Cybersecurity at the Edge: Difference between revisions
From MECwiki
No edit summary |
No edit summary |
||
(10 intermediate revisions by the same user not shown) | |||
Line 10: | Line 10: | ||
=== When ? === | === When ? === | ||
* '''Tuesday 10 December 2024''' 15.30 – 18.30 (EET = UTC +2) | * '''Tuesday 10 December 2024''' 15.30 – 18.30 (EET = UTC +2) | ||
* | * Location: In-presence and remote | ||
* Participation '''Free of charge''' | * Participation '''Free of charge''' | ||
* Registration '''required''' | * Registration '''required''' | ||
<!-- | |||
<center class="img-responsive"><btn class="btn-primary"> | <center class="img-responsive"><btn class="btn-primary"> | ||
https://portal.etsi.org/Meetings.aspx#/meeting?MtgId=48743|Register | https://portal.etsi.org/Meetings.aspx#/meeting?MtgId=48743|Register | ||
</btn></center> | </btn></center> | ||
<center class="img-responsive"><btn class="btn-success">https://teams.microsoft.com/l/meetup-join/19%3ameeting_MDk4YjZjNDctNTE0MS00NmJjLWI2MTYtMDZjYmExM2NjOGY5%40thread.v2/0?context=%7b%22Tid%22%3a%22e6746ab5-ebdc-4e9d-821b-a71bdaf63d9b%22%2c%22Oid%22%3a%220eb37810-8df1-4b96-ac3e-7f78f51080a4%22%7d|Connect | |||
</btn></center> | |||
--> | |||
=== Abstract === | === Abstract === | ||
* The edge is becoming a hybrid multi-cloud environment, federating communication and computing assets from operators, service providers and hyperscalers. This fundamental nature of the edge deployments has certainly a huge impact on security, as a user workload may execute in an environment involving multiple stakeholders. | * The edge is becoming a hybrid multi-cloud environment, federating communication and computing assets from operators, service providers and hyperscalers. This fundamental nature of the edge deployments has certainly a huge impact on security, as a user workload may execute in an environment involving multiple stakeholders. | ||
* Additionally, security decisions are in principle very complex and depend on several factors, which need to be analyzed from an E2E perspective, also including terminals and IT infra at the edge. In particular, automotive sector is a key domain where MEC deployments are key to deliver services to customers, and where also there is an increased need for security (due also to the progressive introduction of automated and connected cars, where softwarization and introduction of AI is a ubiquitous phenomenon in all parts of the infrastructure). In that perspective, also AI systems and their related governance, will be a challenge also toward 6G systems, future technology infrastructure will be AI-native and edge-native by design. | * Additionally, security decisions are in principle very complex and depend on several factors, which need to be analyzed from an E2E perspective, also including terminals and IT infra at the edge. In particular, automotive sector is a key domain where MEC deployments are key to deliver services to customers, and where also there is an increased need for security (due also to the progressive introduction of automated and connected cars, where softwarization and introduction of AI is a ubiquitous phenomenon in all parts of the infrastructure). In that perspective, also AI systems and their related governance, will be a challenge also toward 6G systems, future technology infrastructure will be AI-native and edge-native by design. | ||
* This panel | * This panel provides a must-have overview on edge computing cybersecurity, with a special focus on automotive use cases. The speakers, as relevant international experts in the area, will provide a comprehensive view of the state-of-the-art, encompassing standards (e.g. 3GPP, ETSI, IETF), compliance, regulations (ENISA, ETSI, CEN, CENELEC), certification schemes (e.g. EUCC, EUCS, CRA, EU5G), and best practices from industry (e.g. GSMA, 5GAA), including trust management frameworks from research projects (e.g. CONNECT, VERGE, Hexa-X), also with a perspective on recent normative challenges related to adoption of AI. The final goal is to provide a diverse set of points of view from industry and research, not only to demystify edge cybersecurity, but also to identify promising directions toward future 6G systems. | ||
Line 31: | Line 37: | ||
* Dario Sabella (Chairman, ETSI MEC – Multi-access Edge Computing, VP at xFlow Research) | * Dario Sabella (Chairman, ETSI MEC – Multi-access Edge Computing, VP at xFlow Research) | ||
=== Speakers === | === Speakers === | ||
* Akis Kourtis (Researcher, National Centre for Scientific Research “Demokritos”) | * Akis Kourtis (Researcher, National Centre for Scientific Research “Demokritos”) | ||
* Claire Vishik (CTO, Stealth Startup, independent security expert | |||
* Claire Vishik (CTO, Stealth Startup, independent security expert) | |||
=== Agenda | * Slawomir Gorniak (Senior Cybersecurity Expert at ENISA) | ||
* Riccardo Masucci (Managing Director EU Affairs, Head of Brussels Office, Intel) | |||
* Dario Sabella (Chairman, ETSI MEC – Multi-access Edge Computing, VP at xFlow Research) | |||
* Ioannis Krontiris (Senior Research Engineer, Huawei) | |||
* Eric Gauthier (GSMA FSAG chair, Orange) | |||
[[File:Event 3.jpg|500px|center|class=img-responsive|link=Cybersecurity_at_the_Edge]] | |||
=== Agenda & PDF Presentations === | |||
(all times EET = UTC +2) | (all times EET = UTC +2) | ||
{| class="wikitable" | {| class="wikitable" | ||
Line 50: | Line 63: | ||
|- | |- | ||
|15.30 | |15.30 | ||
|Welcome and Introduction | |[//mecwiki.etsi.org/images/0_-_Edge_Discovery_Event_Cybersecurity_-_PANEL_overview.pdf <u>Welcome and Introduction</u>] | ||
|Nurit Sprecher | |Nurit Sprecher | ||
|- | |- | ||
|15.45 – 16.00 | |15.45 – 16.00 | ||
| | |[//mecwiki.etsi.org/images/1_-_Edge_Discovery_Event_Cybersecurity_-_akis_NCSR_Demokritos.pdf <u>Emerging Trends in Edge Computing Security: Privacy, PQC, and Digital Twin Certification</u>] | ||
|Akis Kourtis | |Akis Kourtis | ||
|- | |- | ||
|16.00 – 16.15 | |16.00 – 16.15 | ||
| | |[//mecwiki.etsi.org/images/2_-_Edge_Discovery_Event_Cybersecurity_-_claire.pdf <u>Edge security: industry perspective on evolving technology and defenders' positioning</u>] | ||
|Claire Vishik | |Claire Vishik | ||
|- | |- | ||
|16.15 – 16.30 | |16.15 – 16.30 | ||
| | |[//mecwiki.etsi.org/images/3_-_Edge_Discovery_Event_Cybersecurity_-_ENISA.pdf <u>The view from ENISA: updates and future activities</u>] | ||
| | |Slawomir Gorniak | ||
|- | |- | ||
|16.30 – 16.45 | |16.30 – 16.45 | ||
| | |[//mecwiki.etsi.org/images/4_-_Edge_Discovery_Event_Cybersecurity_-_Masucci.pdf <u>Security and resilience across digital infrastructure and supply chains</u>] | ||
| | |Riccardo Masucci | ||
|- | |- | ||
|16.45 – 17.00 | |16.45 – 17.00 | ||
| | |[//mecwiki.etsi.org/images/5_-_Edge_Discovery_Event_Cybersecurity_-_MEC_standards.pdf <u>MEC Standards overview and cybersecurity updates</u>] | ||
| | |Dario Sabella | ||
|- | |- | ||
|17.00 – 17.15 | |17.00 – 17.15 | ||
| | |[//mecwiki.etsi.org/images/6_-_Edge_Discovery_events_series-CONNECT.pdf <u>Focus on Automotive Cybersecurity</u>] | ||
| | |Ioannis Krontiris | ||
|- | |- | ||
|17.15 – 17.30 | |17.15 – 17.30 | ||
| | |[//mecwiki.etsi.org/images/7_-_Edge_Discovery_Event_Cybersecurity_-_Overview_of_GSMA_FASG.pdf <u>GSMA Fraud and Security Architecture: an operator views</u>] | ||
|Eric Gauthier | |Eric Gauthier | ||
|- | |- | ||
|17.30 – | |17.30 – 18.15 | ||
| | |'''Panel Discussion''' (with all speakers) | ||
How the future of edge cybersecurity will look like? | |||
Opportunities and challenges, for more secure infrastructures and applications toward 6G | Opportunities and challenges, for more secure infrastructures and applications toward 6G | ||
|Moderator | |Moderator | ||
(Dario Sabella) | (Dario Sabella) |
Latest revision as of 10:01, 11 December 2024
←Edge Discovery events series
ETSI MEC meets vertical markets:
Cybersecurity at the Edge : Opportunities and challenges toward 6G
When ?
- Tuesday 10 December 2024 15.30 – 18.30 (EET = UTC +2)
- Location: In-presence and remote
- Participation Free of charge
- Registration required
Abstract
- The edge is becoming a hybrid multi-cloud environment, federating communication and computing assets from operators, service providers and hyperscalers. This fundamental nature of the edge deployments has certainly a huge impact on security, as a user workload may execute in an environment involving multiple stakeholders.
- Additionally, security decisions are in principle very complex and depend on several factors, which need to be analyzed from an E2E perspective, also including terminals and IT infra at the edge. In particular, automotive sector is a key domain where MEC deployments are key to deliver services to customers, and where also there is an increased need for security (due also to the progressive introduction of automated and connected cars, where softwarization and introduction of AI is a ubiquitous phenomenon in all parts of the infrastructure). In that perspective, also AI systems and their related governance, will be a challenge also toward 6G systems, future technology infrastructure will be AI-native and edge-native by design.
- This panel provides a must-have overview on edge computing cybersecurity, with a special focus on automotive use cases. The speakers, as relevant international experts in the area, will provide a comprehensive view of the state-of-the-art, encompassing standards (e.g. 3GPP, ETSI, IETF), compliance, regulations (ENISA, ETSI, CEN, CENELEC), certification schemes (e.g. EUCC, EUCS, CRA, EU5G), and best practices from industry (e.g. GSMA, 5GAA), including trust management frameworks from research projects (e.g. CONNECT, VERGE, Hexa-X), also with a perspective on recent normative challenges related to adoption of AI. The final goal is to provide a diverse set of points of view from industry and research, not only to demystify edge cybersecurity, but also to identify promising directions toward future 6G systems.
Organizers
- Nurit Sprecher (Nokia, Head of Management, Virtualization and Application Enablement Standardization)
- Dario Sabella (Chairman, ETSI MEC – Multi-access Edge Computing, VP at xFlow Research)
Speakers
- Akis Kourtis (Researcher, National Centre for Scientific Research “Demokritos”)
- Claire Vishik (CTO, Stealth Startup, independent security expert)
- Slawomir Gorniak (Senior Cybersecurity Expert at ENISA)
- Riccardo Masucci (Managing Director EU Affairs, Head of Brussels Office, Intel)
- Dario Sabella (Chairman, ETSI MEC – Multi-access Edge Computing, VP at xFlow Research)
- Ioannis Krontiris (Senior Research Engineer, Huawei)
- Eric Gauthier (GSMA FSAG chair, Orange)
Agenda & PDF Presentations
(all times EET = UTC +2)
Time | Title | Speaker |
---|---|---|
15.30 | Welcome and Introduction | Nurit Sprecher |
15.45 – 16.00 | Emerging Trends in Edge Computing Security: Privacy, PQC, and Digital Twin Certification | Akis Kourtis |
16.00 – 16.15 | Edge security: industry perspective on evolving technology and defenders' positioning | Claire Vishik |
16.15 – 16.30 | The view from ENISA: updates and future activities | Slawomir Gorniak |
16.30 – 16.45 | Security and resilience across digital infrastructure and supply chains | Riccardo Masucci |
16.45 – 17.00 | MEC Standards overview and cybersecurity updates | Dario Sabella |
17.00 – 17.15 | Focus on Automotive Cybersecurity | Ioannis Krontiris |
17.15 – 17.30 | GSMA Fraud and Security Architecture: an operator views | Eric Gauthier |
17.30 – 18.15 | Panel Discussion (with all speakers)
How the future of edge cybersecurity will look like? Opportunities and challenges, for more secure infrastructures and applications toward 6G |
Moderator
(Dario Sabella) |
18.30 | Conclusions | Nurit Sprecher |