Cybersecurity


TRACK 3

Cybersecurity: Threats to the Network of the Future

Stemmons B - 2nd Floor - Renaissance Hotel

There are constant large threats to the security and safety of businesses, individuals, government entities, institutions and countries, brought about by both obvious and elusive vulnerabilities in IT systems and networks. These threats affect all aspects of technology used in Internet of Things (IoT) devices, smart homes, intelligent vehicles, finance and banking, critical infrastructure, shopping, gaming and entertainment.

Learn about these cybersecurity issues at TIA 2016:

  • Barriers with end-to-end network security
  • Carrier competition in the network security space
  • International cooperation for battling cybercrime
  • Innovation frontiers in network security technologies
  • Arming customers against crippling network disruption
  • How cyberattackers leap over corporate defenses
  • Impact of cyber attacks on the SMB market
  • How malicious botnets are created
  • Ransomware attacks on the rise
  • How social networks enable cybercriminals
  • Why the Internet of Things devices are more exposed than ever
  • Nation state attacks on U.S. companies
  • Exposing network vulnerabilities

MONDAY, JUNE 6 - TRACK 3 SESSIONS

MONDAY, JUNE 6: 1:15 pm - 2:15 pm

The Cybersecurity Layer Cake

Pillsbury Winthrop Shaw Pittman LLP

Red Hat

Guardtime

USTelecom

Cisco Systems

Stroz Friedberg

5G, IoT, Virtual Networks – each of these involves multiple layers of connectivity across networks that are licensed and unlicensed, public and private, and under continuing deployment. Each component in hardware and software along the line from antenna to the edge device will need to be protected. What are customers expecting? How are network operators and their partners using the NIST Cybersecurity Framework and other risk management approaches? How are engineers and developers thinking about the cybersecurity needs of the future? What is being developed now? And what is needed now to take the necessary steps forward?

  • Brian Finch

    Partner, Public Policy Practice

    Pillsbury Winthrop Shaw Pittman LLP

  • Herb Kelsey

    Chief Architect

    Guardtime

  • Keith O'Brien

    Distinguished Systems Engineer

    Cisco Systems

  • Ian Hood

    Chief Architect - Service Provider

    Red Hat

  • Chad Pinson

    Managing Director

    Stroz Friedberg

  • Robert Mayer

    Vice President, Industry and State Affairs

    USTelecom

    (Moderator)

MONDAY, JUNE 6: 2:30 pm - 3:45 pm

Cloud, Fog, Mist – What's the Cybersecurity Forecast for IoT

prpl Foundation

HNTB Corporation

Cohesive Networks

MKA Cyber

MONDAY, JUNE 6: 4:00 pm - 5:00 pm

The Next Waves of Cyber Threats in a Connected World

Berkeley Research Group

The AES Corporation

Mission Secure

Applied Control Solutions, LLC and ISA99

TUESDAY, JUNE 7 - TRACK 3 SESSIONS

TUESDAY, JUNE 7: 1:30 pm - 2:45 pm

NIST Cybersecurity Framework - Progress and Challenges Ahead: A USTelecom Policy Forum Series Session

Presented by

U.S. Department of Commerce

AT&T Services Inc.

Verizon Communications

InsideCybersecurity.com

TUESDAY, JUNE 7: 3:00 pm - 4:15 pm

Securing the Smart Grid and Other U.S. Infrastructure

Holland & Knight

TUESDAY, JUNE 7: 4:30 pm - 5:30 pm

Customer-Centric Big Data and Cybersecurity

Solutionary

Innovation Intelligence Institute

LifeWIRE Corp.

WEDNESDAY, JUNE 8 - TRACK 3 SESSIONS

WEDNESDAY, JUNE 8: 10:10 am - 11:25 am

What Will Privacy Look Like in the Big Data World of 2026?

Presented by

ABI Research

Silent Circle

Silent Circle

CONTACT US

1320 N. Courthouse Rd., Suite 200 Arlington, VA 22201 TELEPHONE: 1 703 907 7700

EMAIL: [email protected]