Following the first ever Telecom Threat Intelligence Summit in October last year, HardenStance is delighted to welcome you to TTIS 2022 on June 22nd and 23rd.
|08.00||14.00||HardenStance||Patrick Donegan||Welcome & introduction.|
|08.10||14.10||ObjectS Consulting||Omer Koker||
The Chief Security Officer’s Perspective.
Defeating The Bad Guys Together.
Integrating 5G Threat Intelligence Into Service Provider Security Operations.
|09.20||15.20||MITRE||Muddasar Ahmed and Dr. Michaela Vanderveen||
MITRE’s ‘FiGHT’ Framework for 5G.
|09.40||15.40||Deutsche Telekom||Manuel Kamp||
An architecture for generating and using threat intelligence.
|10.05||16.05||20 minutes interval|
Leveraging Threat intelligence to Protect Home and SOHO Broadband Users.
The view from the UK’s National Cyber Security Centre.
The Mitel MiCollab/MiVoice DDoS Vulnerability from an ISP Perspective.
|11.35||17.35||HardenStance||Patrick Donegan, Cathal Mc Daid||Closing remarks and wrap up.|
05.00 AM PST | 08.00 AM EST | 14.00 PM CET
05.10 AM PST | 08.10 AM EST | 14.10 PM CET
Former CISO, now an independent consultant, Omer Koker will review deepening geopolitical rivalries between global and regional powers, techno nationalism, and it’s impact on security operations and supply chain risks.
05.30 AM PST | 08.30 AM EST | 14.30 PM CET
Erno Doorenspleet, CTO
Telecom operators are part of the critical infrastructure, enabling communications around the globe. Nowadays government, businesses and other organizations need secure communications providers with a strong understanding of cyber security risk and the threat actors they face. Since attackers tend to be one step ahead of defenders in developing their techniques, tactics and procedures, telecom organizations should be actively collaborating on threat intelligence to defend their organizations and their customers.
In this talk, Erno Doorenspleet will share best practice threat Intelligence usage within telecom operator organizations. He will discuss how internal teams can leverage threat intelligence to protect their organizations and how actively exchanging threat intelligence with other telecom operators can drive adjustments in security posture to defend against the latest threats.
05.55 AM PST | 08.55 AM EST | 14.55 PM CET
Silva Nelson, Senior Product Manager
In the 5G era, threat intelligent sources must be integrated into service providers’ cybersecurity posture to provide them with a near real-time view into nefarious activities directed against their organization. This talk will explain different options for endpoint detection and response implementation in service providers networks. It will look at how different approaches will fit in the 5G network infrastructure, enabling service providers to preempt and mitigate cyberattacks effectively.
06.20 AM PST | 09.20 AM EST | 15.20 PM CET
Dr. Michaela Vanderveen, Principal 5G Security Architect
Muddasar Ahmed, Principal Cyber Security Architect
MITRE FiGHT is a framework aimed to catalogue adversary behaviors and techniques that can lead to compromise of the data and subsystems in a 5G network. MITRE’s presenter will share the context that led to the creation of the framework, use of such frameworks in 5G risk management and secure deployments and plans for the future public releases.
05.40 AM PST | 09.40 AM EST | 15.40 PM CET
Manuel Kamp, Head of Cyber Threat Intelligence
07.25 AM PST | 10.25 AM EST | 16.25 PM CET
Angel Fernandez, AVP of Security Solution, Product Management
07.50 AM PST | 10.50 AM EST | 16.50 PM CET
The UK is a leader in both the telecom and cybersecurity sectors. Technical Director of the NCSC, Ian Levy, will give his assessment of the threats to telecoms services, what the sector does well in response and point to areas for potential improvement.
08.10 AM PST | 11.10 AM EST | 17.10 PM CET
In February 2022, a novel new DDoS vulnerability (CVE-2022-26143 – Mitel MiCollab/MiVoice) emerged with previously unheard of amplification rates. This two-part talk will explore this event from the unique perspective of a Canadian ISP. Part one will cover the vulnerability itself and how it manifests on a carrier network. Part two will provide some introspection around the challenges and benefits of sharing sensitive information, ideally to inform better decisions on what and when to share.
08.35 AM PST | 11.35 AM EST | 17.35 PM CET
Cathal Mc Daid, CTO, AdaptiveMobile Security