This presentation discussed Coordination of Threat Analysis in ICT Ecosystems. The presentation was given at ITU Workshop on 5G Security in Geneva, Switzerland, on 19 March 2018. Find more information about this workshop here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180319/Pages/programme.aspx
Global Virtual Mobile Network for Car manufacturersITU
This presentation discussed Global Virtual Mobile Network for Car manufacturers. The presentation was given at was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
This presentation discusses 5G for Connected and Automated Driving and was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
This presentation discusses connected cars & 5G and was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
Learning from the past: Systematization for Attacks and Countermeasures on Mo...ITU
This presentation discussed Learning from the past: Systematization for Attacks and Countermeasures on Mobile Networks. The presentation was given at ITU Workshop on 5G Security in Geneva, Switzerland, on 19 March 2018. Find more information about this workshop here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180319/Pages/programme.aspx
To learn more about the opportunities that 5G will create, Ericsson commissioned a detailed survey of more than 650
decision-makers from eight key industries. Here, we have gathered five glimpses into their 5G future.
O que acontece em Barcelona não fica em Barcelona. No #EricssonTechDay, você pode conferir todas as novidades tecnológicas da Ericsson em IoT, 5G e evolução do 4G.
Webinar – Looking under the hood of automotive IoTEricsson
Take a look at emerging trends in connected vehicles with Magnus Gunnarsson, Head of Ericsson Automotive Marketing.
Download the webinar here: https://www.ericsson.com/en/industries/automotive/trends-and-insights/looking-under-the-hood-of-automotive-iot
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIMData Driven Innovation
Infrastructures for Data "Roundtable: 5G and Enabling Infrastructures". May 18th 2018. Data Driven Innovation 2018. Engineering Department, University of Roma Tre
Global Virtual Mobile Network for Car manufacturersITU
This presentation discussed Global Virtual Mobile Network for Car manufacturers. The presentation was given at was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
This presentation discusses 5G for Connected and Automated Driving and was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
This presentation discusses connected cars & 5G and was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
Learning from the past: Systematization for Attacks and Countermeasures on Mo...ITU
This presentation discussed Learning from the past: Systematization for Attacks and Countermeasures on Mobile Networks. The presentation was given at ITU Workshop on 5G Security in Geneva, Switzerland, on 19 March 2018. Find more information about this workshop here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180319/Pages/programme.aspx
To learn more about the opportunities that 5G will create, Ericsson commissioned a detailed survey of more than 650
decision-makers from eight key industries. Here, we have gathered five glimpses into their 5G future.
O que acontece em Barcelona não fica em Barcelona. No #EricssonTechDay, você pode conferir todas as novidades tecnológicas da Ericsson em IoT, 5G e evolução do 4G.
Webinar – Looking under the hood of automotive IoTEricsson
Take a look at emerging trends in connected vehicles with Magnus Gunnarsson, Head of Ericsson Automotive Marketing.
Download the webinar here: https://www.ericsson.com/en/industries/automotive/trends-and-insights/looking-under-the-hood-of-automotive-iot
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIMData Driven Innovation
Infrastructures for Data "Roundtable: 5G and Enabling Infrastructures". May 18th 2018. Data Driven Innovation 2018. Engineering Department, University of Roma Tre
O que acontece em Barcelona não fica em Barcelona. No #EricssonTechDay, você pode conferir todas as novidades tecnológicas da Ericsson em IoT, 5G e evolução do 4G.
Network support services for a zero-defect network vision!
Is a zero-defect network vision integral to your business success? Our new network support services help operators to transform their network operations management and be proactive; freeing up time to introduce new technologies such as virtualization, Internet of Things and 5G.
With the components already introduced to the market, we are making the platform truly end-to-end by launching;
- The market’s first complete 5G radio system
- The first version of an E2E Core network capable of 5G use cases based on network slices
- A 5G core network which can now be connected to 5G NR radio
This enables already today some 5G use cases, for telecom operators to capture growth opportunities for 5G & Internet of Things services for Consumers & Enterprises.
Ericsson Technology Review: Securing the cloud with compliance auditingEricsson
To gain and retain user trust, cloud providers must be able to deploy tenants’ applications, store their data securely and ensure compliance with multiple regulations and standards. Security compliance auditing is the obvious solution, but several challenges related to the particular specificities of the cloud are limiting the potential benefit of applying current auditing practices and tools. Moving toward a continuous automated compliance verification model that provides tenants with complete compliance visibility is the key to successfully managing security risks in the cloud.
Evolving cellular IoT for industry digitalizationEricsson
Ericsson lays out its vision for the evolution of cellular IoT and launches new offerings - enabling service providers to tap growth opportunities from industry digitalization.
Ericsson Technology Review: Tackling IoT complexity with machine intelligenceEricsson
IoT-based systems will require a high level of decision making automation both in terms of infrastructure management and within the logic of the IoT applications themselves. Decision support systems (DSSs) are an essential tool in this context on account of their ability to enhance human decision-making processes with machine intelligence. The cognitive automation framework that we have created at Ericsson speeds up the development and deployment of intelligent DSSs by reusing as much knowledge as possible, including domain models, behaviors and reasoning mechanisms. The framework substantially reduces operational costs for IoT-based system management by enabling DSSs to make decisions about how to adapt to changes in their context and environment with minimal or no human interaction.
This presentation takes you through an automation Journey from self-healing to #Network #Slicing. It describes the need for orchestration and the service providers’ steps towards automation. It presents Verizon’s customer case of service life-cycle automation, including VNF on-boarding, service design, provisioning and closed loop assurance. Then it explores network slicing including the definition of blueprints and network slice life-cycle management. More information on Ericsson Dynamic orchestration - http;//www.ericsson.com/dynamic-orchestration
Ericsson Technology Review - issue 2, 2017Ericsson
The latest issue of Ericsson Technology Review includes articles that shed light on important topics including the evolution of LTE to fit the 5G future; an overview of the latest developments in microwave backhaul; and how DevOps can be used to satisfy demands for faster turnaround in feature development.
It also contains our annual technology trends article, in which I present what I believe are the five trends to watch in our industry in the years ahead, namely: an adaptable technology base, the dawn of true machine intelligence, end-to-end security and identity for IoT, an extended-distributed IoT platform, and overlaying reality with knowledge.
I hope you find the contents of this issue of the magazine as thought-provoking as I do. All of the articles included here are also available individually on our website. Please feel free to share them via e-mail or social media.
Enable Critical broadband networks - When business performance, and even lives are at stake, you need technology that you can rely on. Around the world and across industries, there is a growing demand for business critical and mission-critical broadband communications. To serve these types of organizations, service providers need to deliver the highest level of availability, reliability and security . That is why we have launched a new Critical Broadband Networks offering, which enables service providers and government operators to ensure critical communications when it really matters.
The offering consists of:
Critical network capabilities: Guaranteeing performance of a business- or mission-critical network and enabling operators to effectively serve critical industries.
Critical broadband applications: Includes Ericsson’s Group-Radio application suite of Mission-Critical Push-to-Talk, Data and Video services. Combined, these provide land mobile radio users with a migration path to LTE and 5G, whilst retaining existing operational capabilities for mission-critical group communications.
Flexible deployments for private networks: deployment models for both local private networks as well as for nationwide networks, leveraging operators’ existing assets and operations to gain business scale, and faster time-to-market.
BRIDGING THE GAP BETWEEN PHYSICAL AND DIGITAL REALITIES
The key role that connectivity plays in our personal and professional lives has never been more obvious than it is today. Thankfully, despite the sudden, dramatic changes in our behavior earlier this year, networks all around the world have proven to be highly resilient. At Ericsson, we’re committed to ensuring that the network platform continues to improve its ability to meet the full range of societal needs as well as supporting enterprises to stay competitive in the long term. We know that greater agility and speed will be essential.
This issue of our magazine includes several articles that explain Ericsson’s approach to future network development, including my annual technology trends article. The seven trends on this year’s list serve as a critical cornerstone in the development of a common Ericsson vision of what future networks will provide, and what sort of technology evolution will be required to get there.
ERIK EKUDDEN
Senior Vice President, Chief Technology Officer and Head of Group Function Technology
Do we need a wakeup call to keep driver-less cars protected? ITU
Do we need a wakeup call to keep driver-less cars protected? This presentation was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp
The session will address GDPR compliance challenges in the context of industry 4.0 and will offer a deeper look into the convergence of data privacy with the digitalisation movement, where Big Data, IoT, AI and Cloud services are all depending on one thing: DATA.
Emerging Technology Risk Series - Internet of Things (IoT)Eryk Budi Pratama
Presented at Indonesia Honeynet Project (IHP) meetup. This presentation covering:
1. Overview of Industry 4.0
2. IoT Security Model
3. How to Secure IoT
4. Research in IoT
Other emerging technology risk area that will be covered in my professional services:
1. Cloud
2. Mobile
3. Artificial Intelligence / Intelligent Automation
4. Data & Analytics
O que acontece em Barcelona não fica em Barcelona. No #EricssonTechDay, você pode conferir todas as novidades tecnológicas da Ericsson em IoT, 5G e evolução do 4G.
Network support services for a zero-defect network vision!
Is a zero-defect network vision integral to your business success? Our new network support services help operators to transform their network operations management and be proactive; freeing up time to introduce new technologies such as virtualization, Internet of Things and 5G.
With the components already introduced to the market, we are making the platform truly end-to-end by launching;
- The market’s first complete 5G radio system
- The first version of an E2E Core network capable of 5G use cases based on network slices
- A 5G core network which can now be connected to 5G NR radio
This enables already today some 5G use cases, for telecom operators to capture growth opportunities for 5G & Internet of Things services for Consumers & Enterprises.
Ericsson Technology Review: Securing the cloud with compliance auditingEricsson
To gain and retain user trust, cloud providers must be able to deploy tenants’ applications, store their data securely and ensure compliance with multiple regulations and standards. Security compliance auditing is the obvious solution, but several challenges related to the particular specificities of the cloud are limiting the potential benefit of applying current auditing practices and tools. Moving toward a continuous automated compliance verification model that provides tenants with complete compliance visibility is the key to successfully managing security risks in the cloud.
Evolving cellular IoT for industry digitalizationEricsson
Ericsson lays out its vision for the evolution of cellular IoT and launches new offerings - enabling service providers to tap growth opportunities from industry digitalization.
Ericsson Technology Review: Tackling IoT complexity with machine intelligenceEricsson
IoT-based systems will require a high level of decision making automation both in terms of infrastructure management and within the logic of the IoT applications themselves. Decision support systems (DSSs) are an essential tool in this context on account of their ability to enhance human decision-making processes with machine intelligence. The cognitive automation framework that we have created at Ericsson speeds up the development and deployment of intelligent DSSs by reusing as much knowledge as possible, including domain models, behaviors and reasoning mechanisms. The framework substantially reduces operational costs for IoT-based system management by enabling DSSs to make decisions about how to adapt to changes in their context and environment with minimal or no human interaction.
This presentation takes you through an automation Journey from self-healing to #Network #Slicing. It describes the need for orchestration and the service providers’ steps towards automation. It presents Verizon’s customer case of service life-cycle automation, including VNF on-boarding, service design, provisioning and closed loop assurance. Then it explores network slicing including the definition of blueprints and network slice life-cycle management. More information on Ericsson Dynamic orchestration - http;//www.ericsson.com/dynamic-orchestration
Ericsson Technology Review - issue 2, 2017Ericsson
The latest issue of Ericsson Technology Review includes articles that shed light on important topics including the evolution of LTE to fit the 5G future; an overview of the latest developments in microwave backhaul; and how DevOps can be used to satisfy demands for faster turnaround in feature development.
It also contains our annual technology trends article, in which I present what I believe are the five trends to watch in our industry in the years ahead, namely: an adaptable technology base, the dawn of true machine intelligence, end-to-end security and identity for IoT, an extended-distributed IoT platform, and overlaying reality with knowledge.
I hope you find the contents of this issue of the magazine as thought-provoking as I do. All of the articles included here are also available individually on our website. Please feel free to share them via e-mail or social media.
Enable Critical broadband networks - When business performance, and even lives are at stake, you need technology that you can rely on. Around the world and across industries, there is a growing demand for business critical and mission-critical broadband communications. To serve these types of organizations, service providers need to deliver the highest level of availability, reliability and security . That is why we have launched a new Critical Broadband Networks offering, which enables service providers and government operators to ensure critical communications when it really matters.
The offering consists of:
Critical network capabilities: Guaranteeing performance of a business- or mission-critical network and enabling operators to effectively serve critical industries.
Critical broadband applications: Includes Ericsson’s Group-Radio application suite of Mission-Critical Push-to-Talk, Data and Video services. Combined, these provide land mobile radio users with a migration path to LTE and 5G, whilst retaining existing operational capabilities for mission-critical group communications.
Flexible deployments for private networks: deployment models for both local private networks as well as for nationwide networks, leveraging operators’ existing assets and operations to gain business scale, and faster time-to-market.
BRIDGING THE GAP BETWEEN PHYSICAL AND DIGITAL REALITIES
The key role that connectivity plays in our personal and professional lives has never been more obvious than it is today. Thankfully, despite the sudden, dramatic changes in our behavior earlier this year, networks all around the world have proven to be highly resilient. At Ericsson, we’re committed to ensuring that the network platform continues to improve its ability to meet the full range of societal needs as well as supporting enterprises to stay competitive in the long term. We know that greater agility and speed will be essential.
This issue of our magazine includes several articles that explain Ericsson’s approach to future network development, including my annual technology trends article. The seven trends on this year’s list serve as a critical cornerstone in the development of a common Ericsson vision of what future networks will provide, and what sort of technology evolution will be required to get there.
ERIK EKUDDEN
Senior Vice President, Chief Technology Officer and Head of Group Function Technology
Do we need a wakeup call to keep driver-less cars protected? ITU
Do we need a wakeup call to keep driver-less cars protected? This presentation was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp
The session will address GDPR compliance challenges in the context of industry 4.0 and will offer a deeper look into the convergence of data privacy with the digitalisation movement, where Big Data, IoT, AI and Cloud services are all depending on one thing: DATA.
Emerging Technology Risk Series - Internet of Things (IoT)Eryk Budi Pratama
Presented at Indonesia Honeynet Project (IHP) meetup. This presentation covering:
1. Overview of Industry 4.0
2. IoT Security Model
3. How to Secure IoT
4. Research in IoT
Other emerging technology risk area that will be covered in my professional services:
1. Cloud
2. Mobile
3. Artificial Intelligence / Intelligent Automation
4. Data & Analytics
Presentation given by Antonio Kung, Trialog, at Open & Agile Smart Cities' annual Connected Smart Cities & Communities Conference 2020 on 23 January in Brussels, Belgium
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
Do you have a GDPR Roadmap?
- How to measure Cybersecurity Preparedness
- Oversight of Third Parties
- Related International Standards
- Killing Cloud Quickly?
Technology aspects:
- International/EU PII Customer Case Studies
- Available Data Protection Options
- How to Integrate Security into Application Development
- Security Metrics
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
In an era where digital transformation is inevitable, the landscape of cybersecurity is constantly evolving.
Amongst others, the webinar covers:
• DORA and its Implications
• ISO/IEC 27005: Risk Management in Information Security
• Leveraging Artificial Intelligence for Enhanced Cybersecurity
Presenters:
Geoffrey L. Taylor - Director of Cybersecurity
Geoffrey Taylor brings a wealth of experience from multiple roles within various industries throughout his career. As a Certified ISO 27001 Implementer and Auditor, as well as certified ISO 27005, CISM and CRISC, he brings a unique perspective on cybersecurity strategy, risk management and the implementation of an Information Security Management System, having helped multiple organizations in aligning their strategy based on their threat landscape.
Martin Tully - Senior Cyber Governance Consultant
Martin is a Senior Consultant at CRMG with over twenty years of experience, and has previously been employed at two of the ‘Big Four’ professional services firms. Martin has worked across most industry sectors in the development of the best practice guidance and risk analysis methodologies. Martin is also accomplished at: leading the implementation of an ISMS; delivering a number of information risk assessments; reviewing information security policies; assessing security requirements across the supply chain; and updating a complete framework of supporting standards. Prior to the ISF, Martin’s roles have included delivering operational risk reporting, running research projects and benchmarking information security investments for major clients. Martin holds a Bachelors degree from Royal Holloway University of London.
Date: March 27, 2024
Tags: ISO, ISO/IEC 27005, ISO/IEC 42001, Artificial Intelligence, Information Security, Digital Operational Resilience Act (DORA)
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27005 Information Security Risk Management - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/ffX-Xbw7XUk
The global IoT Security market report provides geographic analysis covering regions, such as North America, Europe, Asia-Pacific, and Rest of the World. The IoT Security market for each region is further segmented for major countries including the U.S., Canada, Germany, the U.K., France, Italy, China, India, Japan, Brazil, South Africa, and others.
SAM-IoT: Securing low power device communication in critical infrastructure m...Brain IoT Project
Keynote presented during Eclipse SAM-IoT 2020
In this keynote, we will present an overview of a secure IoT data transmission ecosystem. This overview will be completed with a concrete example of a water management use case from the Brain-IoT project. In this use case, to ensure high trust in the device’s data, we integrated an end-to-end security layer that is compatible with battery-less devices with high constraints in terms of energy, power computation and bandwidth.
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14Mark Morley, MBA
This presentation was originally given at an EDIFICE plenary in Brussels in May 2014. EDIFICE is a European based industry association driving B2B standards across the high tech industry. The presentation discussed digital disruption and how the Internet of Things is likely to impact future design of B2B platforms and global supply chains. - Updated March 2015
Contents
I. AI, Blockchain, IoT, and Their Convergence Technology Innovation Status
II. AI, Blockchain, IoT Convergence Use Case System Implementation Examples
1. Blockchain-based Privacy-Preserving Federated Learning System
2. Blockchain-based Decentralized IoT & AI Data Marketplace
3. Blockchain-based Trustworthy AI & IoT Systems
4. Blockchain-based Decentralized Parallel Edge Machine Learning
5. Predictive Maintenance Platform for Industrial Machine using Industrial IoT
6. AI+Blockchain System for Car Sharing Service
7. Connected Autonomous Vehicle Communication Management System
8. 5G-based AI+Blockchain+IoT Edge Computing System
Le slide trasmesse durante la Roundtable di giovedì 21 Novembre 2019 a FICO Bologna, organizzata in collaborazione con IBM e Bitdefender, in cui si è fatto il punto della situazione sulla protezione dei dati e della produttività aziendale: stakeholder dell’ICT Security a confronto.
Trustworthy networking and technical considerations for 5GITU
This presentation discussed Trustworthy networking and technical considerations for 5G. The presentation was given at ITU Workshop on 5G Security in Geneva, Switzerland, on 19 March 2018. Find more information about this workshop here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180319/Pages/programme.aspx
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...ITU
This presentation discussed the role of Bicycles and E-Bikes in the future development of Intelligent Transport Systems. It was given at was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
This presentation discusses securing the future of Automotive and was presented at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018.
Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
The Connected Vehicle - Challenges and Opportunities. ITU
This presentation discusses challenges and opportunities of the connected vehicle. The presentation was given at a Symposium on the Future Networked Car 2018 (FNC-2018)
held in Geneva, Switzerland on 8 March 2018. More information on the symposium can be found here: https://www.itu.int/en/fnc/2018/Pages/default.aspx
Machine learning for decentralized and flying radio devicesITU
This presentation discusses matters of machine learning for decentralized and flying radio devices. This presentation was given during the ITU-T workshop on Machine Learning for 5G and beyond, held at ITU HQ in Geneva, Switzerland on 29 Jan 18. More information on the workshop can be found here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180129/Pages/default.aspx
Join our upcoming forums and workshops here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/Pages/default.aspx
https://www.slideshare.net/ITU/ai-and-machine-learning
This presentation discusses matters of AI and machine learning. This presentation was given during the ITU-T workshop on Machine Learning for 5G and beyond, held at ITU HQ in Geneva, Switzerland on 29 Jan 18. More information on the workshop can be found here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180129/Pages/default.aspx
Join our upcoming forums and workshops here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/Pages/default.aspx
This presentation discusses matters of machine learning for 5G and beyond, towards a reliable and efficient reconstruction of radio maps. This presentation was given during the ITU-T workshop on Machine Learning for 5G and beyond, held at ITU HQ in Geneva, Switzerland on 29 Jan 18. More information on the workshop can be found here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180129/Pages/default.aspx
This presentation consist of models and explanations of deep learning, artificial intelligence and today's systems and communications. This was presented at the ITU-T Workshop on Machine Learning for 5G held at the ITU HQ in Geneva, Switzerland on 29 January 2018. More information on this workshop can be found here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180129/Pages/default.aspx
Driven by the rapid progress in Artificial Intelligence (AI) research, intelligent machines are gaining the ability to learn, improve and make calculated decisions in ways that will enable them to perform tasks previously thought to rely solely on human experience, creativity, and ingenuity. As a result, we will in the near future see large parts of our lives influenced by AI.
AI innovation will also be central to the achievement of the United Nations' Sustainable Development Goals (SDGs) and will help solving humanity's grand challenges by capitalizing on the unprecedented quantities of data now being generated on sentiment behavior, human health, commerce, communications, migration and more.
With large parts of our lives being influenced by AI, it is critical that government, industry, academia and civil society work together to evaluate the opportunities presented by AI, ensuring that AI benefits all of humanity. Responding to this critical issue, ITU and the XPRIZE Foundation organized AI for Good Global Summit in Geneva, 7-9 June, 2017 in partnership with a number of UN sister agencies. The Summit aimed to accelerate and advance the development and democratization of AI solutions that can address specific global challenges related to poverty, hunger, health, education, the environment, and others.
The Summit provided a neutral platform for government officials, UN agencies, NGO's, industry leaders, and AI experts to discuss the ethical, technical, societal and policy issues related to AI, offer reccommendations and guidance, and promote international dialogue and cooperation in support of AI innovation.
Please visit the AI for Good Global Summit page for more resources: https://www.itu.int/en/ITU-T/AI/Pages/201706-default.aspx
If you would like to speak, partner or sponsor the 2018 edition of the summit, please contact: ai@itu.int
Join ITU today and apply for an International Mobile Subscriber Identity (IMSI) ranges signified by the shared Mobile Country Code ‘901’, which has no ties to any single country. ‘Global SIMs’ are important for enabling cross-border global M2M & IoT connectivity, helping manufacturers to build once and sell anywhere.
For more information contact: membership@itu.int
Report on the progress made by least developed countries towards universal + affordable Internet with recommendations to achieve Sustainable Development Goal 9C https://www.itu.int/en/ITU-D/LDCs/Pages/ICTs-for-SDGs-in-LDCs-Report.aspx
Collection Methodology for Key Performance Indicators for Smart Sustainable C...ITU
These indicators have been developed to provide cities with a consistent and standardised method to collect
data and measure performance and progress to:
achieving the Sustainable Development Goals (SDGs)
becoming a smarter city
becoming a more sustainable city
The indicators will enable cities to measure their progress over time, compare their performance to other
cities and through analysis and sharing allow for the dissemination of best practices and set standards for
progress in meeting the Sustainable Development Goals (SDGs) at the city level.
For more information visit: https://www.itu.int/en/ITU-T/ssc/united/Pages/default.aspx
Enhancing innovation and participation in smart sustainable citiesITU
The United for Smart Sustainable Cities (U4SSC) initiative was launched by the International Telecommunication
Union (ITU) and United Nations Economic Commission for Europe (UNECE) in May 2016. The first phase of this initiative, which was conducted via three Working Groups, was completed in April 2017. This flipbook brings together the work done in Working Group 3 (WG3) for Enhancing Innovation and Participation in Smart Sustainable Cities. WG3 is formed of a group of global experts and practitioners to facilitate knowledge sharing and partnership building on smart cities, with the aim of formulating strategic guidelines and case studies for enhancing innovation and participation in smart sustainable cities. More specifically, WG3 addresses various topics on smart governance, smart economy and smart people with the aim of achieving strong and symbiotic governance, economics and society.
For more information visit: https://www.itu.int/en/ITU-T/ssc/united/Pages/default.aspx
Implementing SDG11 by connecting sustainability policies and urban planning p...ITU
In this guidance document, we study the advantages of using ICT technologies to support the implementation
of the Sustainable Development Goals, namely SDG 11, by facilitating the missing linkages that exist between
sustainability policies and urban-planning practices through digitally-enabled urban actions. These urban
actions will be shaped as recommendations that will put forward physical and non-physical advice to help
the user improve the implementation of both SDG 11 and the New Urban Agenda.
For more information visit: https://www.itu.int/en/ITU-T/ssc/united/Pages/default.aspx
Connecting cities and communities with the SDGsITU
This flipbook provides an overview of how cities can use information and communication technologies (ICTs) to achieve the SDGs. It also maps the case studies to the various international agreements as well as the SDGs. Based on the mapping in this flipbook, U4SSC aims to derive the best practices and guidelines with the final goal of propelling transitions to smart cities while simultaneously achieving the SDGs. The outputs
presented in this flipbook are expected to provide urban stakeholders with an overview of innovative concepts, policies and frameworks that have been adopted in various countries, to facilitate smart-city transformations.
For more information visit: https://www.itu.int/en/ITU-T/ssc/united/Pages/default.aspx
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Coordination of Threat Analysis in ICT Ecosystems
1. Coordination of Threat Analysis in ICT
Ecosystems
Antonio Kung, CTO Trialog
25 rue du Général Foy, 75008 Paris, France
www.trialog.com
ITU workshop on 5G security19 March 2018 1
2. Speaker: Antonio Kung
Engineering background
Chair of citizen approach to data
initiative
EIP-SCC: European Innovation
Platform on Smart Cities and
Communities
Data protection / Privacy standards
wiki for Ipen
Ipen.trialog.com
ITU-T
SG17
– Cybersecurity framework for intelligent
transport system
FG-DPM
– Security and privacy framework
ISO/IEC
Projects
– 27550 Privacy engineering
– 27030 Security and privacy guidelines
for the IoT
– 27570 Privacy guidelines for smart
cities
– 20547-4 Big data Security and privacy
Study periods
– Big data security and privacy processes
– Big data implementation security
– Framework privacy preference
management (Joint ITU-ISO)
ITU workshop on 5G security19 March 2018 2
3. Ecosystems are complex
ITU workshop on 5G security19 March 2018
Security
Privacy
SafetySmart
grid
Transport
Health
Smart
Cities
Big
data
IoT
Ecosystems Domains Concerns
3
4. Ecosystem Security and Data Protection Concerns
ITU workshop on 5G security19 March 2018 4
Stakeholder
Legal
Compliance
Concern
Management
Concern
System
Lifecycle
Concern
Demand side
Policy maker
Compliance Check / Follow standards
Transparency
Operator
Regulation for
security
Regulation for
privacy
Security and data
protection risk
analysis
Agreement with
other operators
Security-by-design
Privacy-by-Design
Supply side
Supplier Operators Requirements
5. Ecosystem Cybersecurity: What we Need
ITU workshop on 5G security19 March 2018 5
Ecosystem
Stakeholders
Ecosystem Assets
Ecosystem
Cybersecurity
capabilities
Provide to protect
Ecosystem
Policy makers Verify/Certify
(or Direct – Control – Evaluate)
6. Ecosystem Cybersecurity: What we Have
ITU workshop on 5G security19 March 2018 6
Ecosystem
Stakeholder 1
Ecosystem
Stakeholder 2
Ecosystem
Stakeholder 2
Ecosystem
Stakeholder 2
Asset 1
Asset 2
Asset 3
Asset 4
Cybersecurity
capability 1
Cybersecurity
capability 2
Cybersecurity
capability 3
Cybersecurity
capability 4
Provides to protect
Provides to protect
Provides to protect
Provides to protect
Ecosystem
Policy makers Verify/Certify
7. Example of Ecosystem: AutoMat
http://www.automat-project.eu
ITU workshop on 5G security19 March 2018 7
8. Example of Ecosystem: AutoMat
ITU workshop on 5G security
Four types of stakeholders
19 March 2018 8
Storage provider
Automotive manufacturer
Marketplace
Service provider
9. Ecosystem Design
ITU workshop on 5G security
Personal data
ecosystem
Interoperability
Common description
– CVIM (Common
vehicle
information
model)
19 March 2018 9
Storage manager
Automotive manufacturer 1
Vehicle A
data
capturing
CVIM
Vehicle B
data
capturing
Automotive manufacturer 2
Vehicle C
data
capturing
CVIM
Vehicle A
owner
data vault
Vehicle B
owner
data vault
Vehicle C
owner
data vault
10. Ecosystem Risk Analysis
ITU workshop on 5G security
Risk analysis includes
security risk analysis (e.g. ISO/IEC 27005)
privacy impact analysis (e.g. ISO/IEC 29134)
19 March 2018 10
Storage
Provider
Risk analysis
Automotive
manufacturer
Risk analysis
Marketplace
Risk analysis
Service
provider
Risk analysis
Ecosystem
Risk analysis
11. Ecosystem Interoperability
ITU workshop on 5G security
Interoperability
includes
Functional
interoperability
Cybersecurity
interoperability
19 March 2018 11
Marketplace 2Marketplace 1
Service provider Service provider 2Service provider 1
Marketplace
Storage provider 2Storage provider 1
Marketplace Marketplace 1Marketplace 1
Storage provider
Automotive
manufacturer 2
Automotive
manufacturer 1
Storage provider Storage provider 2Storage provider 1
Automotive
manufacturer
12. Different Types of Interoperability
ITU workshop on 5G security19 March 2018 12
Different descriptionDifferent description
Service Provider
Market place2
Capability
Market place1
Capability
No interoperability
Common descriptionCommon description
Service Provider
Market place2
Same capability
Market place1
Same capability
Interoperability of capabilities
Common descriptionCommon description
Service Provider
Market place2
Different capability
Market place1
Different capability
Interoperability of descriptions
13. Need for Consistent Individual Cybersecurity Framework
ITU workshop on 5G security19 March 2018 13
Service provider
Cybersecurity framework
• Capabilities
• Agreement
• Risks - Incidents - Consequences
• Measures
MarketplaceService provider
Marketplace
Cybersecurity framework
• Capabilities
• Agreement
• Risks - Incidents - Consequences
• Measures
14. Cybersecurity Capabilities
ITU workshop on 5G securitySlide 14
Secure processing Protect data processing
Transparency information
Provide information how data
processing is protected
Data controller
responsibility
Verifies whether service provider
has data controller responsibility
19 March 2018
Marketplace
capability
Service provider
capability
Secure processing
Protect data pipeline and
processing
Owner consent
Capability for vehicle owner to
provide consent on personal data
processing
Consent revocation
Capability for vehicle owner to
withdraw from data pipeline
Transparency information
Capability to provide information
on data processing chain
Secure connection to
service providers
Capability to provide data to
service provider securely
Secure connection to
storage providers
Capability to retrieve data from
storage manager securely
Data processor
responsibility
Verifies whether marketplace has
data processor responsibility
15. Agreement Cybersecurity Capabilities
ITU workshop on 5G security1519 March 2018
Providing evidence of
capability
provide evidence of
cybersecurity compliance to
marketplace
Getting evidence of
capability
obtain evidence of marketplace
cybersecurity compliance
Marketplace
agreement
Service provider
agreement
Providing evidence of
capability
provide evidence of
cybersecurity compliance to
service provider
Getting evidence of
capability
obtain evidence of service
provider cybersecurity
compliance
16. Threats
ITU workshop on 5G security16
STRIDE threat categories
Spoofing Spoofing marketplace
Tampering
Integrity and completeness of data obtained
from marketplace
Information
disclosure
Eavesdropping data during communication
Eavesdropping metadata (e.g. log of interactions
with marketplace)
Incorrect management of data processing chain
leading to leaks (e.g. incorrect deletion)
Denial Of Service Massive access to marketplace
LINDDUN threat categories
Linkability
Anonymisation not carried out correctly
Attempt from external parties to re-identify
vehicle owner by using other datasets
New linkability threat not taken into account
19 March 2018
Marketplace
Threats
Service provider
Threats
STRIDE threat categories
Spoofing
Spoofing storage provider
Spoofing service provider
Tampering
Integrity and completeness of data provided to
service provider
Repudiation Service provider repudiation
Information
disclosure
Eavesdropping data during communication
Eavesdropping metadata (e.g. log of interactions
with storage provider and with service provider)
Incorrect management of data pipeline leading to
leaks (e.g. incorrect deletion)
Denial Of Service
Massive access to marketplace by faked service
providers
Elevation of privilege
Incorrect management of vehicle owner privacy
rules (expressed in obtained metadata)
LINDDUN threat categories
Linkability
Anonymisation not carried out correctly
New linkability threat not taken into account
[
17. Incidents
ITU workshop on 5G security17
Incident Description Severity
Massive
personal data
breach
Public report of
potential massive
personal data leak
because of
improper operation
at service provider
level
Maximum
Massive denial
of service
Service provider can
no longer operate.
Significant
19 March 2018
Marketplace
Incidents
Service provider
Incidents
Incident Description Severity
Case of personal
data breach
Public reporting that personal
data vault has been accessed or
that it has been processed
against consent or privacy rules
Significant
Massive business
data leak.
Public report of potential
massive business data leak
because of improper operation
at marketplace level
Maximum
Massive personal
data breach
Public report of potential
massive personal data leak
because of improper operation
at marketplace level.
Maximum
Massive denial of
service
Marketplace can no longer
operate.
Significant
18. Measures
ITU workshop on 5G securitySlide 18
ISO 27001 Categories of controls Control
Information security
policies
Management direction. Data management policies
Human resource security During employment
Internal cybersecurity preparedness
External cybersecurity preparedness
Access control
System and application access
control
Secure access to marketplace provider
Cryptography Cryptographic controls Anonymisation of data sets
Operation security
Operational procedures and
responsibilities
Operation procedures for data
processing
Logging and monitoring Logging capabilities
Control of operational software Operation procedures for transparency.
Technical vulnerability
management Plausibility check
Communication security Information transfer Secure transmission of data
System acquisition,
development and
maintenance
Security in development and
support processes
Secure data processing capabilities
Cybersecurity monitoring capabilities
Information security
incident management
Management of information
security incidents and
improvements
Alerting data processing chain
Information security
aspects of business
continuity management
Information security continuity
Assurance of service provider
cybersecurity capabilities
Periodic review of service provider
cybersecurity capabilities
Compliance
Compliance with legal and
contractual requirements
GDPR and cybersecurity compliance
verification
Information security reviews Periodic review of interoperability
19 March 2018
ISO 27001 Categories of controls Control
Information security
policies
Management direction. Data management policies
Human resource security During employment
Internal cybersecurity preparedness
External cybersecurity preparedness
Access control
Business requirements for
access control
Requirements for service provider access
System and application
access control
Secure access from service provider
Secure access to cloud storage provider
Cryptography Cryptographic controls Confidentiality of personal data vaults
Anonymisation of data sets
Operation security
Operational procedures and
responsibilities
Operation procedures for data search and processing
Logging and monitoring Logging capabilities
Control of operational
software
Operation procedures for transparency.
Communication security Information transfer Secure transmission of data
System acquisition,
development and
maintenance
Security in development and
support processes
Secure data pipeline capabilities
Cybersecurity monitoring capabilities
Information security
incident management
Management of information
security incidents and
improvements
Alerting data processing chain
Information security
aspects of business
continuity management
Information security
continuity
Assurance of cloud storage manager cybersecurity
capabilities
Periodic review of cloud storage manager
cybersecurity capabilities
Compliance
Compliance with legal and
contractual requirements
GDPR and cybersecurity compliance verification
Information security reviews Periodic review of interoperability
Marketplace MeasuresService provider measures
19. Conclusions
ITU workshop on 5G security
Need for ecosystem design viewpoint
Need for ecosystem risk analysis
Need for interoperability of cybersecurity capabilities
Need for Coordination of cybersecurity capabilities between
different stakeholders of an ecosystem
Ecosystem vision must be better explained at standardisation level
19 March 2018 19
20. Example of 5G Ecosystem
ITU workshop on 5G security19 March 2018 20
5G Mobile operator
IoT Device operator
Mobile platform operator
Service provider