The 2018 edition of the ETSI Security Week, taking place on 11-15 June 2018 in Sophia Antipolis, France, will look at different aspects of cybersecurity underpinning our digital world. The event will consider latest cybersecurity policies, legislative actions, cyberattacks, challenges, solutions and hot technologies to make the cyber world safer.
The security community will come together in ETSI to network and exchange on the state of standardization for cybersecurity.
Do not miss this unique opportunity to meet with key security experts and to network, share, influence and learn from your peers during this week of events! The event(s) are open to all and free of charge upon registration.
Sponsorship opportunities are available, contact us at email@example.com for more information.
The following topics will be addressed:
|11 June||Latest Drivers for Cybersecurity
How policy, legislative, industrial and standardization actions can succeed in making the cyber world safer
13 June am
|Future-Proof IoT Security and Privacy
How to address, organize, standardize the dynamic hyper-connected IoT world with future-proof security and privacy by default and by design (includes poster session)
|12 June||Hot Topics in Middlebox Security
Exploring cyber security aspects of network middleboxes, those devices between user end-points other than a transparent switch: discovering and managing implementations of middleboxes within networks; discussing their controlled, trusted visibility of encrypted traffic for cyber defence and privacy purposes
|12 June 17:30
Implementing and testing the Middlebox Security Protocol profile for fine grained access control as per draft TC CYBER specification and comparing it to related Middlebox Security protocols.
|13 June||Remote Signature Creation Services by TSP: Protocols and Audit Requirements
Discussing remote signature creation services provided by Trust Service Providers, addressing business cases, audit requirements and protocols. Getting feedback on taken standardization path. (includes poster session)
|13 June pm
14 June am
|What does 5G Security Offer?
Reviewing how well 5G networks can provide security for different trust models, security policies, and deployment scenarios – last not least for ongoing threats in the IoT world
|14 June pm
15 June am
|Security and Trust in ICT: the Value of Distributed Ledger Technology
Discussing ICT use cases for improving trust and security, enhancing security and privacy of DLT, reviewing governmental and regulatory views, and debate about standardization needs