13:30
Registration, refreshments and networking
14:00
CW welcome: Paul Crane, CEO, CW (Cambridge Wireless)
14:05
Welcome from event sponsor: Richard Jacklin, Business Development–Commercial Lead, Plextek
14:10
Introduction to topic by by Yiru Zhong, SIG Champion and Market Development Manager, Soracom
14:15
Dr. Saif Abed, Director of Cybersecurity Advisory Services, The AbedGraham Group
Session to be chaired by Yiru Zhong, Security, Privacy, Identity & Trust (SPIT) SIG Champion
14:35
Q & A
14:40
‘Assured Position, Navigation and Timing’: Dr Aled Catherall, CTO, Plextek
Many systems are critically reliant on Global Navigation Satellite Systems (GNSS) for provision of accurate position, navigation and time information. But GNSS is easily denied or even spoofed. This presentation discusses technologies that Plextek are developing to mitigate loss of GNSS.
15:00
Q & A
15:05
‘Resilient Time for the Future’: Dr Leon Lobo, Head of the National Timing Centre, National Physical Laboratory
Time is an invisible utility, underpinning our digital infrastructure, the basis for global navigation satellite systems delivering Position Navigation and Time (PNT) information, synchronisation of 5G networks and the energy grid, to timestamp traceability critical for trading platforms in financial services. We have an increasing dependency on GNSS for PNT and our awareness of this dependency is poor. This puts us at significant risk of emerging and future applications being ‘dependent by default’ on weak space-based signals, vulnerable to interference and a rapidly developing threat landscape.
15:25
Q & A
15:30
Refreshment break and networking
16:00
‘Being proactive: Picocom’s experience of the new UK Telecommunications Security Code of Practice’s Vendor Security Assessment’: Richard Storer, Director of Security, Picocom
Session to be chaired by Sam Durrant, Security, Privacy, Identity & Trust (SPIT) SIG Champion.
In December 2022, the UK Government published the Telecommunications Security Code of Practice. This includes the requirement for network operators to assess equipment vendors against a Vendor Security Assessment (VSA). As our customers' products are built on Picocom SoCs and software, we want to provide reassurance to them that our products have the security features they require to meet the VSA, so we submitted Picocom’s products and processes to be assessed by BSI (The British Standards Institution) for compliance with the requirements of the VSA. In this talk we discuss the lessons we have learnt from the assessment and offer our opinion of the suitability of the VSA for products at our position in the telecoms supply chain.
16:20
Q & A
16:25
‘Scalable hardware vulnerabilities and software protections for Critical National Infrastructure’: Franck Courbon, CEO, Ethicronics
Space, datacenters, energy, food manufacturing...Operational technology and other critical systems always run on some electronics hardware - and no security is possible without an adequate root of trust. This short talk will particularly highlight associated supply chain and tamper attacks/protections.
16:45
Q & A
16:50
Wrap-up
17:00
End of session and opportunity for informal networking
18:00
Event close