You are here

5G Cybersecurity Requirements Webinar

Where Online
Event start 04-11-2021 10:00
Event end 04-11-2021 11:00
Industry 5G, Cybersecurity, Certification
Type Webinar

Security Assurance in the Mobile Industry

5G technology is settling in the market, especially in the mobile industry, where many manufacturers are already incorporating it into their devices. In this context, it's important that security requirements are considered and implemented when using and commercializing products with this new technology.

NESAS, the Network Equipment Security Assurance Scheme, provides an industry-wide security assurance framework, with different requirements and test cases, to facilitate improvement in security across the mobile industry. It was defined by the GSMA and the 3GPP, or 3rd Generation Partnership Project, a group of standards organizations that develop protocols for mobile telecommunications. NESAS defines a globally applicable security baseline that network equipment vendors can meet. Moreover, it's intended to be used alongside other mechanisms to ensure a network is secure, in particular an appropriate set of security policies covering the whole lifecycle of a network.

We invite you to join our free webinar on November 4th, from 10 am to 11 am, and learn about 5G cybersecurity requirements. Our expert Santiago Gómez, Cybersecurity Project Manager at DEKRA in Spain, will explain the main aspects of:

• Security Assurance in The Mobility Industry.
• Network Equipment Security Assurance Scheme (NESAS).
• SCAS Evaluation Test Laboratory.
• NESAS Benefits.
• Security Compliance Testing.
• Basic Vulnerability Testing.

This webinar is especially aimed at technicians and managers of Engineering, R&D, Production, Technicians, Quality and Homologation of device manufacturing companies.

The session of this webinar will take place from 10 am to 11 am (CEST).

The webinar will finalize with a questions & answers round. Do not hesitate to bring yours!

Register now



Santiago Gómez Muñoz is graduated in Computer Science. He has experience in areas related to operating systems, networking, application development, vulnerability analysis/penetration testing in several IT environments. He has been involved in many security evaluations under Common Criteria, FIPS 140-2 and NESAS schemes.