ETSI Security Week 2019

Cyber Security & Dynamic Nature of Technology, Networks and Society

key Sophia Antipolis, France
Free of charge

Technology, networks and society are moving forward at a rapid rate. Technologies are evolving more and more rapidly. ICT networks are in a permanent change of states with known devices connected, unknown things and applications connecting, other disconnecting, with network functions being virtualized, new services being added, services being segregated, services being discontinued, etc. 

These changes in technologies impact society while user behaviours are also in constant evolution.
This track discusses how such rapid rate of change affects the security of networks, devices and users, and how does security keep pace.

Objectives of this session:

  • To find common challenges across the breadth of technology in staying secure in an evolving landscape
  • To recognise best practice in different technologies of how security can keep pace with rapid change, finding the benefits and limitations in replicating these approaches across industry
  • To identify more immediate technical challenges that will arise in the next year
  • To explore the incentives for developing, deploying and adopting security
  • To understand how best to address these immediate challenges and how what we do now will impact the future

Target audience:
Attendees with either technical and policy backgrounds will find value in these sessions, from government, industry or academia.

The programme committee is calling for contribution on the following topics. Note that, if selected, your contribution may be accepted as presentation, very short statement or participation to a panel; this will be determined in line with agenda constraints and other factors.

  1. 5G networks will have to support rapid and frequent changes due to SDN, NFV, edge computing, cloud technologies, etc; with such rate of change, how does security of 5G networks keep pace? In particular:
    - How security of 5G networks is built to cope with such technology and network rate of change
    - How deployment of SDN, NFV, or edge computing technologies affects 5G network security. What are the new threats and new solutions in security for virtualised networks and for edge computing
    - How to choose between hardware security and cloud security
    - Where can standards help with this?

  2. IoT devices and services are updated very frequently to enhance services and security
    - How can you certify the security of an IoT device that is changing regularly
    - Which security conformance frameworks/models to adopt when IoT products and services are updated very frequently
    - Should updates be more visible to the end user and inform about the security upgrades? How to inform the end user when the IoT device is in a machine-to-machine environment?
    - How do you securely manage dynamically updating devices?
    - With such large deployments, diversity and rapid rate of change of IoT devices, how can security be managed effectively?

  3. Network management: What are the parts of network management that are changing quickly and how security keeps up
    - How do we securely manage new virtual networks
    - How do we securely manage networks with the emergence of quantum computers
    - How do we securely manage networks with hundreds of unknown devices and applications (dis)connecting?
    - How enterprises manage their network security when migrating to cloud services?
    - To what extent will AI help to manage a dynamically changing network?

  4. Changing cryptography: how to maintain security while cryptographic algorithms are more rapidly weaker or hacked, in particular:
    - How rapid changes in crypto-attacks will be solved in terms of cryptography
    - How crypto-agility helps and which migration strategies to adopt
    - How to avoid downgrade attacks
    - How to prepare for the advent of quantum computers: wait, hybrid, or full quantum solution?
    - How lightweight cryptography for IoT will still be safe and secure
    - How attribute- and identity-based encryption methods respond to evolving needs

  5. Human factors: More and more cyber-attacks affect consumers. Service/product providers or employers request their users or employees to update security parameters (e.g. passwords) or to follow strict security procedures. How do human beings keep up? in particular:
    -How can technology enable users to improve security while remaining user friendly and user acceptable? (e.g. there are better ways to authenticate users than requiring them to remember 100 different passwords)
    - Awareness and education of consumers to keep up with such rapid technology life-cycle
    - Security skills development for the product builders
    - How to find the right balance between security features and human acceptability
    - How to give people more control of their data; how data is shared and who it is shared with
    - How those changes affect privacy and trust

  6. Security of hardware and software development:
    - With more and more frequent software updates, how to ensure secure development, update, and deployment of software
    - How hardware keep up with the rapid change in security needs; how does it affect the hardware development, upgrade and deployment
    - Supply chain integrity

  7. How such rapid rate of change in technology, networks and devices reflects on standardization
    - How to make development of standards faster
    - How to update existing standards faster
    - Which new methodologies would help speeding up standards development

Should you wish to send a presentation proposal, please fill in this form and return it to by 8 March 2019.

Note that, if selected, your contribution may be accepted as presentation, very short statement or participation to a panel; this will be determined in line with agenda constraints and other factors. It is intended to have the full programme online beginning of May.

Marketing or commercial speeches are not welcome.

  • Charles Brookson, Zeata
  • Sonia Compans, ETSI
  • Slawomir Gorniak, ENISA
  • Alan Hayward, NCSC
  • Dominique Lazanski, Last Press Label
  • Alex Leadbeater, BT & TC CYBER chairman, PC Chair
  • Andreas Mitrakas, ENISA
  • Kirsty Paine, NCSC
  • Mark Pecen, ISARA
  • Matthias Schneider, Audi & TC HF chairman
  • Claire Vishik, Intel
  • Stacie Walsh, Oxford Information Labs
Any Questions? Contact us

We use cookies or similar technologies to collect data about your use of this website and to improve your experience when using it. To find out how to disable our cookies, please visit our Privacy Policy.

  I accept cookies from this site.
EU Cookie Directive plugin by