How Telecom Networks including 3G, 4G and 5G are architected and can be attacked by skilled hackers. What is the threat surface and attack vectors as per each of domain and what crown Juels are objective of an attack in modern networks.
Robert Rosłonek
“He who knows all the answers has not been asked all the questions.”― Confucius This motto drivers Robert forward as every day there are always new things to learn. Robert is a telecom security consultant and together with his team leads detection engineering in Advanced Consulting Services at Nokia. He spend last 18 years in various Nokia units trying to understand how Telecom Networks are designed and protected. Nowadays helps Telecom Operators around the globe to secure their 5G deployments.
Ещё видео!