8-9 March 2022 | Brussels, Belgium

Presentations by Topic

Complete Agenda | Presentations by Track | Presentations by Topic

Assurance
Automation
Certification
Cloud
Common Criteria
Critical Infrastructure
CSPCERT
Digital Single Market
ECSO
Embedded
Energy
ENISA
ERNCIP
EU Commission
Evaluations
FIPS
FISMA
GDPR
IACS
IEC-62443
IoT
ISACA COBIT
ISCI
ISO 27001
ISO 27552
Lightweight
NIST
OWASP
SESIP
SIM
Smart Card
SoC
Standards
Track A
Track B
Trusted Computing Group

5G Security—From Security Objectives to Operational Requirements (A11a)

Network slicing, NFV and SDN are essential technologies for achieving 5G infrastructures. They enable flexible and on-the-fly placement of network functions (VNFs/CNFs), aiming at optimizing the management of the heterogeneous (network, computational and storage) resources. This brings new security challenges that are of direct relevance for sensitives verticals and national...
Read More
Mohamad Hajj
Dr. Claire Loiseaux

First Experience with the Network Equipment Security Assurance Scheme (NESAS) (A11c)

In response to the development of various national security requirements for the telecommunications industry and the associated test or approval procedures, NESAS (Network Equipment Security Assurance Scheme) was developed by representatives of the telecommunications industry such as network operators and manufacturers as an internationally uniform and industry-specific scheme. The following...
Read More
Rasma Araby

Trustworthiness of Cellular Infrastructures: State-of-the-Art and Ongoing Developments (A12a)

The criticality of the cyber space increased significantly in modern time. Interdependencies between national critical infrastructure sectors and the emergence of new business cases with potential impact on safety further magnifies these risks. The EU Commission identified these concerns in their coordinated risk assessment and offered certification as one of...
Read More
Boutheina Chetali

Certifying Products Using 62443-4-2 (A13a)

Description to come:
Wouter Slegers

An Evaluation Methodology for IEC 62443-4-2 (A13b)

In this talk, in the beginning a brief overview of the IEC 62443 series is given with special focus on the parts that focuses on components (i.e. IEC 62443-4-2) and component developers. The talk gives an overview why there is a need for a new evaluation methodology. By the end...
Read More
Sebastian Fritsch

ENISA EFFORTS ON ARTIFICIAL INTELLIGENCE CYBERSECURITY (A13c)

In this talk, the EU Agency for Cybersecurity (ENISA) will discuss the main findings from its seminal work on mapping the Artificial Intelligence (AI) Threat Landscape. By following a lifecycle view of the AI ecosystem, ENISA worked on identifying relevant assets and following a methodological approach the Agency highlighted threats...
Read More

The EU Cybersecurity Ecosystem (B11a)

The purpose of the presentation will be to give an overview of the ecosystem for Cybersecurity and the related policy framework in the European Union and illustrate the mechanisms of interaction between the various institutions and their interrelationships. We will present an analysis of the industrial and regulatory policies in...
Read More
Jean Lehmann

2025, a Glimpse into the Future of the CSA, and How We Got Here (B11b)

It’s 2025! The Cybersecurity Act has been enforced in Europe for few years already, boosting the cyber resilience capability within the Union. Setting up an international benchmark on cyber security capabilities. By now, we are addressing what was once considered a complex issue. Automotive, Industrial, Communications and consumer markets are...
Read More
Carlos Serratos

State of the Art Approach on ICS Components Security Compliance Under the Umbrella of Upcoming Harmonized Certification (B13a)

One of the main challenges within the industrial cybersecurity is the current lack of mandatory regulation, leaving the responsibility for secure components heavily on the manufacturers. At the same time, the perspective of upcoming harmonized certification under the EU Cybersecurity Act asks manufacturers to take a pro-active approach. Currently there...
Read More
Anna Prudnikova