ETSI’s annual flagship event on Cyber Security, the ETSI Security Conference, will take place face-to-face from 14 to 17 October 2024, in ETSI, Sophia Antipolis, France.  Save the date in your calendar not to miss this opportunity to Meet and Network with the Community! 

This exclusive face-to-face event will provide an exceptional opportunity for the security community to come together to exchange with experts, network with peers, and share facts and opinions around the most relevant subjects of cybersecurity standardization. The intensive 4-day programme will gather speakers from government agencies, other standards bodies, academia and various industry sectors. 

This year's event will address AI - Impacts of Regulation on Zero Trust and Consumer devices - Societal Impact of Technology-  Fraud, Security and Standards Convergence - 5G to 6G - Privacy and Considerations of Employing Encryption Technologies -Transport, Public safety and Critical Communications - Consumer verticals. 

Currently the Programme Committee is finetuning the programme. The event stable programme and the registration opening will be announced around 20 July.

Subscribe to this mailing list to be kept informed of its launch. 

Please find below the stable (yet not final) event programme for the ETSI Security Conference 2024:

  • Day 1: Monday 14 October
  •  
     

    09.15 - 10:00  Check-in and Welcome Coffee

    10.15  Opening Messages 

    • Alex Leadbeater, ETSI TC Cyber Chair
    • Jan Ellsberger, ETSI Director-General

    10:30 SESSION D1-1: GLOBAL CYBER SECURITY
    Chaired by Alex Leadbeater, ETSI TC Cyber Chair, GSMA

    • 10:30 KEYNOTE: AI Security: Present State and Future Directions 
      Rob van der Veer, Software Improvement Group
    • 11:00 KEYNOTE: SBOM - Title to be confirmed 
      Allan Friedman, Cybersecurity & Infrastructure Security Agency
    • 11:30 From eUICC to on-boarding: The puzzle of Certification of EU Identity Wallets 
      Eric Vetillard, ENISA

    11:50 Lunch & Networking Break - Posters Visits

    13:30 SESSION D1-2: IMPACTS OF REGULATION #1 - Capturing European Values in Technology 
    Chaired by Björn Fanta, Fabasoft

    The session will focus on impacts of regulation on products, innovation and technology. It will consider how EU regulation (e.g. AI Act, e-IDAS, RED, CRA, NIS2) and other regional regulations have shaped the global technology landscape. The session will also consider points of friction and gaps between aims of regulation and actual security improvements for products placed on the market.

    • 13:30 CERTGRAPH: Applying Knowledge Graphs for Cloud Certification 
      Stefan Schöberl, Software Competence Center Hagenberg GmbH 
    • 13:50 Estonian journey developing and implementing the national information security framework E-ITS
      Mari Seeba, NCSC-EE 
    • 14:10 SBOMs, Asset Management and Vulnerability Management, a vendor's view 
      Francois Ambrosini, Huawei
    • 14:30 Meeting the challenges of the EUDI Wallet with GlobalPlatform SAM and CSP specifications
      Jean-Daniel Aussel, GlobalPlatform 
    • 14:50 CRA mapping with EUCC and its impact on Protection Profiles 
      Vicente Gonzalez Pedros, ENISA
    • 15:10 Introducing CYBERSTAND.eu: Supporting EU experts in Cybersecurity standardization 
      Igor Minaev - ETSI 

    15:25 Coffee & Networking Break - Posters Visits

     16:00 SESSION D1-3: AI as a Technology / Platform
    Chaired by George Sharkov, European DIGITAL SME Alliance & SBS

    The session will consider AI security from the perspective of securing AI as a generic platform capability. The session will discuss the latest challenges, threats, legislation and approaches to providing secure AI. 

    • 16:00 Adversarial AI in ICT
      Piotr Zuraniewski, TNO
    • 16:20 AI and Impersonation Fraud: Emerging Threats and Countermeasures 
      Nicole van der Meulen, SURF 
    • 16:40 ETSI's role in standardising the cyber security of AI 
      Issy Hall, Department of Science, Innovation and Technology 
    • 17:00 Can standards prevent the existential threat of AI? 
      Scott Cadzow, Cadzow Communications Consulting Ltd
    • 17:20 AI Certification Strategies - Realizing the Potential of the Area 
      Corina Pascu, ENISA

    17:40 Networking Cocktail 

  • Day 2: Tuesday 15 October
  •  
     

    Day 2 Opening by Alex Leadbeater, ETSI TC Cyber Chair, GSMA

    09: 00 SESSION D2-1 Fraud, Security and Standards Convergence 
    Chaired by Charles Brookson, ZEATA

    This session will explore where standards are being driven by fraud and where fraud is driving standards. The session discusses how security and fraud prevention / detection can work more closely. Focus areas to include; 5G, PSD2, eSignature and e-payments. 

    • 09:00 Speaker to be confirmed
    • 09:20 The Janus Problem – the Challenge of Dealing with Legacy Security Problems While Looking to the Future 
      David Rogers, Copperhouse 
    • 09:40 The Evolution of Cybersecurity from Governments to Individuals in a 6G, AI-Enabled Hyper-Connected World
      Bret Jordan, Afero
    • 10:00 Presentation Title to be confirmed
      Peter Allwood, Mastercard
    • 10:20 Mobile Handset Theft Prevention
      Nataliya Stanestky, Google

    10:40 Coffee & Networking Break - Posters Visits

    11:10 KEYNOTE:: Impersonation and Psychological Warfare - Protecting the Children 
    Galina Pildush, Palo Alto Networks

    11:30 SESSION D2-2 : Societal Impacts of Technology
    Chaired by Alex Cadzow, C3L

    This session will explore the societal impact of technology on end users and society. coercive control avoidance, Metaverse, protection of children, disinformation and protection vulnerable citizens will be discussed. 

    • 11:30 Is eHealth a reasonable standardization goal? 
      Suno Wood, EP eHealth Chair
    • 11:50 A Framework for Supporting the Digital Safety of At-Risk Users 
      Sunny Consolvo, Google
    • 12:10 Improving Security by Improving Communication with Individual Consumers 
      Gill Whitney, ANEC

    12:30 Networking Lunch - Posters Visits

    14:00 SESSION D2-3 Consumer Verticals 
    Session Chair Hollie Ennessy, Omdia
    The session will explore latest security best practice, challenges and gaps for consumer IoT and other smart devices.

    • 14:00 CMDPP Evolution Toward EUCC and CRA 
      Davide Pratone, Huawei
    • 14:20 RED Cybersecurity Conformity Assessment Approach and Challenges 
      Angelo D’Amato, UL Solutions
    • 14:40 How Global Standardisation Efforts are Expanding eSIM Benefits for the Consumer IoT 
      Bertrand Moussel, Trusted Connectivity Alliance 
    • 15:00 Navigating the Dynamic Landscape of Cybersecurity Legislations, Standards, and Regulations for Embedded Devices
      from a provider of measurement instrument perspective

      Kaustabh Bebbarman, LAAVAT 
    • 15:20 VDP Accessibility in Consumer IoT 
      Cedric Levy-Bencheton, Cetome

    15:40 Tea & Networking Break Posters Visits

    16:15  SESSION D2-4: Societal Impacts of Technology
    Session Chair : Nataliya Stanestky, Google

    • 16:15 Spotlighting Consumer IoT Enabled Coercive Control 
      Joanne Walker, BT Group 
    • 16:35 Age Verification the Stakeholders Solutions, and Standards Landscape 
      Alex Cadzow, Cadzow Communications Consulting Ltd 
    • 16:55 Is It Trustworthy Enough? Considering Societal Impact in Public Safety Technologies 
      Katrina Petersen, Public Safety Communication Europe 

    17:15 Session D2-5: PANEL DISCUSSION: Societal Impacts of Technology 
    Chaired by Galina Pildush Palo Alto

    More details to be provided at a later stage. 

    18:00 End of Day 2

  • Day 3: 16 October
  •  
     

    Day 3 Opening by Alex Leadbeater, ETSI TC Cyber Chair, GSMA

    09:00 KEYNOTE: The NIST PQC Standards
    Dustin Moody, NIST 

    09:20 Session D3-1: Quantum Safe Cryptography
    Chaired by Colin Whorlow, NCSC

    The session will explore latest developments in quantum algorithm selection, migration strategy, best practice, agility and other cryptography. 

    • 09:20 Presentation Title to be confirmed
      Stephan Ehlen, BSI
    • 09:40 ANSSI views on Post-Quantum Cryptography Transition
      Samih Souissi, ANSSI
    • 10:00 Overview of ETSI ISG QKD
      Martin Ward, ISG QKD Chair, Toshiba
    • 10:20 ETSI Cyber QSC Update
      Matt Campagna, Cyber QSC Chair, AWS

    10:40  Coffee and Networking - Demos and Posters Visit

    11:10 SESSION D3-2: Quantum Safe Cryptography
    Chaired by Matt Campagna, AWS

    • 11:10 Staying Ahead of the Quantum Threat – Starting with Hardware 
      Thalia Laing, HP Security Lab
    • 11:30 Early Experiences Implementing Quantum-Resistant Cryptography for Embedded and Kernel Use Cases 
      Daniel Pouzzner, WolfSSL 
    • 11:50 Futureproofing Data Security with Quantum-Resistant Algorithms
      Glen Leonhard, CryptoMathic

     12:10 - 13:00 SESSION D3-3 : PANEL DISCUSSION 

    13:00 Lunch & Networking  - Posters Visit

    14:15 SESSION D3-4: Impact of Regulation #2 – Trust and Privacy 
    Chaired by Scott Cadzow, C3L

    The session will explore latest developments, regulatory landscape and best practice for trust establishment and privacy. 

    • 14:15 Verify Before Use - the Role of ETSI's ISG ETI 
      Speaker to be confirmed
    • 14:35 Enhancing Zero Trust and Consumer Device Security through TCG Standards and Regulatory Compliance 
      Thorsten Stremlau, Trusted Computing Group 
    • 14:55 Navigating Trust and Data Privacy Contradictions in the Age of Autonomous Cars
      Francesca Bassi, IRT Systemx

    15:15 Tea & Networking  - Posters Visit

    15:45 SESSION D3-5: 5G to 6G Evolution or Revolution? 
    Chaired by Alex Leadbeater, TC Cyber Chair, GSMA

    In early 2024 3GPP, ETSI and GSMA started the multi-year process of developing standards for 6G. While 6G won’t reach the market until ~2030, 2024 to 2026 with be the key years in which 6G architecture is standardised. This session will explore 6G challenges and opportunities from a security perspective. 

    • 15:45 A Vision for Communications (6G)
      Laurence Wayne, BT
    • 16:00 CONFIDENTIAL6G: Confidential Computing and  Privacy-preserving Technologies for 6G 
       Vera Stavroulaki, WINGS ICT Solutions
    • 16:20 Bridging the Gap: XAI's Contribution to B5G and 6G Network Security
      Madhusanka Debbarman,
      University College Dublin 
    • 16:40 Digital Identity for Next Generation Telecommunication Networks 
      Jintao Zhu, Huawei
    • 17:00 Cyber Security Best Practices with Energy Efficiency 
      Nicolas Stricher, Check Point Software 
    • 17:20 Threats and Risks of 5G Networks for Military Applications 
      Jordi Mongay Batalla, Warsaw University of Technology

     17:40 Day 3 Networking Drink

  • Day 4: 17 October
  •  
     

    Day Opening by Alex Leadbeater, ETSI TC Cyber Chair, GSMA

    09:00 SESSION D4-1: Impacts of Regulation#3 -  Consumer Devices
    Chaired by Slawonir Gorniak, ENISA

    The session will explore impacts of regulation on consumer products and devices. The session will explore successes, failures, best practices, and gaps. Focus areas to include IoT and automotive. (session in construction)

    • Industry Update from CSA IoT Security Certification
      Jorge Wallace Ruiz, Dekra
    • Building Trust in IoT: A Comprehensive Cybersecurity Certification Framework based on ETSI EN 303 645 
      Roland Atoui, Red Alert Labs 
    • Navigating the Complex Landscape of IoT Security Regulations
      Zahra Khani, Keystight Technologies
    • Providing Best User Experience with Intelligent & Connected Car Cockpits While Complying with Cybersecurity Regulations 
      Francois Fischer, Huawei Technologies R&D

    10:40 Coffee & Networking - Posters Visits

    11:10 Session D4-2 AI “Verticals” / End Applications
    Chaired by George Sharkov, SBS aisbl
    The session will consider AI security from the perspective of securing AI as deployed in specific vertical applications. The session will discuss latest challenges, threats, legislation and approaches to implementing AI in specific vertical / end applications. 

    • 11:00 Enhancing B5G/6G Network Security with Federated Learning in O-RAN
      Ioannis Makris, MetaMind Innovations IKE
    • 11:20 Protecting AI Systems from Emerging Threats: Guiding Principles and Strategies
      Jayabalaji Sathiyamoorthi, Intel
    • 11:40 Navigating AI Security in 6G: MNO Perspective to Emerging Threats and Regulations
      Buse Bilgin, Turkcell Technology

    12:00 Lunch & Networking - Posters Visits

    13:15 SESSION D4-3: Transport, Public safety and Critical Communications
    Chaired by Charles Brookson, Zeata
    The session will explore security for Transport, Public Safety, Critical Industries and Critical Communications. Topics to include; Tetra replacement, FRMCS Rail, 3GPP SA6 work. 

    • 13;15 BroadEU.Net : Realising the EU Critical Communication System (EUCCS) 
      David Lund, Public Safety Communication Europe (PSCE) Forum 
    • 13:35 FRMCS 
      Speaker to be confirmed
    • 13:55 TETRA
      Brian Murgatroyd  

    14:15 PANEL DISCUSSION ETSI Priorities for Security - Next Steps
    Chaired by Alex Leadbeater

    with all Programme Committee Members

    15:15 Close 

Venue: ETSI Headquarters650 Route des Lucioles06560 Valbonne - Sophia Antipolis FRANCE Tel: +33 4 92 94 42 00 

The ETSI Security Conference 2024 programme will be built by the following people: Samim Ahmadi, EY Charles Brookson, ZEATA Security Alex Cadzow, C3L Scott Cadzow, C3L Matt Campagna, Amazon Web Services Peter C, NCSC Mirko Cano Soveri, ETSI/3GPP Bjorn Fanta, Fabasoft Slawomir Gorniak, ENISA Alan Hayward, NCSC Holie Hennessy, OMDIA Alex Leadbeater,GSMA, Programme Committee Chair Tieyan Li, Huawei Gerry McQuaid, Ofcom Mats Naslund, NDRE Kim Nordstrom, ETSI Jean-Pierre Quémard, KAT Davide Pratone, Huawei Tony Rutkowski, CIS George Sharkov, European DIGITAL SME Alliance & SBS Nataliya Stanetsky, Google Ireland Limited Colin Whorlow, NCSC Alf Zugenmaier, NTT Docomo

Any Questions? Contact us