SDN An opportunity for security by design?

Size: px
Start display at page:

Download "SDN An opportunity for security by design?"

Transcription

1 SDN An opportunity for security by design? IEEE NetSoft Sec-VirtNet 2016 Sandra Scott-Hayward 10 June

2 Presenter Bio Dr Sandra Scott-Hayward, CEng CISSP CEH OCSA Senior Research Engineer Network Security, Queen s University Belfast ONF Research Associate Vice-Chair, ONF Security WG Project Leader, OSSDN Project Delta Research Interests: Network Security Security Protocols and Architectures Software-Defined Networking Optimization Techniques Wireless Communication Introduction Network Security - SDN Security Secure Network Vision

3 Centre for Secure Information Technologies Est.2009, Based in The ECIT Institute Initial funding over 30M (CSIT 2-38M) GLOBAL INNOVATION HUB FOR CYBER SECURITY 90 People Researchers Engineers Business Development Largest UK University lab for cyber security technology research GCHQ Academic Centre of Excellence Industry Informed Open Innovation Model Strong international links ETRI, CyLab, GTRI, SRI International Cyber Security Technology Summit Introduction Network Security - SDN Security Secure Network Vision

4 Outline of the Talk Network Security Today Network Security Tomorrow (or soon!) SDN Security Challenges and Opportunities SDN Secure Network Vision Introduction Network Security - SDN Security Secure Network Vision

5 Network Security - Today Cloud IoT 5G Industry 4.0 ICS Smart Grid Introduction Network Security - SDN Security Secure Network Vision

6 Introduction Network Security - SDN Security Secure Network Vision Network Security - Today

7 Introduction Network Security - SDN Security Secure Network Vision Network Security Tomorrow

8 Introduction Network Security - SDN Security Secure Network Vision No Interruptions

9 SDN Security

10 SDN Characteristics SDN characteristics can counter the lack of visibility and manageability; Virtualized services supported by SDN control; S. Scott-Hayward, S. Natarajan, S. Sezer, A Survey of Security in Software Defined Networks, IEEE Communications Surveys & Tutorials, Introduction Network Security - SDN Security Secure Network Vision

11 Introduction Network Security - SDN Security Secure Network Vision SDN Potential Attacks and Vulnerabilities

12 Introduction Network Security - SDN Security Secure Network Vision SDN Security Opportunities

13 Introduction Network Security - SDN Security Secure Network Vision SDN Security Solutions

14 SDN Security Evolution Dec. 2009: OpenFlow published (Stanford) Aug. 2012: FortNox (SRI) Jun. 2013: ITU-T SDN Security Questions Aug. 2014: 1 st ODL CVE (Raised by Gregory Pickett) Mar. 2015: Formalization of ODL Security Response Team Sept. 2015: Security-Mode ONOS Released (Drake) Apr. 2012: HSA (Stanford) Apr. 2013: OF Security Analysis (R. Kloti) ONF SecDG launched Nov. 2014: ONF SecDG becomes Working Group Aug. 2015: ODL Controller Shield Project launched May 2014: ODL Security Analysis Introduction Network Security - SDN Security Secure Network Vision

15 Secure Network Vision Exploiting the characteristics of SDN for the secure network vision Visibility and programmability can support - Flexible network configuration - Dynamic network reconfiguration Near-term: - Automate existing security model - Accelerate techniques in monitoring, analysis, detection and protection - Moving target defense dispersion, fractionalization and longer-term? Introduction Network Security - SDN Security Secure Network Vision

16 Call for Chapters Guide to Security in SDN and NFV Challenges, Opportunities, and Applications Chapter proposal due: 15 August 2016 Full chapters due: 20 November 2016 Submission Details: Contact: Introduction Network Security - SDN Security Secure Network Vision

17 Thank you! Questions?

ECIT Institute (Est.2003)

ECIT Institute (Est.2003) ECIT Institute (Est.2003) Research Excellence & Innovation 180 people 4 Queen s University Belfast Research Groups - Digital Communications - High Frequency Electronics - Speech, Imaging and Vision Systems

More information

SDN AND NFV SECURITY DR. SANDRA SCOTT-HAYWARD, QUEEN S UNIVERSITY BELFAST COINS SUMMER SCHOOL, 23 JULY 2018

SDN AND NFV SECURITY DR. SANDRA SCOTT-HAYWARD, QUEEN S UNIVERSITY BELFAST COINS SUMMER SCHOOL, 23 JULY 2018 SDN AND NFV SECURITY DR. SANDRA SCOTT-HAYWARD, QUEEN S UNIVERSITY BELFAST COINS SUMMER SCHOOL, 23 JULY 2018 Queen s University Belfast Lanyon Building Est. 1845 Centre for Secure Information Technologies

More information

Huawei European Research University Partnerships. Michael Hill-King European Research Institute, Huawei

Huawei European Research University Partnerships. Michael Hill-King European Research Institute, Huawei Huawei European Research University Partnerships Michael Hill-King European Research Institute, Huawei Next 20 30 Years: The World Will Become Intelligent All things Sensing All things Connected All things

More information

Second Workshop of India-EU Collaboration on Standardization for Select Technologies

Second Workshop of India-EU Collaboration on Standardization for Select Technologies Second Workshop of India-EU Collaboration on Standardization for Select Technologies TSDSI s Vision & Roadmap for 5G Nov 05, 2015 Vinosh James Lead, Technical Standards for Qualcomm, and Chair, 5G WG of

More information

CALENDAR FOR THE YEAR 2018

CALENDAR FOR THE YEAR 2018 27 Dubai 08-12 Jan 1 Advance Budgeting Workshop 386 Istanbul 11-1 Mar 396 London 13-17 May 2 Advance Business Writing 296 Abu Dhabi 1-19 Jan 3 Contract Management 396 London 22-26 Jan 27 Dubai 18-22 Mar

More information

OUR VISION To be a global leader of computing research in identified areas that will bring positive impact to the lives of citizens and society.

OUR VISION To be a global leader of computing research in identified areas that will bring positive impact to the lives of citizens and society. Join the Innovation Qatar Computing Research Institute (QCRI) is a national research institute established in 2010 by Qatar Foundation for Education, Science and Community Development. As a primary constituent

More information

Instructor training course schedule v3 Confirmed courses due completion by 31 st July 2019

Instructor training course schedule v3 Confirmed courses due completion by 31 st July 2019 Confirmed courses due completion by 31 st July 2019 Courses: 2 Orientation 2 IoT Fundamentals 2 Networking Essentials 2 Cybersecurity Essentials 2 IT Essentials: PC Hardware and Software 2 CCNA Routing

More information

SMART. Investing in urban innovation

SMART. Investing in urban innovation SMART Investing in urban innovation What Smart Belfast? Belfast has ambitious plans for the future. Building on our economic revival, we want to make our city an outstanding place to live, work and invest.

More information

James Won-Ki Hong. Distributed Processing & Network Management Lab. Dept. of Computer Science and Engineering POSTECH, Korea.

James Won-Ki Hong. Distributed Processing & Network Management Lab. Dept. of Computer Science and Engineering POSTECH, Korea. James Won-Ki Hong Distributed Processing & Network Management Lab. Dept. of Computer Science and Engineering POSTECH, Korea jwkhong@postech.ac.kr 2017. 7. 6 DPNM Lab., POSTECH NetSoft 2017 DEP Network

More information

Network. Gediz SEZGİN CAPITAL MARKETS DAY 2018

Network. Gediz SEZGİN CAPITAL MARKETS DAY 2018 Gediz SEZGİN 95 1 THE BEST NETWORK 2 NETWORK CAPABILITIES 3 READINESS FOR FUTURE 96 THE WIDEST SPECTRUM Turkey Europe TURKCELL Turkcell EE Telekom Slovenije A1 Slovenija Telekom Austria TTG TDC T-Mobile

More information

The People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK

The People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK The People to Secure Our Future Judy Baker, Director Cyber Security Challenge UK A story Starts in the US, Comes to the UK Results in more and better people in UK jobs The US Discovery Skills shortage

More information

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS Vendor Events SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS National Events over 1200 profession IT Security attendees and over 45 SANS classes

More information

Project Progress Report

Project Progress Report ASEAN IVO Project 2017 Project Title: A Hybrid Security Framework for IoT Networks Project Members: PTIT (Vietnam): Prof. Hai (others: Dr.Minh, Dr.Dau, MSc.Thang, Dr.Duy, ) NECTEC (Thailand): Dr. Chalee

More information

The Transformation in Security How RSA is responding to the Changing Threat Landscape

The Transformation in Security How RSA is responding to the Changing Threat Landscape The Transformation in Security How RSA is responding to the Changing Threat Landscape Dr. Robert Griffin Chief Security Architect RSA, the Security Division of EMC 1 Agenda The changing threat landscape

More information

We are innovating in security

We are innovating in security We are innovating in security Security Network Network Innovation Day Day 2018 2018 We are We in are in threat and defense Complex mix of multiple vendors without effective orchestration IoT connected

More information

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure

More information

Big Data for Smart Cities Connected Vehicles in the Wireless World

Big Data for Smart Cities Connected Vehicles in the Wireless World Big Data for Smart Cities Connected Vehicles in the Wireless World Dr Nigel Jefferies WWRF Chairman Huawei Technologies 3rd March 2016 Will IoT trigger next industrial revolution? Size of the IoT opportunity

More information

5G IOT Security. Dr. Anand R. Prasad, Fellow IET and IETE Chief Advanced Technologist, Executive Specialist NEC Corporation Chairman 3GPP SA3

5G IOT Security. Dr. Anand R. Prasad, Fellow IET and IETE Chief Advanced Technologist, Executive Specialist NEC Corporation Chairman 3GPP SA3 4 th Global Wireless Summit, 28 November, 2016 5G IOT Security Dr. Anand R. Prasad, Fellow IET and IETE Chief Advanced Technologist, Executive Specialist NEC Corporation Chairman 3GPP SA3 Disclaimer: This

More information

IOT Security More than just the network..

IOT Security More than just the network.. IOT Security More than just the network.. Adrian Winckles Cyber Lead - Anglia Ruskin University & OWASP Cambridge Chapter Leader Adrian.Winckles@anglia.ac.uk Bio Adrian Winckles Adrian Winckles is Course

More information

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America 5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,

More information

Preparing your network for the next wave of innovation

Preparing your network for the next wave of innovation Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt

More information

The trouble with referees is that they know the rules, but they do not know the game.

The trouble with referees is that they know the rules, but they do not know the game. The trouble with referees is that they know the rules, but they do not know the game. Bill Shankly s typically insightful comment is fast becoming as relevant to the cyber security profession as it was

More information

A C H I E V E B O T H W I T H K E Y S I G H T. Company Profile

A C H I E V E B O T H W I T H K E Y S I G H T. Company Profile A C H I E V E B O T H W I T H K E Y S I G H T 1 W E H E L P Y O U C R E AT E. I N N O VAT E. A N D D E L I V E R W H AT S N E X T. The innovation leader in electronic design and test for over 75 years

More information

Detecting breach. There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017

Detecting breach. There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017 Feeling lucky? Detecting breach There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017 Industry average is 100 days to detect a breach,

More information

Research Institute in Secure Hardware & Embedded Systems (RISE) Máire O Neill

Research Institute in Secure Hardware & Embedded Systems (RISE) Máire O Neill Research Institute in Secure Hardware & Embedded Systems (RISE) Máire O Neill UK Research Institutes in Cyber Security RISE is 1 of 4 multi-institutional Research Institutes in Cyber Security funded by

More information

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018 Looking Back 2017 2018 Looking Ahead IT industry leaders, experts and analysts share their insights and opinions as they look back at key developments in 2017, as well as technology and market trends they

More information

2015 China Future Network Development and Innovation Forum Held

2015 China Future Network Development and Innovation Forum Held 2015 China Future Network Development and Innovation Forum Held On December 10 th and 11 th 2015, 2015 China Future Network Development and Innovation Forum, co-hosted by the Chinese Academy of Engineering

More information

The NIH Big Data to Knowledge Initiative: Raising the Prominence of Data

The NIH Big Data to Knowledge Initiative: Raising the Prominence of Data The NIH Big Data to Knowledge Initiative: Raising the Prominence of Data Michael F. Huerta, Ph.D. Associate Director, National Library of Medicine Director, Office of Health Information Programs Development

More information

in Action Delivering the digital enterprise Human Centric Innovation Ralf Salzmann Manager OEM

in Action Delivering the digital enterprise Human Centric Innovation Ralf Salzmann Manager OEM Delivering the digital enterprise The five stages of infrastructure evolution Ralf Salzmann Human Centric Innovation in Action Manager OEM Sales @Brocade Agenda BRCD Company details What does digital mean

More information

Building world-class security response and secure development processes

Building world-class security response and secure development processes Building world-class security response and secure development processes David Jorm, Senior Manager of Product Security, IIX Outline Introduction SDN attack surface Recent OpenDaylight vulnerabilities Defensive

More information

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network

More information

SDN RG IAB Review. Daniel King (SDN RG Chair) IETF 94 Yokohama

SDN RG IAB Review. Daniel King (SDN RG Chair) IETF 94 Yokohama SDN RG IAB Review Daniel King (SDN RG Chair) d.king@lancaster.ac.uk IETF 94 Yokohama Nanos gigantum humeris insidentes Standing on the shoulders of giants Previous (founding) SDN RG Chairs: Nick Feamster

More information

WP1. Semantic System Description. by Olaf Owe (UiO)

WP1. Semantic System Description. by Olaf Owe (UiO) WP1 Semantic System Description by Olaf Owe (UiO) WP1 team Olaf Owe (PMA group leader, leader Conserns) Josef Noll (at UNIK and Movation as well) Christian Johansen (50% IoTSec), senior researcher (UNIK

More information

Build Your Zero Trust Security Strategy With Microsegmentation

Build Your Zero Trust Security Strategy With Microsegmentation Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver

More information

Management in SDN/NFV

Management in SDN/NFV Management in SDN/NFV Network Management Spring 2018 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Outline Introduction What is the SDN? NM in SDN What is the NFV? NM in NFV Summary

More information

SESSION 206 Wednesday, November 2, 11:30am - 12:30pm Track: People, Culture and Value

SESSION 206 Wednesday, November 2, 11:30am - 12:30pm Track: People, Culture and Value SESSION 206 Wednesday, November 2, 11:30am - 12:30pm Track: People, Culture and Value The Value of ITSM: An Executive Perspective Anthony Iorio Former, Senior Vice President, Information Technology Group

More information

THE THREE WAYS OF SECURITY. Jeff Williams Co-founder and CTO Contrast Security

THE THREE WAYS OF SECURITY. Jeff Williams Co-founder and CTO Contrast Security THE THREE WAYS OF SECURITY Jeff Williams Co-founder and CTO Contrast Security 1. TODAY S AVERAGE APPLICATION IS A SECURITY DISASTER 2. SOFTWARE IS LEAVING SECURITY IN THE DUST SOFTWARE Typical enterprise

More information

Security improvement in IOT based on Software

Security improvement in IOT based on Software International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 122 Security improvement in IOT based on Software Raghavendra Reddy, Manoj Kumar, Dr K K Sharma Abstract With the

More information

Digital Transformation through Open Software Defined Infrastructure Justin Dustzadeh, Vice President and Head of Global Infrastructure Network

Digital Transformation through Open Software Defined Infrastructure Justin Dustzadeh, Vice President and Head of Global Infrastructure Network Digital Transformation through Open Software Defined Infrastructure Justin Dustzadeh, Vice President and Head of Global Infrastructure Network Services, Visa Digital Transformation Through! Open Software-Defined

More information

Training 120 seconds at a time. Sandra Lammas. Manager ICT Training University of Southern Queensland

Training 120 seconds at a time. Sandra Lammas. Manager ICT Training University of Southern Queensland Training 120 seconds at a time Sandra Lammas Manager ICT Training University of Southern Queensland The Problem Important Info to convey Can't force staff to read our stuff 1200-1500 staff Limited comms

More information

5 Steps to Government IT Modernization

5 Steps to Government IT Modernization 5 Steps to Government IT Modernization 1 WHY MODERNIZE? IT modernization is intimidating, but it s necessary. What are the advantages of modernization? Enhance citizen experience and service delivery Lower

More information

Internet of Things and M2M

Internet of Things and M2M Internet of Things and M2M Pedram Radmand, Ph.D. Wireless Sensor Network Research Newracom Inc Wireless Technology and IoT newracom.com Direct 949-390-7111 pedrad@gmail.com pedram.radmand@newracom.com

More information

Overview of ITU capacity building activities

Overview of ITU capacity building activities Europe Centers of Excellence Steering Committee Meeting Copenhagen, Denmark 12 December 2017 Overview of ITU capacity building activities Mike Nxele Senior Human Capacity Building Officer, Human Capacity

More information

Bristol Is Open. Dimitra Simeonidou Prof. of High Performance Networks CTO, Bristol Is Open 17/03/15

Bristol Is Open. Dimitra Simeonidou Prof. of High Performance Networks CTO, Bristol Is Open 17/03/15 Bristol Is Open Dimitra Simeonidou Prof. of High Performance Networks CTO, Bristol Is Open 17/03/15 The first Joint Venture between the Council & the University Why are we doing this? How are we doing

More information

Thirtieth Annual. Electrical & Computer Engineering Day

Thirtieth Annual. Electrical & Computer Engineering Day \ Thirtieth Annual Electrical & Computer Engineering Day Thursday, November 10, 2016 Villanova Room, Connelly Center Activities are scheduled from 3:00 PM to 7:00 PM ECE DAY 16 The 30th annual ECE Day

More information

ETSI and GRID Standardisation. Mike Fisher, BT ETSI TC GRID Chair. 23 October 2006 ITU-T/OGF Workshop on Next Generation Networks and Grids

ETSI and GRID Standardisation. Mike Fisher, BT ETSI TC GRID Chair. 23 October 2006 ITU-T/OGF Workshop on Next Generation Networks and Grids ETSI and GRID Standardisation Mike Fisher, BT ETSI TC GRID Chair 1 ETSI and GRID GRID#2: 2 nd ETSI TC GRID Meeting, 1 Dec 2006 (Sophia- Antipolis) 3 rd ETSI GRID Plugtests, 27 Nov 1 Dec 2006 (Sophia- Antipolis)

More information

EXPLORING INTERNATIONAL COLLABORATION ON CYBER EDUCATION, RESEARCH & TRAINING

EXPLORING INTERNATIONAL COLLABORATION ON CYBER EDUCATION, RESEARCH & TRAINING ROYAL HOLLOWAY UMBC KEIO EXPLORING INTERNATIONAL COLLABORATION ON CYBER EDUCATION, RESEARCH & TRAINING PROF. ANUPAM JOSHI PROF. KEITH MAYES KAZUO NOGUCHI UMBC NSA/DHS CENTER OF EXCELLENCE ROYAL HOLLOWAY

More information

Optical network virtualization. Optical network virtualization. Transport SDN for cloud-centric networking

Optical network virtualization. Optical network virtualization. Transport SDN for cloud-centric networking Optical network virtualization Optical network virtualization Transport SDN for cloud-centric networking 1 Transport SDN for the cloud Manually initiated and managed provisioning processes do not provide

More information

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS SESSION ID: AST3-R02 THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS Jon Oltsik Senior Principal Analyst Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International Board Director ISSA

More information

EUROCONTROL SWIM Specifications. NM B2B Tech Forum June 2018

EUROCONTROL SWIM Specifications. NM B2B Tech Forum June 2018 EUROCONTROL SWIM Specifications NM B2B Tech Forum June 2018 Where do Specifications (Standardisation) come into play 2 Context Supporting: Coordinated by: Members and Observers: EUROCAE EUROCONTROL European

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information

Instructor: Eric Rettke Phone: (every few days)

Instructor: Eric Rettke Phone: (every few days) Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the

More information

SDN RG State of the Nation. Daniel King Kohei Shiomoto IETF 95 Buenos Aires

SDN RG State of the Nation. Daniel King Kohei Shiomoto IETF 95 Buenos Aires SDN RG State of the Nation Daniel King Kohei Shiomoto IETF 95 Buenos Aires Origins SDN Bar BoF IETF 81 (July 2011) SDNP List created Software Driven Networks BoF (400 participants) IETF 82 (Nov, 2011)

More information

Commonwealth Cyber Initiative Blueprint Development

Commonwealth Cyber Initiative Blueprint Development Commonwealth Cyber Initiative Blueprint Development Theresa Mayer and Laurel Miner Virginia Tech Presented to VRIC on August 14, 2018 https://www.networkworld.com/article/3235124/internet-of-things/internet-of-things-definitions-a-handy-guide-to-essential-iot-terms.html

More information

Accelerating SDN and NFV Deployments. Malathi Malla Spirent Communications

Accelerating SDN and NFV Deployments. Malathi Malla Spirent Communications Accelerating SDN and NFV Deployments Malathi Malla Spirent Communications 2 Traditional Networks Vertically integrated Closed, proprietary Slow innovation 3 Infinite Complexity of Testing Across virtual

More information

Powering Your Website Content with Magento PageBuilder

Powering Your Website Content with Magento PageBuilder Powering Your Website Content with Magento PageBuilder Olena Tkacheva Product Manager Magento Adobe Company tkacheva@adobe.com John Hughes Head of Magento Fisheye Media Ltd. johnh@fisheyehq.com Experience-driven

More information

1/8. Note by the Chair. Executive Summary. 24 th Senior Officials Meeting of the Environment Management Group. EMGSOM.24(a)_4_Work Plan_2019

1/8. Note by the Chair. Executive Summary. 24 th Senior Officials Meeting of the Environment Management Group. EMGSOM.24(a)_4_Work Plan_2019 24 th Senior Officials Meeting of the Environment Management Group Technical Segment, 17 th September 2018 (15:00-17:00 Geneva time) Via audio-video conference EMGSOM.24(a)_4_Work Plan_2019 Distribution:

More information

IPv6 From Developing Country Perspective

IPv6 From Developing Country Perspective International Telecommunication Union IPv6 From Developing Country Perspective Baher Esmat Chair Egypt IPv6 Task Force Outline o Egypt Information Society o Growth in Internet and mobile services o CIT

More information

Introduction of the Industrial Internet Consortium. May 2016

Introduction of the Industrial Internet Consortium. May 2016 Introduction of the Industrial Internet Consortium May 2016 An Open Membership Consortium now 250 companies strong May 26, 2016 2 IIC Founders, Contributing Members, & Large Industry Members IIC Founding

More information

IEEE NetSoft 2016 Keynote. June 7, 2016

IEEE NetSoft 2016 Keynote. June 7, 2016 IEEE NetSoft 2016 Keynote June 7, 2016 0 Contents Introduction - Network Evolution & Operator Challenges Re-architecting the RAN SDRAN: Software-defined RAN - Overview & Enabling Features SDRAN Opportunities

More information

CIMA Asia. Interactive Timetable Live Online

CIMA Asia. Interactive Timetable Live Online CIMA Asia Interactive Timetable 2017 2018 Live Online Version 1 Information last updated 09 October 2017 Please note: Information and dates in this timetable are subject to change. CIMA Cert BA Course

More information

The ESA Cyber Range in Redu: Why it is important for ESA, EDA and all of us

The ESA Cyber Range in Redu: Why it is important for ESA, EDA and all of us The ESA Cyber Range in Redu: Why it is important for ESA, EDA and all of us Stefano Zatti Head of ESA Security Office 14/05/2018 ESA UNCLASSIFIED - Releasable to the Public What is a Training Range? ESA

More information

The Africa Utilities Telecom Council Johannesburg CC, South Africa 1 st December, 2015

The Africa Utilities Telecom Council Johannesburg CC, South Africa 1 st December, 2015 The Africa Utilities Telecom Council Johannesburg CC, South Africa 1 st December, 2015 Utilities Telecom Council Global Focus on Utility Information and Communications Technology (ICT) Formed more than

More information

CENTRE OF EXCELLENCE (COE) in WIPRO TELECOM R.M.K. COLLEGE OF ENGINEERING AND TECHNOLOGY

CENTRE OF EXCELLENCE (COE) in WIPRO TELECOM R.M.K. COLLEGE OF ENGINEERING AND TECHNOLOGY CENTRE OF EXCELLENCE (COE) in WIPRO TELECOM R.M.K. COLLEGE OF ENGINEERING AND TECHNOLOGY CoE Objectives -Importance and Its Opportunities Training and certifications, skill assessments, team building and

More information

World Summit on the Information Society (WSIS) and the Digital Divide

World Summit on the Information Society (WSIS) and the Digital Divide World Summit on the Information Society (WSIS) and the Digital Divide Dr Tim Kelly, Head, Strategy and Policy Unit International Telecommunication Union KADO/APWINC Digital Opportunity Conference, Seoul,

More information

Insert Title Here. Middleware Architecture for Cloud Based Services 11/18/2014

Insert Title Here.  Middleware Architecture for Cloud Based Services 11/18/2014 Insert Title Here Middleware Architecture for Cloud Based Services 11/18/2014 1 Team Prof. Mohammed Samaka Qatar University Dr. Subharthi Paul Washington Univ in STL Prof. Raj Jain Washington Univ in STL

More information

Integrated Consortium of Laboratory Networks (ICLN)

Integrated Consortium of Laboratory Networks (ICLN) Integrated Consortium of Laboratory Networks (ICLN) Dr. S. Randolph Long Deputy Director Chem Bio Division, DHS S&T Directorate FERN National Training Conference June 2009 1 Outline ICLN Organization Steps

More information

SQS Academy Stepping ahead

SQS Academy Stepping ahead SQS Academy Stepping ahead sqs.com Public Schedule Ireland 2018 All public courses also run as private events May 2018 8 May 3 days BCS Certificate in Business Analysis Foundation 1,550.00* 9 May 3 days

More information

Communications Security, Reliability & Interoperability Council

Communications Security, Reliability & Interoperability Council Communications Security, Reliability & Interoperability Council William Smith, AT&T Co-Chair Chris Fischer, APCO Co-Chair Council Members Steering Committee Julie Thomas, AT&T Steering Committee Co-Chair

More information

Effective Partnerships: Security and Privacy in Smart Cities

Effective Partnerships: Security and Privacy in Smart Cities SESSION ID: SEC-R03 Effective Partnerships: Security and Privacy in Smart Cities Mr. Robert (Bob) Butler Chief Security Advisor IO Data Centers LLC Dr. Irv Lachow Principal Cyber Researcher The MITRE Corporation

More information

Information Technology (CCHIT): Report on Activities and Progress

Information Technology (CCHIT): Report on Activities and Progress Certification Commission for Healthcare Information Technology Certification Commission for Healthcare Information Technology (CCHIT): Report on Activities and Progress Mark Leavitt, MD, PhD Chair, CCHIT

More information

What makes a hot topic hot? An NSF Perspective

What makes a hot topic hot? An NSF Perspective What makes a hot topic hot? An NSF Perspective August 2015 Jeremy Epstein Program Officer National Science Foundation SRI International NSF Mission Mission: promote the progress of science; to advance

More information

Coaching emerit Certified Event Find out what level you are ready for and what you need to JHB

Coaching emerit Certified Event Find out what level you are ready for and what you need to JHB For more information on these courses, please visit www.exsaacademy.co.za/courses or contact 011 467 6771 or e-mail: info@exsaacademy.co.za DATE NAME OF COURSE COURSE OUTLINE WHERE DURATION MARCH 07-Mar

More information

Building Open Source IoT Ecosystems. November 2017

Building Open Source IoT Ecosystems. November 2017 Building Open Source IoT Ecosystems November 2017 Jim White, Dell Distinguished Engineer & Senior Software Architect james_white2@dell.com Dell Project Fuse Architect EdgeX Foundry Technical Steering Committee

More information

High Speed Powerline Communication for the Smart Grid

High Speed Powerline Communication for the Smart Grid High Speed Powerline Communication for the Smart Grid UPA Vision for the Future Chris Graham-Fielding Freedom Digital Networks Freedom Digital Networks Privately funded UK company Formed in 2004 Deploy

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

Towards Wireless Sensor Network Softwarization

Towards Wireless Sensor Network Softwarization Paper presentation at The 2nd IEEE Conference on Network Softwarization (NetSoft 2016), Workshop on SDN and IoT (SDN-IoT 2016) 06-10 June 2016, Seoul, Korea. Towards Wireless Sensor Network Softwarization

More information

App Economy Market analysis for Economic Development

App Economy Market analysis for Economic Development App Economy Market analysis for Economic Development Mustapha Hamza, ISET Com Director mustapha.hamza@isetcom.tn ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis

More information

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for

More information

Contents. Huawei 5G Research Progress

Contents. Huawei 5G Research Progress August, 2015 Contents 5G Vision Huawei 5G Research Progress Huawei 5G Collaboration Mobile, One Decade for a Leap 1980s 1990s 2000s 2010s 1G 2G 3G 4G 5G Analog Voice Digital Voice Mobile Broad Band Better

More information

Outcomes of the workshop 5G Security: Phase 1 landscape and foreseen evolutions took place at Oulu, on 12-of June.

Outcomes of the workshop 5G Security: Phase 1 landscape and foreseen evolutions took place at Oulu, on 12-of June. Outcomes of the workshop 5G Security: Phase 1 landscape and foreseen evolutions took place at Oulu, on 12-of June. EuCNC - the best venue to present the work of the Security WG after one year of activities.

More information

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018 Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14

More information

Velammal Engineering College Department of Computer Science and Engineering

Velammal Engineering College Department of Computer Science and Engineering Velammal Engineering College Department of Computer Science and Engineering Name & Photo : Prof.B.Rajalakshmi Designation: Qualification : Area of Specialization : Teaching Experience : Vice Principal

More information

ONOS Mini-Summit, Beijing, China

ONOS Mini-Summit, Beijing, China 1 ONOS Mini-Summit, Beijing, China Aseem Parikh, VP Solutions and Partnerships, ONF August 2017 About ONF 3 New ONF Being Formed to Lead in this New Open Source Era ONF Champion For SDN Standards SDN/NFV

More information

Mcafee Network Intrusion Detection System. Project Report >>>CLICK HERE<<<

Mcafee Network Intrusion Detection System. Project Report >>>CLICK HERE<<< Mcafee Network Intrusion Detection System Project Report Selecting an intrusion detection and prevention system vendor can be a IDS/IPS protection, the current network configuration and the project budget,

More information

Using Flexibility as a Measure to Evaluate Softwarized Networks

Using Flexibility as a Measure to Evaluate Softwarized Networks Chair of Communication Networks Department of Electrical and Computer Engineering Technical University of Munich Using Flexibility as a Measure to Evaluate Softwarized Networks Wolfgang Kellerer Technical

More information

Media Pack 2017 OVER REACHING 14,000 SOFTWARE TESTING AND QA PROFESSIONALS

Media Pack 2017 OVER REACHING 14,000 SOFTWARE TESTING AND QA PROFESSIONALS Media Pack 2017 TEST Magazine was specifically created as a voice for the modern-day software testing and quality assurance professional. Launched in 2008 and published in print and online, the publication

More information

Date of Birth

Date of Birth ALEXANDER ANTUKH General information Date of Birth 26.08.1989 E-mail alexander@antukh.com Location Moscow, Russia Languages Russian (Native) English (Full professional proficiency) Polish (Full working

More information

NIS Directive : Call for Proposals

NIS Directive : Call for Proposals National Cyber Security Centre, in Collaboration with the Research Institute in Trustworthy Inter-connected Cyber-physical Systems (RITICS) Summary NIS Directive : Call for Proposals Closing date: Friday

More information

ACM/IEEE MODELS 2018, København, Denmark. Ta id Holmes

ACM/IEEE MODELS 2018, København, Denmark. Ta id Holmes ACM/IEEE MODELS 2018, København, Denmark Ta id Holmes New Ideas and Vision Paper @ Foundations Track Motivation Vision Idea Application Discussion Customization of Architecture Models Automated Model Refactoring

More information

RTM SDN Webinar & Panel Discussion. Using SDN to Simplify and Automate UC and Real-Time Media Cloud Deployments

RTM SDN Webinar & Panel Discussion. Using SDN to Simplify and Automate UC and Real-Time Media Cloud Deployments SDN Webinar & Panel Discussion Using SDN to Simplify and Automate UC and Real-Time Media Cloud Deployments A welcome from our moderator Jim Burton Co-founder of CT Link LLC, UCStrategies and UC Expert

More information

Seminar Course 392N Spring2012 EE392N. April 3, Dan O Neill Dimitry Gorinevsky

Seminar Course 392N Spring2012 EE392N. April 3, Dan O Neill Dimitry Gorinevsky Seminar Course 392N Spring2012 EE392N April 3, 2012 Dan O Neill Dimitry Gorinevsky Outline Class logistics Introductory lecture on Intelligent Energy Systems Instructors Daniel O Neill, Consulting Professor

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

INFORMATION TECHNOLOGY ONE-YEAR PLAN

INFORMATION TECHNOLOGY ONE-YEAR PLAN INFORMATION TECHNOLOGY ONE-YEAR PLAN 2016-2017 Information and Communications Technology One-year Plan 2016-2017 The purpose of this document is to identify the activities being undertaken this year by

More information

OPERA. Low Power Heterogeneous Architecture for the Next Generation of Smart Infrastructure and Platforms in Industrial and Societal Applications

OPERA. Low Power Heterogeneous Architecture for the Next Generation of Smart Infrastructure and Platforms in Industrial and Societal Applications OPERA Low Power Heterogeneous Architecture for the Next Generation of Smart Infrastructure and Platforms in Industrial and Societal Applications Co-funded by the Horizon 2020 Framework Programme of the

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems

PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems Mati Epstein Global Sales Lead, Critical Infrastructure and ICS [Internal Use] for Check Point employees 1 Industrial Control Systems (ICS)/SCADA

More information

University of Dublin Trinity College

University of Dublin Trinity College University of Dublin Trinity College Library & Information Policy Committee Minutes of the meeting held on Monday 8 th November 2011 at 15.15 in the Henry Jones Room, Old Library. Present: Apologies: Professor

More information

Hearing Voices: The Cybersecurity Pro s View of the Profession

Hearing Voices: The Cybersecurity Pro s View of the Profession SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International

More information

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience

More information