Dubai 2


Published on

Training in Dubai-2

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Dubai 2

  1. 1. This Wo rkshop requires a laptop Security Threats to Mobile Services and Electronic Crimes in IP and IP-TV Platforms 23 - 24 February 2010, Radisson Blu Hotel, Dubai, Deira CreekDear Delegates, By attending this 2 daysSecurity has been a crucial issue for telecom operators and service providers. workshop you will be able to:With the emerging of new mobile technologies and services (e.g. mobile TV)and equipment such as cellular Smartphones, PDAs, Blackbarries, telecomoperators and service providers are forced to offer higher data rates for the • Learn how to protect your mobile telecomprovision of mobile services (e.g. transmission of multimedia, MMS etc.) on infrastructures against attacks coming frommobile phones. fraudsters, criminals or other nation intelligence.Mobile internet market reached over USD71 billion but on the same timethere is a growing concern of new security threats. Penetration and use of • Familiarize with the risks in M-Commerce andmobile internet, is expected to grow from 46% to 135% in the next few years micro payments in systems that are using RFIDin the Middle East. It is typical for attackers and cyber criminals to capitalize technology.on this dramatic growth. Therefore, it is important for telecom operators andservice providers to prepare themselves for the growing security threats and • Learn how to protect your mobiletake countermeasures to secure their infrastructures, their subscribers - communications against eavesdroppers andcustomers and business, since the mobile use growth will increase the the methods used by international spyingpotential number of victims. networks and industrial espionage.On the other hand criminals are using high technology sophisticatedmethods to hide their traces and communications in order to perform their • Get advice on how to better protect yourillegal actions. Next Generation Networks, infrastructures and services mobile communications against various typesincluding mobile TV, IP-TV, M-Commerce, micro-payments and use of new of fraud in pre or post paid services.technologies eg. RFID (RadioFrequency Identification) are improving the waywe are doing business but on the same time they are opening a lot of • See how to identify and control telecom fraudopportunities to fraudsters and various criminal groups to perform their in mobile networks and IP services (VoIP,illegal actions. Companies need to get knowledge how to protect from mobile TV, IPTV), including interconnectionindustrial espionage and countermeasures against white collar crime and fraud between Telecom Operators.loss of sensitive information. Join us in the most exciting workshop that willprovide a deep knowledge of the various security threats to mobile services • Get experience on how to locate fraudsters -and IP platforms and will describe in detail various ways electronic crimes criminals when they disappear, by usingare performed in present and future (NGN) networks and infrastructures. advanced techniques (artificial intelligence – neural network techniques, link analysis,Mr. Michalis Mavis telecom signatures, etc.).(MSc) – f. Chairman of the Hellenic Fraud Forum.Tel: 603 2162 5485 | Fax: 603 2162 7485 | Email: www. invension-i .com 1
  2. 2. Security Threats to Mobile Services and Electronic Crimes in IP and IP-TV Platforms (Workshop Outline) Presented by Mr. Michalis Mavis (MSc) – f. Chairman of the Hellenic Fraud Forum. Day 1 Day 2 • 09:00am – 11:00am: • 09:00am – 11:00am: Cyber terrorism and countermeasures in mobile and IP Id-theft and countermeasures. Methods used by fraudsters platforms. How to locate criminals that are using anonymous and criminals to disappear and how to locate persons that services. Methods used by fraudsters and criminal groups to have disappeared. P2P communications interception and hide their identity and location when communicating (P2P steganography. communications, spoofing techniques, VoIP encryption). Manipulation of CLI (Calling Line Identification) to avoid • 11:00am – 11:30am: Coffee Break detection. Fraud in mobile TV and IP-TV platforms and Next Generation Networks. How PBX fraud is used by criminals to • 11:30am – 13:00pm: hide their identity and communicate without traces. RFID (Radio Frequency Identification) attacks, when used for micropayments and biometric passports. Skimming, • 11:00am – 11:30am: Coffee Break cloning and eavesdropping attacks. • 11:30am – 13:00pm: • 13:00pm – 14:30pm: Lunch Break and Social Telecom Fraud and Electronic Crimes in Mobile Services (e.g. Networking SIM cloning, SIM Boxing, PRS - Roaming Fraud, prepaid • services Fraud, bypass fraud, attacks to mobile infrastructures, 14:30pm – 15:30pm: GPRS fraud, Internal fraud and Dealer’s fraud). Fraudsters Industrial espionage and intelligence. Methods to collect against Mobile Operators, telecom fraud from one Mobile information by using legal and illegal techniques. Operator to other Mobile Operator, Content Provider fraud. International Spying networks, how efficient they are, Ways to manipulate-delete CDRs, attacks against the prepaid limitations and success stories. services. Mobile-Commerce Fraud. • 13:00pm – 14:30pm: Lunch Break and Social Networking • 14:30pm – 15:30pm: Hacking a mobile node/switch. Monitoring mobile phones (conversations – SMS) and countermeasures, Mobile phone used as a bug and how to protect yourself (eg. By using cryptography). Attacking WiFi networks and countermeasures. WHO SHOULD ATTEND ?• Staff and managers of Telecom Operators • Top management of telecom company• Banking sector Security dpt. • Police officers and electronic crime units of law• Telecom Fraud dpt. enforcement.• Internal Auditor dpt.Tel: 603 2162 5485 | Fax: 603 2162 7485 | Email: www. invension-i .com 2
  3. 3. Trainer’s Profile Mr. Mavis was the founder and first Chairman of EFTA (Hellenic Fraud Forum), that was established in the year 2000, by the major Telecom Operators in Greece (COSMOTE, OTE, Vodafone and TIM) with the aim to fight telecommunications fraud and electronic crime amongst its members. he studied Physics and got two Master’s degrees in Telecommunications and Computers & Automation from the University of Athens. He worked for OTE (the Hellenic Telecom Organization) since 1977 from where he voluntarily retired in 2006, to work as telecom and IT security consultant. Mr. Mavis worked : - as crypto engineer at NATO in Brussels Belgium (between 1989-1993) and - as Project Supervisor at EURESCOM (European Institute for Research and Strategic Studies in Telecommunications) in Heidelberg – Germany (between 1995-1999). Before his retirement from OTE he was the Director of the Security Audit and M r. M i cha li s M avis Telecom Fraud Control Division of OTE. He became chairman of the ETNO (European Telecom Network Operators Association) WG on Information Security (1994-1995) and was the Greek rep in the SOGIS (Senior Officials Group on Information Security) of the European Commission (1994-1995). He was also rep of OTE and Greece in the ETSI (European Technical Standards Institute) Technical and General Assembly (France). He is the author of more than 15 papers presented during International Conferences in Australia, USA, and Europe in the areas of Telecommunications, Security and Electronic Crime. He is a permanent expert to the Head District Attorney of Athens, on electronic crime issues. CLIENT LISTARMENTEL ARMENIA MAKNAN COMMUNICATIONS GREECEBRONET GREECE MARFIN BANK GREECEBT UK MATAV - HUNGARIAN TELECOM CO. LTD HUNGARYBTC BULGARIA MD5 GREECEBUSINESS INFORMATION SUPPORT GREECE NATO CIS AGENCY BELGIUMCENSUS GREECE PORTUGAL TELECOM PORTUGALCNET - FRANCE TELECOM FRANCE PRESIDIUM SERVICES LTD UKCOSMOTE GREECE RIGHTTRACK LTD CYPRO USCSELT, TELECOM ITALIA GROUP ITALY ROMTELECOM ROMANIACYTA CYPROUS SLOVAK TELECOM SLOVAKIADEUTSCHE TELECOM AG GERMANY SWISSCOM SWITCHERLANDDISTRICT ATTORNEY ATHENS GREECE TELCORDIA USELECTRONIC CRIME UNIT GREECE TELECOM FINLAND - FINNET GROUP FINLANDEURESCOM GERMANY TELEFONICA I+D SPAINEUROJUST NETHERLANDS TELENOR NORWAYFORTH / ENISA CRETA GR TELIA SWEDENGREEK MINISTRY OF DEVELOPMENT GREECE TRUST-IT GREECEHELLENIC FINANCIAL POLICE GREECE UNIVERSITY OF LUND SWEDENHELLENIC MINISTRY OF PUBLIC ORDER, KEMEA GREECE VODAPHONE HELLAS GREECEHEWLETT PACKARD ITALIANA SRL ITALY VTRIP GREECEIIR TELECOMS & TECHNOLOGY UK WIND (TIM-HELLAS) GREECELITHUANIAN POLICE LITHUANIATel: 603 2162 5485 | Fax: 603 2162 7485 | Email: www. invension-i .com 3
  4. 4. Security Threats to Mobile 3 EASY WAYS TO REGISTERServices and Electronic Crimes Call: +603 2162 5485 Fax the registration form to: +603 2162 7485in IP and IP-TV Platforms Email this form to: - 24 February 2010, Radisson Blu Hotel, Dubai, Deira Creek PRICES AND OFFERS REGISTRATION FORM(Use copies of this form for additional participants) Security Threats to Mobile Services and Electronic Crimes In IP and IP-TV Platforms Per Delegate1st DelegateName Mr/Mrs/Ms Regular Price USD 2,300Position Group Fee of 2 Delegates & Above USD 1,900Telephone Mobile METHOD OF PAYMENTEmail Cheque/Draft Payable to2nd Delegate INVENSION INTERNATIONAL SDN BHDName Mr/Mrs/Ms Bank Transfer A/C No. 205-418510-725Position HSBC Bank, Main Branch, Kuala Lumpur, MalaysiaTelephone Mobile SWIFT: HBMBMYKLEmail For Invoice Purpose Contact Person Name:3rd DelegateName Mr/Mrs/Ms Position:Position Tel: Fax:Telephone Mobile Email:Email Terms and Conditions 1. Professional Training Fee AUTHORIZATION Registration Fee is inclusive of course materials and refreshments, and does not include accommodation or transportation.(This form is invalid without a signature or company stamp) 2. Payment Terms Once a completed registration form is received , full payment is expected within 5Organization business days from receipt of invoice. PLEASE NOTE: payment must be received prior to the event date. A receipt will be issued once payment is received.Address 3. Confirmation Details Joining instructions such as Confirmation Letter, Location Map, etc will be sent to theCountry concerned delegate (s) or contact person once a completed registration form is received.Telephone Fax 3. Cancellation/Substitution/Addition of Delegate (s) Substitutes for registered delegates is welcome at any time, provided the organizer isAuthorising Manager notified either by official fax or email. Additional delegates are welcome too subject to seat availability. All cancellations after a registration is communicated to the organizer either by fax orPosition email will be subjected to a 10% penalty of the regular fee. Cancellation must be received in writing by mail or fax. Non-payments and non-attendance does notSignature constitute cancellation. 4. Late RegistrationDate The organizer reserves the right to reject any registration that is received after the last day of registration that is advertised in our brochure and promotional materials. 5. Certificate All participants who complete the course will receive a Certificate of Attendance, signed by the trainer. Please ensure when registering that your name is written the way you want it to appear on your Certificate. 6. Copyright All intellectual property rights in all materials produced or distributed in relation with this event is expressly reserved with INVENSION International and any unauthorized duplication, publication and distribution is prohibited. www. invension-i .com Important Note: While every reasonable effort will be made to adhere to the Tel: 603 2162 5485 Fax: 603 2162 7485 advertised package, INVENSION reserves the right to change event dates, sites, location General Enquiries: or omit event features or alternate offers shall be made. 4