The Journey to 5G adoption begins here ...
In this early stage of 5G implementation, the “Fortinet 5G Security Summit: Enabling Industry Adoption” will bring together mobile network operators, industry vertical enterprises, industrial vendors, integrators, and standard organizations to debate and discuss the promise, potential and reality of industry 5G use cases today and in the future, capabilities and standards evolution, and the role security must play in enabling and facilitating 5G industry adoption.
We will debate and discuss 5G’s potential to empower a profound transformation in businesses’ operations, products & services and customer engagement, while enabling mobile operators to address business needs for Industry 4.0 mobility and the delivery of value-add services and ecosystem.
The event will provide a worldwide stage to leading business, operators, vendors and integrators to demonstrate their leadership, vision and strategies to help enable and facilitate 5G industry adoption.
With the participation of
Did you know
Agenda
General Session: The Promise, The Potential and A Few Challenges
10:30 AM EST
Visit the information Desk for event details, connect with peers in the networking lounge and visit the Fortinet Solution Zone to learn about solutions and products.
11:00 - 11:05 AM EST
David sets the scene and introduces the topics for this inaugural 5G Security Summit focused on Enabling Industry Adoption.
11:05 -11:20 AM EST
John Maddison joins David in conversation, highlighting the key drivers and trends behind the event.
11:20 - 11:45 AM EST
New and innovative technologies, such as 5G, may trigger a rush for rapid adoption in a race to rip the potential associated benefits. All new technologies, and 5G is not an exception, introduce new security challenges that need to be identified and addressed at the same pace as its adoption.
Is 5G and related technologies secure enough for organizations to safely realize its potential benefits? What are the threats and their possible impacts? What can be done to overcome these challenges and risks? In this interview we will try to briefly address these questions by discussing some of the challenges, possible threats and some recommendations to secure 5G adoption.
11:45 AM - 12:05 PM EST
5G is natively more secured than previous mobile generations. But relying purely on the recommendations called out in the standards and what 5G vendors provide may be not enough to realize 5G’s potential as a critical business infrastructure and service platform.
12:05 - 12:50 PM EST
5G has the potential for reshaping verticals, driving innovation, and creating new opportunities for businesses and service providers alike. Separating the hype from reality, the potential from current capabilities and the promise from industry expectations is not always simple. This discussion panel will provide some insights from key stakeholders as to the promise, realities and future of 5G adoption in the business segment.
12:50 PM - 1:15 PM EST
Michael Xie, Fortinet founder and CTO, will join David in conversation to discuss Fortinet’s role in enabling a secure 5G ecosystem and use cases for industries and mobile network operators.
1:15 - 1:20 PM EST
1:30 - 2:00 PM EST
A unique opportunity to network with the speakers in an innovative live video chat room. Come and join us in the Networking Lounge to discuss hot topics with your peers.
General Session: Opportunities, Realities and Challenges in Vertical Use Cases
10:30 AM EST
Visit the information Desk for event details, connect with peers in the networking lounge and visit the Fortinet Solution Zone to learn about solutions and products.
11:00 - 11:05 AM EST
David will introduce the 2nd day general session: Opportunities, Realities and Challenges in Vertical Use Cases.
11:05 - 11:30 AM EST
5G has high potential in industrial verticals on their path to digitization. Wireless performance, mobility, scalability and network convergence can improve automation infrastructure and enable new applications.
However, in digitalization, OT companies already are facing new cyber-security risks from the convergence of communication, computation, data storage, and (big data) analytics technologies. 5G not only inherits these challenges but also introduces new ones.
In this talk, we will summarize distinct cyber-security risks that 5G introduces for OT industries. This includes both aspects of 5G technology but also of the 5G ecosystem. Such risks relate to radio jamming, use of (non-)public networks and mobile edges, and functional safety. These risks can be show-stoppers for more conservative industries.
Therefore, addressing Internet security for production sites and device authentication are not enough. A common solution across telecom and OT industries is needed for OT customers to be able to trust 5G for mission-critical use.
The purpose of this talk is to raise awareness and motivate activities to address the particular cyber-security risks in 5G technology and ecosystem.
11:30 - 11:55 AM EST
5G will take Mobile Communications from Internet access to a complete enterprise and society platform supporting e.g. Industrial IoT, Automation, OT, remote care, cyberphysical systems, vehicles etc.. The 3GPP standard supports inherent security capabilities that in addition to ensure security for users, network and devices, can be integrated with security functions needed in an enterprise dimension. The cloud native architecture of 5G in combination with Enterprises, applications, data and security functions going into virtualization and the cloud takes networking, processing and security into a modern, future proof scenario. Here also the connectivity architecture from device to centralized processing utilizes cloud/edge techniques so latency, processing response requirements and data localizations can be set to optimize the performance, resilience and security requirements for such applications.
11:55 AM - 12:20 PM EST
As a viable enabler of ubiquitous IoT/IIoT, 5G brings the promise of true realization of IoT/IIoT to the Smart Grid, and with that comes decentralized control and improved efficiencies in the use of energy across the grid. This presentation looks not at the technology of 5G per se, but at the implications it has on cyber security for the Smart Grid as a whole. As IoT/IIoT is propagates in the Smart Grid a new and expanding attack surface comes along with the benefits. The traditional way of looking at the attack surface is from the outside looking in, working to keep attackers from penetrating the 5G attack surface. However, this new IoT/IIoT infrastructure will be built on top of the existing, and often aging, utility infrastructure that comes with its own vulnerabilities and security weaknesses that may provide an easier path for attackers to use to gain entry to the Utilities’ systems. The possibilities and ramifications of attack on the IoT/IIoT attack surface from within, in other words inside-out, are outlined in this discussion.
12:20 - 1:05 PM EST
Private 5G mobile networks are gaining traction with large enterprises who seek a customized, secured and a fully controlled 5G environment and services. This discussion panel will provide a glimpse to industry leaders and stakeholders’ view on this 5G “low hanging fruit”.
1:05 - 1:30 PM EST
Industrial networks are the realm of Operational Technology (OT) that have long been synonymous with Industrial Control Systems. Over the last decade, the OT convergence with IT has been disrupting the Security market triggering the emergence of advanced solutions for Defense.
Today, the emergence of 5G and IIoT into OT, is bringing additional threat vectors and giving the 5G ecosystem players, including Mobile Network Operators (MNOs), the opportunity to support Industrial Asset Owners on their Security journey. Let's see what an MNO needs to do to build an OT security practice and how Fortinet will support them with technology.
1:30 - 1:40 PM EST
1:45 - 2:15 PM EST
A unique opportunity to network with the speakers in an innovative live video chat room. Come and join us in the Networking Lounge to discuss hot topics with your peers.
Technology Deep-Dives
These 30 minute presentations will dive you into the technology for 5G Security. Following each session, you will have the opportunity to meet the experts in an innovative live video chat room.
2:00 - 2:45 PM EST
With the advent of 5G, IoT and the Telco cloud, operators are seeing a larger attack surface. In this session, we will see how operators can protect both their own infrastructure and their very valuable subscribers from the core of the network with the right security architecture. We will also see how to build scalable solutions to cope with a user traffic that is doubling every year and a half.
Multi-access Edge Computing (MEC) sites are key to enable 5G low latency services and use cases in industry verticals, such as Automotive, Manufacturing, Logistics and more. MEC sites are complex environments, providing hybrid infrastructure, PDN connectivity, User Plane termination and an ecosystem of MNO, enterprise, and third-party applications, tools, and services. Securing such complex environment is of absolute importance for both MNOs and their enterprise customers.
This session will discuss the capabilities required for a successful MEC implementation and how does Fortinet security solutions provide a solid and secure foundation for MEC environments, applications and services.
3:00 - 3:45 PM EST
The Telco Cloud is the functional basis for modern Telco Networks with the aim of enabling agile development, delivery and operation of existing and new services. Flexibility, scalability, openness and reliability are the key requirements, that sometimes might appear mutually exclusive.
This session will highlight the journey to a successful Telco Cloud migrations and will focus on solutions to help MNOs plan, deliver and operate highly secure Telco Cloud platforms.
Industrial networks are facing a double transformation, on the one hand from the growth of the Industrial Internet of Things, and in parallel from the advent of 5G and the benefits that it brings.
This session will look at the security implications of these two technologies and how to build security into an IIoT solution from the ground up.
4:00 - 4:45 PM EST
With the advent of 5G, IoT and the Telco cloud, operators are seeing a larger attack surface. In this session, we will see how operators can protect both their own infrastructure and their very valuable subscribers from the core of the network with the right security architecture. We will also see how to build scalable solutions to cope with a user traffic that is doubling every year and a half.
Multi-access Edge Computing (MEC) sites are key to enable 5G low latency services and use cases in industry verticals, such as Automotive, Manufacturing, Logistics and more. MEC sites are complex environments, providing hybrid infrastructure, PDN connectivity, User Plane termination and an ecosystem of MNO, enterprise, and third-party applications, tools, and services. Securing such complex environment is of absolute importance for both MNOs and their enterprise customers.
This session will discuss the capabilities required for a successful MEC implementation and how does Fortinet security solutions provide a solid and secure foundation for MEC environments, applications and services.
5:00 - 5:45 PM EST
The Telco Cloud is the functional basis for modern Telco Networks with the aim of enabling agile development, delivery and operation of existing and new services. Flexibility, scalability, openness and reliability are the key requirements, that sometimes might appear mutually exclusive.
This session will highlight the journey to a successful Telco Cloud migrations and will focus on solutions to help MNOs plan, deliver and operate highly secure Telco Cloud platforms.
Industrial networks are facing a double transformation, on the one hand from the growth of the Industrial Internet of Things, and in parallel from the advent of 5G and the benefits that it brings.
This session will look at the security implications of these two technologies and how to build security into an IIoT solution from the ground up.