Dinner for attendees arriving earlier to Reading (not sponsored)

Restaurant TBC

Session 1: Welcome by the Host and Roundtable Introductions
Session 1: Security Strategy Updates and Introduction of new Partners

Every participant prepares a short, 3-5 min input (slides are optional) on recent challenges, threats, incidents, projects, and future plans in their organisation. Participants are also invited to share what expectations they have from our 2-day meeting.

More time can be allocated for new members introducing their organisations

Coffee Break
Session 1 (continuation): Running the Oracle-wide security programme

Presentation by Adam O’Brien, Oracle Global Product Security (GPS) team

Session 2: "Risk management strategies with a focus on risk acceptance"

Presentation from ENISA:

- "The new implementing act for security measures and incident reporting", Georgia Bafoutsou, ENISA, 20' + Q&A

Telco presentation:

- TBC

Lunch Break
Session 3: Visit to the Oracle Lab

Attendees will separate into two groups and be given a guided tour with a joint lecture in the end.

Coffee Break
Session 4: "Security of AI & AI for Telecom Security"

We accept presentation proposals at this time - please contact Andrija Visic at av@etis.org

Confirmed:

"Safe, Secure & Responsible AI", by Tom Curry, Senior Security Consultant, Office of the CISO, Google Cloud, 25' + Q&A

Presentation 2 TBC

Walking tour of Reading

From a meeting spot of choice to the restaurant where we'll have the community dinner

Community Dinner sponsored by Oracle

Restaurant TBC

Session 5: "Creating the Telco Security Landscape 2025, by TNO & ETIS”

Introduction/recap + break-out group assignments

The Telco Security Landscape is an annual publication between TNO and ETIS's Information Security WG members. It is a tangible outcome for telco security professionals worldwide to use.

All participants in the meeting are encouraged to participate in the break-out group discussions and the plenary consolidation of outcomes.

Moderator: Richard Kerkdijk, Senior Security Consultant, ICT, Strategy & Policy

Break-out group discussions

3 breakout groups are formed

Plenary consolidation of outcomes

Each breakout group rep. presents the outcomes to the entire group.

Coffee Break
Session 6: Various Topics

Choice of previously proposted topics, either:

1) "SBOM handling", challenges and modes of sharing information between telcos

- SBOM and Telecom-Specific Risks
- Automation and Tools for SBOM Handling
- SBOM for Vulnerability Management and Incident Response
- The Future of SBOM in Telecom


2) Vulnerability scoring

General Understanding of Vulnerability Scoring
Challenges with Current Scoring Systems
Risk Prioritization and Contextualization
Automating and Scaling Vulnerability Scoring
Evolution and Future of Vulnerability Scoring

3) Setting up "Test Beds"

Lunch Break
Session 7: "Merging security with infrastructure projects"

We accept presentation proposals at this time - please contact Andrija Visic at av@etis.org

Presentations or a Roundtable on the following:

- Increased attack surfaces with 5G and IoT.

- Complex coordination between security teams and infrastructure engineers.

- Regulatory and compliance pressures (e.g., GDPR, NIS2 Directive).

What are the future trends and some of the proactive approaches?
Are there best practices and case studies to share?

Session 8: "Telco Security Benchmark 2025", by TNO & ETIS

Presentation by Richard Kerkdijk, Senior Security Consultant, ICT, Strategy & Policy

Session 9: Roundtable of input about topics of interest for the next ISWG meeting
Meeting ends