Technology, networks and society are moving forward at a rapid rate. Technologies are evolving more and more rapidly. ICT networks are in a permanent change of states with known devices connected, unknown things and applications connecting, other disconnecting, with network functions being virtualized, new services being added, services being segregated, services being discontinued, etc.
These changes in technologies impact society while user behaviours are also in constant evolution.
This track discusses how such rapid rate of change affects the security of networks, devices and users, and how does security keep pace.
Objectives of this session:
Target audience:
Attendees with either technical and policy backgrounds will find value in these sessions, from government, industry or academia.
Thread introduction: Presentation of Topic, Problematic and Structure of the Day
Alex Leadbeater, ETSI TC Cyber Chairman, BT
5G networks will have to support rapid and frequent changes due to virtualization, edge computing, cloud technologies, IoT devices and different verticals relying on 5G networks. This session will discuss how security of 5G networks keep pace with such rate of change.
5G and Other Stories: Evolving Security in an Evolving World
Steve Babbage, Vodafone
5G Providing the Secure Platform for Digitalization of Enterprises and Society
Mats Nilsson, Ericsson
Suppliers and Manufacturers views of 5G Security
Marcus Wong, Futurewei
5G Security Challenges for Verticals - a Standards View
Anja Jerichow - Ali Rezaki, Nokia Bell Labs
Coffee, Posters & Demos
IoT devices and services are updated very frequently to enhance services and security. This session will discuss how security can keep pace with such dynamic IoT environment, the impact on certification and conformance models and new dynamic security solutions on the horizon with future secure elements.
The Value of Security and Privacy Signals in Improving the IoT Ecosystem
Steve Olshansky, the Internet Society
Challenges in Securing the IoT in a Post Quantum World
Louis Parks, SecureRF Corporation
ETSI Explainer (amphi Athena)
Introduction on Security and Access Privileges in oneM2M Release 3 - Enrico Scarrone, oneM2M
ETSI Explainer (Amphi Athena)
SmartM2M IoT Security - Scott Cadzow, STF 547
Panel Certification of Components
Moderated by Stacie Hoffmann, Oxford Information Labs
How can you certify the security of an IoT device that is changing regularly, which security conformance frameworks/models to adopt when IoT products and services are updated very frequently etc)
Integrated SIMs – The next after Embedded SIM
Stephan Spitz, Secure Thingz / IAR Systems
SIMs, eSIMs and Secure Elements: Providing a Roadmap to Dynamic Security and Flexible Control for Connected Devices
Remy Cricco, SIMalliance
Coffee, Posters & Demos
This session will discuss the latest and future changes in cryptography and public key infrastructures (PKIs), which are critical to online security, changing rapidly due to several industry trends and needing to prepare for the advent of quantum computers.
Maintaining Trust in PKIs: Trends and Updates
Timothy Hollebeek, Digicert
An Overview on NIST Post-Quantum Cryptography Standardization
Lily Chen, NIST
Cryptography Migration Strategies for Certificates and Communications Protocols
Erik Andersen, Andersen’s L Service
Hybrid-Key Exchanges as an Interim-to-Permanent Solution to Cryptographic Agility
Matt Campagna, Amazon Web Services
Networking Cocktail
This session intends to detail how to ensure secure development, update, and deployment of software, how hardware keep up with the rapid change in security needs, how it affects the hardware development, upgrade and deployment and how to ensure supply chain integrity.
Hardware Security, including Latest R&D
Ed Montgomery, Queens University of Belfast
For the Supply Chain in the Aircraft
Stéphane Chopart, Airbus
Using Deception to achieve Continued Technical Assurance
Alex Tarter, Thales UK
Trusted Computing and Slicing in the Dynamic Environment
Ian Oliver, Nokia Bell Labs
Coffee & Networking Break
More and more cyber-attacks affect consumers. Service/product providers or employers request their users or employees to update security parameters (e.g. passwords) or to follow strict security procedures. How do human beings keep up? in particular:
Managing Information Security in an Economic Warfare Context
Quentin Gaumer, Amazon Web Services
Continuous Auditing Certification
Dorian Knoblauch, Fraunhofer Fokus
Behavioural Aspects of Cybersecurity
Thomas Schlienger, TreeSolution Consulting GmbH
Access to the Presentations given during the thread on Cyber Security & Dynamic Nature of Technology, Networks and Society