Network of the Future 2019

June 04, 2019 - June 05, 2019

Network of the Future

2019 // SECURITY AND RESILIENCY

YOUR EXPERIENCE STARTS HERE

Network of the Future 2019 focuses on how the communications industry can collaborate to advance security and resiliency for next-generation networks. As the ICT sector focuses on virtualization, NOF19 will address issues and use cases related to supply chain security, telecom infrastructure resiliency, securing the IoT and edge data, blockchain, machine learning/AI, and much more.

Tuesday - June 04
9:00 am - 12:00 pm
  Off-Site Experience
1:00 pm - 1:45 pm
  Welcome & Keynote Presentation: Securing 5G Infrastructure
1:45 pm - 2:45 pm
  Supply Chain Security
This session discusses best practices for preventing bad-actors from disrupting the Telecom supply chain, how much government intervention is necessary, and how the ICT industry is combating today’s threats.
2:45 pm - 3:00 pm
  Networking Break
3:00 pm - 4:00 pm
  Network/Edge Vulnerabilities 
What vulnerabilities have been created by the traditional “hard shell, squishy center” security architecture? How do we create a new security infrastructure where threats are discovered at each location in the network, and protections created? This session will discuss how to increase the probability of stopping an attack at each location of the edge and at each stage in the attack kill-chain.
  Future-proofing IoT
This session will explore the security challenges posed by the Internet of Things and the implications of the interconnectivity of everything. The discussion will focus on processes and technologies for managing IoT security in the enterprise, including device management and emerging threats to AI and automation.
  Benchmarking Quality & Performance Reliability 
4:00 pm - 5:00 pm
  Main Stage Session: The Next-Gen Security Platform
Should the next generation of security platforms be autonomous? Are machine-learning and AI the best defense for 5G networks? This discussion explores how expanded attack surfaces in virtual networks should be best monitored and defended.
5:00 pm - 7:00 pm
  All Attendee Opening Reception
Wednesday - June 05
6:00 am - 7:00 am
  Wellness Experience: Yoga
7:30 am - 9:00 am
  Breakfast
9:15 am - 9:30 am
  TIA State of the Association Address
9:30 am - 10:00 am
  Keynote Presentation: Governance, Risk and Compliance
10:00 am - 11:00 am
  Small Cell/Distributed Attack Vectors
Small cell deployments will initially use backhaul connections that pass over the public Internet. This session will confront wireless infrastructure security challenges, and focus on finding solutions to protect the hardware and software integrity of small cells.
  Edge Data Ceters & 5G: The Use Case
We are quickly moving toward an era of IoT where billions of gigabyte of new data will be generated, shared and stored. This session will focus on the edge data center security use case as we begin moving resources to the edge and building networks that are going to be a critical part of 5G transformation.
  The Role of Quality Assurance in Security
11:00 am - 12:00 pm
  Network/Edge Vulnerabilities 
What vulnerabilities have been created by the traditional “hard shell, squishy center” security architecture? How do we create a new security infrastructure where threats are discovered at each location in the network, and protections created? This session will discuss how to increase the probability of stopping an attack at each location of the edge and at each stage in the attack kill-chain.
  Cyber Attacks, Pivots, and Impacts in Smart Building Networks
How will Smart Building Networks be reinforced to combat attacks? This session will discuss best practice for Cyber Security risk mitigation, and an analysis of the enablers, drivers and barriers shaping this building block of Smart Cities.
  Business Assessment Tools and Strategies
12:00 pm - 1:00 pm
  Lunch
1:00 pm - 2:00 pm
  Safeguarding the Cloud & Virtualization
This session explores the security aspects of using and leveraging cloud services, virtualization technologies/services, segmentation, deployment models, network function virtualization (NFV) and hybrid architectures to support 5G.
  The Zero Trust Architecture 
The Zero Trust concept is centered on the belief that organizations should trust nothing inside or outside its network perimeters, and instead must verify anything and everything trying to connect to its systems before granting access. This session explores the possibilities for Zero Trust in network architecture, and whether this new thinking is the path forward.
  Resilient Interoperability
2:00 pm - 3:00 pm
  The Network Certification Path to Security
  Blockchain and Network Security
Can blockchain enable a new generation of access technology selection mechanisms required for the realization of 5G networks? This discussion will explore emerging use cases, security considerations and practical applications for this rapidly changing, transformative technology.
  Testing Best Practices: Quality Assurance & Security Considerations
3:00 pm - 3:15 pm
  Networking Break
3:15 pm - 4:15 pm
  Main Stage Session: Hackers, Threats and Responses 
Experienced White Hat hackers lead this discussion around new classes of vulnerabilities, advanced threats, ransomware, cyber-weapons, exploitation techniques, reverse engineering, and how to combat these problems.
4:15 pm - 5:00 pm
  Keynote Presentation: Security and the Digital Economy
Speakers
Name Organization Speaking At
Venue Details
Dallas/Plano Marriott at Legacy Town Center
7121 Bishop Rd
Plano, TX 75024

Get directions

Venue Images

Continuing Education

Dates
Event dates
June 04, 2019 - June 05, 2019
Early bird deadline
Monday, April 01, 2019
Registration deadline
Saturday, May 25, 2019
Location
Dallas/Plano Marriott at Legacy Town Center
7121 Bishop Rd
Plano, TX 75024

Get directions