Hacking 5G: Top Ten 5G Zero-Day Attacks to Expect in 2020 and Beyond

Sponsored By: TeleStrategies' ISS WorldŽ

January 29, 2019 : Online Webinar

TIME: 9:00-10:00 AM New York Time, Eastern USA Time

Free for Law Enforcement, the government intelligence community, telecom operators and private enterprise cyber security managers. Registration with Government or Corporate e-mail address is required.

Click here to register  Click Here To Register

Hacking 5G: Top Ten 5G Zero-Day Attacks to Expect in 2020 and Beyond

If you are a cyber security executive of an enterprise planning to deploy a new business venture built atop 5G or a government executive responsible for setting 5G infrastructure protection mandates and think that all that's needed to be done to secure 5G is to ban Huawei 5G equipment from your country, you have alot to learn about 5G Security or "Lack-of".

This webinar addresses why 2G-3G-4G mobile network infrastructure is virtually immune from cyber hacking, denial of service attacks, ransomware and more and why these defense features don’t apply to the new, revolutionary features found in 5G infrastructure.

"The formulation of a problem is often more essential than its solution"
- Albert Einstein

Below are ISS World Top Ten 5G Zero-Day Attack Targets we have identified via OSINT research. If your planned 5G service provider can't explain why these are not secruity vulnerabilities, this webinar should help you formulate your questions and you should be demanding answers. Specific hacking and denial of serivce (DoS) 5G infrastructure targets to be addressed (light on 5G acronyms) are:

5G Hacking Infrastructure Targets:

  1. Hacking IoT 5G Services
  2. Hacking 5G Network Function Virtualization (NFV) Infrastructure
  3. Hacking 5G Machine to Machine (M2M) Communications Services
  4. Hacking 5G Device to Device (D2D) Communications Services
  5. Hacking 5G Network Slicing Services

    5G Denial of Services (DoS) Targets: 

  6. Attacking 5G Software Defined Network (SDN) Infrastructure
  7. Attacking 5G Small Cells
  8. Attacking 5G Cloud-Radio Access Network (RAN) Infrastructure
  9. Attacking 5G Mobile Edge Computing (MEC)
  10. Attacking WiFi & LiFi 5G Interoperabily

There is no doubt 5G Security Standard Groups will have patches for the above attack targets. But this will likely be years after the attacks actuarily occur. Also note, the first 5G security standards release (Release 16) is not scheduled at this time until March 2020. For some 5G network providers, this will be nearly a year after they have deployed their first 5G offering.

As such, this webinar ends with three ISS World recommendations on what government should mandate 5G operators to do in 2019 to increase 5G security by orders of magnitude in 2020.

Presented by:
Jerry Lucas (Ph.D., Physics)
President, TeleStrategies


Matthew Lucas (Ph.D., Computer Science)
Vice President, TeleStrategies

Click here to register  Click Here To Register

Webinar FAQ's

All Contents Copyright © 2019
TeleStrategies, Inc.
6845 Elm Street, Suite 310
McLean, VA 22101

703-734-7050 fax:703-893-3197