BEGIN:VCALENDAR PRODID:-//Microsoft Corporation//Outlook 16.0 MIMEDIR//EN VERSION:2.0 METHOD:PUBLISH X-MS-OLK-FORCEINSPECTOROPEN:TRUE BEGIN:VTIMEZONE TZID:AUS Eastern Standard Time BEGIN:STANDARD DTSTART:16010401T030000 RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4 TZOFFSETFROM:+1100 TZOFFSETTO:+1000 END:STANDARD BEGIN:DAYLIGHT DTSTART:16011007T020000 RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=10 TZOFFSETFROM:+1000 TZOFFSETTO:+1100 END:DAYLIGHT END:VTIMEZONE BEGIN:VEVENT CLASS:PUBLIC CREATED:20190228T115844Z DESCRIPTION:Applying Security in a 5G World\nMike Geller (Principal Enginee r\, Distinguished Speaker) and Pramod Nair (Consulting Systems Engineer)\n \n5G networks will require the data to be delivered faster with lower lat ency and connect millions of IoT devices using various architectures such as MEC\, CUPS\, Network Slicing and CRAN. This network transformation of m obile networks brings in various threat surfaces. This session would take the audience through the threat surfaces during the network transformation and how threats can be mitigated using Cisco’s end to end security arch itecture for Mobile Network Operators. We will focus on securing new evolv ing architectures such as Distributed architectures (MEC)\, Network Slicin g &V2X. It would also cover aspects of securing virtualized infrastructure s including NFVi.\n DTEND;TZID="AUS Eastern Standard Time":20190306T123000 DTSTAMP:20190228T115844Z DTSTART;TZID="AUS Eastern Standard Time":20190306T121000 LAST-MODIFIED:20190228T115844Z LOCATION:https://www.cisco.com/c/m/en_au/ciscolive/security/index.html PRIORITY:5 SEQUENCE:0 SUMMARY;LANGUAGE=en-au:Applying Security in a 5G World TRANSP:OPAQUE UID:040000008200E00074C5B7101A82E00800000000F0D569E9B3CFD401000000000000000 0100000000580CB8E358AE644A39E5B0F0AB42FC8 X-ALT-DESC;FMTTYPE=text/html:

Applying Security in a 5G World

Mike Gel ler (Principal Engineer\, Distinguished Speaker) and Pramod Nair (Consulti ng Systems Engineer)

 \;

5G networks will require the data to be delivered faster with low er latency and connect millions of IoT devices using various architectures such as MEC\, CUPS\, Network Slicing and CRAN. This network transformatio n of mobile networks brings in various threat surfaces. This session would take the audience through the threat surfaces during the network transfor mation and how threats can be mitigated using Cisco’\;s end to end se curity architecture for Mobile Network Operators. We will focus on securin g new evolving architectures such as Distributed architectures (MEC)\, Net work Slicing &\;V2X. It would also cover aspects of securing virtualize d infrastructures including NFVi.

X-MICROSOFT-CDO-BUSYSTATUS:BUSY X-MICROSOFT-CDO-IMPORTANCE:1 X-MICROSOFT-DISALLOW-COUNTER:FALSE X-MS-OLK-AUTOFILLLOCATION:FALSE X-MS-OLK-CONFTYPE:0 BEGIN:VALARM TRIGGER:-PT15M ACTION:DISPLAY DESCRIPTION:Reminder END:VALARM END:VEVENT END:VCALENDAR