Hi [[ session.user.profile.firstName ]]

Recent developments in RED & EMCD: How to make the best use of ETSI

Wireless technology is becoming an ever-increasing part of our lives. The EMC Directive (2014/30/EU) and the Radio Equipment Directive (2014/53/EU) have now been in place for several years, but the technology and the regulatory environment are still developing rapidly. This webinar will give an overview of recent developments and identify how the more recent ETSI standards and other deliverables can be used to support manufacturers to demonstrate compliance and access the market in Europe.
Recorded May 11 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dr Michael Sharpe, ETSI
Presentation preview: Recent developments in RED & EMCD: How to make the best use of ETSI

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • ETSI Security Week:Industry Applications and Use Cases for Advanced Cryptography Jun 19 2020 8:30 am UTC 120 mins
    François Ambrosini,, Moderator, Scott Cadzow, Dr. Yang Cui, Dr. Jinguang Han
    The benefits of Advanced Cryptography are recognised by ETSI, as its members make developments and standards in Identity-Based Cryptography, Attribute-Based Encryption and other forms of Advanced Cryptography. This session focuses on applications of Advanced Cryptography, including a privacy-preserving electronic ticket scheme using attribute-based credentials to protect users' privacy, and a survey on how Attribute-Based Encryption could be deployed to protect mobile networks.
  • ETSI Security Week: Fully Homomorphic Encryption Jun 18 2020 1:00 pm UTC 90 mins
    Kirsty Paine, Moderator
    Homomorphic encryption is one of the technologies allowing the public cloud to operate on secret data without leaking any information about the data. In these two talks, the speakers give a general overview of the capabilities of homomorphic encryption and of the general security model. They will detail some of the tools and technologies that make it usable for concrete use-cases and share the latest advances in practical homomorphic encryption with a strong emphasis on applications to deep learning.
  • ETSI Security Week: Security Challenges and Regulatory Aspects Jun 18 2020 8:00 am UTC 90 mins
    Bengt Sahlin, Moderator, Tomasz Osko, David Soldani
    This session discusses security challenges due to new technological advancements, and discussed regulatory aspects related to 5G security
  • ETSI Security Week: 5G Network Certification Jun 17 2020 8:30 am UTC 120 mins
    Colin Whorlow, Moderator, Domenico Ferrara, Sven Lachmund, Goran Milenkovic, Cord-Heinrich Bartels, Marcus Wong
    This webinar will provide a status of the policy and industry actions to enable effective security of and trust in 5G networks.
  • ETSI Security Week: 5G Security Evolution Jun 16 2020 1:00 pm UTC 120 mins
    Noamen Ben Henda, Moderator, Takahito Yoshikawa, James Skuse
    This session includes presentations on the most recent 5G security features, and efforts within the industry for continuous improvement of 5G security.
  • SKINNY LATTE: Scalable Hierarchical Identity Based Encryption over Lattices Jun 15 2020 1:00 pm UTC 60 mins
    Kirsty Paine, Moderator, Sarah Mc Carthy,
    The ETSI-standardised TETRA communications system is used for instantaneous communication within emergency services and for military personnel. Whilst considering its transition to the PS-LTE network, it was proposed that identity-based encryption (IBE) could be used as a low latency solution. However, the scheme which was considered, MIKEY-SAKKE, is not resistant to quantum computing attacks.
  • ETSI Security Week: ETSI Standardisation in Advanced Cryptography Jun 11 2020 1:00 pm UTC 90 mins
    François Ambrosini, Moderator, Christoph Striecks,
    The academic community and the industry thrive with innovative cryptography that enable advanced access control and secure communication use cases. Functional Encryption is one such family of schemes. This session will introduce Attribute-Based Encryption (ABE), Identity-Based Encryption (IBE), and their related standardisation efforts in ETSI, including a quantum-safe hierarchical IBE scheme.
    ABE is a cryptographic mechanism that enforces access control solely on the mathematical level with strong security guarantees. A main incentive using ABE is to provide a proper and versatile replacement for software-only access-control mechanisms that need to embed all trust into (often seen to be error-prone) software components by design. Applications of ABE in EU research projects and ETSI TS 103 532 will be presented.
    IBE is a form of asymmetric encryption in which the participants’ identities (such as a phone number or an email address) serve as public keys. Participants wishing to securely communicate can do so directly, without having to aggree on keying material beforehand. IBE is well suited for the seamless onboarding of participants in cases where the task of establishing secure communications can be delegated to a trusted third party. The properties of IBE schemes will be summarised and the study conducted in ETSI TR 103 719 will be presented.
    As quantum computing poses a threat to the long-term security of most of the currently used encryption mechanisms, this session will also present ongoing efforts in the development of quantum-safe IBE, with a focus on a hierarchical IBE scheme based on structured lattices and described in ETSI TR 103 618.
  • ETSI Security Week: Consumer IoT Security - Certification Schemes Jun 11 2020 9:30 am UTC 120 mins
    Sonia Compans, Moderator, David Mudd, Roland Atoui, Juhani Eronen, Jamie Randall, Alex Buchan, Laurens Vanoijen
    Product assurance schemes play an important role in consumer IoT security. Typically, they provide a consumer-facing assurance label or kitemark which demonstrates that the product has undergone independent testing or a robust self-assessment process, thus helping consumers make security-conscious purchasing decisions. Assessment feedback can also be communicated privately to manufacturers to help them improve their product. But operating an assurance scheme for consumer IoT can be challenging, not least due to the broad diversity of relevant products and the rapid innovation in this space.
    This webinar panel features speakers with experience in this area. It will consider options for managing these challenges and look ahead to a possible IoT security certification scheme under the EU Cybersecurity Act.
  • ETSI Security Week: Consumer IoT security standards Jun 11 2020 8:00 am UTC 60 mins
    Jasper Pandza, Moderator, Gisela Meister
    A significant proportion of consumer Internet of Things (IoT) or ‘smart’ products currently on the market lack basic cyber security provisions. ETSI TC CYBER has developed European Standard (EN) 303 645 “Cyber Security for Consumer Internet of Things: Baseline Requirements”, which is expected to be published in July, to bring together widely considered good security / privacy practice for consumer IoT devices. The EN has been developed in collaboration with CEN/CENELEC JTC 13 experts. It is expected to inform the development of new legislation on IoT security in Europe and beyond.

    TC CYBER is also taking forward TS 103 701, which will set out test scenarios for assessing products against EN 303 645. It is to set out mandatory and recommended assessments, as well as guidance and examples to support their implementation. The document is intended to be used by testing labs and certifying bodies that provide assurance on the security of relevant products, as well as manufacturers that wish to carry out a self-assessment. The document is intended as input to a future EU common cybersecurity certification scheme as proposed in the Cybersecurity Act.
  • ETSI Security Week: 5G security for verticals Jun 10 2020 1:00 pm UTC 120 mins
    Stefan Schroeder, Moderator, Ian Oliver, Rong Wu, Haitham Cruickshank
    The best-known security features of a 5G network ensure secure operation of a public network: strong subscriber authentication, protection against fraud and eavesdropping, secure billing, robust services etc. Security addresses the typical trust relation between network operators and their customers.
    5G applications and deployments in vertical industries have complementary security requirements and different multi-party trust models that need to be addressed in addition, often on top of the 5G network. Moreover, the 5G deployment models may be different from the usual public mobile network, ranging from non-public campus networks in factories, over specific network slices for safety-critical applications like healthcare or railways, up to global V2X networks for transport applications.
    The EU Toolbox of risk mitigating measures for 5G explicitly mentions the need to address the risk of exploitation of IoT, handsets or smart devices - i.e. the verticals' domain- in addition to the need to secure the network.
  • Insight into the First Steps of the Cybersecurity Act Reality Jun 10 2020 8:30 am UTC 90 mins
    Andreas Mitrakas, Moderator, Aristotelis.Tzafalias, Philippe Blot, Eric.Vetillard
    EC& ENISA will provide the progress of work on the first schemes being under preparation: Common Criteria and Cloud Security certification. They will share the lessons learnt from the preparation of those schemes. EC will also provide an update on the latest steps taken within the Cybersecurity Act, such as an overview of the first Rolling Work Programme, potential next schemes…..
  • SSP: The New Smart Secure Platform – The Technical Realisation Jun 9 2020 2:45 pm UTC 60 mins
    Denis Praca, Moderator, Michele Berionne, Stéphane Schirar, Stéphane Bandin, Elder Dos Santos
    This session will cover in detail the published specifications ETSI TS 102 666-1 and -2 as well as the SPI protocol in ETSI TS 103 713 and will give an insight into the current work on the embedded SSP.
  • SSP: The New Smart Secure Platform – A High Level Introduction Jun 9 2020 1:00 pm UTC 90 mins
    Klaus Vedder, Moderator, Davide Pratone, Sophie Diallo, Andreas Bertling, Denis Praca
    This session will give a high-level introduction into the reasons for developing this new security platform, its requirements and impact on the ecosystem as well as the current state of testing and why certification is needed.
  • ETSI Security Week: 5G Deployment Jun 8 2020 1:00 pm UTC 120 mins
    Marcus Wong (Moderator), Silke Holtmanns, Pieter Veenstra
    5G poses a major architectural and functional change of a network. This move brings along many security questions and many have been tackled for the non-standalone or standalone architecture. We will discuss how to get securely from a 4G or non-standalone architecture to a standalone architecture. Different migration scenarios and architectures are described and what are the specific security aspects of it. This will be put into context with latest GSMA and 3GPP security approaches and features. Additionally, as we gain experience from the initial deployment and collect open issues related to standardization, operation, and implementation, we aim to provide an overview of practical guidelines and recommendations for mobile operators for the implementation of 5G networks.
  • Recent developments in RED & EMCD: How to make the best use of ETSI Recorded: May 11 2020 61 mins
    Dr Michael Sharpe, ETSI
    Wireless technology is becoming an ever-increasing part of our lives. The EMC Directive (2014/30/EU) and the Radio Equipment Directive (2014/53/EU) have now been in place for several years, but the technology and the regulatory environment are still developing rapidly. This webinar will give an overview of recent developments and identify how the more recent ETSI standards and other deliverables can be used to support manufacturers to demonstrate compliance and access the market in Europe.
  • ETSI ENI Architecture: AI for robust and manageable systems and applications. Recorded: May 6 2020 52 mins
    John Strassner
    This is an AI-based, context-aware architecture that uses Intent and other types of Policy Rules to improve the operator experience. This architecture is designed to provide recommendations and/or commands, and does not impose requirements on the systems that it aids that change the function or APIs of those systems. The ENI System Architecture will be described using a functional block approach, emphasising external and internal Reference Points to standardise communication. Its innovative closed control loops and model-driven engineering approaches will also be described.
  • Overview of ETSI reference architecture for Augmented Reality solutions Recorded: Apr 28 2020 61 mins
    Jerome Royan, Muriel Deschanel
    ISG ARF recently published the ETSI GS ARF 003 specifying a functional reference architecture for Augmented Reality (AR) solutions. It identifies key components and interfaces, and defines generic functionalities required by an AR solution. The webinar presents this reference architecture and how the ecosystem will benefit from it.
  • A new approach to networking protocols with ETSI Recorded: Apr 23 2020 62 mins
    Kevin Smith (Vice-Chairman), John Grant (Chairman)
    ETSI ISG NIN (Non-IP Networking) has been formed to standardize protocols that will provide better support for 21st century use cases than the TCP/IP-based networking used in current systems is able to. Kevin Smith will describe the problems mobile operators experience with the current technology and how the new technology might be deployed. Then John Grant will outline the main features of the new protocols.
  • Artificial Intelligence for networks: understanding it through ETSI ENI use case Recorded: Apr 17 2020 63 mins
    Luca Pesando, Yue Wang
    The Webinar provides a general overview of the background and ENI work, followed by a focus on the use cases with a few examples to show the benefit for network operation and management, as well as the instantiation of ENI reference architecture to address these use cases.
  • Multi-access Edge Computing in Action for Application Developers Recorded: Mar 16 2020 62 mins
    Dario Sabella, Walter Feathersone, Salvatore Scarpina, Edoardo Bonetto
    Multi-access Edge Computing in Action for Application Developers – special insights from the MEC Hackathons.
In depth coverage of ETSI's standards
ETSI's webcasts cover all our standardization in telecommunications, radiocommunications and ICT. Find out more about our work and how you can get involved at www.etsi.org

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Recent developments in RED & EMCD: How to make the best use of ETSI
  • Live at: May 11 2020 1:00 pm
  • Presented by: Dr Michael Sharpe, ETSI
  • From:
Your email has been sent.
or close