Workshop Description
Practical workshop for security operations and network security teams at mobile network operators and fixed-line carriers. Covers cryptographic asset discovery methodology for complex, multi-vendor network environments, construction of a Cryptographic Bill of Materials (CBOM) across RAN, core, transport, and OSS/BSS layers, quantum vulnerability classification using the ETSI GR QSC 006 and NCSC frameworks, and migration priority matrix development aligned with 3GPP Release 19/20 timelines, NIS2 Directive requirements, and national telecoms security legislation.
Mobile networks are among the most cryptographically complex environments in any sector. A single operator may run Ericsson RAN with Nokia core network, Cisco transport, and multiple OSS/BSS vendors, each implementing cryptography independently. SIM/USIM key agreement uses ECDH. 5G-AKA authentication depends on elliptic curve operations. GTP tunnels, SBA interfaces, and management plane communications each have separate cryptographic dependencies. Many of these are invisible to network operations teams because they are embedded in vendor firmware. Building a complete cryptographic inventory is the prerequisite for any PQC migration programme, and it is substantially harder in telecoms than in enterprise IT because of this vendor fragmentation. This workshop provides the systematic methodology and produces a working CBOM that participants take away and extend to their own networks.
What participants cover
- Cryptographic discovery across RAN, core, transport, and OSS/BSS: systematic methodology for identifying algorithm implementations in multi-vendor telecoms infrastructure
- CBOM construction: building a Cryptographic Bill of Materials that maps every algorithm to its network function, vendor, protocol, and data flow
- Quantum vulnerability classification: categorising algorithms as broken (RSA, ECDH, ECDSA), weakened (AES-128, SHA-256), or safe (AES-256) under quantum attack
- Harvest-now-decrypt-later risk assessment: identifying which telecoms data flows carry information with secrecy lifetimes exceeding the quantum threat horizon
- Migration priority matrix: combining vulnerability, sensitivity, exposure, and remediation complexity into a scored, actionable migration sequence
- Regulatory alignment: mapping migration phases to NIS2, national telecoms security requirements (UK TSA, German TKG, French ARCEP), 3GPP, and GSMA PQC guidance