Virtualization and Security Workshop:

End-to-End Security on a Virtualized Network:
Not Your Grand Ma's Network Anymore

Thursday, June 8     9:00 AM - 4:00 PM

Virtualization of networks is a foregone conclusion as a primary requirement for developing at scale the networks needed to deploy 5G with a profitable ROI.  Security and privacy across the cloud, fog and mist of connectivity are a fundamental requirement to ensure trust and usage of the communications and connectivity platforms being built. The question - the complexity - the opportunity - is how to build security into virtualized networks at every layer, every juncture, every device and every platform.

Learn and engage with others on use cases and best practices:

 

Security - A View from the top

CIOs of four global corporations discuss their day-to-day needs of keeping networks, datacenters, corporate infrastructure, BYO devices, and corporate and customer IoT platforms secure, what they struggle with, and what they have learned.

The 'Kiss' of security

Keeping it simple and deployable. Not every company is a multi-billion dollar corporation. Often it is the small companies that are more vulnerable and susceptible for attacks. What are their challenges in personnel, budget and resources? How are they coping, and what do they need?

7 Layers of security - or is it now only 3?

Networks are being redefined and flattened in layers. Securing functions within virtual CPEs.

Securing the atoms of networks: the chips

Chips are located at every junction of a network from the cloud servers in the data center, to the edge devices. These include processing chips, radio chips, and CPEs and now virtualized chips and their functions. Each is a vulnerability point. And they are trillions in number.  How does this possible chink in the armor get secured?

Government policy perspective on security

A review of the latest NIST Framework and market drivers that require it.

securing open software

Open Source and OpenStack are tremendous resources. Let’s make sure we can take advantage of them within a secured environment.

the building blocks of software security

A look at offensive and defensive tools.

data security and privacy - two sides of the same coin

Petabytes of data move at ever increasing speeds, back and forth between devices, across platforms and networks, from core to edge. The question is how to keep it secure, and how to manage privacy.  These are questions which corporations, and U.S. and international government policy officials are grappling.  Extra layers of complexity are added for global corporations, particularly those doing business in the European Union which now requires data to stay within state borders.  What are the data management issues?  What are some of the ways companies are finding resolutions? What is at stake if we don’t pay attention to privacy needs of the individual and the corporation? How do we make privacy a business imperative?

tia developing a security operations control process

As part of its mission to help communications companies do their business faster and better, TIA is committed to partnering with government and enterprise to develop a SOC process for the ecosystem. Let’s discuss what is needed, priorities, and the best way to share and educate the ecosystem.

the business of security

Most companies consider security a necessary, but dreaded cost. This is usually the primary reason why security is not often thoroughly thought through until a damaging attack takes place. Security can be a market differentiator, a service offering, a new way to drive revenue with diversified business models.  How is the market taking advantage of security from a business building perspective? What are use cases and key pointers to keep in mind?