{"id":3056,"date":"2022-04-22T13:25:46","date_gmt":"2022-04-22T13:25:46","guid":{"rendered":"https:\/\/www.eucnc.eu\/?page_id=3056"},"modified":"2025-05-23T16:11:33","modified_gmt":"2025-05-23T16:11:33","slug":"convened-session-3","status":"publish","type":"page","link":"https:\/\/www.eucnc.eu\/programme\/special-sessions\/convened-session-3\/","title":{"rendered":"Convened Session 3"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><h3><strong>Uncovered 6G Security: gap and needs for the evolution beyond 5G security and towards 6G Networks<\/strong><\/h3>\n<h6>Thursday, 5 June 2025, 11:00 \u2013 12:30, room EH.A (level2)<\/h6>\n<h5>Session Chair:<\/h5>\n<ul>\n<li><strong>Pavlos Fournogerakis<\/strong> (Deputy Head of Programmes, SNS JU)<\/li>\n<li><strong>Alexandros Kaloxylos<\/strong> (6G-IA)<\/li>\n<li><strong>Pascal Bisson<\/strong> (Chair 6G-IA Security WG)<\/li>\n<li><strong>Roberto Cascella<\/strong> (Chief Technology Officer \u00b7 European Cyber Security Organisation (ECSO)<\/li>\n<li><strong>Kerboeuf, Sylvaine<\/strong> (Nokia -Bells Labs)<\/li>\n<li><strong>Pawani Porambage<\/strong> (VTT)<\/li>\n<li><strong>Diego L\u00f3pez<\/strong> (Telef\u00f3nica I+D)<\/li>\n<li><strong>Antonio Skarmeta<\/strong> (Co-chair 6G-IA Security WG)<\/li>\n<\/ul>\n<p class=\"rtejustify\" style=\"text-align: justify;\">In the last year we have seen relevant new trends and solution being defined in the context of 5G Security to overcome the new cybersecurity risks in future networks, in many cases results from different 6G-SNS projects. Innovative concepts for security management of 5G networks and beyond from a holistic high-level architecture perspective; fully-automated and secured 5G infrastructure; and the adoption of a set of emerging trends and technologies is crucial, namely, Zero-touch network and Service Management (ZSM), Software-Defined Security (D-SEC) models, Artificial Intelligence\/Machine Learning (AI\/ML) techniques, Distributed Ledger Technologies (DLT), Zero Trust models, and Trusted Execution Environments (TEE).<br \/>\nGoing a next step, the purpose of this session is to raise awareness of the panorama of solutions in 6G security and identify new trends, needs and evolution of the actual architecture to support the new challenges of the 6G. Additionally, we need to mobilise the European stakeholders, establish the cross-sector collaboration with relevant initiatives and ensure a European consensus, boosting the European role in standardisation and contributing to ensure European sovereignty in these critical supply chains. In this context, cooperation and coordination with other stakeholders at European level like ECSO, EC and others are key to prepare for the identification of the 6G security challenges and the R&amp;I activities to be undertaken, ensuring a full alignment with the European policy landscape, calling for secure and resilient Connected Collaborative Computing Networks (3C Network).<\/p>\n<h5>Programme<\/h5>\n<p><strong>Introduction \/ Welcome <\/strong><\/p>\n<p>&#8211; Welcome, Setting Scene, <em>Pavlos Fournogerakis, Deputy Head of Programmes, SNS JU (5 mins) <\/em><br \/>\n&#8211; Opening Statements, <em>Alexandros Kaloxylos 6G-IA (5 mins) <\/em><br \/>\n&#8211; Opening Statements, <em>Antonio Skarmeta, Chair 6G-IA Security WG (5 mins) <\/em><\/p>\n<p><strong>Talks \u2013 Towards 6G Security<\/strong><\/p>\n<p><strong>Beyond 5G Security:<\/strong><br \/>\n&#8211; Existing GAP and Research Priorities on 6G Security, <em>Emmmanuel\u00a0 Dottaro, Fellow 5G-6G expertise Thales (10 mins)<\/em><br \/>\n&#8211; ECCC: Europe\u2019s cybersecurity technological advancement and capabilities development, <em>Polyvios Hadjiyiangou, Head of Unit \u2013 Operations European Cybersecurity Competence Centre (ECCC) (10 mins)<\/em><br \/>\n&#8211; From 5G security to 6G: new trends, <em>Antonio Skarmeta, Co-chair 6G-IA Security WG (10 mins)<\/em><br \/>\n&#8211; Evolution of the 6G Architectures and its security,<em> Pawani Porambage, VTT (10 mins)<\/em><\/p>\n<p><strong><em>\u00a06G Impact<\/em><\/strong><br \/>\n&#8211; 6G and Cybersecurity Roadmap, <em>Cristina Regueiro, PhD &#8211; Senior Researcher \/ DIGITAL from Tecnalia in representation of\u00b7 European Cyber Security Organisation (ECSO) (10 mins) <\/em><br \/>\n&#8211; Standards trends on security and their applicability to 6G<em>, Diego L\u00f3pez, Telef\u00f3nica I+D (10 mins) <\/em><\/p>\n<p><strong>Q&amp;A Session <\/strong><em>(15 mins) <\/em><br \/>\n&#8211; Moderator, <em>Kerboeuf, Sylvaine, Nokia -Bells Labs<\/em><\/p>\n<p><strong>Conclude and Session Close <\/strong><br \/>\n&#8211; Concluding remarks<em> Antonio Skarmeta, 6G-IA Security WG<\/em><\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":521,"menu_order":45,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3056","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.eucnc.eu\/wp-json\/wp\/v2\/pages\/3056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eucnc.eu\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.eucnc.eu\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.eucnc.eu\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eucnc.eu\/wp-json\/wp\/v2\/comments?post=3056"}],"version-history":[{"count":30,"href":"https:\/\/www.eucnc.eu\/wp-json\/wp\/v2\/pages\/3056\/revisions"}],"predecessor-version":[{"id":13173,"href":"https:\/\/www.eucnc.eu\/wp-json\/wp\/v2\/pages\/3056\/revisions\/13173"}],"up":[{"embeddable":true,"href":"https:\/\/www.eucnc.eu\/wp-json\/wp\/v2\/pages\/521"}],"wp:attachment":[{"href":"https:\/\/www.eucnc.eu\/wp-json\/wp\/v2\/media?parent=3056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}