SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Straw Program
- Topics that highlight Ericsson’s IP
expertise
- Leverage Ericsson’s strengths and
apply to new technology and issues to
resolve. (e.g, MBH)
- Focus on operator perspective and
pain points
- Cover emerging tech and tech we have
“on the truck”
- Include “friendly” partners to show not
working in a vacuum
- Industry thought leaders for keynotes to
highlight technical business drivers
- One track for non-technical business
related content*
- Possible Friday customer meetings
• 2-3 distinct parallel tracks.
• Could have side room for “Meet the Engineer” private sessions.
Continuous Multilayer Protection:
- Operationalizing a Security Framework
Mats Nilsson
2015-05-25 | Page 2
Connectivitymoreand more part ofour life
1875 20001975
10
30
50
15 years
50 billion connected devices
25 years
5 billion connected people
100 years
1 billion connected places
20
40
Connections(billion)
2020
2015-05-25 | Page 3
Connectivityintegrated
into our way oflife
Collaboration
Innovation
Privacy
Competence
Trust
Socializing
Learning
Everything
PEOPLE do
Media
Commerce
Security
Government
Education
Transport
Healthcare
Utilities
In all parts of
SOCIETY &
BUSINESS
Will be done over a
NETWORK
2015-05-25 | Page 4
NEW OPPORTUNITIES
– NEW CHALLENGES
Increased
network capacity
More commerce &
financial transactions
More cloud
storage & services
Open and capable
devices
An IP based unified
global network
New things
get connected
More services
get networked
More decisions
based on real-time data
Policyand regulation
› Status and drivers
– On top of political agendas
– The (global) Economic and
Social impact of the ICT
enabled society
– How to ensure core values
and security in Cyberspace
› Activities and consequences
– Definition and scope of Critical
Information Infrastructures (e.g.
Communications, Healthcare Energy,
Transport
– Operational security requirements
and audits
› Voluntary but required to avoid
liabilities – US
› Law - EU
– Mitigation through recommended
Standards, Best practices,
implementation incentives or
law/liabilities
› Examples of policy measures
– US Executive Order 13636 and
“Cyber security Framework”
– EU
› Cyber security strategy
› EU proposed NIS directive
› EU NIS platform
– India
› Security requirements and
audits on operators.
› Mandatory local testing of
equipment (from 1 April 2015)
however alignment with global
standards
– Many others….
2015-05-25 | Page 6
our perspective onSecurity
in the networked society
• services should always be available
• security should require minimum effort from users
• communications should be protected
• all access to information and data should be authorized
• manipulation of data in the networks should be possible to detect
• the right to privacy should be protected
SECURITYIN THE NETWORKED SOCIETY
Operator Policies
& Directives
Secure
Operations
Secure
Network
Secure
Products
Laws &
Regulation
Standards:
ISO 27001…
3GPP, ITU-T,
IETF…
3GPP SECAM,
ISO 15408…
2015-05-25 | Page 8
System scale
Users
Thousands Millions Billions
Enterprise
Telecom Networks
Multiple Networks
Moderate
Large
Very large
Our Focus:
Large scalesecurity
2015-05-25 | Page 9
Point security
• Firewalls
• Malware detection
• Intrusion detection
• Content scrubbing
Network & Operational Security
• Software and data integrity verification
• Tamper protection
• Identity management
• Fraud prevention mechanisms
• ISO 27 000 certified operations
• Secure storage
IntegratedSecurity
CreatingLarge-scale system Security
• Integrity
• Robustness
• Scalability
• Efficiency
• Confidentiality
• Privacy
• Coordinated defense
• Fast response
Integrated security
Threat
Threat
Threat
2015-05-25 | Page 10
People &
Processes HW & SW Data
TransactionsConfigurationsIdentities
Devices
…and much more
What needs to betrusted
2015-05-25 | Page 11
NEEDSTHE ERICSSONTRUST STACK
TRUSTED BUSINESS
TRUSTED OPERATIONS
TRUSTED NETWORKS
TRUSTED PRODUCTS
ENABLES
2015-05-25 | Page 12
NISTCS FW mappedto RESPONSIBILITIES
Identify
Protect
Detect
Respond
Recover
NIST CS FW
2015-05-25 | Page 13
integrated process for Product andservice development
PRODUCT
SECURITY
FUNCTIONS
PRODUCT
SECURITY
ASSURANCE
PRODUCT
SECURITY
DOCUMENTATION
PRODUCT NEAR
SECURITY
SERVICES
Developing the
right security
functions for a
product or service
Assuring that the
security
functionality works
as expected
Documenting
security
functionality to
enable secure
operations
Provide services to
ensure that
security
functionality is
properly used
Securityreliability model:
2015-05-25 | Page 14
FROM: PROTECT ONLY
100% protection is possible
Re-Inventionof CloudSecurity
TheShift to Cloud Requires a New Focus
Hardened end points, users not
devices
Illusion of liability protection:
third party audits,
certifications
Data is locked down
Perimeter-centric: access control,
encryption
Authenticate end points: trusted identity of
users AND devices
Data is portable, in compliance
with local regulations
Data - centric: every data asset is
tagged, tracked, located, verified
Onus for proof: independently
verifiable, mathematical
forensics
2015-05-25 | Page 15
Ericsson WalletPlatformoverviewof securitycontrols
Approval of sensitive
operations
Traceability & accountability
Security
configuration
validation
Eavesdropping and
modification protection
Two factor authentication
Configurable access control
System and API
hardening
Financial crime controls
2015-05-25 | Page 16

Más contenido relacionado

La actualidad más candente

EiTESAL IOT DAY 26-10-2016
EiTESAL IOT DAY 26-10-2016EiTESAL IOT DAY 26-10-2016
EiTESAL IOT DAY 26-10-2016EITESANGO
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Mark Skilton
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021Heidelberg India
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0Home
 
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-dateSODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-dateNabil Bouzerna
 
Cisco Powered Overview
Cisco Powered OverviewCisco Powered Overview
Cisco Powered OverviewCisco Powered
 
EUCI O&G Cloud Security - Eric Jeffery Final
EUCI O&G Cloud Security - Eric Jeffery FinalEUCI O&G Cloud Security - Eric Jeffery Final
EUCI O&G Cloud Security - Eric Jeffery FinalEric Jeffery
 
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...Nabil Bouzerna
 
TechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational InsightsTechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational InsightsRobb Boyd
 
Building an OpenStack Ecosystem - Trove Day 2014
Building an OpenStack Ecosystem - Trove Day 2014Building an OpenStack Ecosystem - Trove Day 2014
Building an OpenStack Ecosystem - Trove Day 2014Tesora
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides Francisco Maroto
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
NSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementNSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementBjorn Hjelm
 

La actualidad más candente (20)

EiTESAL IOT DAY 26-10-2016
EiTESAL IOT DAY 26-10-2016EiTESAL IOT DAY 26-10-2016
EiTESAL IOT DAY 26-10-2016
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...
 
INTERNET PROTOCOL VIDEO SURVEILLANCE
INTERNET PROTOCOL VIDEO SURVEILLANCEINTERNET PROTOCOL VIDEO SURVEILLANCE
INTERNET PROTOCOL VIDEO SURVEILLANCE
 
Smart buildings
Smart buildingsSmart buildings
Smart buildings
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-dateSODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
 
Cisco Powered Overview
Cisco Powered OverviewCisco Powered Overview
Cisco Powered Overview
 
EUCI O&G Cloud Security - Eric Jeffery Final
EUCI O&G Cloud Security - Eric Jeffery FinalEUCI O&G Cloud Security - Eric Jeffery Final
EUCI O&G Cloud Security - Eric Jeffery Final
 
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
 
Enisa and cyber security standards
Enisa and cyber security standardsEnisa and cyber security standards
Enisa and cyber security standards
 
TechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational InsightsTechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational Insights
 
Building an OpenStack Ecosystem - Trove Day 2014
Building an OpenStack Ecosystem - Trove Day 2014Building an OpenStack Ecosystem - Trove Day 2014
Building an OpenStack Ecosystem - Trove Day 2014
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
NSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementNSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access Management
 

Destacado

MIRAI - Managing Industry Restructuring and Adoptions Inquisitively
MIRAI - Managing Industry Restructuring and Adoptions InquisitivelyMIRAI - Managing Industry Restructuring and Adoptions Inquisitively
MIRAI - Managing Industry Restructuring and Adoptions InquisitivelyQuEST Forum
 
Driving Networks Forward to a Hyperconnected World
Driving Networks Forward to a Hyperconnected WorldDriving Networks Forward to a Hyperconnected World
Driving Networks Forward to a Hyperconnected WorldQuEST Forum
 
Sustainability Thinking Pays Off; New Framework Drives Game-Changing Ideas
Sustainability Thinking Pays Off; New Framework Drives Game-Changing IdeasSustainability Thinking Pays Off; New Framework Drives Game-Changing Ideas
Sustainability Thinking Pays Off; New Framework Drives Game-Changing IdeasQuEST Forum
 
Revised ISO 9001 - in a viewpoint of top management
Revised ISO 9001 - in a viewpoint of top managementRevised ISO 9001 - in a viewpoint of top management
Revised ISO 9001 - in a viewpoint of top managementQuEST Forum
 
From the Clean Room to the Great Outdoors
From the Clean Room to the Great OutdoorsFrom the Clean Room to the Great Outdoors
From the Clean Room to the Great OutdoorsQuEST Forum
 
Integrated Continuous Improvements Ecosystem
Integrated Continuous Improvements EcosystemIntegrated Continuous Improvements Ecosystem
Integrated Continuous Improvements EcosystemQuEST Forum
 
Driving Networks Forward to the Hyper-Connected World
Driving Networks Forward to the Hyper-Connected WorldDriving Networks Forward to the Hyper-Connected World
Driving Networks Forward to the Hyper-Connected WorldQuEST Forum
 
Customer Delight Created by Co-Operation between Supplier and Operator
Customer Delight Created by Co-Operation between Supplier and OperatorCustomer Delight Created by Co-Operation between Supplier and Operator
Customer Delight Created by Co-Operation between Supplier and OperatorQuEST Forum
 
Kudos Aristotle: Using Ethos, Logos & Pathos to Improve the Xilinx Customer E...
Kudos Aristotle: Using Ethos, Logos & Pathos to Improve the Xilinx Customer E...Kudos Aristotle: Using Ethos, Logos & Pathos to Improve the Xilinx Customer E...
Kudos Aristotle: Using Ethos, Logos & Pathos to Improve the Xilinx Customer E...QuEST Forum
 
Maturity Model of Internal Audit
Maturity Model of Internal AuditMaturity Model of Internal Audit
Maturity Model of Internal AuditQuEST Forum
 
Adoption & Reinforcement - Applying TL 9000 in R&D Businesses
Adoption & Reinforcement - Applying TL 9000 in R&D BusinessesAdoption & Reinforcement - Applying TL 9000 in R&D Businesses
Adoption & Reinforcement - Applying TL 9000 in R&D BusinessesQuEST Forum
 
TL 9000 Today & Benefit of PDR
TL 9000 Today & Benefit of PDRTL 9000 Today & Benefit of PDR
TL 9000 Today & Benefit of PDRQuEST Forum
 
Zero Defect Initiative - Quality Index Generator
Zero Defect Initiative - Quality Index GeneratorZero Defect Initiative - Quality Index Generator
Zero Defect Initiative - Quality Index GeneratorQuEST Forum
 
TL 9000 WG Activities
TL 9000 WG ActivitiesTL 9000 WG Activities
TL 9000 WG ActivitiesQuEST Forum
 
Quality Measurement Framework Puts the End User in Focus
Quality Measurement Framework Puts the End User in FocusQuality Measurement Framework Puts the End User in Focus
Quality Measurement Framework Puts the End User in FocusQuEST Forum
 
Being Agile with Assured Quality
Being Agile with Assured QualityBeing Agile with Assured Quality
Being Agile with Assured QualityQuEST Forum
 
Sustainable Engineering - Practical Studies for Building a Sustainable Society
Sustainable Engineering - Practical Studies for Building a Sustainable Society Sustainable Engineering - Practical Studies for Building a Sustainable Society
Sustainable Engineering - Practical Studies for Building a Sustainable Society QuEST Forum
 
QuEST Forum TL 9000 R6.0 Requirements & ISO 9001:2015
QuEST Forum TL 9000 R6.0 Requirements & ISO 9001:2015QuEST Forum TL 9000 R6.0 Requirements & ISO 9001:2015
QuEST Forum TL 9000 R6.0 Requirements & ISO 9001:2015QuEST Forum
 

Destacado (18)

MIRAI - Managing Industry Restructuring and Adoptions Inquisitively
MIRAI - Managing Industry Restructuring and Adoptions InquisitivelyMIRAI - Managing Industry Restructuring and Adoptions Inquisitively
MIRAI - Managing Industry Restructuring and Adoptions Inquisitively
 
Driving Networks Forward to a Hyperconnected World
Driving Networks Forward to a Hyperconnected WorldDriving Networks Forward to a Hyperconnected World
Driving Networks Forward to a Hyperconnected World
 
Sustainability Thinking Pays Off; New Framework Drives Game-Changing Ideas
Sustainability Thinking Pays Off; New Framework Drives Game-Changing IdeasSustainability Thinking Pays Off; New Framework Drives Game-Changing Ideas
Sustainability Thinking Pays Off; New Framework Drives Game-Changing Ideas
 
Revised ISO 9001 - in a viewpoint of top management
Revised ISO 9001 - in a viewpoint of top managementRevised ISO 9001 - in a viewpoint of top management
Revised ISO 9001 - in a viewpoint of top management
 
From the Clean Room to the Great Outdoors
From the Clean Room to the Great OutdoorsFrom the Clean Room to the Great Outdoors
From the Clean Room to the Great Outdoors
 
Integrated Continuous Improvements Ecosystem
Integrated Continuous Improvements EcosystemIntegrated Continuous Improvements Ecosystem
Integrated Continuous Improvements Ecosystem
 
Driving Networks Forward to the Hyper-Connected World
Driving Networks Forward to the Hyper-Connected WorldDriving Networks Forward to the Hyper-Connected World
Driving Networks Forward to the Hyper-Connected World
 
Customer Delight Created by Co-Operation between Supplier and Operator
Customer Delight Created by Co-Operation between Supplier and OperatorCustomer Delight Created by Co-Operation between Supplier and Operator
Customer Delight Created by Co-Operation between Supplier and Operator
 
Kudos Aristotle: Using Ethos, Logos & Pathos to Improve the Xilinx Customer E...
Kudos Aristotle: Using Ethos, Logos & Pathos to Improve the Xilinx Customer E...Kudos Aristotle: Using Ethos, Logos & Pathos to Improve the Xilinx Customer E...
Kudos Aristotle: Using Ethos, Logos & Pathos to Improve the Xilinx Customer E...
 
Maturity Model of Internal Audit
Maturity Model of Internal AuditMaturity Model of Internal Audit
Maturity Model of Internal Audit
 
Adoption & Reinforcement - Applying TL 9000 in R&D Businesses
Adoption & Reinforcement - Applying TL 9000 in R&D BusinessesAdoption & Reinforcement - Applying TL 9000 in R&D Businesses
Adoption & Reinforcement - Applying TL 9000 in R&D Businesses
 
TL 9000 Today & Benefit of PDR
TL 9000 Today & Benefit of PDRTL 9000 Today & Benefit of PDR
TL 9000 Today & Benefit of PDR
 
Zero Defect Initiative - Quality Index Generator
Zero Defect Initiative - Quality Index GeneratorZero Defect Initiative - Quality Index Generator
Zero Defect Initiative - Quality Index Generator
 
TL 9000 WG Activities
TL 9000 WG ActivitiesTL 9000 WG Activities
TL 9000 WG Activities
 
Quality Measurement Framework Puts the End User in Focus
Quality Measurement Framework Puts the End User in FocusQuality Measurement Framework Puts the End User in Focus
Quality Measurement Framework Puts the End User in Focus
 
Being Agile with Assured Quality
Being Agile with Assured QualityBeing Agile with Assured Quality
Being Agile with Assured Quality
 
Sustainable Engineering - Practical Studies for Building a Sustainable Society
Sustainable Engineering - Practical Studies for Building a Sustainable Society Sustainable Engineering - Practical Studies for Building a Sustainable Society
Sustainable Engineering - Practical Studies for Building a Sustainable Society
 
QuEST Forum TL 9000 R6.0 Requirements & ISO 9001:2015
QuEST Forum TL 9000 R6.0 Requirements & ISO 9001:2015QuEST Forum TL 9000 R6.0 Requirements & ISO 9001:2015
QuEST Forum TL 9000 R6.0 Requirements & ISO 9001:2015
 

Similar a Continuous Multilayer Protection: Operationalizing a Security Framework

telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionsFakher Oueslati
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nagui Chalache
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016Dale Butler
 
OpShield 운영기술 환경 보안 솔루션
OpShield 운영기술 환경 보안 솔루션 OpShield 운영기술 환경 보안 솔루션
OpShield 운영기술 환경 보안 솔루션 GE코리아
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
IoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayIoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayEurotech
 
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar  CIC Qatar 2018 AgendaiFluids Cybersecurity Seminar  CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar CIC Qatar 2018 AgendaJohn Kingsley
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceDale Butler
 
M2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 NetworksM2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 NetworksEricsson
 
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...IBM_Info_Management
 
Cisco Impresa40 - Trends, Vision, Solutions
Cisco Impresa40 - Trends, Vision, SolutionsCisco Impresa40 - Trends, Vision, Solutions
Cisco Impresa40 - Trends, Vision, SolutionsMatteo Masi
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...festival ICT 2016
 
Data center presentation toi -28022013
Data center presentation   toi -28022013Data center presentation   toi -28022013
Data center presentation toi -28022013Sanjay Belulkar
 
Presentation cloud computing
Presentation   cloud computingPresentation   cloud computing
Presentation cloud computingxKinAnx
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...FinTech Belgium
 
Ericsson’s main challenges and key differentiators to support operators busin...
Ericsson’s main challenges and key differentiators to support operators busin...Ericsson’s main challenges and key differentiators to support operators busin...
Ericsson’s main challenges and key differentiators to support operators busin...Houria Tair
 

Similar a Continuous Multilayer Protection: Operationalizing a Security Framework (20)

telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutions
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
OpShield 운영기술 환경 보안 솔루션
OpShield 운영기술 환경 보안 솔루션 OpShield 운영기술 환경 보안 솔루션
OpShield 운영기술 환경 보안 솔루션
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
IoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayIoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT Gateway
 
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar  CIC Qatar 2018 AgendaiFluids Cybersecurity Seminar  CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 
M2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 NetworksM2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 Networks
 
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
 
Cisco Impresa40 - Trends, Vision, Solutions
Cisco Impresa40 - Trends, Vision, SolutionsCisco Impresa40 - Trends, Vision, Solutions
Cisco Impresa40 - Trends, Vision, Solutions
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
Data center presentation toi -28022013
Data center presentation   toi -28022013Data center presentation   toi -28022013
Data center presentation toi -28022013
 
Presentation cloud computing
Presentation   cloud computingPresentation   cloud computing
Presentation cloud computing
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
Ericsson’s main challenges and key differentiators to support operators busin...
Ericsson’s main challenges and key differentiators to support operators busin...Ericsson’s main challenges and key differentiators to support operators busin...
Ericsson’s main challenges and key differentiators to support operators busin...
 

Más de QuEST Forum

Networked Society - Story to be Continued
Networked Society - Story to be ContinuedNetworked Society - Story to be Continued
Networked Society - Story to be ContinuedQuEST Forum
 
Achieving Best-in-Class Customer Experience through Effective Product Launch
Achieving Best-in-Class Customer Experience through Effective Product LaunchAchieving Best-in-Class Customer Experience through Effective Product Launch
Achieving Best-in-Class Customer Experience through Effective Product LaunchQuEST Forum
 
Increasing Revenue Through Improved Customer Experience
Increasing Revenue Through Improved Customer ExperienceIncreasing Revenue Through Improved Customer Experience
Increasing Revenue Through Improved Customer ExperienceQuEST Forum
 
KPI Team Journey
KPI Team JourneyKPI Team Journey
KPI Team JourneyQuEST Forum
 
Network Quality and Customer Experience
Network Quality and Customer ExperienceNetwork Quality and Customer Experience
Network Quality and Customer ExperienceQuEST Forum
 
Automotive Services and Communications Technologies, a Brief Look into the Fu...
Automotive Services and Communications Technologies, a Brief Look into the Fu...Automotive Services and Communications Technologies, a Brief Look into the Fu...
Automotive Services and Communications Technologies, a Brief Look into the Fu...QuEST Forum
 
Conquering the Cost of Poor Quality
Conquering the Cost of Poor QualityConquering the Cost of Poor Quality
Conquering the Cost of Poor QualityQuEST Forum
 
TL 9000 Measurements and Requirements Interactive Workshop
TL 9000 Measurements and Requirements Interactive WorkshopTL 9000 Measurements and Requirements Interactive Workshop
TL 9000 Measurements and Requirements Interactive WorkshopQuEST Forum
 
7 Key Elements for Operation Quality Improvement
7 Key Elements for Operation Quality Improvement7 Key Elements for Operation Quality Improvement
7 Key Elements for Operation Quality ImprovementQuEST Forum
 
The Action Against Soft-Errors to Prevent Service Outage
The Action Against Soft-Errors to Prevent Service OutageThe Action Against Soft-Errors to Prevent Service Outage
The Action Against Soft-Errors to Prevent Service OutageQuEST Forum
 
Minimize the Cost by Quality Assurance Process Improvement
Minimize the Cost by Quality Assurance Process ImprovementMinimize the Cost by Quality Assurance Process Improvement
Minimize the Cost by Quality Assurance Process ImprovementQuEST Forum
 
The Status and Issues of Quality Management System Certification in Japan
The Status and Issues of Quality Management System Certification in JapanThe Status and Issues of Quality Management System Certification in Japan
The Status and Issues of Quality Management System Certification in JapanQuEST Forum
 
Key Concept in Toyota Production System and Their Own Thought
Key Concept in Toyota Production System and Their Own ThoughtKey Concept in Toyota Production System and Their Own Thought
Key Concept in Toyota Production System and Their Own ThoughtQuEST Forum
 

Más de QuEST Forum (13)

Networked Society - Story to be Continued
Networked Society - Story to be ContinuedNetworked Society - Story to be Continued
Networked Society - Story to be Continued
 
Achieving Best-in-Class Customer Experience through Effective Product Launch
Achieving Best-in-Class Customer Experience through Effective Product LaunchAchieving Best-in-Class Customer Experience through Effective Product Launch
Achieving Best-in-Class Customer Experience through Effective Product Launch
 
Increasing Revenue Through Improved Customer Experience
Increasing Revenue Through Improved Customer ExperienceIncreasing Revenue Through Improved Customer Experience
Increasing Revenue Through Improved Customer Experience
 
KPI Team Journey
KPI Team JourneyKPI Team Journey
KPI Team Journey
 
Network Quality and Customer Experience
Network Quality and Customer ExperienceNetwork Quality and Customer Experience
Network Quality and Customer Experience
 
Automotive Services and Communications Technologies, a Brief Look into the Fu...
Automotive Services and Communications Technologies, a Brief Look into the Fu...Automotive Services and Communications Technologies, a Brief Look into the Fu...
Automotive Services and Communications Technologies, a Brief Look into the Fu...
 
Conquering the Cost of Poor Quality
Conquering the Cost of Poor QualityConquering the Cost of Poor Quality
Conquering the Cost of Poor Quality
 
TL 9000 Measurements and Requirements Interactive Workshop
TL 9000 Measurements and Requirements Interactive WorkshopTL 9000 Measurements and Requirements Interactive Workshop
TL 9000 Measurements and Requirements Interactive Workshop
 
7 Key Elements for Operation Quality Improvement
7 Key Elements for Operation Quality Improvement7 Key Elements for Operation Quality Improvement
7 Key Elements for Operation Quality Improvement
 
The Action Against Soft-Errors to Prevent Service Outage
The Action Against Soft-Errors to Prevent Service OutageThe Action Against Soft-Errors to Prevent Service Outage
The Action Against Soft-Errors to Prevent Service Outage
 
Minimize the Cost by Quality Assurance Process Improvement
Minimize the Cost by Quality Assurance Process ImprovementMinimize the Cost by Quality Assurance Process Improvement
Minimize the Cost by Quality Assurance Process Improvement
 
The Status and Issues of Quality Management System Certification in Japan
The Status and Issues of Quality Management System Certification in JapanThe Status and Issues of Quality Management System Certification in Japan
The Status and Issues of Quality Management System Certification in Japan
 
Key Concept in Toyota Production System and Their Own Thought
Key Concept in Toyota Production System and Their Own ThoughtKey Concept in Toyota Production System and Their Own Thought
Key Concept in Toyota Production System and Their Own Thought
 

Último

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Continuous Multilayer Protection: Operationalizing a Security Framework

  • 1. Straw Program - Topics that highlight Ericsson’s IP expertise - Leverage Ericsson’s strengths and apply to new technology and issues to resolve. (e.g, MBH) - Focus on operator perspective and pain points - Cover emerging tech and tech we have “on the truck” - Include “friendly” partners to show not working in a vacuum - Industry thought leaders for keynotes to highlight technical business drivers - One track for non-technical business related content* - Possible Friday customer meetings • 2-3 distinct parallel tracks. • Could have side room for “Meet the Engineer” private sessions. Continuous Multilayer Protection: - Operationalizing a Security Framework Mats Nilsson
  • 2. 2015-05-25 | Page 2 Connectivitymoreand more part ofour life 1875 20001975 10 30 50 15 years 50 billion connected devices 25 years 5 billion connected people 100 years 1 billion connected places 20 40 Connections(billion) 2020
  • 3. 2015-05-25 | Page 3 Connectivityintegrated into our way oflife Collaboration Innovation Privacy Competence Trust Socializing Learning Everything PEOPLE do Media Commerce Security Government Education Transport Healthcare Utilities In all parts of SOCIETY & BUSINESS Will be done over a NETWORK
  • 4. 2015-05-25 | Page 4 NEW OPPORTUNITIES – NEW CHALLENGES Increased network capacity More commerce & financial transactions More cloud storage & services Open and capable devices An IP based unified global network New things get connected More services get networked More decisions based on real-time data
  • 5. Policyand regulation › Status and drivers – On top of political agendas – The (global) Economic and Social impact of the ICT enabled society – How to ensure core values and security in Cyberspace › Activities and consequences – Definition and scope of Critical Information Infrastructures (e.g. Communications, Healthcare Energy, Transport – Operational security requirements and audits › Voluntary but required to avoid liabilities – US › Law - EU – Mitigation through recommended Standards, Best practices, implementation incentives or law/liabilities › Examples of policy measures – US Executive Order 13636 and “Cyber security Framework” – EU › Cyber security strategy › EU proposed NIS directive › EU NIS platform – India › Security requirements and audits on operators. › Mandatory local testing of equipment (from 1 April 2015) however alignment with global standards – Many others….
  • 6. 2015-05-25 | Page 6 our perspective onSecurity in the networked society • services should always be available • security should require minimum effort from users • communications should be protected • all access to information and data should be authorized • manipulation of data in the networks should be possible to detect • the right to privacy should be protected
  • 7. SECURITYIN THE NETWORKED SOCIETY Operator Policies & Directives Secure Operations Secure Network Secure Products Laws & Regulation Standards: ISO 27001… 3GPP, ITU-T, IETF… 3GPP SECAM, ISO 15408…
  • 8. 2015-05-25 | Page 8 System scale Users Thousands Millions Billions Enterprise Telecom Networks Multiple Networks Moderate Large Very large Our Focus: Large scalesecurity
  • 9. 2015-05-25 | Page 9 Point security • Firewalls • Malware detection • Intrusion detection • Content scrubbing Network & Operational Security • Software and data integrity verification • Tamper protection • Identity management • Fraud prevention mechanisms • ISO 27 000 certified operations • Secure storage IntegratedSecurity CreatingLarge-scale system Security • Integrity • Robustness • Scalability • Efficiency • Confidentiality • Privacy • Coordinated defense • Fast response Integrated security Threat Threat Threat
  • 10. 2015-05-25 | Page 10 People & Processes HW & SW Data TransactionsConfigurationsIdentities Devices …and much more What needs to betrusted
  • 11. 2015-05-25 | Page 11 NEEDSTHE ERICSSONTRUST STACK TRUSTED BUSINESS TRUSTED OPERATIONS TRUSTED NETWORKS TRUSTED PRODUCTS ENABLES
  • 12. 2015-05-25 | Page 12 NISTCS FW mappedto RESPONSIBILITIES Identify Protect Detect Respond Recover NIST CS FW
  • 13. 2015-05-25 | Page 13 integrated process for Product andservice development PRODUCT SECURITY FUNCTIONS PRODUCT SECURITY ASSURANCE PRODUCT SECURITY DOCUMENTATION PRODUCT NEAR SECURITY SERVICES Developing the right security functions for a product or service Assuring that the security functionality works as expected Documenting security functionality to enable secure operations Provide services to ensure that security functionality is properly used Securityreliability model:
  • 14. 2015-05-25 | Page 14 FROM: PROTECT ONLY 100% protection is possible Re-Inventionof CloudSecurity TheShift to Cloud Requires a New Focus Hardened end points, users not devices Illusion of liability protection: third party audits, certifications Data is locked down Perimeter-centric: access control, encryption Authenticate end points: trusted identity of users AND devices Data is portable, in compliance with local regulations Data - centric: every data asset is tagged, tracked, located, verified Onus for proof: independently verifiable, mathematical forensics
  • 15. 2015-05-25 | Page 15 Ericsson WalletPlatformoverviewof securitycontrols Approval of sensitive operations Traceability & accountability Security configuration validation Eavesdropping and modification protection Two factor authentication Configurable access control System and API hardening Financial crime controls