Security in Complex Multi-Generational Networks
Mobile operators provide the backbone for technologies that the world relies upon. These services are currently provided and managed via four distinct generations of mobile telecommunications technologies. This vast array of technologies results in a mixed threat landscape of traditional IT, radio and mobile network related threats. In this complex environment, as we move to 5G, everything changes. The networks will become more distributed, and many critical applications will be hosted at the edge of 5G networks and across edge clouds. Critical applications like remote healthcare, remote monitoring and control over our power grids, and self-driving cars will all rely on 5G technologies. Network Slicing is earmarked to be a prominent feature of 5G to enjoy connectivity and data processing tailored to customers’ specific requirements. Opportunities for threat actors will emerge if they are allowed to go unchecked, as they will use automation to wage multi-stage attacks and find the least secure portions of the 5G networks to exploit. For mobile networks to be 5G-ready, a new approach for security is required. As we enter the 5G era, this vital session will help operators to understand how to manage and mitigate the threats associated with managing multi-generational networks.