№ files_lp_3_process_9_56135
Meeting minutes documenting discussions among industry and government representatives on threat identification, data exposure analysis, and dynamic security policy enforcement planning within the Rel-19 eZTS work context.
Date: 09 January 2024
Time: 14:30–16:00 CET
Venue: Microsoft Team Meeting (Online)
Organizer: Sheeba Backia Mary B.
Document Type: Meeting Minutes
Working Topics: WT1 Data Exposure for Security Evaluation and Monitoring; WT2 Security Mechanism for Dynamic Policy Enforcement
Release Context: Rel-19
Participants: Representatives from MITRE, Lenovo, BSI, JHU/APL, Ericsson, NIST, Sectra, NSA, Irt Saint Exupéry, Charter Communications, Huawei, China Unicom, Nokia, BMWK, PSC, Trideaworks, Thales, ZTE, Comcast, Motorola Solutions, OTD_US, Department of Telecom, Interdigital
Main Themes: Threat identification, data exposure analysis, security monitoring, dynamic policy enforcement, SBA layer, security assumptions, use case mapping
Related Concepts: SNPI, PII, SIEM, SOAR, ACME STAR (RFC 8739), certificate management, key issues and solutions
Summary of Decisions: Agreement to refine threat and data identification for WT1 and to study use case-based mapping between threats and policy enforcement actions for WT2
Price: 8 / 10 USD
The file will be delivered to the email address provided at checkout within 12 hours.

Don’t have cryptocurrency yet?

You can still complete your purchase in a few minutes:
  1. Buy Crypto in a trusted app (Coinbase, Kraken, Cash App or any similar service).
  2. In the app, tap Send.
  3. Select network, paste our wallet address.
  4. Send the exact amount shown above.
After sending, paste your TXID (transaction ID) and your email to receive the download link. Need help? Contact support and we’ll guide you step by step.