Hi [[ session.user.profile.firstName ]]

Introduction to Secure Artificial Intelligence (ISG SAI).

ETSI ISG SAI is the first technology standardisation group focusing on securing AI. This webinar will provide an introduction to ISG SAI, the challenges of securing AI and current state of work within ISG SAI.
Oct 21 11:00 am UTC 60 mins
Starting in 00:00:00
Your place is confirmed,
we'll send you email reminders
Presented by
Alex Leadbeater, ISG SAI Chair
Presentation preview: Introduction to Secure Artificial Intelligence (ISG SAI).

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Achieving security and compliance in cyber space through PDLs Oct 29 2020 2:00 pm UTC 75 mins
    Christophe Gossard, Tooba Faisal
    Achieving security and compliance in cyber space through permissioned distributed ledgers

    Presentation 1: Applicability and compliance to data processing requirements for a connected machinery

    The presentation will describe the impact that the use of connected machinery has upon health and safety compliance. This will specify security requirements for electronic control units, telematics gateway, computational portion of smart sensors, computational portion of smart actuators, and computational portion of other devices. The PDL will not only specify security for on-machine communications between electronic control units and sensors but also to the cloud infrastructure.

    Presentation 2: The exploitable properties of smart contracts to enable future generation applications

    This presentation will discuss portability needs for future generation applications and their security requirements. The adoption of PDL and smart contracts can facilitate these challenges and implement secure and coherent data sharing.
  • The challenge of operating networks with encryption everywhere Oct 28 2020 2:00 pm UTC 75 mins
    Tony Rutkowski, Scott Cadzow, Chair and Vice Chair ISG ETI.
    The challenge of operating networks with encryption everywhere

    The ever pervasive adoption of encryption poses challenges to many of the core stakeholders in society that rely on communications. From the perspective of the developers and operators of networks it makes many routing efficiencies difficult if not possible to achieve. The core phenomena that the ETSI ISG Encrypted Traffic Integration is trying to avoid is that of “going dark”, the phenomenon by which an authorised user lacks the technical or practical ability to access data, applies in particular to access to Encrypted Traffic where a normally authorised user, for example the CSP's management entity, cannot access data due the imposition of encryption by an end-user. The intersection of the two elements, A, representing network capabilities that, when content and headers are encrypted, pose extreme challenges to network operation, and B, representing Network capabilities that are core to development of cyber/digital business, has to be minimised, whilst always seeking to eliminate A. Thus getting to understand and mitigate issues that make A more likely and developing strategies that encourage all the good things that security and confidentiality of traffic using encryption can bring, i.e. maximising B, is at the root of the work of ETSI’s ISG ETI that this webinar will address.
  • Introduction to Secure Artificial Intelligence (ISG SAI). Oct 21 2020 11:00 am UTC 60 mins
    Alex Leadbeater, ISG SAI Chair
    ETSI ISG SAI is the first technology standardisation group focusing on securing AI. This webinar will provide an introduction to ISG SAI, the challenges of securing AI and current state of work within ISG SAI.
  • ETSI Cyber Security Standardisation Overview - 2020 Update. Recorded: Oct 15 2020 74 mins
    Alex Leadbeater, TC CYBER Chair
    TC CYBER, the most security-focused Technical Committee in ETSI, is sharing its recent work, to celebrate Cyber Security Month in October 2020. Highlights for 2020 will include Consumer IoT Security, Middleboxes, Quantum Safe Cryptography, Cyber Security Act (CSA) and Radio Equipment Directive (RED).
  • TTCN-3 language extensions object-oriented features Recorded: Oct 9 2020 57 mins
    Jens Grabowski, Axel Rennoch, György Réthy, Kristóf Szabados, Tomas Urban, Jacob Wieland
    The new TTCN-3 extension “Object-oriented features” introduces the concepts “classes”, “objects” and “exception handling” into the TTCN-3 language. Even though some of these concepts have been implemented implicitly in the TTCN-3, the concepts are now integrated explicitly into the language allowing a new style of test specification that provides new ways of designing abstract data types, in the form of user defined classes, and integrating external data by means of external classes. This presentation informs TTCN-3 users, test engineers and test managers about the newest developments of the language.
  • OSM Release EIGHT Recorded: Oct 7 2020 91 mins
    Francisco-Javier Ramon (Telefonica), Guillermo Calvino (Canonical), Gianpietro Lavado (Whitestack)
    This Webinar will provide an update on the status of ETSI's Open Source MANO project and its latest achievements, including two live demos showcasing new features in OSM Release EIGHT and the end-to-end deployment of a mobile network service based on Magma EPC.

    1)OSM Intro by Francisco-Javier Ramon, OSM Chair, Telefonica
    2)OSM System Features in action demo by Guillermo Calvino, Canonical
    Featuring: Next Generation User Interface, High Availability, System Quotas and Monitoring
    3)Network Service Deployment with OSM demo by Gianpietro Lavado, Whitestack
    Featuring: Magma EPC Deployment, High Performance Network Functions, VNF Catalog
  • TTCN-3 general concepts and applications Recorded: Oct 6 2020 52 mins
    Axel Rennoch, Jens Grabowski, György Réthy, Kristóf Szabados, Tomas Urban, Jacob Wieland
    The Testing and Test Control Notation TTCN-3 is the only standardized test specification and implementation language used in industry and research to define and execute different types of tests in multiple domains like e.g. telecommunication or automotive. The notation supports an abstract description of test scenarios. Due to multiple tool support, including powerful open source projects, it is successfully worldwide in use e.g. for testing and certification of mobile phones by 3GPP or the oneM2M products. The presentation introduces the goals, technical concepts and various applications of the TTCN-3 technology.
  • Boost innovation and create business opportunities with mobile edge computing Recorded: Oct 1 2020 104 mins
    Nurit Sprecher, Dave Bolan, Omar Elloumi, Alex Reznik, Suresh Chitturi
    Mobile edge computing is a keystone of the Ultra-Reliable, Low Latency Connectivity (URLLC) and the digital transformation and mobilization of the enterprise industries. It also enables a new class of premium applications that require real-time delivery of live and on-demand content as well as a high degree of interactivity, for example: gaming, 360 video delivery, AR/VR, etc. ETSI ISG MEC and 3GPP have both worked on their own architectures for edge computing within the boundaries of their different scopes. Their common purpose, however, is to create an open and standardized IT service environment for hosting and supporting third-party applications in edge clouds while also leveraging the underlying network infrastructure. In order to accelerate time-to-market and promote industry adoption, it is essential to ensure alignment, leverage synergies and offer common practices and tools for the developers. This will foster innovation and enable the developers to write a single application software module that can run on every edge environment, and support the GSMA requirements for federation.
    The speakers will review the emerging mobile edge computing use cases and the recently updated 5-year mobile edge computing market forecast from DellOro. They will also highlight the role of standards, the value proposition of the different standards streams and will show how those standards can complement each other when it comes to operational deployments. Some deployment scenarios will also be introduced.
  • Education about ICT Standardization Recorded: Sep 24 2020 104 mins
    Dr. habil Nizar Abdelkafi, Prof. Rafaele Bolla, Dr. Alejandro Rodriguez-Ascaso, Dr. Michelle Wetterwald, Prof. Ray Walshe
    Education is an important instrument in raising awareness and providing support for standardization. To promote the ICT standardization process, it is important to increase the understanding and attractiveness of standards with lecturers and students alike. Strong teaching materials provide a major tool that can be used to convey the value of standardization.
    ETSI has published a detailed textbook and corresponding slide presentation in 2018. Entitled “Understanding ICT Standardization: Principles and Practice”, they have been produced in order to assist academia and students in understanding the value of well written technology standards. The textbook and slides can be downloaded from the ETSI website. The overall objective of this initiative is to get feedback for the material as we move into 2020-2021 as ICT is an ever-changing field.
  • Decentralised Trust on Internet Infrastructure: Securing Inter-Domain Routing Recorded: Sep 15 2020 44 mins
    Albert Cabellos
    The Border Gateway Protocol (BGP) glues the Internet, it provides reachability and routing to the building blocks of the Internet, networks referred as Autonomous Systems (ASes). BGP was not designed with security in mind, and as a consequence it contains critical security issues that can affect the Internet infrastructure. There have been several instances of attackers exploiting such security issues that have resulted in important disruption of services provided over the Internet. The most common security threats are: (i) prefix hijacking: where an attacker takes over control over a set of IP addresses (ii) path hijack: where attackers control the path of the flow of information between ASes and (iii) route leaks, where an AS announces a path incorrectly. Give the importance of the security of BGP for the entire Internet infrastructure, research efforts have been devoted to mitigate such attacks. Existing proposals aims to secure BGP by using a standard centralized Public Key Infrastructure approach. In this talk we will show how BGP can be secured using a decentralised approach. By taking advantage of Decentralized Ledger Technologies, we research and design a Decentralized Internet Infrastructure that effectively protects BGP against all three attacks: prefix hijack, path hijack and route leaks. In addition, we have built a prototype and at the end of the talk we will briefly demonstrate how it works.
  • IPv6 Best Practices, Benefits, Transition Challenges and the Way Forward Recorded: Sep 14 2020 92 mins
    A Brand, L Ladid, P Thubert, E Metz, Chongfeng Xie, C Ralli Ucendo, C Filsfils, S Lourdez, R Li
    Today over 1.2 billion Internet netizens are using IPv6 without even knowing it. In the 5G & cloud era, the number of nodes connected to the Internet will exceed 100 billion. IP networks continue to scale rapidly, while network services become more diversified than ever. IPv6 provides a tremendous number of IP addresses and greater options for IP packet forwarding, creating opportunities to offer better network services.
    In this webinar, which follows the release of ETSI White Paper No.35, we plan to detail the progress made to date, IPv6 best practices, the benefits, transition challenges, and IPv6 Enhanced Innovation. All of this will also point to the way forward.
  • TETRA to 2035 and beyond Recorded: Sep 10 2020 40 mins
    Brian Murgatroyd, TC TCCE Chair, David Chater-Lea, Jeppe Jepson
    TETRA to 2035 and beyond. Marketing overview, InteropTesting, TETRA and standards development, packet date enhancements, TETRA security, interworking with critical communications broadband systems
  • More Advanced Cryptography - Fully Homomorphic Encryption Recorded: Jun 23 2020 64 mins
    Kirsty Paine, Moderator, Ilaria Chillotti, Mariya Georgieva
    More Advanced Cryptography - Fully Homomorphic Encryption
  • ETSI Security Week:Industry Applications and Use Cases for Advanced Cryptography Recorded: Jun 19 2020 99 mins
    François Ambrosini,, Moderator, Scott Cadzow, Dr. Yang Cui, Dr. Jinguang Han
    The benefits of Advanced Cryptography are recognised by ETSI, as its members make developments and standards in Identity-Based Cryptography, Attribute-Based Encryption and other forms of Advanced Cryptography. This session focuses on applications of Advanced Cryptography, including a privacy-preserving electronic ticket scheme using attribute-based credentials to protect users' privacy, and a survey on how Attribute-Based Encryption could be deployed to protect mobile networks.
  • ETSI Security Week: Fully Homomorphic Encryption Recorded: Jun 18 2020 2 mins
    Kirsty Paine, Moderator
    Homomorphic encryption is one of the technologies allowing the public cloud to operate on secret data without leaking any information about the data. In these two talks, the speakers give a general overview of the capabilities of homomorphic encryption and of the general security model. They will detail some of the tools and technologies that make it usable for concrete use-cases and share the latest advances in practical homomorphic encryption with a strong emphasis on applications to deep learning.
  • ETSI Security Week: Security Challenges and Regulatory Aspects Recorded: Jun 18 2020 89 mins
    Bengt Sahlin, Moderator, Tomasz Osko, David Soldani
    This session discusses security challenges due to new technological advancements, and discussed regulatory aspects related to 5G security
  • ETSI Security Week: 5G Network Certification Recorded: Jun 17 2020 98 mins
    Colin Whorlow, Moderator, Domenico Ferrara, Sven Lachmund, Goran Milenkovic, Marcus Wong
    This webinar will provide a status of the policy and industry actions to enable effective security of and trust in 5G networks.
  • ETSI Security Week: 5G Security Evolution Recorded: Jun 16 2020 97 mins
    Noamen Ben Henda, Moderator, Takahito Yoshikawa, James Skuse
    This session includes presentations on the most recent 5G security features, and efforts within the industry for continuous improvement of 5G security.
  • SKINNY LATTE: Scalable Hierarchical Identity Based Encryption over Lattices Recorded: Jun 15 2020 42 mins
    Kirsty Paine, Moderator, Sarah Mc Carthy,
    The ETSI-standardised TETRA communications system is used for instantaneous communication within emergency services and for military personnel. Whilst considering its transition to the PS-LTE network, it was proposed that identity-based encryption (IBE) could be used as a low latency solution. However, the scheme which was considered, MIKEY-SAKKE, is not resistant to quantum computing attacks.
  • ETSI Security Week: ETSI Standardisation in Advanced Cryptography Recorded: Jun 11 2020 85 mins
    François Ambrosini, Moderator, Christoph Striecks,
    The academic community and the industry thrive with innovative cryptography that enable advanced access control and secure communication use cases. Functional Encryption is one such family of schemes. This session will introduce Attribute-Based Encryption (ABE), Identity-Based Encryption (IBE), and their related standardisation efforts in ETSI, including a quantum-safe hierarchical IBE scheme.
    ABE is a cryptographic mechanism that enforces access control solely on the mathematical level with strong security guarantees. A main incentive using ABE is to provide a proper and versatile replacement for software-only access-control mechanisms that need to embed all trust into (often seen to be error-prone) software components by design. Applications of ABE in EU research projects and ETSI TS 103 532 will be presented.
    IBE is a form of asymmetric encryption in which the participants’ identities (such as a phone number or an email address) serve as public keys. Participants wishing to securely communicate can do so directly, without having to aggree on keying material beforehand. IBE is well suited for the seamless onboarding of participants in cases where the task of establishing secure communications can be delegated to a trusted third party. The properties of IBE schemes will be summarised and the study conducted in ETSI TR 103 719 will be presented.
    As quantum computing poses a threat to the long-term security of most of the currently used encryption mechanisms, this session will also present ongoing efforts in the development of quantum-safe IBE, with a focus on a hierarchical IBE scheme based on structured lattices and described in ETSI TR 103 618.
In depth coverage of ETSI's standards
ETSI's webcasts cover all our standardization in telecommunications, radiocommunications and ICT. Find out more about our work and how you can get involved at www.etsi.org

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Introduction to Secure Artificial Intelligence (ISG SAI).
  • Live at: Oct 21 2020 11:00 am
  • Presented by: Alex Leadbeater, ISG SAI Chair
  • From:
Your email has been sent.
or close