GSMA Mobile 360 Series - Attend a Workshop

Attend a Workshop

Navigating the advanced threat landscape in the era of 5G

At Mobile 360 – Security for 5G, GSMA features a variety of workshops on specific topics presented by GSMA, sponsors, and partners. These workshops provide the opportunity to exchange information, receive training, learn best practices, and connect with fellow companies facing similar challenges.

**To attend a workshop, you will need to register for the Mobile 360 – Security for 5G event. If you have not registered yet, be sure you do this here.**

If your company is interested in hosting a workshop, please contact our Sales team.

NetNumber Pre-Conference Workshop

Date: 28 May | Time: 9:30 – 15:00
This workshop is by invitation only; express your interest in attending here:

Apply to Attend

Sponsored by

Network transformation and modernisation is revealing a proliferation of concerns regarding security, fraud and privacy – which if left unchecked will lead to significant problems, legal and financial penalties for progressive communication service providers.

As a counter-action the industry is turning to network vendors, regulatory and standardisation bodies to come together and collaborate to keep our communications, data and privacy secure. Independently these interested parties along with service providers have their own contextual concerns and challenges.

NetNumber is providing a platform for both common and specific concerns to be openly discussed at our Signaling Security Summit.

Agenda Highlights:

  • Patrick Donegan, Principal Analyst of HardenStance, will review “New Opportunities and New Risks from Cloudifying the 5G Core”. He will touch on the nature of the Service Based Architecture and the opportunities and threats presented by key aspects of 5G including inter-carrier signaling, network slicing and distributed edge clouds.
  • Operators will share their insights on the threat landscape and security considerations when transitioning from one “G” to the next.
  • Pieter Veenstra will provide an update of the inventory of open issues for 5G Security as investigated in the GSMA.
  • Patrick Donegan will interview Nigel Jones, CEO of Koolspan, on Security Issues related to Calling & Messaging in Mobile Networks
  • Join your peers for roundtable discussions moderated by security experts from Hardenstance, Koolspan, The Telecom Defense Limited Company* and NetNumber on network testing for security, fraud prevention and mitigation, approaches to signaling protection, and mobile authentication.
  • Jean Gottschalk from The Telecom Defense Limited Company will help operators understand how to keep mobile networks safe from threats against privacy of subscribers, fraud and denial of service attacks that have emerged recently over signaling networks such as SS7 and Diameter.

If you have a security role in a communication service provider, MNO, MVNO or Enterprise Organisation, you are a customer of NetNumber, or official in an industry regulatory body we welcome you to register and join us for this interesting day of listening to peers, learning from experts, interactive discussion and lively debate.

Internet of Things – Challenges and Practical Experiences with Implementation

Date: 29 May | Time: 13:15 – 14:30

Sponsored by

Internet of Things (IoT) has been a buzz word for quite some time and now it is gaining traction. It is a key component in the digital transformation of all industries and has the potential to significantly improve efficiency and make people’s life more convenient. Connected cars, industry 4.0, smart cities, smart home, wearable devices and voice recognition have been lauded as the next big thing.

The possibilities of all sorts of different (categories of) devices “speaking” and interacting do not come without raising privacy issues. The necessity of connected devices to communicate with each other generates a huge amount of data. The nature of the data collected is different from data collected by previous systems – both in amount and in quality. Offering and implementing IoT solutions can be challenging from a privacy perspective. In this presentation we want to explore the possibilities and risks of IoT and show compliant ways to handle the challenges and mitigate risks for those involved, ranging from hardware manufacturers, data processors and controllers to users.

Security in Complex Multi-Generational Networks

Date: 29 May | Time: 13:15 – 14:30

Sponsored by

Mobile operators provide the backbone for technologies that the world relies upon. These services are currently provided and managed via four distinct generations of mobile telecommunications technologies. This vast array of technologies results in a mixed threat landscape of traditional IT, radio and mobile network related threats. In this complex environment, as we move to 5G, everything changes. The networks will become more distributed, and many critical applications will be hosted at the edge of 5G networks and across edge clouds. Critical applications like remote healthcare, remote monitoring and control over our power grids, and self-driving cars will all rely on 5G technologies. Network Slicing is earmarked to be a prominent feature of 5G to enjoy connectivity and data processing tailored to customers’ specific requirements. Opportunities for threat actors will emerge if they are allowed to go unchecked, as they will use automation to wage multi-stage attacks and find the least secure portions of the 5G networks to exploit. For mobile networks to be 5G-ready, a new approach for security is required. As we enter the 5G era, this vital session will help operators to understand how to manage and mitigate the threats associated with managing multi-generational networks.

Security Transformation and Skills to Protect the 5G Era

Date: 29 May | Time: 14:30 – 15:45

Sponsored by

Statistics indicate there could be as many as 3.5 million unfilled cyber security jobs by 2021 (Cyber Security Ventures, 2017). The cybersecurity workforce shortage has left CISOs and corporate IT security teams scrambling for talent while the cyberattacks are intensifying. Corporations are responding by placing some or all of their IT security into the hands of third parties. Last year, Microsoft estimated that 75% of infrastructure will be under third-party control by 2020. Certainly, security leadership is quickly becoming a necessary investment regardless of industry and organisations looking to attract talent are finding expertise scarce and the competition from big tech companies fierce. The good news is that improved techniques for reskilling existing workers to support digital transformation efforts are now beginning to yield dividends. In particular, reinforcing a culture of life-long learning and development, the concept of reskilling and promoting digital badges for certified skills for employees is growing in popularity. This essential session will explore the impact of 5G and digital transformation upon the workforce and provide insight into how organisations can successfully create a cybersecurity talent pipeline.

Certification and Assuring the 5G Supply Chain

Date: 29 May | Time: 16:15 – 17:30

Mobile operators rely on numerous external suppliers to deliver 5G infrastructure, software, products and services. In turn operators’ customers, enterprise or consumer, rely on the operator provided services to manage and enable their lives and businesses. This represents a complex supply chain where downstream links inherit risks and vulnerabilities from suppliers if they are not properly mitigated. One of the ways to manage the supply chain is to certify or assure products, services and stakeholders within that supply chain. Security assurance is a means to ensure that network equipment meets security requirements and is implemented following adherence to secure development and product lifecycle processes by suppliers. This assurance is especially important for mobile systems, as they are classified as critical infrastructure in some jurisdictions. The recently mandated EU Cybersecurity Act establishes an EU framework for cybersecurity certification, potentially boosting the cybersecurity of online services and consumer devices. The certification framework will be a one-stop shop for cybersecurity certification, resulting in significant cost saving for enterprises, especially SMEs that would have otherwise had to apply for several certificates in several countries. Moreover, companies are incentivised to invest in the cybersecurity of their products and turn this into a competitive advantage. This session will highlight the importance of understanding how products are developed and introduced into the 5G ecosystem as well as how they are how certification is likely to impact and benefit 5G.