Dinner for attendees arriving earlier to Reading (not sponsored)

Restaurant to be selected in early February.

Session 1: "Welcome by the Host and Roundtable Introductions"

Opening of the WG meeting:

- welcome from Rolv Hauge, ISWG Chair, 10'
- roundtable introductions, 5'
- welcome from Ericsson

Session 1: "Security Strategy Updates and Introduction of new Partners" (PART 1)

Every participant prepares a short, 5 min input (using ETIS template slides) on recent challenges, threats, incidents, projects, and future plans in their organisation.

Coffee Break
Session 2: "Building Resilience in Telecom Security: Preparing for Black Swan Events"

Telecom operators in Europe are increasingly focusing on building resilience against "black swan" events—unpredictable, high-impact disruptions—by enhancing their cybersecurity and operational robustness.

In our Working Group meetings, members are invited to share their proposals via email with Andrija Visic (av@etis.org) and Wim De Meyer (wdm@etis.org), on the following:

- Adoption of Advanced Technologies (AI / ML) to enhance threat detection capabilities and predictive analytics

- Development of Cyber Digital Twins - simulate networks to test vulnerabilities and develop mitigation strategies

- Modeling of threats - identifying assets, doing threat surface analysis and risk assessment scoring

- Building up Resilient Infrastructure - Network segmentation, continuous monitoring, and disaster recovery plans

- Supply chain security

- Other topics of interest in the field of building resilience

Lunch Break
Session 3: Ericsson-organised Visit
Session 4: Finalising the 2025 Telco Security Landscape (publication by ETIS/TNO/ConnectEurope)

The latest draft of the publication will be presented to the working group, together with the 2025 launch plans and collaborations it could bring.

Richard Kerkdijk, Senior security consultant
ICT, Strategy & Policy, TNO, 15'

Coffee Break
Session 5: "Enhancing Executive Preparedness: Best Practices for Cybersecurity Exercises with Senior Leaders"

In an era of escalating cyber threats, preparing senior leadership in telecom organizations is paramount for ensuring swift and effective crisis management. This session will explore best practices for conducting cybersecurity exercises tailored to executives.

These simulations are designed to bridge strategic decision-making with technical realities, fostering a cohesive response framework.

Do you have a best practice to share? Please propose your presentation via email directly to Andrija Visic (av@etis.org) and Wim De Meyer (wdm@etis.org)

Confirmed presentations:

- Dominic Wood, Security Governance and Assurance Director, BT, 30' (including Q&A)

- Presentation 2 - TBC

- Roundtable with all participants, 30'

ETIS-Sponsored Dinner in: Griffins' Steakhouse

Restaurant: Griffins Steakhouse, Klarabergsviadukten 67, 111 64 Stockholm, Sweden

Maps link: https://maps.app.goo.gl/QvsusWZRx76od6zVA

Session 6: Company Updates (PART II)

Continuation of the first session from Day 1.

Every participant prepares a short, 5 min input (using ETIS template slides) on recent challenges, threats, incidents, projects, and future plans in their organisation.

Coffee Break
Session 7: "Patch Management in TelecomsStrengthening Cybersecurity Foundations"

Patch management remains a foundational pillar of cybersecurity, especially in the telecom sector, where maintaining network integrity is critical. This session will delve into modern practices for robust patch management, incorporating tools like Software Bill of Materials (SBOM), Common Security Advisory Framework (CSAF), and guidance from cybersecurity authorities like ENISA.

Emphasis can be placed on automating patch deployment, leveraging threat intelligence for prioritization, and ensuring compliance with global regulatory standards.

Please share your 20-30' long presentation proposals directly via email with Andrija Visic (av@etis.org) and Wim De Meyer (wdm@etis.org).

Lunch Break
Session 8: "Adapting to the AI Act: Integrating Secure AI Models in Telecom Cybersecurity"

As Europe advances toward enforcing the AI Act, telecom operators must adapt by ensuring AI-driven cybersecurity models comply with new standards. This session will explore the implications of the Act for developing secure and transparent AI systems, focusing on risk management and accountability.

Please share your 20-30' long presentation proposals directly via email with Andrija Visic (av@etis.org) and Wim De Meyer (wdm@etis.org).

Session 9: Roundtable session choosing topics to discuss in the next ISWG meeting
Meeting Ends