Dr. Altaf Shaik , Fast IOT
Dr. Altaf Shaik is a senior researcher at the Technische Universität Berlin in Germany, and conducts advanced research in telecommunications esp. in 6G security architecture, openRAN, and 5G radio access and core network security. He holds more than 11 years of experience in Telecom security and combines a professional background in embedded programming, wireless communications, and offensive network security.
Dr. Shaik spent his career as a security engineer and expert at various leading telecommunication companies including Gemalto (currently Thales), Deutsche Telekom (Germany), and Huawei Technologies (Sweden). His PhD research assisted in improving the 3GPP 4G security standards and also exposed several vulnerabilities in commercial mobile networks affecting millions of base stations, networks, and handsets worldwide. His post-doctoral research exposed vulnerable API designs in latest 5G networks and slicing vulnerabilities in the 5G security specifications leading to serious attacks.
Dr. Shaik is a frequent speaker and trainer at various prestigious international security conferences such as Blackhat, T2, SECT, Nullcon, Hardware.io and HITB, 44CON, and many others. His accomplishments landed him in the hall of fame of organizations like Google, Qualcomm, Huawei, and GSMA. He is also the founder of Kaitiaki labs and FastIoT that trains internationally various companies and governmental organizations in exploit development and also building secure mobile and IoT networks including their testing and security assessment.
Training: 5G Hacking for Red and Blue Teams
Yesterday, it was Salt Typhoon. Today, it’s Liminal Panda. Tomorrow, they’ll target your latest fifth-generation networks. As 5G becomes the backbone of sensitive data management and mission-critical operations, its security is more crucial than ever. However, there’s a pressing gap in the expertise and skills needed to safeguard these systems effectively. This 5G Core Security Training is designed to give security pros the skills to identify and counter security threats in 5G networks. You'll dive into 5G core security, protocols, and learn how to use pentesting tools to assess vulnerabilities and develop exploits. The training also covers the latest security challenges and best practices, with hands-on exercises simulating real-world attacks and defenses on a local, isolated (zero RF transmitting) 5G network setup.