Any LTE security framework must address five key points of vulnerability. This presentation examines the specific risks to critical EPC infrastructure at the S1 link (the border between RAN and core, reviews emerging trends and threat vectors at that interface, details some pertinent use cases, and outlines the steps to virtualization.