GSMA Mobile 360 Series - Workshops

Workshops

workshop

Attendees are welcome to join us for workshops sponsored by Giesecke+Devrient Mobile Security, Microsoft, NetNumber and Neural Technologies. View the details about each workshop below.

Looking Ahead at the First Six Months of GDPR

Sponsored by

GDPR will have entered into force on 25 May. While many companies will have hopefully finalised internal preparations, the first 6 months provides important and significant learnings for GDPR compliance moving forward. In this workshop, we look at some of the key considerations for companies updating and adapting their internal procedures and organizational measures to ensure GDPR compliance. Experiences with GDPR will vary, and despite the 25 May milestone, compliance will remain an ongoing process. What tools and best practices are emerging in this space to support compliance journeys, and what signals, or precedents, can companies expect from regulators and enforcement bodies in the first 6 months? Where should follow-up efforts focus and what will the ‘post-GDPR’ environment look like? These are just some of the questions we addressed with perspectives from industry players engaged on GDPR from a variety of angles.

Big Data, Privacy and doing Social Good

Sponsored by
g-d-mobile-security-logo

Today, timely information is crucial. To respond effectively and efficiently to an event – be it the spread of pollution, disasters or overcrowding – governments and NGOs need to know where the impacted people reside, in which direction they are moving, and how the environment is changing. Mobile operators can provide that information while respecting individuals’ privacy and safeguarding personal data.

This workshop took attendees through a complete examination of the topic: understanding the framework and approach of analysing the data captured by telecoms, discussing the privacy questions, and offering a guide to how you can capture and derive positive insights from the data in your organisation.

Securing the Signaling Core and the Mobile Edge

Sponsored by

In 2017, the industry saw an unprecedented number of SS7 flaws made public, with massive issues exploited worldwide in the most advanced countries. The technology to avoid a repeat of this is available today.

Security of mobile networks is a clear concern to mobile operators. With more than 2000 players (MNOs and MVNOs) interconnected worldwide for their mobile roaming services, vulnerabilities of the 40-years old SS7 signaling system have raised a lot of negative publicity and business concerns. Similar problems exist with Diameter as successor of SS7. With only the victim’s telephone number, you can intercept, track and disrupt communications, used for banking fraud and other criminal acts, and interconnect access to the SS7 and Diameter networks is easily obtainable nowadays. This is scary for operators and your customers alike. Further security opportunities are enabled by SDN & NFV platforms whereby the authentication is moving to distributed environments and Edge Computing as essential prerequisite to the rapid growth of the Internet of Things.

This workshop discussed how operators can protect their SS7 and Diameter networks against these security weaknesses to protect their customers against todays and tomorrows attacks. In this workshop strategies were discussed how operators can enable a virtuoso loop to Detect anomalies, Protect the service and Maintain high security standards along with the technology and industry evolution. In addition to the defensive approach, for which NetNumber took the initiative for standardization the guidelines in the GSMA Fraud and Security Group (FASG), the speaker addressed the operational aspects for provisioning the filtering rules with accurate data sets.

Event Data Virtualisation – The Bigger Picture

Sponsored by

Throughout this conference, you will have heard about data privacy and security in various aspects.

In this last workshop, we would like to broaden such vision and consider the true challenges that we all face in our digital transformation journeys. It is not just about how we manage security and privacy of the event data we already own, but how to acquire and ingest such event data, store such acquired event data and most importantly, how to leverage such event data across various end-to-end business processes for which the data is required.

This workshop explored the following:

  • The challenges we face with event data and a particular industry concept that proposed ‘how to solve such challenges’
  • A (vendor neutral) proposal to concretely implement such industry concept, including the various functional elements that are required for a successful implementation
  • An exchange of concrete use-cases in the telecommunications and finance sectors, to illustrate how those functional elements work together end-to-end