SlideShare a Scribd company logo
1 of 4
Download to read offline
This Wo
                                                                                                                 rkshop
                                                                                                      requires a
                                                                                                                 laptop




      Security Threats to Mobile
    Services and Electronic Crimes
      in IP and IP-TV Platforms
                         23 - 24 February 2010, Radisson Blu Hotel, Dubai, Deira Creek

Dear Delegates,                                                                             By attending this 2 days
Security has been a crucial issue for telecom operators and service providers.            workshop you will be able to:
With the emerging of new mobile technologies and services (e.g. mobile TV)
and equipment such as cellular Smartphones, PDAs, Blackbarries, telecom
operators and service providers are forced to offer higher data rates for the         •   Learn how to protect your mobile telecom
provision of mobile services (e.g. transmission of multimedia, MMS etc.) on               infrastructures against attacks coming from
mobile phones.                                                                            fraudsters, criminals or other nation
                                                                                          intelligence.
Mobile internet market reached over USD71 billion but on the same time
there is a growing concern of new security threats. Penetration and use of            •   Familiarize with the risks in M-Commerce and
mobile internet, is expected to grow from 46% to 135% in the next few years               micro payments in systems that are using RFID
in the Middle East. It is typical for attackers and cyber criminals to capitalize         technology.
on this dramatic growth. Therefore, it is important for telecom operators and
service providers to prepare themselves for the growing security threats and          •   Learn how to protect your mobile
take countermeasures to secure their infrastructures, their subscribers -                 communications against eavesdroppers and
customers and business, since the mobile use growth will increase the                     the methods used by international spying
potential number of victims.                                                              networks and industrial espionage.
On the other hand criminals are using high technology sophisticated
methods to hide their traces and communications in order to perform their             •   Get advice on how to better protect your
illegal actions. Next Generation Networks, infrastructures and services                   mobile communications against various types
including mobile TV, IP-TV, M-Commerce, micro-payments and use of new                     of fraud in pre or post paid services.
technologies eg. RFID (RadioFrequency Identification) are improving the way
we are doing business but on the same time they are opening a lot of                  •   See how to identify and control telecom fraud
opportunities to fraudsters and various criminal groups to perform their                  in mobile networks and IP services (VoIP,
illegal actions. Companies need to get knowledge how to protect from                      mobile TV, IPTV), including interconnection
industrial espionage and countermeasures against white collar crime and                   fraud between Telecom Operators.
loss of sensitive information. Join us in the most exciting workshop that will
provide a deep knowledge of the various security threats to mobile services           •   Get experience on how to locate fraudsters -
and IP platforms and will describe in detail various ways electronic crimes               criminals when they disappear, by using
are performed in present and future (NGN) networks and infrastructures.                   advanced techniques (artificial intelligence –
                                                                                          neural network techniques, link analysis,
Mr. Michalis Mavis                                                                        telecom signatures, etc.).
(MSc) – f. Chairman of the Hellenic Fraud Forum.


Tel: 603 2162 5485 | Fax: 603 2162 7485 | Email: telecom.training@invension-i.com   www. invension-i .com                              1
Security Threats to Mobile
    Services and Electronic Crimes in IP and IP-TV Platforms
                                               (Workshop Outline)
                  Presented by Mr. Michalis Mavis (MSc) – f. Chairman of the Hellenic Fraud Forum.




                               Day 1                                                                         Day 2
    • 09:00am – 11:00am:                                                            • 09:00am – 11:00am:
     Cyber terrorism and countermeasures in mobile and IP                               Id-theft and countermeasures. Methods used by fraudsters
     platforms. How to locate criminals that are using anonymous                        and criminals to disappear and how to locate persons that
     services. Methods used by fraudsters and criminal groups to                        have disappeared. P2P communications interception and
     hide their identity and location when communicating (P2P                           steganography.
     communications, spoofing techniques, VoIP encryption).
     Manipulation of CLI (Calling Line Identification) to avoid                     • 11:00am – 11:30am: Coffee Break
     detection. Fraud in mobile TV and IP-TV platforms and Next
     Generation Networks. How PBX fraud is used by criminals to                     • 11:30am – 13:00pm:
     hide their identity and communicate without traces.                                RFID (Radio Frequency Identification) attacks, when used
                                                                                        for micropayments and biometric passports. Skimming,
    • 11:00am – 11:30am: Coffee Break                                                   cloning and eavesdropping attacks.

    • 11:30am – 13:00pm:                                                            • 13:00pm – 14:30pm: Lunch Break and Social
     Telecom Fraud and Electronic Crimes in Mobile Services (e.g.                       Networking
     SIM cloning, SIM Boxing, PRS - Roaming Fraud, prepaid                          •
     services Fraud, bypass fraud, attacks to mobile infrastructures,                   14:30pm – 15:30pm:
     GPRS fraud, Internal fraud and Dealer’s fraud). Fraudsters                         Industrial espionage and intelligence. Methods to collect
     against Mobile Operators, telecom fraud from one Mobile                            information by using legal and illegal techniques.
     Operator to other Mobile Operator, Content Provider fraud.                         International Spying networks, how efficient they are,
     Ways to manipulate-delete CDRs, attacks against the prepaid                        limitations and success stories.
     services. Mobile-Commerce Fraud.

    • 13:00pm – 14:30pm: Lunch Break and Social Networking

    • 14:30pm – 15:30pm:
     Hacking a mobile node/switch. Monitoring mobile phones
     (conversations – SMS) and countermeasures, Mobile phone
     used as a bug and how to protect yourself (eg. By using
     cryptography). Attacking WiFi networks and
     countermeasures.




                                                        WHO SHOULD ATTEND ?
•    Staff and managers of Telecom Operators                                        •    Top management of telecom company
•    Banking sector Security dpt.                                                   •    Police officers and electronic crime units of law
•    Telecom Fraud dpt.                                                                  enforcement.
•    Internal Auditor dpt.




Tel: 603 2162 5485 | Fax: 603 2162 7485 | Email: telecom.training@invension-i.com              www. invension-i .com                                2
Trainer’s Profile

                                                              Mr. Mavis was the founder and first Chairman of EFTA (Hellenic Fraud Forum), that
                                                              was established in the year 2000, by the major Telecom Operators in Greece
                                                              (COSMOTE, OTE, Vodafone and TIM) with the aim to fight telecommunications
                                                              fraud and electronic crime amongst its members. he studied Physics and got two
                                                              Master’s degrees in Telecommunications and Computers & Automation from the
                                                              University of Athens. He worked for OTE (the Hellenic Telecom Organization) since
                                                              1977 from where he voluntarily retired in 2006, to work as telecom and IT security
                                                              consultant. Mr. Mavis worked :
                                                              - as crypto engineer at NATO in Brussels Belgium (between 1989-1993) and
                                                              - as Project Supervisor at EURESCOM (European Institute for Research
                                                                  and Strategic Studies in Telecommunications) in Heidelberg – Germany
                                                                  (between 1995-1999).
                                                              Before his retirement from OTE he was the Director of the Security Audit and
 M r. M i cha li s M avis                                     Telecom Fraud Control Division of OTE.


                                                              He became chairman of the ETNO (European Telecom Network Operators
                                                              Association) WG on Information Security (1994-1995) and was the Greek rep in the
                                                              SOGIS (Senior Officials Group on Information Security) of the European
                                                              Commission (1994-1995). He was also rep of OTE and Greece in the ETSI (European
                                                              Technical Standards Institute) Technical and General Assembly (France).


                                                              He is the author of more than 15 papers presented during International
                                                              Conferences in Australia, USA, and Europe in the areas of Telecommunications,
                                                              Security and Electronic Crime. He is a permanent expert to the Head District
                                                              Attorney of Athens, on electronic crime issues.




                                CLIENT LIST

ARMENTEL                                             ARMENIA                             MAKNAN COMMUNICATIONS                       GREECE
BRONET                                               GREECE                              MARFIN BANK                                 GREECE
BT                                                   UK                                  MATAV - HUNGARIAN TELECOM CO. LTD           HUNGARY
BTC                                                  BULGARIA                            MD5                                         GREECE
BUSINESS INFORMATION SUPPORT                         GREECE                              NATO CIS AGENCY                             BELGIUM
CENSUS                                               GREECE                              PORTUGAL TELECOM                            PORTUGAL
CNET - FRANCE TELECOM                                FRANCE                              PRESIDIUM SERVICES LTD                      UK
COSMOTE                                              GREECE                              RIGHTTRACK LTD CYPRO                        US
CSELT, TELECOM ITALIA GROUP                          ITALY                               ROMTELECOM                                  ROMANIA
CYTA                                                 CYPROUS                             SLOVAK TELECOM                              SLOVAKIA
DEUTSCHE TELECOM AG                                  GERMANY                             SWISSCOM                                    SWITCHERLAND
DISTRICT ATTORNEY ATHENS                             GREECE                              TELCORDIA                                   US
ELECTRONIC CRIME UNIT                                GREECE                              TELECOM FINLAND - FINNET GROUP              FINLAND
EURESCOM                                             GERMANY                             TELEFO'NICA I+D                             SPAIN
EUROJUST                                             NETHERLANDS                         TELENOR                                     NORWAY
FORTH / ENISA                                        CRETA GR                            TELIA                                       SWEDEN
GREEK MINISTRY OF DEVELOPMENT                        GREECE                              TRUST-IT                                    GREECE
HELLENIC FINANCIAL POLICE                            GREECE                              UNIVERSITY OF LUND                          SWEDEN
HELLENIC MINISTRY OF PUBLIC ORDER, KEMEA             GREECE                              VODAPHONE HELLAS                            GREECE
HEWLETT PACKARD ITALIANA SRL                         ITALY                               VTRIP                                       GREECE
IIR TELECOMS & TECHNOLOGY                            UK                                  WIND (TIM-HELLAS)                           GREECE
LITHUANIAN POLICE                                    LITHUANIA




Tel: 603 2162 5485 | Fax: 603 2162 7485 | Email: register@invension-i.com                    www. invension-i .com                                 3
Security Threats to Mobile                                                                            3 EASY WAYS TO REGISTER

Services and Electronic Crimes                                                               Call: +603 2162 5485
                                                                                             Fax the registration form to: +603 2162 7485
in IP and IP-TV Platforms                                                                    Email this form to: telecom.training@invension-i.com
23 - 24 February 2010, Radisson Blu Hotel, Dubai, Deira Creek
                                                                                                            PRICES AND OFFERS
                     REGISTRATION FORM
(Use copies of this form for additional participants)                                           Security Threats to Mobile
                                                                                 Services and Electronic Crimes In IP and IP-TV Platforms
                                                                                                                                                      Per Delegate
1st Delegate
Name Mr/Mrs/Ms                                                                               Regular Price                                            USD 2,300

Position                                                                                     Group Fee of 2 Delegates & Above                         USD 1,900

Telephone                                  Mobile
                                                                                                          METHOD OF PAYMENT
Email
                                                                                 Cheque/Draft                    Payable to
2nd Delegate                                                                                                     INVENSION INTERNATIONAL SDN BHD
Name Mr/Mrs/Ms
                                                                                 Bank Transfer                   A/C No. 205-418510-725
Position                                                                                                         HSBC Bank, Main Branch,
                                                                                                                 Kuala Lumpur, Malaysia
Telephone                                  Mobile                                                                SWIFT: HBMBMYKL

Email
                                                                                 For Invoice Purpose
                                                                                 Contact Person Name:
3rd Delegate
Name Mr/Mrs/Ms                                                                   Position:

Position                                                                         Tel:                                       Fax:

Telephone                                  Mobile
                                                                                 Email:

Email
                                                                                Terms and Conditions

                                                                                1. Professional Training Fee
                          AUTHORIZATION                                            Registration Fee is inclusive of course materials and refreshments, and does not
                                                                                   include accommodation or transportation.
(This form is invalid without a signature or company stamp)
                                                                                2. Payment Terms
                                                                                   Once a completed registration form is received , full payment is expected within 5
Organization                                                                       business days from receipt of invoice. PLEASE NOTE: payment must be received prior
                                                                                   to the event date. A receipt will be issued once payment is received.
Address
                                                                                3. Confirmation Details
                                                                                   Joining instructions such as Confirmation Letter, Location Map, etc will be sent to the
Country                                                                            concerned delegate (s) or contact person once a completed registration form is
                                                                                   received.
Telephone                                  Fax                                  3. Cancellation/Substitution/Addition of Delegate (s)
                                                                                   Substitutes for registered delegates is welcome at any time, provided the organizer is
Authorising Manager                                                                notified either by official fax or email.
                                                                                   Additional delegates are welcome too subject to seat availability.
                                                                                   All cancellations after a registration is communicated to the organizer either by fax or
Position                                                                           email will be subjected to a 10% penalty of the regular fee. Cancellation must be
                                                                                   received in writing by mail or fax. Non-payments and non-attendance does not
Signature                                                                          constitute cancellation.

                                                                                4. Late Registration
Date                                                                               The organizer reserves the right to reject any registration that is received after the last
                                                                                   day of registration that is advertised in our brochure and promotional materials.

                                                                                5. Certificate
                                                                                   All participants who complete the course will receive a Certificate of Attendance,
                                                                                   signed by the trainer. Please ensure when registering that your name is written the
                                                                                   way you want it to appear on your Certificate.

                                                                                6. Copyright
                                                                                   All intellectual property rights in all materials produced or distributed in relation with
                                                                                   this event is expressly reserved with INVENSION International and any unauthorized
                                                                                   duplication, publication and distribution is prohibited.
                                     www. invension-i .com                      Important Note: While every reasonable effort will be made to adhere to the
                                      Tel: 603 2162 5485 Fax: 603 2162 7485     advertised package, INVENSION reserves the right to change event dates, sites, location
                                      General Enquiries: info@invension-i.com   or omit event features or alternate offers shall be made.


                                                                                                                                                                                 4

More Related Content

What's hot

Role of communication in it
Role of communication in itRole of communication in it
Role of communication in itvarunbakshi
 
Network 2020: Connecting Everyone to Everything
Network 2020: Connecting Everyone to Everything Network 2020: Connecting Everyone to Everything
Network 2020: Connecting Everyone to Everything Verizon Thought Leadership
 
Ce hv6 module 14 denial of service TH3 professional security
Ce hv6 module 14 denial of service TH3 professional securityCe hv6 module 14 denial of service TH3 professional security
Ce hv6 module 14 denial of service TH3 professional securitydefquon
 
Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011CPPGroup Plc
 
Cell Phone Evolution: The Mobile Phone Technology
Cell Phone Evolution: The Mobile Phone TechnologyCell Phone Evolution: The Mobile Phone Technology
Cell Phone Evolution: The Mobile Phone Technologycellphonerumble
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01Faizal Adiputra
 
USIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute ResolutionUSIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute Resolutioninternetbar
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Frameworkanthonywong
 
Rabo Com Autumn09 H1
Rabo Com Autumn09 H1Rabo Com Autumn09 H1
Rabo Com Autumn09 H1Robert Aouad
 
An Overview of 5G Wireless Cellular Technologies
An Overview of 5G Wireless Cellular TechnologiesAn Overview of 5G Wireless Cellular Technologies
An Overview of 5G Wireless Cellular TechnologiesEditor IJCATR
 
Calling the Police - PR Nightmare or Liability Protection?
Calling the Police - PR Nightmare or Liability Protection?Calling the Police - PR Nightmare or Liability Protection?
Calling the Police - PR Nightmare or Liability Protection?Betsy Elaine Gulinson
 
Broadband & Digital Lifestyle - Telkomsel Perspective - December 2010
Broadband & Digital Lifestyle - Telkomsel Perspective - December 2010Broadband & Digital Lifestyle - Telkomsel Perspective - December 2010
Broadband & Digital Lifestyle - Telkomsel Perspective - December 2010Aris Sudewo Wirjoatmodjo
 
The role of Smartphones And Citizens in Improving Situational Awareness of Fi...
The role of Smartphones And Citizens in Improving Situational Awareness of Fi...The role of Smartphones And Citizens in Improving Situational Awareness of Fi...
The role of Smartphones And Citizens in Improving Situational Awareness of Fi...Bala2212
 
5G System Trends and Development
5G System Trends and Development5G System Trends and Development
5G System Trends and Developmentijtsrd
 

What's hot (20)

Mobile Telephony
Mobile TelephonyMobile Telephony
Mobile Telephony
 
Role of communication in it
Role of communication in itRole of communication in it
Role of communication in it
 
Network 2020: Connecting Everyone to Everything
Network 2020: Connecting Everyone to Everything Network 2020: Connecting Everyone to Everything
Network 2020: Connecting Everyone to Everything
 
D010221620
D010221620D010221620
D010221620
 
Ce hv6 module 14 denial of service TH3 professional security
Ce hv6 module 14 denial of service TH3 professional securityCe hv6 module 14 denial of service TH3 professional security
Ce hv6 module 14 denial of service TH3 professional security
 
Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011
 
Cell Phone Evolution: The Mobile Phone Technology
Cell Phone Evolution: The Mobile Phone TechnologyCell Phone Evolution: The Mobile Phone Technology
Cell Phone Evolution: The Mobile Phone Technology
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
 
Wp 3g
Wp 3gWp 3g
Wp 3g
 
USIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute ResolutionUSIP Presentation of ISR Mobile Land Dispute Resolution
USIP Presentation of ISR Mobile Land Dispute Resolution
 
Information security
Information securityInformation security
Information security
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Framework
 
Rabo Com Autumn09 H1
Rabo Com Autumn09 H1Rabo Com Autumn09 H1
Rabo Com Autumn09 H1
 
An Overview of 5G Wireless Cellular Technologies
An Overview of 5G Wireless Cellular TechnologiesAn Overview of 5G Wireless Cellular Technologies
An Overview of 5G Wireless Cellular Technologies
 
Calling the Police - PR Nightmare or Liability Protection?
Calling the Police - PR Nightmare or Liability Protection?Calling the Police - PR Nightmare or Liability Protection?
Calling the Police - PR Nightmare or Liability Protection?
 
Broadband & Digital Lifestyle - Telkomsel Perspective - December 2010
Broadband & Digital Lifestyle - Telkomsel Perspective - December 2010Broadband & Digital Lifestyle - Telkomsel Perspective - December 2010
Broadband & Digital Lifestyle - Telkomsel Perspective - December 2010
 
The role of Smartphones And Citizens in Improving Situational Awareness of Fi...
The role of Smartphones And Citizens in Improving Situational Awareness of Fi...The role of Smartphones And Citizens in Improving Situational Awareness of Fi...
The role of Smartphones And Citizens in Improving Situational Awareness of Fi...
 
5G System Trends and Development
5G System Trends and Development5G System Trends and Development
5G System Trends and Development
 

Viewers also liked

Viewers also liked (9)

London March 2011 IIR
London March 2011 IIRLondon March 2011 IIR
London March 2011 IIR
 
February booster
February   boosterFebruary   booster
February booster
 
HeyMath! Technology
HeyMath! TechnologyHeyMath! Technology
HeyMath! Technology
 
00076
0007600076
00076
 
عرض
عرضعرض
عرض
 
Stream serve connect_for_sap_e-docs
Stream serve connect_for_sap_e-docsStream serve connect_for_sap_e-docs
Stream serve connect_for_sap_e-docs
 
What Exactly Are Blogs
What Exactly Are BlogsWhat Exactly Are Blogs
What Exactly Are Blogs
 
Eryn Travis-Podcasting and Blogging
Eryn Travis-Podcasting and BloggingEryn Travis-Podcasting and Blogging
Eryn Travis-Podcasting and Blogging
 
Slides chapeuzinho vermelho
Slides chapeuzinho vermelhoSlides chapeuzinho vermelho
Slides chapeuzinho vermelho
 

Similar to Dubai 2

Dubai 1
Dubai 1Dubai 1
Dubai 1mmavis
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Rhys A. Mossom
 
Cybercrime Mobile and Wireless Devices.pptx
Cybercrime Mobile and  Wireless Devices.pptxCybercrime Mobile and  Wireless Devices.pptx
Cybercrime Mobile and Wireless Devices.pptxVivekanandaGN1
 
Voice communication security
Voice communication securityVoice communication security
Voice communication securityFabio Pietrosanti
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threatLuc Beirens
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesMrityunjaySaraswat
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedAsyathShahina
 
The_SIMbox_fraud_survey.pdf
The_SIMbox_fraud_survey.pdfThe_SIMbox_fraud_survey.pdf
The_SIMbox_fraud_survey.pdfmanthanpandit1
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsPaul Parke
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010Vicky Shah
 

Similar to Dubai 2 (20)

Dubai 1
Dubai 1Dubai 1
Dubai 1
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Merging fraud in a full IP environment
Merging fraud in a full IP environmentMerging fraud in a full IP environment
Merging fraud in a full IP environment
 
Presentation1 1.pptx
Presentation1 1.pptxPresentation1 1.pptx
Presentation1 1.pptx
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
Cybercrime Mobile and Wireless Devices.pptx
Cybercrime Mobile and  Wireless Devices.pptxCybercrime Mobile and  Wireless Devices.pptx
Cybercrime Mobile and Wireless Devices.pptx
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat
 
SF 9 FCS UNIT 2.pptx
SF 9 FCS UNIT 2.pptxSF 9 FCS UNIT 2.pptx
SF 9 FCS UNIT 2.pptx
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
The_SIMbox_fraud_survey.pdf
The_SIMbox_fraud_survey.pdfThe_SIMbox_fraud_survey.pdf
The_SIMbox_fraud_survey.pdf
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile Communications
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 

Dubai 2

  • 1. This Wo rkshop requires a laptop Security Threats to Mobile Services and Electronic Crimes in IP and IP-TV Platforms 23 - 24 February 2010, Radisson Blu Hotel, Dubai, Deira Creek Dear Delegates, By attending this 2 days Security has been a crucial issue for telecom operators and service providers. workshop you will be able to: With the emerging of new mobile technologies and services (e.g. mobile TV) and equipment such as cellular Smartphones, PDAs, Blackbarries, telecom operators and service providers are forced to offer higher data rates for the • Learn how to protect your mobile telecom provision of mobile services (e.g. transmission of multimedia, MMS etc.) on infrastructures against attacks coming from mobile phones. fraudsters, criminals or other nation intelligence. Mobile internet market reached over USD71 billion but on the same time there is a growing concern of new security threats. Penetration and use of • Familiarize with the risks in M-Commerce and mobile internet, is expected to grow from 46% to 135% in the next few years micro payments in systems that are using RFID in the Middle East. It is typical for attackers and cyber criminals to capitalize technology. on this dramatic growth. Therefore, it is important for telecom operators and service providers to prepare themselves for the growing security threats and • Learn how to protect your mobile take countermeasures to secure their infrastructures, their subscribers - communications against eavesdroppers and customers and business, since the mobile use growth will increase the the methods used by international spying potential number of victims. networks and industrial espionage. On the other hand criminals are using high technology sophisticated methods to hide their traces and communications in order to perform their • Get advice on how to better protect your illegal actions. Next Generation Networks, infrastructures and services mobile communications against various types including mobile TV, IP-TV, M-Commerce, micro-payments and use of new of fraud in pre or post paid services. technologies eg. RFID (RadioFrequency Identification) are improving the way we are doing business but on the same time they are opening a lot of • See how to identify and control telecom fraud opportunities to fraudsters and various criminal groups to perform their in mobile networks and IP services (VoIP, illegal actions. Companies need to get knowledge how to protect from mobile TV, IPTV), including interconnection industrial espionage and countermeasures against white collar crime and fraud between Telecom Operators. loss of sensitive information. Join us in the most exciting workshop that will provide a deep knowledge of the various security threats to mobile services • Get experience on how to locate fraudsters - and IP platforms and will describe in detail various ways electronic crimes criminals when they disappear, by using are performed in present and future (NGN) networks and infrastructures. advanced techniques (artificial intelligence – neural network techniques, link analysis, Mr. Michalis Mavis telecom signatures, etc.). (MSc) – f. Chairman of the Hellenic Fraud Forum. Tel: 603 2162 5485 | Fax: 603 2162 7485 | Email: telecom.training@invension-i.com www. invension-i .com 1
  • 2. Security Threats to Mobile Services and Electronic Crimes in IP and IP-TV Platforms (Workshop Outline) Presented by Mr. Michalis Mavis (MSc) – f. Chairman of the Hellenic Fraud Forum. Day 1 Day 2 • 09:00am – 11:00am: • 09:00am – 11:00am: Cyber terrorism and countermeasures in mobile and IP Id-theft and countermeasures. Methods used by fraudsters platforms. How to locate criminals that are using anonymous and criminals to disappear and how to locate persons that services. Methods used by fraudsters and criminal groups to have disappeared. P2P communications interception and hide their identity and location when communicating (P2P steganography. communications, spoofing techniques, VoIP encryption). Manipulation of CLI (Calling Line Identification) to avoid • 11:00am – 11:30am: Coffee Break detection. Fraud in mobile TV and IP-TV platforms and Next Generation Networks. How PBX fraud is used by criminals to • 11:30am – 13:00pm: hide their identity and communicate without traces. RFID (Radio Frequency Identification) attacks, when used for micropayments and biometric passports. Skimming, • 11:00am – 11:30am: Coffee Break cloning and eavesdropping attacks. • 11:30am – 13:00pm: • 13:00pm – 14:30pm: Lunch Break and Social Telecom Fraud and Electronic Crimes in Mobile Services (e.g. Networking SIM cloning, SIM Boxing, PRS - Roaming Fraud, prepaid • services Fraud, bypass fraud, attacks to mobile infrastructures, 14:30pm – 15:30pm: GPRS fraud, Internal fraud and Dealer’s fraud). Fraudsters Industrial espionage and intelligence. Methods to collect against Mobile Operators, telecom fraud from one Mobile information by using legal and illegal techniques. Operator to other Mobile Operator, Content Provider fraud. International Spying networks, how efficient they are, Ways to manipulate-delete CDRs, attacks against the prepaid limitations and success stories. services. Mobile-Commerce Fraud. • 13:00pm – 14:30pm: Lunch Break and Social Networking • 14:30pm – 15:30pm: Hacking a mobile node/switch. Monitoring mobile phones (conversations – SMS) and countermeasures, Mobile phone used as a bug and how to protect yourself (eg. By using cryptography). Attacking WiFi networks and countermeasures. WHO SHOULD ATTEND ? • Staff and managers of Telecom Operators • Top management of telecom company • Banking sector Security dpt. • Police officers and electronic crime units of law • Telecom Fraud dpt. enforcement. • Internal Auditor dpt. Tel: 603 2162 5485 | Fax: 603 2162 7485 | Email: telecom.training@invension-i.com www. invension-i .com 2
  • 3. Trainer’s Profile Mr. Mavis was the founder and first Chairman of EFTA (Hellenic Fraud Forum), that was established in the year 2000, by the major Telecom Operators in Greece (COSMOTE, OTE, Vodafone and TIM) with the aim to fight telecommunications fraud and electronic crime amongst its members. he studied Physics and got two Master’s degrees in Telecommunications and Computers & Automation from the University of Athens. He worked for OTE (the Hellenic Telecom Organization) since 1977 from where he voluntarily retired in 2006, to work as telecom and IT security consultant. Mr. Mavis worked : - as crypto engineer at NATO in Brussels Belgium (between 1989-1993) and - as Project Supervisor at EURESCOM (European Institute for Research and Strategic Studies in Telecommunications) in Heidelberg – Germany (between 1995-1999). Before his retirement from OTE he was the Director of the Security Audit and M r. M i cha li s M avis Telecom Fraud Control Division of OTE. He became chairman of the ETNO (European Telecom Network Operators Association) WG on Information Security (1994-1995) and was the Greek rep in the SOGIS (Senior Officials Group on Information Security) of the European Commission (1994-1995). He was also rep of OTE and Greece in the ETSI (European Technical Standards Institute) Technical and General Assembly (France). He is the author of more than 15 papers presented during International Conferences in Australia, USA, and Europe in the areas of Telecommunications, Security and Electronic Crime. He is a permanent expert to the Head District Attorney of Athens, on electronic crime issues. CLIENT LIST ARMENTEL ARMENIA MAKNAN COMMUNICATIONS GREECE BRONET GREECE MARFIN BANK GREECE BT UK MATAV - HUNGARIAN TELECOM CO. LTD HUNGARY BTC BULGARIA MD5 GREECE BUSINESS INFORMATION SUPPORT GREECE NATO CIS AGENCY BELGIUM CENSUS GREECE PORTUGAL TELECOM PORTUGAL CNET - FRANCE TELECOM FRANCE PRESIDIUM SERVICES LTD UK COSMOTE GREECE RIGHTTRACK LTD CYPRO US CSELT, TELECOM ITALIA GROUP ITALY ROMTELECOM ROMANIA CYTA CYPROUS SLOVAK TELECOM SLOVAKIA DEUTSCHE TELECOM AG GERMANY SWISSCOM SWITCHERLAND DISTRICT ATTORNEY ATHENS GREECE TELCORDIA US ELECTRONIC CRIME UNIT GREECE TELECOM FINLAND - FINNET GROUP FINLAND EURESCOM GERMANY TELEFO'NICA I+D SPAIN EUROJUST NETHERLANDS TELENOR NORWAY FORTH / ENISA CRETA GR TELIA SWEDEN GREEK MINISTRY OF DEVELOPMENT GREECE TRUST-IT GREECE HELLENIC FINANCIAL POLICE GREECE UNIVERSITY OF LUND SWEDEN HELLENIC MINISTRY OF PUBLIC ORDER, KEMEA GREECE VODAPHONE HELLAS GREECE HEWLETT PACKARD ITALIANA SRL ITALY VTRIP GREECE IIR TELECOMS & TECHNOLOGY UK WIND (TIM-HELLAS) GREECE LITHUANIAN POLICE LITHUANIA Tel: 603 2162 5485 | Fax: 603 2162 7485 | Email: register@invension-i.com www. invension-i .com 3
  • 4. Security Threats to Mobile 3 EASY WAYS TO REGISTER Services and Electronic Crimes Call: +603 2162 5485 Fax the registration form to: +603 2162 7485 in IP and IP-TV Platforms Email this form to: telecom.training@invension-i.com 23 - 24 February 2010, Radisson Blu Hotel, Dubai, Deira Creek PRICES AND OFFERS REGISTRATION FORM (Use copies of this form for additional participants) Security Threats to Mobile Services and Electronic Crimes In IP and IP-TV Platforms Per Delegate 1st Delegate Name Mr/Mrs/Ms Regular Price USD 2,300 Position Group Fee of 2 Delegates & Above USD 1,900 Telephone Mobile METHOD OF PAYMENT Email Cheque/Draft Payable to 2nd Delegate INVENSION INTERNATIONAL SDN BHD Name Mr/Mrs/Ms Bank Transfer A/C No. 205-418510-725 Position HSBC Bank, Main Branch, Kuala Lumpur, Malaysia Telephone Mobile SWIFT: HBMBMYKL Email For Invoice Purpose Contact Person Name: 3rd Delegate Name Mr/Mrs/Ms Position: Position Tel: Fax: Telephone Mobile Email: Email Terms and Conditions 1. Professional Training Fee AUTHORIZATION Registration Fee is inclusive of course materials and refreshments, and does not include accommodation or transportation. (This form is invalid without a signature or company stamp) 2. Payment Terms Once a completed registration form is received , full payment is expected within 5 Organization business days from receipt of invoice. PLEASE NOTE: payment must be received prior to the event date. A receipt will be issued once payment is received. Address 3. Confirmation Details Joining instructions such as Confirmation Letter, Location Map, etc will be sent to the Country concerned delegate (s) or contact person once a completed registration form is received. Telephone Fax 3. Cancellation/Substitution/Addition of Delegate (s) Substitutes for registered delegates is welcome at any time, provided the organizer is Authorising Manager notified either by official fax or email. Additional delegates are welcome too subject to seat availability. All cancellations after a registration is communicated to the organizer either by fax or Position email will be subjected to a 10% penalty of the regular fee. Cancellation must be received in writing by mail or fax. Non-payments and non-attendance does not Signature constitute cancellation. 4. Late Registration Date The organizer reserves the right to reject any registration that is received after the last day of registration that is advertised in our brochure and promotional materials. 5. Certificate All participants who complete the course will receive a Certificate of Attendance, signed by the trainer. Please ensure when registering that your name is written the way you want it to appear on your Certificate. 6. Copyright All intellectual property rights in all materials produced or distributed in relation with this event is expressly reserved with INVENSION International and any unauthorized duplication, publication and distribution is prohibited. www. invension-i .com Important Note: While every reasonable effort will be made to adhere to the Tel: 603 2162 5485 Fax: 603 2162 7485 advertised package, INVENSION reserves the right to change event dates, sites, location General Enquiries: info@invension-i.com or omit event features or alternate offers shall be made. 4