Abstract
As 5G, IoT, and OT systems within national critical infrastructure become increasingly interconnected, securing legacy devices has become a critical priority. This talk explores how Software Bill of Materials (SBOM) can be used to identify and manage vulnerabilities by mapping software components to known Common Vulnerabilities and Exposures (CVEs).
We present our practical methodology for generating SBOMs, automating vulnerability detection, and integrating findings into risk assessments for traditional IoT, OT, and 5G-based communication systems. Key challenges, such as incomplete SBOM data, proprietary components, and the unique complexities of 5G networks, are addressed, along with case studies demonstrating practical applications.
Attendees will learn how SBOMs can enhance transparency, streamline vulnerability management, and improve cybersecurity across both critical infrastructure and 5G communication systems, offering actionable insights for safeguarding critical communications.