Join this session for an overview of modern information security challenges for Service providers and Service integrators. What are their priorities? How this aspect of their network has evolved over the last few years and what are they expecting in the future? What are today's best practices in security for a service provider? This workshop will cover an up to date overview of today's modern security landscape as well as a round table session to go through several questions on the topic.


Finding the needle in the haystack –How SDN & Network virtualization enables better visibility and containment

Bruno Germain (VMware, Canada)

Abstract :

There has been a lot of attention in the last years on post-intrusion tools and analytics with a proliferation of new offerings from both startups and established vendors. The stated objective being to provide better correlation between events in the Security Information and Event Management (SIEM) "haystack" in the hope of reducing the time required to pinpoint a breach, thus limiting the spread of the attack and avoid data exfiltration. The assumption underlying this approach is that the tools have access to all the data, from network flows to security logs, in order to apply some logic to uncover abnormal behavior. While these tools are worth investigating, could we not leverage some more fundamental changes to the underlying security architecture, enabled by network virtualization, that could yield even higher returns from these tools if deployed? In short, instead of sending the proverbial haystack more hay, could we not reduce the size of the data to look at with better contextual information while providing better containment for the breach, thus providing more time and better probabilities of uncovering the attack? This session will examine SDN, micro–segmentation and automation of policies in the context of a data center and discuss their impact on fundamental security properties such as context, visibility and containment. Lastly, we will see how current tools can benefit from such enhanced properties to deliver a better security solution.


Today's cybersecurity challenges require more management than ever before.

Troy Bryant (Research and Development, TELUS, Canada)

Abstract :

Today's cybersecurity challenges require more management than ever before. TELUS will review some of the more advanced programs that it includes in its security management portfolio and some of the challenges it see on the horizon as the carrier network evolves in the face of 5G mobile networks, carrier virtualization and the IoT.


How to stay agile when applying security assurance to SDN/NFV projects

Vivek Khindria (Director Information Security, Bell Canada)


As many telecommunications and large enterprises move forward to embrace the agility and automation around use of Software Defined Networks (SDN) and Network Function Virtualization (NFV), many are at the same times integrating Agile and DevOps models. All of these elements combined challenge traditional security assurance models. This discussion will talk to the key security challenges as well as some suggestions on how to adapt information security controls and assurance methods to fit better in the new world.


SS7 and Diameter Security

Andrew Ho (Senior Director, Information & Cyber Security Unit, Rogers, Canada)

Abstract :

Once considered trusted and an internal network amongst telco's, SS7 and Diameter signalling networks are now confronted with unprecedented volume and types of malicious activities recently.  It threatens not only telco revenues, but also the privacy of the end customers.  I'll attempt to provide a summary update on the joint effort by standard bodies, equipment vendors and carriers in combating this threat.