Thinking Like a 5G Attacker


Posted on in Presentations

5G technology is enabling a vast application landscape through network slicing which presents significant security challenges. This talk will discuss research that considers 5G threat vectors to “think like a 5G attacker.” The goal is to automate Attack Graph generation to illuminate vulnerable paths of attack among disparate network slices, given the network state.

Session slides not available per the request of the presenters.


Participants
Dr. Shehadi Dayekh

Speaker

Specialist Leader, Deloitte

Dr. Abdul Rahman

Speaker

Associate Vice President, Deloitte

Hackers & Threats

cyber warfare & cyber weapons cyberattacks


Topic

Subtopic


Share With Your Community