January 20 2021

#7 The EU 5G Security Toolbox (1/3) – Best Practices to Secure Critical Voice Services

The EU 5G Security Toolbox and the Need to Secure Critical Voice Services

This is the first in a series of three webinars for telco organisations that covers security assurance of 4G/5G voice services.

This introductory webinar covers market and technology trends for VoIP and the regulatory framework to the increased need for voice security measures. Further it gives an overview of the threat landscape, types and possible origins of threats and suggestions for measures based on best practice developed by BlueTC in collaboration with its strategic partner in this area.

Security for voice remains critical and voice is an essential operator service that generates important revenues. With the EU 5G Security Toolbox, the EU is strengthening the role of the national regulator in ensuring that mobile operators have their own network security systems extending into their supply chain. This is a fundamental shift whereby operators cannot outsource their responsibility and must take full ownership of security. The measures of the 5G Security Toolbox apply to VoIP services, independently of whether these are delivered over fixed, 4G or 5G networks.

Summary of the most important topics treated:

  • Voice Services Are Still Critical in 4G and 5G
  • The Future Evolution of VoIP Services, Tendencies and Forecasts (by Analysys Mason)
  • The New Regulatory Environment in the EU and the EEA: The EU 5G Security Toolbox
  • Increased Security Requirements for Operators – Extending Into the Supply Chain
  • The Importance of Trust for Operators
  • What Functions are Viewed as Critically Sensitive?
  • Types of Security Risks and Their Multiple Sources
  • Signalling/SIP and its Key Role in Securing Voice Services
  • BlueTC’s Collaboration with the GSMA Fraud & Security Group
  • A Classification of Network Security Risks Linked to Layers of the ISO Model
  • BlueTC’s Operator Security Maturity Model
  • BlueTC Best Practice – Part 1: IMS Security Assessments in Pre-Production Environments to Establish an Operator Security Base Line
  • BlueTC Best Practice – Part 2: The Recommendation of an IDS (Intrusion Detection System) Monitoring the Live Traffic

The main presenter is Ian Ginn, Director of Business Development in Western & Central Europe at Blue Telecom Consulting, with the participation of Roberto Kompany, Senior Analyst, Research at Analysys Mason.

The next webinars in this telco voice security series are held on the 10th of February (security assessments) and the 3rd of March 2021 (operational requirements and tools in live networks).

If you would like to receive a link to a private recording of the other Webinars in this series, or on other topics, please send and email with your contact data to marketing@laude.tech.


Leave a comment

Notify of
Inline Feedbacks
View all comments
Scroll to Top