WORKSHOP ON NETWORK SECURITY PROGRAM
Join
this session for an overview of modern information security challenges for
Service providers and Service integrators. What are their priorities? How
this aspect of their network has evolved over the last few years and what are
they expecting in the future? What are today's best practices in security for
a service provider? This workshop will cover an up to date overview of today's
modern security landscape as well as a round table session to go through
several questions on the topic.
Finding the needle in the haystack –How SDN &
Network virtualization enables better visibility and containment
Bruno
Germain (VMware, Canada)
Abstract
:
There
has been a lot of attention in the last years on post-intrusion tools and
analytics with a proliferation of new offerings from both startups and
established vendors. The stated objective being to provide better correlation
between events in the Security Information and Event Management (SIEM)
"haystack" in the hope of reducing the time required to pinpoint a breach, thus
limiting the spread of the attack and avoid data exfiltration. The assumption
underlying this approach is that the tools have access to all the data, from
network flows to security logs, in order to apply some logic to uncover
abnormal behavior. While these tools are worth investigating, could we not
leverage some more fundamental changes to the underlying security architecture,
enabled by network virtualization, that could yield even higher returns from
these tools if deployed? In short, instead of sending the proverbial haystack
more hay, could we not reduce the size of the data to look at with better
contextual information while providing better containment for the breach, thus
providing more time and better probabilities of uncovering the attack? This
session will examine SDN, micro–segmentation and automation of policies in the
context of a data center and discuss their impact on fundamental security
properties such as context, visibility and containment. Lastly, we will see
how current tools can benefit from such enhanced properties to deliver a better
security solution.
Today's cybersecurity challenges require more
management than ever before.
Troy Bryant (Research and Development, TELUS, Canada)
Abstract
:
Today's
cybersecurity challenges require more management than ever before. TELUS will
review some of the more advanced programs that it includes in its security
management portfolio and some of the challenges it see on the horizon as the
carrier network evolves in the face of 5G mobile networks, carrier
virtualization and the IoT.
How to stay agile when applying security assurance to
SDN/NFV projects
Vivek
Khindria (Director Information Security, Bell Canada)
Abstract:
As
many telecommunications and large enterprises move forward to embrace the
agility and automation around use of Software Defined Networks (SDN) and
Network Function Virtualization (NFV), many are at the same times integrating
Agile and DevOps models. All of these elements combined challenge traditional
security assurance models. This discussion will talk to the key security
challenges as well as some suggestions on how to adapt information security
controls and assurance methods to fit better in the new world.
SS7 and Diameter Security
Andrew
Ho (Senior Director, Information & Cyber Security Unit, Rogers, Canada)
Abstract
:
Once
considered trusted and an internal network amongst telco's, SS7 and Diameter
signalling networks are now confronted with unprecedented volume and types of
malicious activities recently. It threatens not only telco revenues, but
also the privacy of the end customers. I'll attempt to provide a summary
update on the joint effort by standard bodies, equipment vendors and carriers
in combating this threat.