SlideShare a Scribd company logo
Straw Program
- Topics that highlight Ericsson’s IP
expertise
- Leverage Ericsson’s strengths and
apply to new technology and issues to
resolve. (e.g, MBH)
- Focus on operator perspective and
pain points
- Cover emerging tech and tech we have
“on the truck”
- Include “friendly” partners to show not
working in a vacuum
- Industry thought leaders for keynotes to
highlight technical business drivers
- One track for non-technical business
related content*
- Possible Friday customer meetings
• 2-3 distinct parallel tracks.
• Could have side room for “Meet the Engineer” private sessions.
Continuous Multilayer Protection:
- Operationalizing a Security Framework
Mats Nilsson
2015-05-25 | Page 2
Connectivitymoreand more part ofour life
1875 20001975
10
30
50
15 years
50 billion connected devices
25 years
5 billion connected people
100 years
1 billion connected places
20
40
Connections(billion)
2020
2015-05-25 | Page 3
Connectivityintegrated
into our way oflife
Collaboration
Innovation
Privacy
Competence
Trust
Socializing
Learning
Everything
PEOPLE do
Media
Commerce
Security
Government
Education
Transport
Healthcare
Utilities
In all parts of
SOCIETY &
BUSINESS
Will be done over a
NETWORK
2015-05-25 | Page 4
NEW OPPORTUNITIES
– NEW CHALLENGES
Increased
network capacity
More commerce &
financial transactions
More cloud
storage & services
Open and capable
devices
An IP based unified
global network
New things
get connected
More services
get networked
More decisions
based on real-time data
Policyand regulation
› Status and drivers
– On top of political agendas
– The (global) Economic and
Social impact of the ICT
enabled society
– How to ensure core values
and security in Cyberspace
› Activities and consequences
– Definition and scope of Critical
Information Infrastructures (e.g.
Communications, Healthcare Energy,
Transport
– Operational security requirements
and audits
› Voluntary but required to avoid
liabilities – US
› Law - EU
– Mitigation through recommended
Standards, Best practices,
implementation incentives or
law/liabilities
› Examples of policy measures
– US Executive Order 13636 and
“Cyber security Framework”
– EU
› Cyber security strategy
› EU proposed NIS directive
› EU NIS platform
– India
› Security requirements and
audits on operators.
› Mandatory local testing of
equipment (from 1 April 2015)
however alignment with global
standards
– Many others….
2015-05-25 | Page 6
our perspective onSecurity
in the networked society
• services should always be available
• security should require minimum effort from users
• communications should be protected
• all access to information and data should be authorized
• manipulation of data in the networks should be possible to detect
• the right to privacy should be protected
SECURITYIN THE NETWORKED SOCIETY
Operator Policies
& Directives
Secure
Operations
Secure
Network
Secure
Products
Laws &
Regulation
Standards:
ISO 27001…
3GPP, ITU-T,
IETF…
3GPP SECAM,
ISO 15408…
2015-05-25 | Page 8
System scale
Users
Thousands Millions Billions
Enterprise
Telecom Networks
Multiple Networks
Moderate
Large
Very large
Our Focus:
Large scalesecurity
2015-05-25 | Page 9
Point security
• Firewalls
• Malware detection
• Intrusion detection
• Content scrubbing
Network & Operational Security
• Software and data integrity verification
• Tamper protection
• Identity management
• Fraud prevention mechanisms
• ISO 27 000 certified operations
• Secure storage
IntegratedSecurity
CreatingLarge-scale system Security
• Integrity
• Robustness
• Scalability
• Efficiency
• Confidentiality
• Privacy
• Coordinated defense
• Fast response
Integrated security
Threat
Threat
Threat
2015-05-25 | Page 10
People &
Processes HW & SW Data
TransactionsConfigurationsIdentities
Devices
…and much more
What needs to betrusted
2015-05-25 | Page 11
NEEDSTHE ERICSSONTRUST STACK
TRUSTED BUSINESS
TRUSTED OPERATIONS
TRUSTED NETWORKS
TRUSTED PRODUCTS
ENABLES
2015-05-25 | Page 12
NISTCS FW mappedto RESPONSIBILITIES
Identify
Protect
Detect
Respond
Recover
NIST CS FW
2015-05-25 | Page 13
integrated process for Product andservice development
PRODUCT
SECURITY
FUNCTIONS
PRODUCT
SECURITY
ASSURANCE
PRODUCT
SECURITY
DOCUMENTATION
PRODUCT NEAR
SECURITY
SERVICES
Developing the
right security
functions for a
product or service
Assuring that the
security
functionality works
as expected
Documenting
security
functionality to
enable secure
operations
Provide services to
ensure that
security
functionality is
properly used
Securityreliability model:
2015-05-25 | Page 14
FROM: PROTECT ONLY
100% protection is possible
Re-Inventionof CloudSecurity
TheShift to Cloud Requires a New Focus
Hardened end points, users not
devices
Illusion of liability protection:
third party audits,
certifications
Data is locked down
Perimeter-centric: access control,
encryption
Authenticate end points: trusted identity of
users AND devices
Data is portable, in compliance
with local regulations
Data - centric: every data asset is
tagged, tracked, located, verified
Onus for proof: independently
verifiable, mathematical
forensics
2015-05-25 | Page 15
Ericsson WalletPlatformoverviewof securitycontrols
Approval of sensitive
operations
Traceability & accountability
Security
configuration
validation
Eavesdropping and
modification protection
Two factor authentication
Configurable access control
System and API
hardening
Financial crime controls
2015-05-25 | Page 16

More Related Content

PDF
Iot tunisia forum 2017 security, confidentiality and privacy in iot
PDF
Privacy by Design
PPTX
Machining 4.0 - First Time Right
PDF
Cybersecurity nexus vision
PDF
Cybersecurity governance existing frameworks (nov 2015)
PDF
PDF
Iot tunisia forum 2017 the journey of making things happen stories of success
PDF
Revamp business models toward industry 4.0 create new value engine eric lo-...
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Privacy by Design
Machining 4.0 - First Time Right
Cybersecurity nexus vision
Cybersecurity governance existing frameworks (nov 2015)
Iot tunisia forum 2017 the journey of making things happen stories of success
Revamp business models toward industry 4.0 create new value engine eric lo-...

What's hot (20)

PPT
EiTESAL IOT DAY 26-10-2016
PPTX
Industry 4.0
PPTX
Identity privacy and data protection in the cloud – what is being done is it ...
PDF
INTERNET PROTOCOL VIDEO SURVEILLANCE
PPTX
Smart buildings
PDF
4 video surveillance technology trends 2021
PDF
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
PPTX
Industry 4.0
PDF
CloudWALL Profile ENG
PDF
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
PPTX
Cisco Powered Overview
PDF
EUCI O&G Cloud Security - Eric Jeffery Final
PDF
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
PDF
TechWiseTV Workshop: Operational Insights
PPTX
Building an OpenStack Ecosystem - Trove Day 2014
PDF
Internet of Things in 10 slides
PDF
Singapore. industry 4.0 and cybersecurity
PDF
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
PPTX
NSTIC Panel on Mobile-based Identity and Access Management
EiTESAL IOT DAY 26-10-2016
Industry 4.0
Identity privacy and data protection in the cloud – what is being done is it ...
INTERNET PROTOCOL VIDEO SURVEILLANCE
Smart buildings
4 video surveillance technology trends 2021
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
Industry 4.0
CloudWALL Profile ENG
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
Cisco Powered Overview
EUCI O&G Cloud Security - Eric Jeffery Final
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
TechWiseTV Workshop: Operational Insights
Building an OpenStack Ecosystem - Trove Day 2014
Internet of Things in 10 slides
Singapore. industry 4.0 and cybersecurity
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
NSTIC Panel on Mobile-based Identity and Access Management
Ad

Viewers also liked (18)

PDF
MIRAI - Managing Industry Restructuring and Adoptions Inquisitively
PDF
Driving Networks Forward to a Hyperconnected World
PDF
Sustainability Thinking Pays Off; New Framework Drives Game-Changing Ideas
PDF
Revised ISO 9001 - in a viewpoint of top management
PDF
From the Clean Room to the Great Outdoors
PDF
Integrated Continuous Improvements Ecosystem
PDF
Driving Networks Forward to the Hyper-Connected World
PDF
Customer Delight Created by Co-Operation between Supplier and Operator
PDF
Kudos Aristotle: Using Ethos, Logos & Pathos to Improve the Xilinx Customer E...
PDF
Maturity Model of Internal Audit
PDF
Adoption & Reinforcement - Applying TL 9000 in R&D Businesses
PDF
TL 9000 Today & Benefit of PDR
PDF
Zero Defect Initiative - Quality Index Generator
PDF
TL 9000 WG Activities
PDF
Quality Measurement Framework Puts the End User in Focus
PDF
Being Agile with Assured Quality
PDF
Sustainable Engineering - Practical Studies for Building a Sustainable Society
PDF
QuEST Forum TL 9000 R6.0 Requirements & ISO 9001:2015
MIRAI - Managing Industry Restructuring and Adoptions Inquisitively
Driving Networks Forward to a Hyperconnected World
Sustainability Thinking Pays Off; New Framework Drives Game-Changing Ideas
Revised ISO 9001 - in a viewpoint of top management
From the Clean Room to the Great Outdoors
Integrated Continuous Improvements Ecosystem
Driving Networks Forward to the Hyper-Connected World
Customer Delight Created by Co-Operation between Supplier and Operator
Kudos Aristotle: Using Ethos, Logos & Pathos to Improve the Xilinx Customer E...
Maturity Model of Internal Audit
Adoption & Reinforcement - Applying TL 9000 in R&D Businesses
TL 9000 Today & Benefit of PDR
Zero Defect Initiative - Quality Index Generator
TL 9000 WG Activities
Quality Measurement Framework Puts the End User in Focus
Being Agile with Assured Quality
Sustainable Engineering - Practical Studies for Building a Sustainable Society
QuEST Forum TL 9000 R6.0 Requirements & ISO 9001:2015
Ad

Similar to Continuous Multilayer Protection: Operationalizing a Security Framework (20)

PDF
telebriefing-150415-ericssons-security-solutions
PDF
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
PDF
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
PDF
SecurityGen's Pioneering Approach to 5G Security Services
PDF
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
DOCX
White Paper Security and High Availability Concerns with Wide Area Networks
DOCX
White Paper Security and High Availability Concerns with Wide Area Networks
PDF
Securing Private 5G Networks (1).pdf
PDF
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
PDF
SMi Group's 6th annual European Smart Grid Cyber Security 2016
PPTX
Cisco Security DNA
PDF
The Network Enabled EOC
PDF
Strengthening Your Network Against Future Incidents with SecurityGen
PDF
Unleashing the Power of Telecom Network Security.pdf
PDF
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
PPTX
Overview of Ericsson’s Products
PPT
Securty Issues from 1999
PDF
A modern approach to safeguarding your ICS and SCADA systems
PDF
er-security-assurance-3gpp
PDF
Ericsson Review: Setting the standard: methodology counters security threats
telebriefing-150415-ericssons-security-solutions
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
SecurityGen's Pioneering Approach to 5G Security Services
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
Securing Private 5G Networks (1).pdf
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
SMi Group's 6th annual European Smart Grid Cyber Security 2016
Cisco Security DNA
The Network Enabled EOC
Strengthening Your Network Against Future Incidents with SecurityGen
Unleashing the Power of Telecom Network Security.pdf
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Overview of Ericsson’s Products
Securty Issues from 1999
A modern approach to safeguarding your ICS and SCADA systems
er-security-assurance-3gpp
Ericsson Review: Setting the standard: methodology counters security threats

More from QuEST Forum (13)

PDF
Networked Society - Story to be Continued
PDF
Achieving Best-in-Class Customer Experience through Effective Product Launch
PDF
Increasing Revenue Through Improved Customer Experience
PDF
KPI Team Journey
PDF
Network Quality and Customer Experience
PDF
Automotive Services and Communications Technologies, a Brief Look into the Fu...
PDF
Conquering the Cost of Poor Quality
PDF
TL 9000 Measurements and Requirements Interactive Workshop
PDF
7 Key Elements for Operation Quality Improvement
PDF
The Action Against Soft-Errors to Prevent Service Outage
PDF
Minimize the Cost by Quality Assurance Process Improvement
PDF
The Status and Issues of Quality Management System Certification in Japan
PDF
Key Concept in Toyota Production System and Their Own Thought
Networked Society - Story to be Continued
Achieving Best-in-Class Customer Experience through Effective Product Launch
Increasing Revenue Through Improved Customer Experience
KPI Team Journey
Network Quality and Customer Experience
Automotive Services and Communications Technologies, a Brief Look into the Fu...
Conquering the Cost of Poor Quality
TL 9000 Measurements and Requirements Interactive Workshop
7 Key Elements for Operation Quality Improvement
The Action Against Soft-Errors to Prevent Service Outage
Minimize the Cost by Quality Assurance Process Improvement
The Status and Issues of Quality Management System Certification in Japan
Key Concept in Toyota Production System and Their Own Thought

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Encapsulation theory and applications.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Unlocking AI with Model Context Protocol (MCP)
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Encapsulation theory and applications.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Review of recent advances in non-invasive hemoglobin estimation
Chapter 3 Spatial Domain Image Processing.pdf
Big Data Technologies - Introduction.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Reach Out and Touch Someone: Haptics and Empathic Computing
MIND Revenue Release Quarter 2 2025 Press Release
Encapsulation_ Review paper, used for researhc scholars
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...

Continuous Multilayer Protection: Operationalizing a Security Framework

  • 1. Straw Program - Topics that highlight Ericsson’s IP expertise - Leverage Ericsson’s strengths and apply to new technology and issues to resolve. (e.g, MBH) - Focus on operator perspective and pain points - Cover emerging tech and tech we have “on the truck” - Include “friendly” partners to show not working in a vacuum - Industry thought leaders for keynotes to highlight technical business drivers - One track for non-technical business related content* - Possible Friday customer meetings • 2-3 distinct parallel tracks. • Could have side room for “Meet the Engineer” private sessions. Continuous Multilayer Protection: - Operationalizing a Security Framework Mats Nilsson
  • 2. 2015-05-25 | Page 2 Connectivitymoreand more part ofour life 1875 20001975 10 30 50 15 years 50 billion connected devices 25 years 5 billion connected people 100 years 1 billion connected places 20 40 Connections(billion) 2020
  • 3. 2015-05-25 | Page 3 Connectivityintegrated into our way oflife Collaboration Innovation Privacy Competence Trust Socializing Learning Everything PEOPLE do Media Commerce Security Government Education Transport Healthcare Utilities In all parts of SOCIETY & BUSINESS Will be done over a NETWORK
  • 4. 2015-05-25 | Page 4 NEW OPPORTUNITIES – NEW CHALLENGES Increased network capacity More commerce & financial transactions More cloud storage & services Open and capable devices An IP based unified global network New things get connected More services get networked More decisions based on real-time data
  • 5. Policyand regulation › Status and drivers – On top of political agendas – The (global) Economic and Social impact of the ICT enabled society – How to ensure core values and security in Cyberspace › Activities and consequences – Definition and scope of Critical Information Infrastructures (e.g. Communications, Healthcare Energy, Transport – Operational security requirements and audits › Voluntary but required to avoid liabilities – US › Law - EU – Mitigation through recommended Standards, Best practices, implementation incentives or law/liabilities › Examples of policy measures – US Executive Order 13636 and “Cyber security Framework” – EU › Cyber security strategy › EU proposed NIS directive › EU NIS platform – India › Security requirements and audits on operators. › Mandatory local testing of equipment (from 1 April 2015) however alignment with global standards – Many others….
  • 6. 2015-05-25 | Page 6 our perspective onSecurity in the networked society • services should always be available • security should require minimum effort from users • communications should be protected • all access to information and data should be authorized • manipulation of data in the networks should be possible to detect • the right to privacy should be protected
  • 7. SECURITYIN THE NETWORKED SOCIETY Operator Policies & Directives Secure Operations Secure Network Secure Products Laws & Regulation Standards: ISO 27001… 3GPP, ITU-T, IETF… 3GPP SECAM, ISO 15408…
  • 8. 2015-05-25 | Page 8 System scale Users Thousands Millions Billions Enterprise Telecom Networks Multiple Networks Moderate Large Very large Our Focus: Large scalesecurity
  • 9. 2015-05-25 | Page 9 Point security • Firewalls • Malware detection • Intrusion detection • Content scrubbing Network & Operational Security • Software and data integrity verification • Tamper protection • Identity management • Fraud prevention mechanisms • ISO 27 000 certified operations • Secure storage IntegratedSecurity CreatingLarge-scale system Security • Integrity • Robustness • Scalability • Efficiency • Confidentiality • Privacy • Coordinated defense • Fast response Integrated security Threat Threat Threat
  • 10. 2015-05-25 | Page 10 People & Processes HW & SW Data TransactionsConfigurationsIdentities Devices …and much more What needs to betrusted
  • 11. 2015-05-25 | Page 11 NEEDSTHE ERICSSONTRUST STACK TRUSTED BUSINESS TRUSTED OPERATIONS TRUSTED NETWORKS TRUSTED PRODUCTS ENABLES
  • 12. 2015-05-25 | Page 12 NISTCS FW mappedto RESPONSIBILITIES Identify Protect Detect Respond Recover NIST CS FW
  • 13. 2015-05-25 | Page 13 integrated process for Product andservice development PRODUCT SECURITY FUNCTIONS PRODUCT SECURITY ASSURANCE PRODUCT SECURITY DOCUMENTATION PRODUCT NEAR SECURITY SERVICES Developing the right security functions for a product or service Assuring that the security functionality works as expected Documenting security functionality to enable secure operations Provide services to ensure that security functionality is properly used Securityreliability model:
  • 14. 2015-05-25 | Page 14 FROM: PROTECT ONLY 100% protection is possible Re-Inventionof CloudSecurity TheShift to Cloud Requires a New Focus Hardened end points, users not devices Illusion of liability protection: third party audits, certifications Data is locked down Perimeter-centric: access control, encryption Authenticate end points: trusted identity of users AND devices Data is portable, in compliance with local regulations Data - centric: every data asset is tagged, tracked, located, verified Onus for proof: independently verifiable, mathematical forensics
  • 15. 2015-05-25 | Page 15 Ericsson WalletPlatformoverviewof securitycontrols Approval of sensitive operations Traceability & accountability Security configuration validation Eavesdropping and modification protection Two factor authentication Configurable access control System and API hardening Financial crime controls