Secure end-to-end 5G cloud deployments

The virtualization and automation of network functions have enabled cloud-based deployments of mobile cores and open Radio Access Networks (RAN). While 3GPP has standardized 5G to be the most secure generation of cellular technology, there is an evolving threat surface as RAN and Core deployments move to the cloud. Concurrently, new attack vectors are exploiting vulnerabilities in cloud architectures and software to increase risk. This panel brings together leading 5G cybersecurity experts from mobile network operators to discuss their insights for securing 5G RAN and Core cloud deployments. Key topics for discussion include existing 5G security standards, cloud security, zero-trust architectures, IoT security, open RAN security, and network slicing.

Scott Poretsky (Moderator)
Director of Security, Ericsson North America
Scott Poretsky is Ericsson North America’s Director for Security, Network Product Solutions. He has over 25 years of industry experience in a variety of networking and security technologies. Scott is currently working in the areas of 5G security, Open RAN security, Cloud security, IoT security, and Software Bill of Materials (SBOM). Scott is Ericsson’s voting member at the O-RAN Alliance’s Security Focus Group (SFG), where he is a frequent contributor and serves as the SFG’s liaison to GSMA’s FASG and 5G STF. He has represented Ericsson in industry-government collaborative working groups including NSTAC, FCC CSRIC, and DHS ICT SCRM. He also represents Ericsson at the CSCC 5G Committee and CTIA CSWG.
Scott is a Certified Information Systems Security Professional (CISSP) and holds an MSEE from the Worcester Polytechnic Institute (WPI) and BSEE from the University of Vermont. He is an IEEE Senior Member and is Advisory Board Chair for the IEEE ComSoc’s CQR technical committee. Scott has one patent and numerous published papers. He is a recipient of the Ericsson North America Networks 2020 Gold PRIDE Award for External Customer Satisfaction.

Arash Obaidi
Director, Cybersecurity Architecture & Roadmaps, T-Mobile
Arash Obaidi leads Cybersecurity Strategy, Architecture & Roadmaps for T-Mobile’s Digital Security Organization. During his 23+ years career, Arash Obaidi developed Telecom network gear & mobile devices for Nokia, secured mobile devices for Virgin Mobile and proposed some of industry’s first technologies to secure mobile devices and mobile networks. Arash Obaidi also works closely with Deutsche Telecom Capital Partners – Israel – on new and emerging technologies and is a veteran of Silicon Valley. Arash Obaidi has been engaged with UC Berkeley’s Center for Long-Term Cybersecurity (CLTC) focusing on key Cybersecurity initiatives and has directly worked out of T-Labs Silicon Valley on new and emerging areas of Telecom initiatives. Mr. Obaidi has been issued 50+ US Patents and has 60+ US Patents pending with the US Patent office.

Mike Loushine (Panelist)
Lead – Cybersecurity, AT&T Chief Security Office
Mike Loushine develops cybersecurity mechanisms and threat analytics platforms for mobility and enterprise systems. Mike is a delegate to the 3GPP SA3 Security Working Group and to the O-RAN Alliance Security Focus Group. Mike regularly contributes to industry alliances focused on emerging cybersecurity requirements and solutions for 5G, 5G beyond, and 6G systems.
Mike Loushine joined AT&T five years ago after 17 years in the roles of Director, Chief Scientist, and Senior Scientist at Telcordia Applied Research and (then renamed) Applied Communication Sciences. Mike performed research in wireless communications technology including Wi-Fi positioning (patented), 4G mobile networks, and security. His technical and business contributions were recognized with three CEO Awards.
Mike received a Bachelor of Electrical Engineering from the University of Minnesota and a Master of Science in Electrical Engineering (Communications Theory) from The George Washington University, Washington, DC. Mike is an IEEE Member. Mike recently dusted off his golf clubs and tennis racquet and is experiencing variable, but enjoyable, results.

Mohamad HAJJ (Panelist)
Senior Cybersecurity Consultant, Internet of Trust
Mohamad Hajj is a Senior Cybersecurity Consultant with over 10 years of experience in security risk assessment (according to EBIOS RM, ISO 27005 and NIST 800-30) and security assurance (Self-assessment, Common Criteria, EUCC, EUCS, GlobalPlatform, CSPN, IoT schemes, NESAS, etc.), with technologies including 5G, O-RAN, Virtualization, Smart Cards, IoT devices, Digital identity, Digital signature and Automotive (ISO 21434). Mohamad currently works at Internet of Trust helping customers to take their products through cybersecurity assessment in order to effectively reduce risk and protect users from cyberthreats and information theft. He has the ability to derive technical security requirements for products and services from specifications/standards/regulations (e.g. French LPM, ANSSI RGS, eIDAS, GDPR, NIS, ISO, 3GPP, NIST) and present them to managers and engineers in a way that is meaningful, actionable and ensures compliance.
Prior to joining Internet of Trust, Mohamad was a certification expert (Common Criteria and other private certification schemes) at Thales (previously Gemalto/Trusted Labs). Mohamad earned a PhD in Electronic and telecommunication from Limoges University, France, in 2009.

Imran Obaidullah (Panelist)
Senior Security Architect, Bell Canada
Imran Obaidullah is a Senior Security Architect working in network security division of Bell Canada. Imran has B.E (Computer science) and MBA (System and Marketing) from Universities in India and other professional certifications such as CRISC, CDPSE. He is highly experienced cyber security and risk management professional with more than 20+ years of experience in Security Architecture, Security strategy, governance, and planning, IS Risk Management, MSSP, Security best practices and standards, Security awareness etc. He is focusing on emerging technologies such as 5G, MEC, Cloud in Bell Canada and involved in performing threat risk assessment, threat modelling, security architect & design and implementation of security controls. Prior joining Bell, he has worked with another telecom operator as senior manager (Security planning and risk governance) focusing on security architecture, planning and governance of wireless, wireline, cloud, IPTV services etc.

Sebastien Jeux (Panelist)
Senior RAN Security Architect, Orange France
Sébastien Jeux received the master’s degree from ESIGETEL (French IT engineering school) in 1997. His fields of expertise are RRM (Radio Resource Management), QoS (Quality of Service) assessment, network architecture and network security. Sébastien has worked for Orange for more than 20 years and has been involved in strategic projects such as 3G network roll-out in Orange France in early 2000’s and for the past 10 years in Orange Labs in innovation programs with leading positions in international projects (NGMN, ICT METIS). Early 2020 he joined the O-RAN ALLIANCE as co-chair of the Security Focus Group to lead the development of an O-RAN security architecture to ensure that O-RAN is secure by design.

Wynn Fenwick, Senior Consulting Architect, TELUS
Wynn is 5G prime for Canadian mobility operator TELUS, operating out of its CyberSecurity Architecture practice. He is a 27 years veteran of the cyber security industry who has been implementing cloud security since 2000. Wynn has a been the catalyst for cloud security architecture and processes in North America, Asia and Europe, including solutions for the US GSA, Canadian departments of Health, Justice, Foreign Affairs, PWGSC, and dozens of private sector service providers and clients. Wynn has certified with Global Information Assurance (GIAC) in network Intrusion Analysis (GCIA), Assessing Wireless Networks (GAWN), Web Application Penetration Testing (GWAPT) and Incident Handling and Hacker Techniques (GCIH). Whether it is, embedding security to virtualized hosting to deliver government certified cloud offerings, or guiding assurance programs for service provider networks, he looks beyond the tools and techniques to ensure they are integrated within continuous improvement and quality processes necessary to counter ever-changing threat models. Prior to joining TELUS, Wynn was Chief Technology Architect for an international Managed Security Services Provider.

Program Links

Email Subscription

Our Patrons


Title Patron






Knowledge Partners



FNI Roadmap