invernizzi, Google - 14:15 The software supply chain: securing an essential pillar of today's digital infrastructure
Dmitry Raidman, Cybeats - 14:30 Cyber resilience in the TN-ITS data chain: building trust through provenance and end-user engagement
Massimiliano Masi, ERTICO - 14:45 Advancing vulnerability assessment
Francois Ambrosini, Huawei - 15:00 Symbiotic human-AI collaboration for augmented cybersecurity operations
Reda Yaich, IRT SystemX - 15:15 Ensuring cyber resilience from hardware up with TCG standards
Silviu Vlasceanu, TCG
15:30SESSION D4-5 : Future of cybersecurity standards
Session Chair: Alex Leadbeater, ETSI TC Cyber Chair, GSMA
Envisioning the future of cybersecurity standards and the role of European Standardization Organizations in the global ecosystem and setting priorities for ETSI16:15 Wrap up and Close of the event
- 09:30Turning threats into strategy: Insights from salt typhoon and SK telecom attacks
The conference is organized at ETSI's Headquarters in the South of France.
ETSI, 650 Route des Lucioles
06921 Sophia Antipolis, cedex
More on how to reach us.hotel recommendations, travelling from Nice Airport to ETSI
ETSI sincerely thanks the Security Conference 2025 Programme Committee Members for their engagement in putting together another thought provoking conference!
- Samim Ahmadi, EY
- Charles Brookson, ZEATA Security
- Alex Cadzow, C3L
- Scott Cadzow, C3L
- Matt Campagna, Amazon Web Services
- Mirko Cano Soveri, ETSI/3GPP
- Bjorn Fanta, Fabasoft
- Slawomir Gorniak, ENISA
- Issy Hall, DSIT
- Alan Hayward, NCSC
- Holie Hennessy, OMDIA
- Amy Johnstone, BT
- Michaela Klopstra, Accenture
- Alex Leadbeater,GSMA, Programme Committee Chair
- Daniel Lunny, BT
- Gerry McQuaid, Ofcom
- Kim Nordstrom, ETSI
- Davide Pratone, Huawei
- Tony Rutkowski, CIS
- Dario Sabella, xFlow Research Inc.
- George Sharkov, European DIGITAL SME Alliance & SBS
- Nataliya Stanetsky, Google Ireland Limited
- Colin Whorlow, NCSC
- Alf Zugenmaier, NTT Docomo
The following posters will be presented during the breaks of the Conference
- TELEMETRY: a novel approach to cybersecurity testing and assurance
Mr. Paolo DE LUTIIS TELECOM ITALIA s.p.a.
TELEMETRY is an EU funded RIA project started at the end of 2023 and fully dedicated to cybersecurity, providing a trustworthy framework to enable the continuous assessment of heterogenous and interlinked components & systems in the Internet of Things (IoT) ecosystems (interconnected IoT devices with hardware, software, services and communications infrastructure). Addressing all aspects of their lifecycle, the TELEMETRY holistic methodologies and toolkit cover both design-time as well as run-time, incorporating testing & monitoring features at component and system level within the heterogeneous, multi-actor context of IoT ecosystems, including mechanisms for certification in realistic environments. The TELEMETRY framework will deliver advances in cybersecurity testing and runtime monitoring through the use of novel machine learning models, algorithms for real-time anomaly detection, and dynamic risk assessment to simulate and evaluate likelihood and severity of threat consequences. The poster will present the main objectives of the project, highlighting the overall architecture and a set of innovative tools that have been developed and integrated into a comprehensive framework. It will also showcase how the framework and related tools have been evaluated through significant and realistic use cases, each representing distinct industry vertical, namely Aviation, Manufacturing, and Telecommunication. The application of the TELEMETRY tools will facilitate the automation of security testing of these ecosystems. A special deep dive will highlight the preliminary results achieved in the Telecom use cases, based on the internal Telecom Italia validation and certification process for network and IoT devices (including Home Gateway validation based on ETSI TS 103 848 and EN 303 645) prior to their mass deployment in critical infrastructure. Within the Telecom use case, the TELEMETRY tools and framework have been evaluated against actual industrial cyber threats and challenges, such as SBOM generation and analysis, vulnerabilities (e.g. CVEs) identification and prioritization, 0-Day detection and supply chain risks mitigation. The project will be finalized in the second half of 2026. Additional information about the TELEMETRY project: https://telemetry-project.eu/ - Post-Quantum TLS in the 5G Core: A Quantum-Agile Framework for Secure Network
Mr. Vasileios Fountas Eight Bells Ltd. (8BELLS)
The rise of quantum computing poses a critical threat to current cryptographic protocols, particularly RSA and Elliptic Curve Cryptography (ECC), which are vulnerable to quantum attacks such as Shor’s algorithm. As 5G networks rely heavily on public key infrastructure, the risk of quantum-era compromise—both retrospective and real-time—is significant. Transitioning to post-quantum cryptographic (PQC) primitives is therefore an urgent priority. This poster presents a practical framework for integrating PQC into 5G control plane communication, specifically over Service-Based Interfaces (SBIs). Utilizing NIST-recommended post-quantum algorithms, we implement PQC-enabled TLS handshakes through a modular proxy architecture comprising a Python-based proxy and HAProxy. The Python proxy intercepts inter-service traffic and handles cryptographic operations using a containerized environment that leverages the Open Quantum Safe (OQS) library, while HAProxy manages secure routing to the Network Repository Function (NRF). Importantly, this integration is non-intrusive and requires no modification to core 5G network functions such as the AMF, AUSF, SMF, or UDM. System-level metrics—including CPU usage, memory footprint, latency, and jitter—were evaluated before and after PQC integration. While a measurable overhead was introduced, performance remained within acceptable thresholds, demonstrating the approach’s feasibility for real-world deployment. This work supports a hybrid migration strategy, enabling backward compatibility, cryptographic agility, and seamless updates. It provides a scalable, testable foundation for securing 5G networks against future quantum threats, in line with emerging ETSI and NIST guidelines for post-quantum transition. - ML-KEM-ECIES: an hybrid key exchange and encryprion scheme based on the CatKDF key combiner for Cooperative ITS confidentiality service
Dr. Brigitte Lonc IRT SystemX
When a sufficient large and reliable Quantum Computer will become available, an attacker using Shor’s algorithm, which allows to solve Integer Factorization or Discrete Logarithm Problem in polynomial time, would be able to break classical cryptography whose security rely on these hard problems. This poses significant threats to the security solutions used in Cooperative Intelligent Transport Systems (C-ITS) such as Elliptic Curve Digital Signature (ECDSA) signature and Elliptic Curve Integrated Encryption Scheme (ECIES) asymmetric encryption. Due to the longevity of vehicle and road-side equipement deployed in the field, it is recommended to migrate to quantum-safe cryptography as soon as possible and transition to hybrid schemes is critical. Hybrid schemes combining a classical and a quantum-safe algorithms allow to mitigate the risk of quantum attacks while preserving common security guarantees. ECIES based confidentially service is used in C-ITS PKI for the frequent renewing of pseudonymous certificates (« Authorization Tickets ») provisioned to the C-ITS participants (vehicles, road-side units, and other road vulnerable users) and will be key in future, new C-ITS applications which may need to exchange encrypted messages in unicast or multicast mode such as Cooperative ACC, Platooning, tele-operation of autonomous shuttles etc. IEEE 1609.1 standard specifies the ECIES scheme and its parameter set for the confidentiality service used for these application messages and for PKI management protocols. ECIES is based on Elliptic Curve-Diffie Hellman with Cofactor (ECDHP) for key agreement and for derivation of shared secret keys between the communicating entities. However, ECDHP is no more secure in the quantum era. In this poster we present the MLKEM-ECIES hybrid key exchange and encryption protocol which is built on the Concatenate hybrid key exchange (CatKDF) combiner, as specified in ETSI 103 744_V1.2.1. MLKEM-ECIES is optimized to perform only three steps process similar to ECIES by aggregating the Key Derivation Function (KDF) process. It enables to possibly reuse the already implemented X9.63-KDF2 function as long as this KDF remains sufficiently secure. Thus it minimizes the processing effort and latency time for broadcasted critical safety messages as required in Connected, Cooperative and Automated Mobilility, while still maintaning a robust and secure protocol for C-ITS encrypted communication. In the next steps, we intend to further contribute to research and standardization works and plan to carry out formal validation of the hybrid security protocol and PoC implementation for performance evaluation. Further lage-scale testing in Field-test/ pilot projects would be needed for the adoption by the C-ITS ecosystem. - Automotive Security in the Era of Splinternet
Dr. Garikayi Madzudzo Horiba-MIRA
The poster highlights several critical security challenges posed by the splinternet in the automotive sector. As global internet fragmentation increases, cyberattacks become more prevalent due to inconsistent cybersecurity standards across regions, making vehicles in less-protected areas prime targets. Delayed software updates and patching issues further exacerbate security risks, as automakers struggle to deliver critical fixes to all vehicles, leaving some vulnerable to exploits. The fragmentation of the internet also leads to data privacy concerns, with varying regulations across regions potentially exposing vehicle data to breaches or unauthorized surveillance. Additionally, supply chain disruptions become a major issue, as restricted access to global cybersecurity tools and software can weaken automotive security frameworks. A fragmented digital landscape also threatens Vehicle-to-Everything (V2X) communication, which is crucial for autonomous driving, emergency responses, and real-time traffic updates—disruptions in these networks leads to safety hazards on the road. As the risk of geopolitical cybersecurity threats grows, disconnected networks enable state-sponsored cyberattacks, unauthorized access, or vehicle system manipulations. These challenges, represented through fragmented digital grids, cybersecurity threat icons, and disrupted data flows in the poster, underscore the urgent need for robust security measures in the evolving automotive landscape. - Benchmarking TLS 1.3 with PQC on Realistic Network Conditions
Mr. Iyan Mendez Veiga Lucerne University of Applied Sciences and Arts
We benchmark the TLS 1.3 handshake using post-quantum cryptographic algorithms, including both key encapsulation mechanisms and digital signature schemes, and compare them against traditional, non-quantum-safe counterparts. Our evaluation covers all FIPS-approved post-quantum standards (ML-KEM, ML-DSA, and SLH-DSA), as well as a selection of digital signature schemes from second-round candidates of the NIST PQC competition that are available in the liboqs library from the Open Quantum Safe project. To assess real-world performance, we simulate various network conditions (rate, delay, and losses) and analyze the impact of post-quantum cryptography on TLS connection latency. - Enabling Secure Network Orchestration: Proposals for SDN Controller Monitoring Interface Standardisation
Dr. Christiana Panayi European University Cyprus
Multiple industry standards have already been published to define interfaces within quantum key distribution (QKD) networks, including ETSI GS QKD 004 and ETSI GS QKD 014. Several others are under development, with some in stable draft form. However, a dedicated standard for monitoring interfaces to Software-Defined Networking (SDN) controllers—critical for integrating QKD into dynamic network environments—is still lacking and remains in a very early draft stage. This poster proposes a set of recommendations for the functional capabilities and data models such an SDN monitoring interface should support. It also outlines how these capabilities could be leveraged in different types of European network infrastructures, including traditional and quantum-enhanced architectures, to enable secure, interoperable, and automated network management. - Replacing eXtendable-Output Functions with Fresh Entropy in Module-Lattice-Based Cryptography: A Viability Study
Mr. Marc Romeu Casas Quside Technologies S.L.
We study the feasibility of modifying some primitives in Module-Lattice-based cryptography to use fresh entropy in place of eXtendable-Output Functions (XOFs). We discuss in detail the modification of several primitives within the standard FIPS 203 ML-KEM framework, focusing on both the security and performance implications of this substitution. Additionally, we evaluate how this implementation can affect key sizes, computational performance and the overall robustness of the algorithm. Systems with low computation capacity that have access to a high-performant entropy source—such as IoT devices equipped with dedicated entropy chips or those leveraging Entropy-as-a-Service solutions—can benefit of this approach. Our preliminary findings suggest that leveraging fresh entropy can maintain or even improve performance while preserving the system security, thereby presenting a viable alternative for resource-constrained cryptographic implementations. - ETSI TR 103 644 CYBER vs. Smart Device Security under Türkiye’s Energy Sector
Mr. Mehmet ÜNAL Secretariat of Defence Industries
This poster presents a comparative analysis of smart meter security observations set forth in the ETSI TR 103 644 CYBER technical report under the SUCCESS project and smart device security requirements under Türkiye’s Cyber Security Competency Model Regulation for the Energy Sector. It aims to contribute to the harmonization of policy and technical measures for device security in the digitalization process in the energy sector by providing a visual comparison of how field applications of standards developed at the European level overlap or differ with Turkey’s national cyber security approaches. - Not if, but when: The case of universal post-quantum readiness
Ms. Mouna Wamra, BERTRANDT
Cryptography, a pillar of cybersecurity is being threatened by advances in quantum computing. In the age of digitisation, all industries are subject to this threat. Before it becomes a reality, organisations must focus on crypto-agility and prepare their infrastructures for transition. The risk is even more urgent for industries with long product lifecycles, such as embedded systems. So how fast -and how effectively- can we prepare for a post-quantum world? - CUSTODES
Dr. Andreas Miaoudakis, CyberAlytics Limited
Attendees will be able to visit the following demonstrations during the conference networking breaks:
- SBOM Studio
Dmitry Raidman, Cybeats - Cloud Anti-Randsomware
Wojciech Niewolski, Orange Polska S.A. - Packet and Optical Transport Providers Security Enforcement in Multi-Stakeholder Untrusted Networks
Pol Alemany, Centre Tecnològic de Telecomunicacions de Catalunya (CTTC-CERCA) - Benchmarking and Visualizing the PQC Digital Signatures Zoo
Lyan Mendez Veiga, Lucerne University - Hay-Free Logging: Real-Time Whitelisting & Stream-SQL Analytics for a Minimal-Ops SOC
Hans Christian de Raad, OpenNovations - Exploring 6G Security via HORSE platform: Real-timeThreats and Mitigation in AR Server/Client Interactions
Amrita Prasad, Martel Innovate - Multi-vendor, resilient, Quantum Key Distribution demonstration
Noel Farrugia Merqury Cybersecurity, Marc Kaplan Veriqloud, Sebastian Etcheverry, LuxQuanta - Cyber Security Resilient Smart Manufacturing
Robert Seidl, Nokia
Iñigo Barreira is a seasoned computer engineer with over 20 years of experience in the field of Public Key Infrastructure (PKI) and trust services. His professional background includes extensive work with both public and private Trust Service Providers (TSPs), where he has led the design, deployment, and auditing of secure infrastructures for digital identity, qualified electronic signatures, and certificate lifecycle management. His expertise spans regulatory compliance (notably eIDAS), cryptographic hardware integration (HSMs), and the implementation of high-assurance environments for critical digital services. Since 2007, Iñigo has been an active member of the CA/Browser Forum (CABF), where he served as Chair of the Server Certificate Working Group (ServerCert WG), contributing to the development of baseline requirements and security guidelines for publicly trusted TLS certificates. In 2008, he joined ETSI, where he currently serves as Vice-Chair of the Electronic Signatures and Infrastructures (ESI) Technical Committee, playing a key role in the evolution of European standards such as ETSI EN 319 411 and EN 319 421, among many others over his long contribution to ETSI ESI. His international experience and multilingual capabilities have enabled him to collaborate effectively across regulatory bodies, standardization forums, and cross-border technical projects. Iñigo is recognized for his deep technical knowledge, strategic insight, and long-standing contributions to the global trust services ecosystem.
Federica Bozzi is an experienced manager with 10+ years in various businesses, from big corporations to SMEs, with leadership skills and experience in people management, other than a strong background in sales and operations. She holds a MS in Economics from Bocconi University (Milan) and a Master in International Relationships and Leadership (undergoing). In 2024, she co-founded NEXT G CLOUD, an Italian start-up specialized in Cloud Managed Services and Edge Cybersecurity. She currently leads the STF 701 in ETSI, an international task force of experts working to advance standardization for the Cyber Resilience Act (CRA). The project is part of STAN4CR2, funded by the European Commission and EFTA, and supports the implementation of the CRA, which aims to strengthen cybersecurity for hardware and software products across the EU.
Charles Brookson, OBE CEng FIET FRSA.- Member of the Programme Committee
Charles was at the United Kingdom Government for twelve years and is an Electronic Engineer. He was Head of Security for the UK mobile operator and was in British Telecom for twenty years. He has worked in many security areas over the last 40 years, including Cryptographic systems, secure designs, policies, auditing, and mobile radio for over 40 years. He now runs his own Company Zeata Security Ltd and is a Director of Azenby and Floor51 Ltd. He was Chairman of the GSM Association Security Group for 25 years. He was within GSM and 3GPP security standards, chairing the Algorithm Expert Group in 1986, which helped define GSM Security. He also helped to define Public Key Standards and ISO 27000 Standards. He was the first Chairman of the ETSI TC CYBER, then the Vice Chairman. He was awarded an OBE for services to Telecommunications Security in 2015.
Scott Cadzow, Cadzow Communications Consulting - Member of the Programme Committee
Appointed as an ETSI Fellow in 2023 Scott has a number of years of experience in standardisation at ETSI. Whilst often focussing on security it is in the application of security across technologies that are the standout characteristic of his career. In domains including eHealth and ITS, in AI and in the integration of transparency and applicability in the use of security technologies, that ensure ETSI is able to address the societal role of security and privacy in ICT, Scott has along the way helped to provide guidance and standards to solve problems.
Alex Cadzow, Cadzow Communications Consulting - Member of the Programme Committee
Alex's aim is to take an active role, through research and education, to bridge the gap between technology and the human user. This has been built up through a background in Anthropology and Forensic science and latterly into the human aspects of cybersecurity. His role in Cadzow Communications Consulting (C3L) as researcher and co-developer of contributions to the company’s work in standards and other projects.
Matthew Campagna, Amazon Web Services - Member of the Programme Committee
Matthew Campagna is a Sr. Principal Engineer & Cryptographer for Amazon Web Services Inc.’s. He oversees the design and analysis of cryptographic solutions across AWS. He is a member of the ETSI Security Algorithms Group Experts (SAGE), and Chairman of ETSI TC CYBER’s Quantum Safe Cryptography group. Previously he managed Certicom/BlackBerry’s Cryptography Research Group focused on the development of intellectual property and standardization for elliptic curve cryptography. He holds a doctorate in Mathematics from Wesleyan University.
Isaac Dangana is an expert in IoT and cybersecurity, currently serving as Lead Cybersecurity Expert at Red Alert Labs. His past roles include Group SECOPS CISO at Inetum, CISO and Senior Consultant at Red Alert Labs. Throughout his career, Isaac has contributed to major European initiatives and regulatory frameworks such as EUCC, EUCS, and the Cybersecurity Act. He has contributed to the development of several security frameworks and certification schemes (including IoTSF, Eurosmart IoT SCS, etc), and has been involved in security evaluations, consulting & training for clients accross Europe including both public and private entities.
Alfonso De Gregorio is a globally recognised cybersecurity technologist, Founding Director and Principal Investigator at Pwnshow, and CEO at Zeronomicon, Italy. He is a featured speaker at over 25 peer-reviewed international events across five continents, including NATO's Conference on Cyber Conflict, RSA Conference, ACSC Conference, and the world's leading hacker conferences. As a strategic policy advisor at the forefront of the AI governance debate, his current work focuses on the dual-use dilemma of open-weight AI and how the proliferation of powerful models impacts the cyber threat landscape. Alfonso is one of the few experts who has not only identified critical gaps in international regulations like the EU AI Act but has also directly influenced their evolution. His evidence-based recommendations on AI security and distributed responsibility were integrated into the EU's 2025 GPAI Code of Practice. Through his research at Pwnshow, he bridges the gap between the technical realities of offensive AI and the strategic imperatives of global cyber policy, making him a key figure in shaping how next-generation AI risks are managed.
Jan Ellsberger, Director-General, ETSI.
Jan Ellsberger is a globally recognised leader in the ICT industry with more than 30 years of experience with research and innovation, industry ecosystem development, standardisation, policy development & regulation, and strategy development in the telecommunications and automotive industries. From 2000-2012 he was leading Ericsson’s global standardisation operations. He has also served in leading positions in several industry associations such as 3GPP, 5GAA, ERTICO and the Horizon Europe CCAM Association.
Björn Fanta, Fabasoft – Member of the Programme Committee
Björn Fanta has a background in electrical engineering, and holds a degree in statistics and economics. In recent years, he has made significant contributions to various innovation projects in collaboration with international partners. At Fabasoft, he successfully established the research department and recently was appointed as General Manager of the newly founded Fabasoft Research GmbH. He leads a team of highly motivated young researchers in the Cloud computing sector. Together, they engage in a range of research initiatives with partners across Europe, guided by a shared research vision at Fabasoft. Björn continuously seeks innovative ideas and project opportunities related to digitalization, Cloud and Edge computing, cybersecurity, artificial intelligence as well as human-centered research approaches. Originally from northern Germany, Björn has developed a deep appreciation for the Upper Austrian region and has chosen to settle near Linz.
Jesús García Rodríguez received the B.S. degree in Mathematics and the B.S and M.Sc. degrees in computer science from the University of Murcia. He is a Postdoctoral Researcher at the Department of Information and Communications Engineering. During his career, he has participated in several EU cybersecurity projects like OLYMPUS, CERTIFY, ERATOSTHENES, or ENTRUST. His research interests involve privacy-enhancing and security technologies, including cryptographic developments and their application to identity and trust management solutions for end-users and Internet of Things scenarios.
Erol Gelenbe PhD DSc FIEEE FACM, professor at the Institute of Theoretical and Applied Informatics of the Polish Academy of Science, researches the cybersecurity, sustainability and performance of computer systems and networks. Also CTO of Cognitive Networks Ltd, he served as Dennis Gabor Professor at Imperial College (2003-2020), graduating over 90 PhDs during his career in Europe and the USA. A Fellow of Academia Europaea, the French National Academy of Technologies and the Science Academy of Turkey, a Foreign Fellow of the Royal Academy of Sciences of Belgium and the Polish Academy of Sciences, and Honorary Fellow of the Hungarian Academy of Sciences and the Academy of Sciences of the Islamic World, he has won the awards of Chevalier de la Légion d'Honneur and Commandeur du Mérite (France), Commendatore Ordine al Merito della Repubblica Italiana, Commandeur de la Couronne (Belgium), and Officer of Merit (Poland). Active in EU Horizon projects, he contributes regularly to major research journals.
Issy Hall, DSIT - Member of the Programme Committee
Issy is a cyber policy professional who has served both the New Zealand government and, currently, the UK government at the Department for Science, Innovation and Technology. Issy’s focus to date has been on the cyber security of a range of evolving and emerging technologies. In her current role, she leads the UK Government’s work across a variety of standards bodies on increasing the use of standards to uplift the cyber security of emerging technologies, such as AI. Issy is a member of the Securing AI technical committee in ETSI, where she is rapporteur for a cyber security standard for AI.
Hollie Hennessy, OMDIA - Member of the Programme Committee
Hollie provides insight into the fascinating and fast-moving domain of IoT cybersecurity, including automotive, medical and embedded security, as well as the increasing development of OT cybersecurity. Hollie has a range of experience in research. She began her career in the legal sector, writing and researching for expert witness reports on the labor market. She then moved into product testing, with a consumer protection focus. In this role, she was responsible for managing comparative tests of various technology and IoT products, as well as regular testing and investigative work into the security of these devices. She has published articles in Which?, produced by the UK's largest consumer organization and one of the country's largest subscription magazines, Computing, DarkReading and regularly provides expertise for news announcements and reports. She is also a regular speaker at industry events such as Black Hat, as well as specialised events in the OT and IoT cybersecurity space. She has a particular interest in regulation and standards, supporting numerous research projects on the topic, ranging from consumer device testing and labelling, 5G security standards, OT security regulation and automotive cybersecurity regulation.
Xin Kang is a chief research scientist in Trust and Security at Huawei Singapore Research Center. Dr. KANG received his B. Eng. degree from Xi’an Jiaotong University in 2005, and his Ph.D. degree from National University of Singapore in 2011. He was a research scientist in Institute for Infocomm Research, A*STAR, Singapore, from 2011 to 2014. After that, he joined Shield Lab, Huawei Singapore Research Center as a senior researcher. Dr. Kang has published 90+ top-tier journal and conference papers, and many of them are SCI highly cited research papers. He has received the Best Paper Award from IEEE ICC 2017, and Best 50 Papers Award from IEEE GlobeCom 2014. He has also filed 70+ patents on trust and security protocol designs. Besides, he is very active in standardization. He has contributed 30+ technical proposals to 3GPP SA3. He is the initiator and chief editor for ITU-T standard X.1365, X.1353, Y.3260, and the on-going work item Y. Trust-AI. He is the vice chair of IEEE SA AIGC technology working group, and the main contributor of IEEE P3429. He is also the initiator and main contributor of ISO JPEG Trust. He is also very active in IETF ANIMA and TLS working group. He is the leading key contributor of Huawei 5G security white paper series. Dr. Kang has more than 15 years’ research experience and his research interests include but not limited to trust modelling, trust networking, trustworthy AI, network security, digital identity, blockchain, security protocol design, and applied cryptography.
Alex Leadbeater, GSMA, ETSI TC CYBER Chair - Programme Committee Chair
Alex is Technical Security Director at GSMA. Alex has spent over 25 years working across the Communications and Cyber Security industry. Alex specialises in bridging the gaps between communications technology evolution and regulatory requirements (Security, Privacy, Public Safety) placed on the Communications Service Providers. Alex has been involved in standardisation for 25+ years and currently chairs several industry Cyber Security and Regulatory standards groups. Starting his career in satellite communications, following a Master’s degree in Electronic Engineering from Warwick University. Prior to joining GSMA in Jan 2023, Alex held a range of technical, design and regulatory governance roles for BT Plc.
Zygmunt Lozinski - Zygmunt's mission in IBM Research is to make the world's networks Quantum-safe. He is part of the team researching Post-Quantum Cryptography and PQC migration for telecoms and other industry sectors. He was one of the co-founders of the GSMA Post Quantum Telco Network Task Force (PQTN) and is editor for PQTN reports. Previously he was IBM's Telecom Industry Technical Leader where he worked on telco network cloud (NFV), edge computing and orchestration. Zygmunt is a member of IEEE and holds over 30 patents in telecommunications and computing.
Dr. Shahram Mossayebi is the founder and CEO of Crypto Quantique, a London-based company specialising in cybersecurity solutions for the Internet of Things (IoT). Before founding Crypto Quantique, Shahram worked as a cybersecurity consultant. Alongside his team, he invented the world's first quantum tunnelling physical unclonable function (PUF) chip, called QDID, after identifying a significant vulnerability in existing IoT chip designs. Shahram is recognised as a quantum cybersecurity expert and has published several scientific papers and patents. His work focuses on creating simple, scalable, and secure solutions that address the complex challenges of IoT device connectivity and protection against cyber threats. Under his leadership, Crypto Quantique has raised funding from prominent venture capital firms over multiple rounds, won multiple grants from the European Innovation Council (EIC) and has been awarded multiple industry awards. Shahram holds an MSc in Information Security and a PhD in Post-Quantum Cryptography, both from Royal Holloway, University of London. His doctoral thesis focused on providing an in-depth analysis of the security of existing symmetric encryption schemes against attackers with quantum capabilities.
Davide Pratone, Huawei - Member of the Programme Committee
Davide has a degree in Physics and a Master in Telecommunication. He joined Telecom Italia R&D in 1997 and since 2004 he represented Telecom Italia in several SDOs: 3GPP ETSI, CEN, ISO/IEC. From 2009 to 2013 Davide has been the 3GPP CT6 Vice Chairman, while from 2012 is ETSI TC SET REQ Chair. Davide was even technical project manager for some important Telecom Italia deployments such as the Mobile TV in 2006, NFC payment, transport and loyalty services. In 2016 Davide moved to Idemia (formerly Oberthur Technologies) acting as security standardization expert and supporting the eUICC Product Managers to certify several eUICC products for Consumer and M2M scenarios. In 2019 Davide moved to Huawei to cover the Security Standardization Expert position for Consumer Business Group in Europe. He joined ETSI TC CYBER becoming Vice Chair in 2020 and he has been elected ETSI TC SET Vice Chair in March 2021. In September 2021 he has been elected GSMA eSIM WG1 (requirements) Chair. Davide represent UNI in several CEN/CENELEC JTC13 Working Groups including WG8 where he contributed to the RED standards for cybersecurity and privacy EN 18031 serie.
Dmitry Raidman is a visionary cybersecurity executive with decades of experience in building secure, automated systems and transformative software supply chain solutions. As CTO of Cybeats, he pioneers SBOM-based security tools, engages in standards development, and champions secure-by-design across industries. His public engagement, from speaking at global events to podcasting, empowers the cybersecurity community to build transparent, resilient software ecosystems.
David Rogers is a mobile telecoms and security specialist who runs Copper Horse Ltd, a software and security company based in Windsor, UK. His company is currently focusing on research for AI model security, product security for the Internet of Things as well as future automotive cyber security. David chaired the Fraud and Security Group at the GSMA until March 2025. He authored the UK’s ‘Code of Practice for Consumer IoT Security’, in collaboration with UK government and industry colleagues and served on the UK’s Telecoms Supply Chain Diversification Advisory Council. He was awarded an MBE for services to Cyber Security in the Queen’s Birthday Honours 2019.
Dario Sabella, xFlow Research Inc. - Member of the Programme Committee
Dario Sabella works with xFlow Research Inc. as Vice President, Technology and Standards, leading the team’s involvement in ETSI, both on standardization and open-source activities, and guiding the strategy to expand in other areas, also for features evolution and prioritization in the company. Since 2025, he is also Managing Director and R&D Head of the Italian company called NEXT G CLOUD, focused on Cloud Managed Services and Edge Cybersecurity. Serving since 2021 as Chairman of the ETSI MEC (Multi-access Edge Computing), an international stand body with 180+ members and participants from industry, research and government agencies. In his career, Dario was previously with Intel Corporation for about 8 years as Senior Manager Standards and Research, driving new technologies and edge cloud innovation, and earlier he worked for 16+ years in TIM (Telecom Italia group), as responsible in various research, experimental and operational activities on cellular technologies. IEEE senior member, prolific author of several publications (80+) and patents (50+) in the field of communications, energy efficiency and edge computing. Member of the Editorial Board of MIT Technology Review Italia.
George Sharkov - Member of the Programme Committee
Dr Sharkov is Assoc. Professor at the Institute of ICT, Bulgarian Academy of Sciences. Since 2003, he has been Director of the European Software Institute (Sofia) and head of the Cybersecurity Lab at SofiaTechPark. He was a cyber defence adviser to the Bulgarian MoD (2014-2021) and National Cybersecurity Coordinator for the Bulgarian Government. George was a member of EU AI High-Level Expert Group and is representing European Digital SMEs and SBS in ETSI Technical Committees CYBER and Securing AI, and several ENISA working groups. He has more than 30 years of experience in developing complex software systems-of-systems, software process quality (CMMI), cyber security and resilience (CERT RMM), and trustworthy AI. He holds a PhD in AI/expert systems and is lecturing at three leading universities in Bulgaria (software quality, cybersecurity, security for AI).
Nataliya Stanetsky, Google - Member of the Programme Committee
As a Senior Lead Program Manager at Google, Nataliya Stanetsky leverages her extensive expertise in IT Security and Business Risk Management to shape the future of Android security and privacy. With close to 20 years of experience, she leads a portfolio of strategic initiatives within the Android Security & Privacy Engineering team, focusing on Device, Connectivity, and App safety. Nataliya's influence extends beyond Google, as she drives industry-wide evangelism efforts and collaborates with partners to establish robust security standards. Her previous experience includes significant contributions to IT Security at L’Oréal and within top-tier Big 4 consulting environments.
Silviu Vlasceanu is a Senior Technical Expert and Director of the Trusted System Security Lab at Huawei in Germany, where he is responsible for research in trusted computing and system integrity for heterogeneous cluster computing infrastructures. In the past 17 years, he has been contributing security technologies to a wide range of products, from network equipment to servers, from smartphones to cars, and from hardware roots of trust to software runtime integrity. He represents Huawei within the Trusted Computing Group (TCG) since 9 years, and is currently the Secretary of the Board of Directors, a member of the Technical Committee, and a co-chair of the Cyber Resilient Technologies working group."
Gill Whitney - My expertise is in the area of Secure and Accessible ICT Systems. I have worked on projects with partners including the UN Committee on the Rights of People with Disabilities, ISO, CEN/CENELEC, ETSI, BSI and European Academic Institutions. My work has included the authoring of Security and Accessibility standards and the creation of ambitious but practical training materials, including creation of ISO27001:2022 teaching material. I work as an independent expert for ANEC (the European consumer voice in standardisation) on ETSI (The European Telecommunications Standards Institute) Technical Committee on Cybersecurity (ETIS Cyber), on CEN (the European Committee for Standardization) Technical Committee on Personal identification and related personal devices with secure element, systems, operations and privacy.
Colin Whorlow, NCSC - Member of the Programme Committee
Colin Whorlow has worked in the UK National Cyber Security Centre (NCSC), and its predecessor CESG, for over 20 years. As Head of International Standards he has spearheaded NCSC’s active involvement in global security standards work including within ETSI and 3GPP. He convened the ETSI Quantum Safe Cryptography ISG, now a Working Group within TC Cyber, and has also chaired the group – and he is a Programme Committee member for the annual ETSI/IQC Quantum-safe Cryptography workshops. He also convened the ETSI Securing AI ISG, now TC SAI. Colin was a long-time member of the Management Board of ENISA, and is a former chair of the CCRA Management Committee. In previous roles he led CESG’s engagement on EU and NATO information assurance issues. Colin also chaired the Information Security Technical Working Group at the Wassenaar Arrangement for some years. Colin was awarded an OBE for services to National Security in 2024.
Leyi Zhang received the B.S. and M.S. degree (with honors) in electronic engineering from the Department of Electronic Information Engineering, Beihang University in 2020 and 2023 respectively. She is working as a researcher with the technology planning department of ZTE Corporation, responsible for long-term research as well as standardization. Her research interests include network security and quantum communication. She has many peer-reviewed publications. She took part in many international academic conferences as the session chair or invited speaker. She participated in national key research projects as the research assistant or researcher. She actively participates in global standardization activities through platforms such as ITU-T, 3GPP, ETSI and CCSA. She currently serves as the chief delegate of ZTE to ITU-T SG17, and WG3 leader of thematic group DPI for cities in ITU-T U4SSC.