Главная
Study mode:
on
1
Intro
2
FREE
3
Phone Technologies
4
STIR SHAKEN Framework Basic Flow
5
SHAKEN Reference Architecture
6
SHAKEN Reference Call Flow
7
Attestation Levels
8
Voice Attacks
9
Security Architecture Considerations
10
Infrastructure
11
Data Sensitivity
12
Security Zone
13
Protocols: SIP, RTP
14
SHAKEN Certificate Management Architecture (1)
15
Note Worthy Cert Specs for STIR SHAKEN Framework
16
Tokens - Security Considerations
17
Cache Considerations
18
Intermediaries/Gateways
19
APPLY
20
Session Objectives
Description:
Explore the STIR/Shaken framework designed to combat robocalling and phone scams in this 44-minute conference talk from RSA Conference. Delve into the intricacies of voice service security with Senior Security Architect Daksha Bhasker as she explains the framework's basic flow, reference architecture, and call flow. Examine attestation levels, voice attacks, and crucial security architecture considerations. Learn about infrastructure, data sensitivity, security zones, and relevant protocols like SIP and RTP. Gain insights into the SHAKEN Certificate Management Architecture, noteworthy certificate specifications, and token security considerations. Understand the role of caches and intermediaries/gateways in the framework. By the end of this talk, become part of the cybersecurity community working to thwart robocalling and support voice professionals in implementing secure architectures.

STIR SHAKEN to Stop Robocalling

RSA Conference
Add to list