xSecurity Forum
xSecurity Forum

xSecurity Forum will introduce interdisciplinary security solutions, integrating innovation from information security and other technology fields to create a comprehensive, multi-layered security protection.

TIME & LOCATION
AGENDA
5 / 16
09:30 - 10:00
Shi-Cho Cha / Professor NTUST (National Taiwan Univeristy of Sciency and Technology) Chairman of Department & Director of Taiwan Information Security Center at NTUST

In 2022, our country released the "Technical Specifications for Information Security Testing of Electric Vehicle Supply Equipment," establishing the basic cybersecurity requirements for connected charging devices. However, as part of the overall charging ecosystem, it is necessary to further consider the cybersecurity risks and countermeasures in operations and maintenance of the devices.

This presentation will begin by examining the cybersecurity requirements for electric vehicle fast charging infrastructure, as detailed in U.S. NIST IR 8473. We will define key terms and explore the cybersecurity risks identified by the U.S. NIST for stakeholders in the electric vehicle fast charging ecosystem, with a specific focus on charging stations. Following this, the presentation will highlight discrepancies in risk management strategies between the cybersecurity of the charging equipment itself and the provision of charging services. Based on these observations, we will offer targeted recommendations to address these gaps.

  • EV Security
  • Risk Management
  • Standards
5 / 16
10:15 - 10:45
5 / 16
14:00 - 14:30
Shin-Ming Cheng / Deputy Director-general Administration for Cyber Security, moda Professor, Department of Computer Science and Infomration Engineering National Taiwan University of Sciecne and Technology

The openness of Radio Access Networks (RAN) coupled with AI has positioned O-RAN as the next-generation solution for telecommunications networks. On one hand, its intelligence, flexibility, and customization have paved the way for innovative, convenient, and cost-effective usage scenarios and opportunities. However, on the other hand, it has also led to new types of cybersecurity attacks and potential security threats. This presentation will investigate into the vulnerabilities arising from new components and interfaces within O-RAN, with a particular focus on the threats posed by the integration of AI. Finally, we will further discuss corresponding protection mechanisms.

  • Telecom Security
  • Mobile Security
  • Open Source Security