Former CISO, now an independent consultant, Omer Koker will review deepening geopolitical rivalries between global and regional powers, techno nationalism, and it’s impact on security operations and supply chain risks.
A. Ömer Köker
Founder ObjectS Consulting Ltd UK
Ömer is the founder of Objects Consulting Ltd UK, a consultancy where he engages senior executives and technology teams in organizations to help understand, then improve their privacy and cybersecurity maturity. He implements this through strategic and tactical programs managing technical risk for business resilience. Before founding Objects Consulting Ömer held various roles mainly in Telecommunications, ISP and eCommerce environments. Most recently he was the Head of Technology Security and the Managed Security Services divisions of Vodafone Turkey as well as a member of Vodafone Group’s global Technology Security Board. His earlier hands on experience in software development, IT and Network management helps him better understand the assets and operations that needs protection. He is an experienced public speaker with various professional certifications including ISO27001LA and ISO22301LA. An alumnus of Rochester Institute of Technology he has worked or consulted on four continents.
Objects Consulting is a practitioner led cybersecurity consultancy and operational support firm. We believe by addressing technology infrastructure, policy/procedures, and human resources under the guidance of international standards and best practices not only ensures cybersecurity & resilience but also a strategic competitive advantage.
Objects Consultancy offers strategy, architecture, operation, and compliance services for the creation & maturation of cybersecurity, privacy & business resilience programs. In a world with accelerating digitalisation and geographic competition we can help you understand your real level of risk and its impact on business initiatives. We then help you manage those risks in a bespoke approach. Objects Consulting also provides technical due-diligence services to investors who want to understand what lurks under the hood of their potential targets. Furthermore, with access to experienced & certified engineers for most major security vendors Objects Consulting can provide full spectrum of interim services.
All work is based on global standards such as ISO27001 series, ISO22301, PCI, GDPR as well as proven best practices from NIST, CIS, ENISA and GSMA.
Website: https://objectsconsulting.com/
In the 5G era, threat intelligent sources must be integrated into service providers’ cybersecurity posture to provide them with a near real-time view into nefarious activities directed against their organization. This talk will explain different options for endpoint detection and response implementation in service providers networks. It will look at how different approaches will fit in the 5G network infrastructure, enabling service providers to preempt and mitigate cyberattacks effectively.
Nelson Silva
Security Product Manager, Nokia
Nelson Silva leads the NetGuard Endpoint Cybersecurity product line, one of Nokia’s key pillars for carrier network infrastructure protection. Nelson has more than 25 years of experience in the telecommunications industry, in network analytics and operations software, and cybersecurity, in global consulting and product management roles.
At Nokia, we create technology that helps the world act together. As a trusted partner for critical networks, we are committed to innovation and technology leadership across mobile, fixed and cloud networks. We create value with intellectual property and long-term research, led by the award-winning Nokia Bell Labs. Adhering to the highest standards of integrity and security, we help build the capabilities needed for a more productive, sustainable and inclusive world.
Website: https://www.nokia.com/
An event dedicated to improving cyber security outcomes for the telecom sector and its customers through threat intelligence sharing.
Organised and hosted by HardenStance Founder and Principal Analyst, Patrick Donegan.
Telecom operators occupy a unique position in the ICT ecosystem. They have unique visibility into network traffic, unique reach into customer networks, and they are uniquely well placed to serve as convenors of some types of collective industry action to combat cyber threats.
TTIS 2022 serves as a forum for advancing best practise as regards threat intelligence sharing between telcos in different countries as well as within their domestic markets; between telcos and other leading actors in the ICT ecosystem; between telcos and their customers; and between different groups and departments within the telco organisation.
Telecom operators occupy a unique position in the ICT ecosystem. They have unique visibility into network traffic, unique reach into customer networks, and they are uniquely well placed to serve as convenors of some types of collective industry action to combat cyber threats.
TTIS 2201 serves as a forum for advancing best practise as regards threat intelligence sharing between telcos in different countries as well as within their domestic markets; between telcos and other leading actors in the ICT ecosystem; between telcos and their customers; and between different groups and departments within the telco organisation.
Patrick Donegan is Founder and Principal Analyst with HardenStance, a leading industry analyst firm providing trusted research, analysis and insight in telecom and IT security. HardenStance provides consulting services, public speaking services and leading analyst reports on cybersecurity risk and solutions across the telecom sector and broader enterprise markets. HardenStance openly supports the work of key industry associations, organizations and SDOs including NetSecOPEN, AMTSO, ETSI, the GSM Association and OASIS. HardenStance is also a recognized Cyber Threat Alliance ‘Champion’.
HardenStance is a leading industry analyst firm providing trusted research, analysis and insight in telecom and IT security. HardenStance provides consulting services, public speaking services and leading analyst reports on cybersecurity risk and solutions across the telecom sector and broader enterprise markets.
HardenStance openly supports the work of key industry associations, organizations and SDOs including NetSecOPEN, AMTSO, ETSI, the GSM Association and OASIS. HardenStance is also a recognized Cyber Threat Alliance ‘Champion’. www.hardenstance.com
Addressing a broad range of aspects of threat intelligence use cases.
Enea AdaptiveMobile Security, is a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide. With deep expertise and a unique focus on network security, AdaptiveMobile Security award-winning innovative security solutions and services provide its customers with advanced threat detection, response, and actionable intelligence, combined with the most comprehensive security product-set in the market today, predicting and protecting against multi-protocol mobile security attacks.
AdaptiveMobile Security provides its customers with the unique combination of technology, analyst input and intelligence to ensure their subscribers, data and networks remain protected from cyber warfare.
AdaptiveMobile Security was founded in 2006 and counts some of the world’s largest carriers, Governments and Regulators as customers. The Company is headquartered in Dublin with offices in North America, Europe, South Africa, the Middle East, and Asia Pacific region.
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.
We create technology that helps the world act together. As a trusted partner for critical networks, we are committed to innovation and technology leadership across mobile, fixed and cloud networks. We create value with intellectual property and long-term research, led by the award-winning Nokia Bell Labs. Adhering to the highest standards of integrity and security, we help build the capabilities needed for a more productive, sustainable, and inclusive world.
Allot Ltd. (NASDAQ: ALLT, TASE: ALLT) is a provider of leading innovative network intelligence and security solutions for service providers and enterprises worldwide, enhancing value to their customers. Our solutions are deployed globally for network and application analytics, traffic control and shaping, network-based security services, and more. Allot’s multi-service platforms are deployed by over 500 mobile, fixed and cloud service providers and over 1000 enterprises. Our industry-leading network-based security as a service solution has achieved over 50% penetration with some service providers and is already used by over 20 million subscribers globally.
Allot. See. Control. Secure.
NETSCOUT helps assure digital business services against disruptions in availability, performance, and security. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility and insights customers need to accelerate and secure their digital transformation. Our approach transforms the way organizations plan, deliver, integrate, test, and deploy services and applications. Our nGenius™ service assurance solutions provide real-time, contextual analysis of service, network, and application performance. Arbor Smart DDoS Protection by NETSCOUT products help protect against attacks that threaten availability and advanced threats that infiltrate networks to steal critical business assets.
HardenStance has donated £250 to ‘Girls Who Code” from the proceeds of the event. Girls Who Code is reaching girls around the world and is on track to close the gender gap in new entry-level tech jobs by 2030.
HardenStance is grateful to guest TTIS2022 speaker, Jaya Baloo, for choosing this organization to receive this donation.
Telecom operators occupy a unique position in the ICT ecosystem. They have unique visibility into network traffic, unique reach into customer networks, and they are uniquely well placed to serve as convenors of some types of collective industry action to combat cyber threats. TTIS 2021 serves as a forum for advancing best practise as regards threat intelligence sharing between telcos in different countries as well as within their domestic markets; between telcos and other leading actors in the ICT ecosystem; between telcos and their customers; and between different groups and departments within the telco organisation.
Individuals who stand to benefit most from attending TTIS 2022 are cyber security professionals spanning the telco’s enterprise IT and telecom network domains; telco network, engineering and operations professionals; as well as vendors, systems integrators and other ICT and cyber security ecosystem players looking to contribute to hardening cyber security in telco organizations.
As is the case in other sectors of industry, most threat intelligence sharing groups and fora in the telecom sector tend to be either private or narrowly focused (or both). TTIS 2022 offers a unique ‘big tent’ forum. It’s a ‘big tent’ in that it addresses a broad range of aspects of threat intelligence use cases. It’s also a ‘big tent’ in that it’s open to the ICT community as a whole - a relevant email address is the only qualification needed to assure your registration is approved.
The UK is a leader in both the telecom and cybersecurity sectors. Technical Director of the NCSC, Peter Haigh, will give his assessment of the threats to telecoms services, what the sector does well in response and point to areas for potential improvement.
Peter Haigh
Technical Director
The National Cyber Security Centre (NCSC) was formally launched in 2017, as part of GCHQ, to be the UK’s national authority on the cyber security environment: sharing knowledge, addressing systemic vulnerabilities, and providing leadership on key national cyber security issues.
We support all parts of UK society to protect themselves by providing tailored expertise and unique knowledge that citizens, businesses and organisations across the UK can use to protect themselves and help make the UK the safest place to live and work online. We take direct action to reduce cyber harms to the UK by providing protection at scale through digital services like Active Cyber Defence, provide UK sovereign capabilities through our National Crypt-Key Centre and we support growth in cyber skills and investment through key programmes like CyberFirst and NCSC for Startups.
The NCSC is committed to ensuring the UK is as secure as possible, working with partners across law enforcement, HMG, industry, and academia. We pride ourselves on being experts in cyber trends and are committed to understanding and advising citizens and organisations on the latest issues.
Website: www.ncsc.gov.uk
HardenStance is a leading industry analyst firm providing trusted research, analysis and insight in telecom and IT security. HardenStance provides consulting services, public speaking services and leading analyst reports on cybersecurity risk and solutions across the telecom sector and broader enterprise markets.
HardenStance openly supports the work of key industry associations, organizations and SDOs including NetSecOPEN, AMTSO, ETSI, the GSM Association and OASIS. HardenStance is also a recognized Cyber Threat Alliance ‘Champion’.
Telecom operators are part of the critical infrastructure, enabling communications around the globe. Nowadays government, businesses and other organizations need secure communications providers with a strong understanding of cyber security risk and the threat actors they face. Since attackers tend to be one step ahead of defenders in developing their techniques, tactics and procedures, telecom organizations should be actively collaborating on threat intelligence to defend their organizations and their customers.In this talk,
Erno Doorenspleet will share best practice threat Intelligence usage within telecom operator organizations. He will discuss how internal teams can leverage threat intelligence to protect their organizations and how actively exchanging threat intelligence with other telecom operators can drive adjustments in security posture to defend against the latest threats.
Erno Doorenspleet
CTO of KPN Security
Erno oversees KPN’s Security Research activities, Technology, Security Advisory, Red/Blue/Purple teaming and the Security Lab. He has more than 20 years of experience in IT, covering Security & Risk Management, Governance & Operations and Outsourcing. He is a national and international speaker on the relationship of Cyber Security, Information Technology, Cloud computing and Internet of Things.
KPN is a leading telecommunication, IT and security services provider and market leader in the Netherlands, serving both consumer and business customers. KPN offers small-, medium-, and large-size business customers a comprehensive portfolio varying from mobile and fixed telephony, broadband and networking, to a wide range of IT services, such as cloud, workplace, security, and internet of things.
PN Security (KPN’s brand for all security activities) has played a crucial role in securing the critical infrastructure of Dutch organizations for decades. Every day, we help more than 1200 customers who rely on our knowledge and expertise, and on the most comprehensive security portfolio available on the market. We not only offer solid, turnkey security solutions for identity and privacy, but we also have a complete service package for managed security.
With more than 400 security professionals, we are the largest Managed Security Service Provider (MSSP) in the Netherlands and market leader in the Dutch IT security market. This also includes a state-of-the-art Security Operations Center. From our SOC, our security specialists protect and monitor the ICT infrastructure of KPN and its business customers. So that they can harness the opportunities of the digital world with confidence.
Website: https://www.kpn.com/
In recent months we have witnessed the widespread need and use of mobile networks on the Ukrainian battlefield. It is now recognised that Mobile Networks are truly critical national infrastructure. At the same time many threats over mobile network interfaces, especially signalling network are via state or state-supported actors in telecom networks. As a result, the need to co-ordinate and share telecom threat intelligence has never been higher, in order to protect this critical network infrastructure. We speak about what the industry has learnt over the past few months, and what is the future in this area.
Cathal Mc Daid is the Chief Technology Officer at AdaptiveMobile Security. He is one of the world’s foremost experts in Mobile Network security and his pivotal work in the industry has been recognized by the GSM Association. As CTO his role is to define the technology strategy and long-term technical vision, as well as to lead the team responsible for applied research in the fields of cybersecurity & mobile networks. He has 15+ years of experience in telecoms, messaging and security, he is a frequent contributor to business and technology media, where his work has featured on USA Today, BBC, Forbes, Bloomberg and the Register, and he is also a regular speaker at industry events such as RSA, VirusBulletin and Mobile World Congress.
AdaptiveMobile Security, an Enea company, is a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide. With deep expertise and a unique focus on network security, AdaptiveMobile Security award-winning innovative security solutions and services provide its customers with advanced threat detection, response, and actionable intelligence, combined with the most comprehensive security product-set in the market today, predicting and protecting against multi-protocol mobile security attacks.
AdaptiveMobile Security provides its customers with the unique combination of technology, analyst input and intelligence to ensure their subscribers, data and networks remain protected from cyber warfare.
AdaptiveMobile Security was founded in 2006 and counts some of the world’s largest carriers, Governments and Regulators as customers. The Company is headquartered in Dublin with offices in North America, Europe, South Africa, the Middle East, and Asia Pacific region.
Visit www.adaptivemobile.com
MITRE FiGHT is a framework aimed to catalogue adversary behaviors and techniques that can lead to compromise of the data and subsystems in a 5G network. MITRE’s presenter will share the context that led to the creation of the framework, use of such frameworks in 5G risk management and secure deployments and plans for the future public releases.
Michaela Vanderveen
Principal 5G Security Architect, MITRE Labs
Michaela Vanderveen has over 20 years of wireless communications research and development experience. She has a broad background in cybersecurity, cellular networks, communications systems, connected vehicles, and a history of active participation in standards, including 3GPP, 5GAA, IEEE, SAE and IETF. Michaela led research and standards efforts in her career with telecom vendors, and now serves as technical lead for the FiGHT project in MITRE.
Muddasar Ahmed
Principal Cyber Security Architect, MITRE Labs
Muddasar is a Principal Cyber Security Architect in MITRE Labs, focusing on cloud, networks and 5G systems. Muddasar is a graduate of The George Washington University school of Business and has over 20 years of experience in telecom systems including turnkey solutions from incubation to mass deployments in service provider market. Muddasar has spent time in development, systems integration, and professional services building capabilities with large service providers across the globe.
As a not-for-profit organization, MITRE works in the public interest across federal, state and local governments, as well as industry and academia. MITRE brings innovative ideas into existence in areas as varied as artificial intelligence, intuitive data science, quantum information science, health informatics, space security, policy and economic expertise, trustworthy autonomy, cyber threat sharing, and cyber resilience.
Website: https://www.mitre.org
In February 2022, a novel new DDoS vulnerability (CVE-2022-26143 – Mitel MiCollab/MiVoice) emerged with previously unheard of amplification rates. This two-part talk will explore this event from the unique perspective of a Canadian ISP. Part one will cover the vulnerability itself and how it manifests on a carrier network. Part two will provide some introspection around the challenges and benefits of sharing sensitive information, ideally to inform better decisions on what and when to share.
Tim Allsopp
Senior Strategy Manager
Tim Allsopp is currently focused on security analytics, innovation, and promoting data driven security decisions at TELUS, a major Canadian telecom provider. Throughout his 21 year tenure at TELUS, he has enjoyed the privilege of helping found the Incident Response and Threat Intelligence practices as a technical leader on both teams. Tim holds a number of technical security certifications across Forensics, Incident Response, and Offensive Security disciplines, including a GIAC Security Expert certification, which he has actively maintained since 2015.
At TELUS, we’re building a better future for all Canadians by using our technology for good and giving back to our communities. Our social purpose is at the heart of everything we do as a world-leading technology company and continues to set us apart. Let's make the future friendly, together.
Website: www.telus.com
"Information Sharing" has been a buzz-phrase in cybersecurity for quite a time. Just what does "information sharing" mean to an ISP? How does it happen, how is it evolving and how will this change the way we protect the global internet? Ms. Condello will outline current and evolving efforts to protect the global internet ecosystem as Industry moves to next generation network capabilities.
Kathryn Condello
Sr. Director, National Security / Emergency Preparedness Lumen Technologies
Kathryn Condello represents Lumen at the Federal level in all policy, planning and operational issues related to National Security, Emergency Preparedness, Disaster Response, Cybersecurity, Critical Infrastructure Protection, and Continuity of Operations.
Roles: Vice-Chair, Communications SCC Executive Committee, DHS ICT Supply Chain Risk Management Task Force (SCRM TF) Alliance Member, Joint Cyber Defense Collaborative; Senior Liaison to DHS National Coordinating Center (NCC); Past Chair, DHS NCC/Comms-ISAC.
Lumen is guided by our belief that humanity is at its best when technology advances the way we live and work. With approximately 500,000 route fiber miles and serving customers in more than 60 countries, we deliver the fastest, most secure platform for applications and data to help businesses, government and communities deliver amazing experiences.
Learn more about the Lumen network, edge cloud, security, communication and collaboration solutions and our purpose to further human progress through technology at news.lumen.com/home, LinkedIn: /lumentechnologies, Twitter: @lumentechco, Facebook: /lumentechnologies, Instagram: @lumentechnologies and YouTube: /lumentechnologies. Lumen and Lumen Technologies are registered trademarks in the United States.
Telecom operators are part of the critical infrastructure, enabling communications around the globe. Nowadays government, businesses and other organizations need secure communications providers with a strong understanding of cyber security risk and the threat actors they face. Since attackers tend to be one step ahead of defenders in developing their techniques, tactics and procedures, telecom organizations should be actively collaborating on threat intelligence to defend their organizations and their customers.
In this talk, Erno Doorenspleet will share best practice threat Intelligence usage within telecom operator organizations. He will discuss how internal teams can leverage threat intelligence to protect their organizations and how actively exchanging threat intelligence with other telecom operators can drive adjustments in security posture to defend against the latest threats.
Erno Doorenspleet
CTO of KPN Security
Erno oversees KPN’s Security Research activities, Technology, Security Advisory, Red/Blue/Purple teaming and the Security Lab. He has more than 20 years of experience in IT, covering Security & Risk Management, Governance & Operations and Outsourcing. He is a national and international speaker on the relationship of Cyber Security, Information Technology, Cloud computing and Internet of Things.
KPN is a leading telecommunication, IT and security services provider and market leader in the Netherlands, serving both consumer and business customers. KPN offers small-, medium-, and large-size business customers a comprehensive portfolio varying from mobile and fixed telephony, broadband and networking, to a wide range of IT services, such as cloud, workplace, security, and internet of things.
PN Security (KPN’s brand for all security activities) has played a crucial role in securing the critical infrastructure of Dutch organizations for decades. Every day, we help more than 1200 customers who rely on our knowledge and expertise, and on the most comprehensive security portfolio available on the market. We not only offer solid, turnkey security solutions for identity and privacy, but we also have a complete service package for managed security.
With more than 400 security professionals, we are the largest Managed Security Service Provider (MSSP) in the Netherlands and market leader in the Dutch IT security market. This also includes a state-of-the-art Security Operations Center. From our SOC, our security specialists protect and monitor the ICT infrastructure of KPN and its business customers. So that they can harness the opportunities of the digital world with confidence.
Website: https://www.kpn.com/
Deutsche Telekom has been championing the importance of threat intelligence for telecommunications companies for some time. Manuel will show what data a telecom operator can collect using internal sensors, what data can be evaluated, and how to set up a corresponding architecture to protect companies and their customers.
Manuel Kamp
Head of Cyber Threat Intelligence
Manuel has worked for Deutsche Telekom in various areas since graduating from university. He joined Deutsche Telekom Security in 2017. As a Cyber Security Engineer, he developed an early warning system for detecting cyber incidents. Since 2021, Manuel is heading the Cyber Threat Intelligence Team. Its experts identify, collect, assess, process and deliver information and recommendations with the aim of preventing cyberattacks on Deutsche Telekom, partners and customers or minimizing the damage.
Deutsche Telekom Security GmbH is responsible for the Telekom Group's global security and also offers this professional protection to external customers. As an independent company of the Deutsche Telekom Group, we offer highly qualified solutions from the technology and service sectors with around 1,600 specialists and over 25 years of experience. To this end, we cooperate with leading global companies in our portfolio and thus offer digital security from a single source.
For more information: https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security
Having worked in infosec and CISO roles in a number of telcos, Avast CISO Jaya Baloo will reflect on how well telcos generate, curate, apply and share threat intelligence compared with other sectors of industry and will suggest steps for improvement.
Jaya Baloo, CISO
Jaya Baloo is Avast’s Chief Information Security Officer (CISO) and joined Avast in October 2019. Previously, Ms. Baloo held the position of CISO at KPN, the largest telecommunications carrier in the Netherlands, where she established and led its security team whose best practices in strategy, policy, and security operations are today recognized as world leading. Prior to this, Ms. Baloo also held the position of Practice Lead Lawful Interception at Verizon and worked at France Telecom as a Technical Security Specialist.
Ms. Baloo is formally recognized within the list of top 100 CISOs globally and ranks among the top 100 security influencers worldwide. In 2019, she was also selected as one of the fifty most inspiring women in the Netherlands by Inspiring Fifty, a non-profit aiming to raise diversity in technology by making female role models in technology more visible.
Ms. Baloo has been working in the field of information security, with a focus on secure network architecture, for over 20 years and sits on the advisory boards of the NL’s National Cyber Security Centre, PQCrypto and the EU Quantum Flagship’s Strategic Advisory Board. She serves on the audit committee of TIIN capital, a cybersecurity fund, and is also a member of the IT Committee of Sociale Verzekeringsbank. She is a board member of the cybersecurity firm NIXU in Finland. Since 2021 she is also a board member of the RvT of the Dutch Broadcasting station, the NOS.
Ms. Baloo has spoken widely at high profile conferences such as RSA, TEDx and Codemotion on topics including Lawful Interception, VoIP; Mobile Security, Cryptography, and Quantum Communications Networks. Additionally, Ms. Baloo is a faculty member of the Singularity University since 2017, where she regularly lectures.
Avast combines artificial intelligence with human ingenuity to create the world ‘s largest cybersecurity network protecting people and businesses from attacks online. We safeguard their data, identity, privacy, and digital relationships with sophisticated solutions that are engaging and easy to use.
Website: www.avast.com
David will provide an update on the GSMA’s work in advancing threat intelligence sharing and other collaboration across the mobile ecosystem to combat mobile fraud and security challenges, including work on ensuring machine-readable telecoms intelligence is standardised and actionable
David Rogers
Chair GSMA Fraud and Security Group
David is a mobile phone and IoT security expert who runs Copper Horse Ltd, a software and security company based in Windsor, UK. His company is currently focusing on security and privacy research for the Internet of Things as well as future automotive cyber security.
David chairs the Fraud and Security Group at the GSMA and sits on the Executive Board of the Internet of Things Security Foundation. He authored the UK’s ‘Code of Practice for Consumer IoT Security’, in collaboration with UK government and industry colleagues and is a member of the UK’s Telecoms Diversification Task Force.
He has worked in the mobile industry for over twenty years in security and engineering roles. Prior to this he worked in the semiconductor industry. David holds an MSc in Software Engineering from the University of Oxford and a HND in Mechatronics from the University of Teesside. He lectured in Mobile Systems Security at the University of Oxford from 2012-2019 and served as a Visiting Professor in Cyber Security and Digital Forensics at York St John University. He was awarded an MBE for services to Cyber Security in the Queen’s Birthday Honours 2019. He blogs from https://mobilephonesecurity.org and tweets @drogersuk
The GSMA represents the interests of mobile operators worldwide, uniting more than 750 operators with almost 400 companies in the broader mobile ecosystem, including handset and device makers, software companies, equipment providers and internet companies, as well as organisations in adjacent industry sectors. The GSMA also produces the industry-leading MWC events held annually in Barcelona, Los Angeles and Shanghai, as well as the Mobile 360 Series of regional conferences.
For more information, please visit the GSMA corporate website at https://www.gsma.com
Although everyone agrees in principle that sharing threat intelligence would be beneficial, making sharing work in practice usually proves quite challenging. Drawing on CTA’s experience over the last five years, Michael Daniel will discuss the barriers to effective intelligence sharing and offer some strategies for overcoming them.
Michael Daniel, President & CEO of the Cyber Threat Alliance (CTA)
Michael Daniel serves as the President & CEO of the Cyber Threat Alliance (CTA), a not-for-profit that enables high-quality cyber threat information sharing among cybersecurity organizations. Prior to CTA, Michael served for four years as US Cybersecurity Coordinator, leading US cybersecurity policy development, overseeing US government partnerships with the private sector and other nations, and managing significant incident response activities. From 1995 to 2012, Michael worked for the Office of Management and Budget, overseeing the U.S. Intelligence Community. Michael also works with the Aspen Cyber Group, the World Economic Forum, and other organizations improving cybersecurity in the digital ecosystem. In his spare time, he enjoys running and martial arts.
The Cyber Threat Alliance (CTA) is a 501(c)(6) non-profit organization that is working to improve the cybersecurity of our global digital ecosystem by enabling near real-time, high-quality cyber threat information sharing among companies and organizations in the cybersecurity field. We take a three-pronged approach to this mission:
CTA is continuing to grow on a global basis, enriching both the quantity and quality of the information that is being shared amongst its membership. CTA is actively recruiting additional cybersecurity providers to enhance our information sharing and operational collaboration to enable a more secure future for all.
For more information about the Cyber Threat Alliance, please visit www.cyberthreatalliance.org
As we continue to talk about the convergence of networking and security, there is a parallel convergence occurring with the threat landscape. APT groups, typically associated with nation states, have also been busy converging their infrastructure and playbooks with cybercriminal groups – and vice versa. This means that cyber crime, which accounts for a majority of attack activity we observe, is shifting left. The focus is on observing and blueprinting intended target in premeditated fashion with more aggressive attack methodologies. This talk will examine how attackers are building their playbooks in 2022, including destructive attacks such as wiper and ‘bricker’ malware that even impacts satellite communications.
Derek Manky
Chief Security Strategist & VP Global Threat Intelligence
Derek Manky brings more than fifteen years of experience to a strategic and visionary cyber security role, working within the Office of the CISO at Fortinet. Manky leads a seasoned, special strategic engagement team which bridges data science with security strategy, facilitating tactics. This agile consulting team provides expert advice and is specialized in advanced threat concepts, security research, penetration testing, data insight and threat intelligence/playbook mapping. He consults with leading CSOs/CISOs of Fortune 500 companies worldwide across multiple industries. Manky provides thought leadership to industry and has presented research and strategy worldwide at many premier security conferences. As a cyber security expert, his work has included meetings with leading political figures and key policy stakeholders globally, including law enforcement, which helps define the future of cyber security.
Manky orchestrates global threat intelligence initiatives with Fortinet, including the Cyber Threat Alliance (CTA), NATO NICP, INTERPOL Expert Working Group, and the Forum for Incident Response and Security Teams (FIRST). Manky has been with the Cyber Threat Alliance since it was founded in May 2014 and sits on the steering committee, working with leading security executives and CEO direction in industry. His vision is applied to help shape the future of proactive cyber security, with the ultimate goal to make a positive impact towards the global war on cybercrime.
This strategy is integrated into advanced technology frameworks to fight cyber-attacks, while keeping clients secure. Manky designed a zero-day vulnerability disclosure framework, which has been reliably used for years to responsibly fix security issues before black hat attackers get a chance to exploit victims. Manky is regularly featured in top tier media as a spokesperson, in an effort to educate. He continues to dedicate his career to security, research and education.
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.
Website: www.fortinet.com
DDoS attacks continue to pose a major threat to Service Providers and their customers. Staying abreast of and sharing information related to DDoS attacks trends and best practices in defense is vital for effective mitigation. In this session NETSCOUT will discuss DDoS attack trends and key findings from their latest Threat Intelligence Report.
Roland Dobbins is a Principal Engineer on NETSCOUT’s ASERT Team. He has more than 30 years of operational experience in the service provider (SP) and large enterprise arenas, designing, deploying, operating, securing, maintaining, troubleshooting, and defending many of the highest-visibility networks in the world. He is a recognized industry leader in the fields of operational security (opsec) and network telemetry and has an extensive background in security product/feature innovation, devising operational security requirements for network infrastructure devices and protocol design. His focus is on extending the availability, scalability and security of the network infrastructure and the applications/services it enables, with an emphasis on flexible and resilient global service delivery capabilities.
NETSCOUT SYSTEMS helps assure digital business services against disruptions in availability, performance, and security. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility and insights customers need to accelerate and secure their digital transformation. Our approach transforms the way organizations plan, deliver, integrate, test, and deploy services and applications. Our nGenius™ service assurance solutions provide real-time, contextual analysis of service, network, and application performance. Arbor Smart DDoS Protection by NETSCOUT products help protect against attacks that threaten availability and advanced threats that infiltrate networks to steal critical business assets.
To learn more about improving service, network, and application performance in physical or virtual data centers, or in the cloud, and how NETSCOUT’s performance and security solutions powered by service intelligence can help you move forward with confidence, visit www.netscout.com or follow @NETSCOUT on Twitter, Facebook, or LinkedIn.
As critical infrastructure/ utility providers around the world place increasingly stringent focus on quality of their services to the mass market, delivering ‘clean pipes’ should be a core part of the CSP business model. This talk will discuss how threat intelligence can be generated, curated and used to protect the on-line experience of consumers and small businesses. It will also discuss the importance of CSPs sharing threat intelligence with one another so as to then differentiate in the way they integrate threat intelligence into differentiated cyber security service offerings.’
Angel Fernández, AVP of Security Solution, Product Management at Allot
Angel Fernández leads the product management group in charge of end-to-end product strategy and execution of Allot Secure’s core products. He has more than 10 years of experience in security and networking, working with both enterprises and communication service providers. Angel holds a Master of Business Administration from IE Business School in Madrid, Spain.
Allot Ltd. (NASDAQ: ALLT, TASE: ALLT) is a provider of leading innovative network intelligence and security solutions for service providers and enterprises worldwide, enhancing value to their customers. Our solutions are deployed globally for network and application analytics, traffic control and shaping, network-based security services, and more. Allot’s multi-service platforms are deployed by over 500 mobile, fixed and cloud service providers and over 1000 enterprises. Our industry-leading network-based security as a service solution has achieved over 50% penetration with some service providers and is already used by over 20 million subscribers globally.
Allot. See. Control. Secure.
For more information, visit www.allot.com
Poland’s telcos are experienced in dealing with cyber threats including Advanced Persistent Threat (APTs). CISO, Przemyslaw Deba, will share Orange Polska’s experience and thoughts on what telcos do well in terms of using and sharing cyber threat intelligence – as well as what they could do better.
Przemyslaw Deba
CSO
CSO at Orange Polska. Member of ISSA and CSO Council, and ardent supporter of thorough cybersecurity approach: starting from spreading clear and understandable awareness on every level, through supplying the customers with friendly and necessary services, to using long lasting experience of Orange Polska for the good of business customers. An experienced manager, network operations and telco quality expert, AMEA region consultant. Does not compromise when it comes to Orange Polska customers’ security.
Orange Polska, the biggest telecom operator in Poland, originating from former national “Telekomunikacja Polska”. Investing in cybersecurity for quarter of the century, with its dedicated cybersecurity team launched in 1997, being first CERT team in Poland, currently member of FIRST (Forum of Incident Response and Security Teams) and Certified by Trusted Introducer.
Website: https://www.orange.pl/
©2022 HardenStance. All rights reserved. Privacy Policy