Following the first ever Telecom Threat Intelligence Summit in October last year, HardenStance is delighted to welcome you to TTIS 2022 on June 22nd and 23rd.
|08.00||14.00||HardenStance||Patrick Donegan||Welcome & introduction.|
Advancing threat intelligence sharing across the mobile ecosystem.
From Information Sharing to Joint Collaboration: Creating new norms for ecosystem protection.
|08.55||14.55||AdaptiveMobile Security, an Enea company||Cathal Mc Daid||Mobile Networks, Nation States & Threat Intelligence.|
|08.20||15.20||Orange Polska||Przemek Deba||
Threat Intelligence Learnings from Orange Polska.
Sharing The Latest DDoS Attack Intelligence.
|10.10||16.10||20 minutes interval|
Threat Intelligence Usage in Telecom and other Industries.
|10.50||16.50||Cyber Threat Alliance||Michael Daniel||
Changing talk to action: overcoming the barriers to information sharing.
Advanced Persistent Cybercrime: The Convergence of APT.
|11.35||17.35||HardenStance||Patrick Donegan||Closing remarks and wrap up.|
TTIS 2022 serves as a forum for advancing best practise as regards threat intelligence sharing between telcos in different countries as well as within their domestic markets; between telcos and other leading actors in the ICT ecosystem; between telcos and their customers; and between different groups and departments within the telco organisation.
David will provide an update on the GSMA’s work in advancing threat intelligence sharing and other collaboration across the mobile ecosystem to combat mobile fraud and security challenges, including work on ensuring machine-readable telecoms intelligence is standardised and actionable.
"Information Sharing" has been a buzz-phrase in cybersecurity for quite a time. Just what does "information sharing" mean to an ISP? How does it happen, how is it evolving and how will this change the way we protect the global internet? Ms. Condello will outline current and evolving efforts to protect the global internet ecosystem as Industry moves to next generation network capabilities.
05.55 AM PST | 08:55 AM EST | 14.55 PM CET
In recent months we have witnessed the widespread need and use of mobile networks on the Ukrainian battlefield. It is now recognised that Mobile Networks are truly critical national infrastructure. At the same time many threats over mobile network interfaces, especially signalling network are via state or state-supported actors in telecom networks. As a result, the need to co-ordinate and share telecom threat intelligence has never been higher, in order to protect this critical network infrastructure. We speak about what the industry has learnt over the past few months, and what is the future in this area.
06.20 AM PST | 09.20 AM EST | 15.20 PM CET
Przemyslaw Deba, CISO
Poland’s telcos are experienced in dealing with cyber threats including Advanced Persistent Threat (APTs). CISO, Przemyslaw Deba, will share Orange Polska’s experience and thoughts on what telcos do well in terms of using and sharing cyber threat intelligence – as well as what they could do better.
06.45 AM PST | 09.45 AM EST | 15.45 PM CET
Roland Dobbins, Principal Engineer
DDoS attacks continue to pose a major threat to Service Providers and their customers. Staying abreast of and sharing information related to DDoS attacks trends and best practices in defense is vital for effective mitigation. In this session NETSCOUT will discuss DDoS attack trends and key findings from their latest Threat Intelligence Report.
07.30 AM PST | 10.30 AM EST | 16.30 PM CET
Having worked in infosec and CISO roles in a number of telcos, Avast CISO Jaya Baloo will reflect on how well telcos generate, curate, apply and share threat intelligence compared with other sectors of industry and will suggest steps for improvement.
07.50 AM PST | 10.50 AM EST | 16.50 PM CET
Although everyone agrees in principle that sharing threat intelligence would be beneficial, making sharing work in practice usually proves quite challenging. Drawing on CTA’s experience over the last five years, Michael Daniel will discuss the barriers to effective intelligence sharing and offer some strategies for overcoming them.
08.10 AM PST | 11.10 AM EST | 17.10 PM CET
As we continue to talk about the convergence of networking and security, there is a parallel convergence occurring with the threat landscape. APT groups, typically associated with nation states, have also been busy converging their infrastructure and playbooks with cybercriminal groups – and vice versa. This means that cyber crime, which accounts for a majority of attack activity we observe, is shifting left. The focus is on observing and blueprinting intended target in premeditated fashion with more aggressive attack methodologies. This talk will examine how attackers are building their playbooks in 2022, including destructive attacks such as wiper and ‘bricker’ malware that even impacts satellite communications.