08:30 - 09:15 KST
|
Registration
|
09:15 - 09:30 KST
|
Opening Remarks
Masters of Ceremony: Yumin Jeong, International Conference MC &
Xiaoya Yang, ITU-T Study Group 17 Counsellor
-
Seizo Onoe, Director, Telecommunication Standardization Bureau, ITU
-
Jin-Bae Hong, Deputy Minister, Ministry of Science and ICT, Korea (Rep. of)
-
Heung Youl Youm, Chairman, ITU-T Study Group 17, Security | Professor, Department of Information Security Engineering, Soonchunhyang University [
Welcome remarks ]
|
09:30 - 11:45 KST
| Session 1: Need, security issues, threats and controls for zero trust
This session will look at various aspects or views on zero trust and focus on identifying a need and discussing security issues, threats and controls for zero trust.
Moderator:
Zhiyuan Hu, WP2 Vice-Chair and Q2 Co-Rapporteur, ITU-T Study Group 17, Security | Director, Security Research, vivo Mobile Communication Co. Ltd
-
Martin Goldberg, 5G Cybersecurity Standards Lead, U.S. National Security Agency: The need for Zero Trust in 5G [
Presentation ]
-
Sokjoon Lee, Professor, Department of Computer Engineering (Smart Security), Gachon University, Korea (Rep. of): Zero trust, how to understand the paradigm [ Presentation ]
-
Junzhi Yan, Co-rapporteur of ITU-T SG17 Q6 I Senior Researcher & Project Manager, China Mobile Research Institute I Editor of TR.zt-acp: Zero trust and practice in telecommunication networks [ Presentation ]
-
Francesco Chiarini, Chairman, ISSA.org Cyber Resilience Special Interest Group:
An adversarial viewpoint to identify High Value Targets: for increased Cyber Resilience [ Presentation
-
Manoj Sharma, Global Head, Security Strategy Symantec Enterprise Division, Broadcom: Zero Trust: A customer and practitioner's perspective [ Presentation ]
-
Sounil Yu, Author, Cyber Defense Matrix: Understanding Zero Trust through the Cyber Defense Matrix [ Presentation ]
-
Ilia Gerasimov, Researcher, Cryptography Lab, JSRPC “Kryptonite”:
Anonymous authentication for mitigation extended attack surface in zero trust systems [ Presentation ]
|
11:45 - 11:55 KST
| Coffee Break
|
11:55 - 13:15 KST
| Session 2: Need, security issues, threats and controls for software supply chain security
This session will focus on identifying a need and discussing security issues, threats and controls for software supply chain security.
Moderator: Jonghyun Kim, WP1 Vice-Chair and Q4 Co-Rapporteur, ITU-T Study Group 17, Security | Principal Researcher, Electronics and Telecommunications Research Institute (ETRI)
-
Allan Friedman, Senior Advisor & Strategist, Cybersecurity and Infrastructure Security Agency, US Government
-
Heejo Lee, Professor, Department of Computer Science and Engineering, Korea University (KU) I Director, Center for Software Security and Assurance (CSSA) I Founder & Co-CEO, Labrador Labs, Inc: SBOM technology development and challenges for securing software supply chains [ Presentation ]
-
Kyoung Ae Kim, LG Electronics, Korea (Rep. of):
SBOM tool essentials [ Presentation ]
-
Manhee Lee, Professor of Computer Engineering Department, Hannam University: Zero Trust for supply chain security [ Presentation ]
-
Yuto Nakano, Expert, Information Security Laboratory, KDDI Research, Inc &
Takao Kojima, KDDI Research Inc., Japan: A new use case of attribute certificates: application to software supply chain [ Presentation ]
-
Robert Martin, Senior Principal Engineer, MITRE Corporation:
Software supply chain risks that may need to be addressed [ Presentation ]
-
Scott Cadzow, Director, C3L (UK) I ETSI Fellow, ETSI: EU SBOM initiatives [ Presentation ]
|
13:15 - 14:10 KST |
Lunch Break
|
14:10 - 15:30 KST
|
Session 3: Implementation of zero trust and software supply chain security
This session will focus on implementing zero trust and software supply chain security and developing national and regional strategies and policies.
Moderator: Afnan AlRomi, Vice-chair, ITU-T Study Group 17 I Communications, Space & Technology Commission (CST), Saudi Arabia
-
Sheeba Baskaran, Advisory Researcher - Lenovo, Motorola Mobility I Rapporteur for the 3GPP SA3 ZT TR: Zero Trust Security -- 5G & Beyond [ Presentation ]
-
Tim Ashton, Policy lead, U.K. National Cyber Security Centre (NCSC):
Zero Trust [ Presentation ]
-
Ray Sung Joon Ahn, Director of Marketing, Sparrow Co., Ltd:
Software supply chain security [ Presentation ]
-
Chen Zhang, R&D Director of Security, China Mobile Group Design Institute:
Security research and practices on Zero Trust for Software Supply Chain in Computing Force Network [ Presentation ]
-
Youngrang Kim, CEO/CTO, PRIBIT Technology:
Introduction to products and technologies focused on ZTA implementation [ Presentation ]
-
Cassie Crossley, VP, Supply Chain Security, Schneider Electric:
Schneider Electric supply chain security program [ Presentation ]
-
Dmitry Raidman, CTO, Cybeats:
Cyber risk: The Software Bill of Materials (SBOM) and security through transparency or trust but verify
[ Presentation ]
-
Jini SungJin Park, Director/Embedded Solution Team/Solution Business Division, COONTEC: Supply chain security in OT/ICS environment with private 5G [
Presentation ]
|
15:30 - 16:00 KST
|
Coffee Break
|
16:00 - 17:30 KST
|
Session 4: Panel discussion – Future directions for Study Group 17
This session will focus on providing recommendations to SG17 for its future work.
Moderator: Yutaka Miyake, WP2/17 Chairman | Senior Manager, Technology Strategy Department, KDDI Corporation
-
Arnaud Taddei, Vice-chairman, ITU-T Study Group 17, Security | Broadcom
-
Heung Youl Youm, Chairman, ITU-T Study Group 17, Security | Professor, Department of Information Security Engineering, Soonchunhyang University [ Presentation ]
-
Sheeba Baskaran, Advisory Researcher - Lenovo, Motorola Mobility I Rapporteur for the 3GPP SA3 ZT TR
-
Duncan Sparrell, Chief Cyber Curmudgeon, sFractal Consulting [
Presentation ]
-
Tony Rutkowski, CEO, Netmagic Associates LLC [
Remarks ]
|
17:30 - 17:40 KST
| Closing Remarks
-
Heung Youl Youm, Chairman, ITU-T Study Group 17, Security | Professor, Department of Information Security Engineering, Soonchunhyang University [ Outcomes Document ]
|