Join us 11-12 June 2024!

About the Speaker

Muddasar Ahmed | Principal Cyber Security Architect


MITRE’s ‘FiGHT’ Framework for 5G

MITRE FiGHT is currently the only open threat framework for 5G systems. The MITRE FiGHT framework can play a significant role in establishing defenses against adversarial and unauthorized behaviors in 5G networks. With its comprehensive repository of techniques and tactics employed by threat actors, the framework enables organizations to proactively identify and comprehend potential vulnerabilities within their 5G systems. It allows security teams to align and map their defenses with specific attack vectors, prioritizing their efforts on critical areas. Additionally, the FiGHT framework facilitates threat hunting and detection by providing a standardized language and classification system to describe adversary behaviors, fostering effective collaboration and information sharing among security practitioners. By leveraging the MITRE FiGHT framework, organizations can enhance their incident response capabilities, fortify the security posture of their 5G networks, and safeguard against emerging threats and unauthorized activities.

Muddasar AhmedMuddasar is a Principal Cyber Security Architect in MITRE Labs, focusing on cloud, networks and 5G systems. Muddasar is a graduate of The George Washington University school of Business and has over 20 years of experience in telecom systems including turnkey solutions from incubation to mass deployments in service provider market. Muddasar has spent time in development, systems integration, and professional services building capabilities with large service providers across the globe.

About MITRE Labs

MITRE LabsAs a not-for-profit organization, MITRE works in the public interest across federal, state and local governments, as well as industry and academia. MITRE brings innovative ideas into existence in areas as varied as artificial intelligence, intuitive data science, quantum information science, health informatics, space security, policy and economic expertise, trustworthy autonomy, cyber threat sharing, and cyber resilience.