Loading…
Session Description
In today’s world, connected systems, social networks, and mobile communications create a massive data flow prone to cyberattacks. This requires fast and accurate detection of cyberattacks. Intelligent systems and Data analytics are essential when discussing effective security solutions.
This Round table will address, among other topics, the region's current challenges in the evolving field of Post-Quantum cryptography algorithms in the telco infrastructure, particularly their impact on telco operators and service providers and the role of China's algorithm section process.
This Round table will also feature leading experts who will discuss the latest advancements in post-quantum algorithms and Cybersecurity, their implementation challenges, and the transition strategies for existing systems, with a focus on mainland China.
This session promises an exciting program featuring cutting-edge advancements, expert insights, and discussions that shape the future of cybersecurity in the region. Don't miss this unique opportunity to connect with global experts and explore the forefront of Post Quantum and Cybersecurity innovation.
Agenda
Post Quantum Cryptography: Telco challenges, approaches and regulatory aspects
i. GSMA Post Quantum Crypto Impact in Telco Industry
- by David Turkington, Head of Technology APAC, GSMA
ii. Post Quantum Cryptography: CAICT overview
- by Junsen Lai, Director Engineer, China Academy of Information and Communication Technology, CAICT
iii. Post Quantum Cryptography – Telco Operator Perspective
- by Zheng Li, Deputy Director, China Mobile Research & Institute, Service Department, China Mobile
iv. Q&A