5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America

Similar documents
Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Unleashing the potential of 5G. Guillaume Mascot Head of Government Relations APJ

Future X Network. Sanjay Kamat Managing Partner, Bell Labs Consulting Nokia

Securing Digital Transformation

The Widening Talent Gap: The greatest security challenge of our time

SDN and NFV as expressions of a systemic trend «integrating» Cloud, Networks and Terminals

SECURING THE CONNECTED ENTERPRISE.

Security in Today s Insecure World for SecureTokyo

Committed to connecting the world

Which Side Are You On?

DIGITAL CENTRAL ASIA SOUTH ASIA (CASA) PROGRAM. Transport and ICT Global Practice World Bank

Thinking cities. Khalil Laaboudi. Smart & Sustainable Cities. Global Marketing

Governor Patrick Announces Funding to Launch Massachusetts Open Cloud Project Celebrates Release of 2014 Mass Big Data Report

CALIFORNIA CYBERSECURITY TASK FORCE

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Collaboration on Cybersecurity program between California University and Shippensburg University

IP Networks & Applications

5G Readiness Survey 2017

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

National Institute of Standards and Technology

Better skilled workforce

RESILIENT UTILITY COALITION OF SOUTH FLORIDA

Introduction to ITU and ITU-T activities. ITU-T, the Standardization Sector of ITU.

Accelerate Your Enterprise Private Cloud Initiative

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Title. The Digital Single Market: The European Commission strategy for unleashing the digital economy

5G Enables Enterprise

CISCO NETWORKING ACADEMY CASE STUDY

INTERNET OF THINGS CAPACITY BUILDING CHALLENGES OF BIG DATA AND PLANNED SOLUTIONS BY ITU. ICTP Workshop 17 March 2016

IEEE CSCN Genesis Taking the first steps towards 6G. Prof. Ari Pouttu. Centre for Wireless Communications. University of Oulu

Cybersecurity for ALL

Welcome to the HP Institute

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum

Service Provider Consulting

Ericsson hits 5G milestone with expanded portfolio

THE POWER OF TECH-SAVVY BOARDS:

EMC ACADEMIC ALLIANCE

Accelerating Cloud Adoption

Staff Subcommittee on Electricity and Electric Reliability

SMART. Investing in urban innovation

Enhancing the cyber security &

Bridging The Gap Between Industry And Academia

Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation

Fostering Competitiveness, Growth and Jobs. Wrocław, Poland, 15 October 2014

ITU Academia. Smart Partnership for ICT4SDG. Jaroslaw K. PONDER Coordinator for Europe Region

Transformation Through Innovation

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

5G Future X Network and the Next Industrial Revolution. Peter Vetter Nokia Bell Labs

itsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program

Cybersecurity ecosystem and TDL Antonio F. Skarmeta

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

Cyber Security in Smart Commercial Buildings 2017 to 2021

Overview of the Juniper Networks Mobile Cloud Architecture

U.S. Department of Homeland Security Office of Cybersecurity & Communications

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

India s National Policy On. Information Technology. Ajay Sawhney, President & CEO, National egovernance Division, Dept of IT

PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity

Overview of the Juniper Mobile Cloud Architecture Laying the Foundation for a Next-gen Secure Distributed Telco Cloud. Mobile World Congress 2017

Technology for a Changing World

Why you should adopt the NIST Cybersecurity Framework

ASREN Arab States Research and Education Network

CCNA Routing and Switching Courses. Scope and Sequence. Target Audience. Curriculum Overview. Last updated November 2, 2016

MALAYSIA S APPROACH IN CAPACITY BUILDING. Dr Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia 24 March 2017

T87 - Building a Stronger Business with a Connected Workforce

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

Implementation Strategy for Cybersecurity Workshop ITU 2016

Evolution of connectivity in the era of cloud

#ericssonlive Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt

Innovation policy for Industry 4.0

Cisco Connected Factory Accelerator Bundles

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Driving Internet of Things (IoT) standardization to build smart sustainable cities. Cristina Bueti, Adviser, ITU

Broadband for Digital Transformation

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

Cyber Secure Dashboard Cyber Insurance Portfolio Analysis of Risk (CIPAR) Cyber insurance Legal Analytics Database (CLAD)

WIND RIVER NETWORKING SOLUTIONS

A Global Operating System «from the Things to the Clouds»

Version 11

Commonwealth Cyber Initiative Blueprint Development

NEC Australia Overview. au.nec.com

INTERNATIONAL TELECOMMUNICATION UNION

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

Enabling Open Standards at Scale

Enabling Fast IT. In the IoE era. Alberto Degradi DCV Sales Leader. November 2014

Media Kit. California Cybersecurity Institute

Overview. A fact sheet from Feb 2015

The impact of digital transformation on industries

BUILD A BUSINESS CASE

Next Generation Data Center : Future Trends and Technologies

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

FAA Cybersecurity Test Facility (CyTF) By: Enterprise Information Security Team ANG-B31 Patrick Hyle, William J Hughes Technical Center

The Programmable World Opportunities and Challenges

Harmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT

The Africa Utilities Telecom Council Johannesburg CC, South Africa 1 st December, 2015

Security and networks

Regional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America

Transcription:

5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms, Analytics, Control, and Security Research Lab Nokia Bell Labs

Jason Boswell Head of Security, IT, and Cloud Ericsson North America

5G Security CTIA Cybersecurity summit Jason S. Boswell, CISSP Head of Security, IT & Cloud Consulting Apr 27, 2017 Ericsson, Market North America

Ericsson 140 years 39000 patents 1B in managed networks 180 Countries 1300 ICT transformation projects 2.5B served by installed base

ENABLES TRUST STACK, A HOLISTIC APPROACH TRUSTED BUSINESS NEEDS TRUSTED OPERATIONS TRUSTED NETWORK INFRASTRUCTURE TRUSTED HW & SW

Enabling the networked society Connected Devices in 2022 8,6 billion MOBILE PHONES 7.1 Billion in 2015 3.7 Billion in 2015 3 billion PC/TABLET/LAPTOP/FIXED PHONES 29,7 BILLION 18,1 billion M2M/IOT DEVICES 4.6 Billion in 2015 Source: Ericsson Mobility Report November 2016 Technology Drivers 5G IoT Cloud

Key 5G Security challenges NEW Business & trust MODELS NEW service delivery MODELS Evolved threat landscape Critical infrastructure

Ready for the challenge Multi-stakeholder: 5G security baseline Network slicing & virtualization enable isolated sub-networks IoT authentication and transport layer security Greater resiliency, protection & recovery OTT Service enablement

Presented by

Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA

5G Impact 5G Drives Unprecedented Growth Global spending on cybersecurity products & services are predicted to exceed $1 trillion over the next 5 years Cisco and Microsoft both predict 50 billion devices will be connected to the Internet by 2020 By 2020, data volumes online are expected to be 50 times greater than today

Axis Title 5G Drives Jobs Economic Benefits of 5G are Even Greater than the direct jobs and investments in Networks Expected Jobs By State Economic benefit is estimated to be at $500B and result in the creation of an estimated 3 million jobs New jobs could be up to 40x the number of jobs created in network providers Cybersecurity workforce growth will be across all industry sectors South Dakota Oregon New York Florida California 0 50000 100000 150000 200000 250000 300000 350000 400000 450000 Network Other Jobs

True Software The Human Element of Cybersecurity Symantec estimates 6 million positions globally with 1.5 million cybersecurity job openings unfilled by 2019 The Global Information Security Workforce Study released earlier this year projects a shortage of 1.8 million professionals by 2022 Human attack surface to reach 4 billion people by 2020

Why the Gap? The demand is growing at a faster rate than supply Curriculum guidelines are still evolving; there is no standard baseline The Skill level is not entry level; each industry requires specialization There is a lack of qualified instructors; skilled practitioners are recruited by Industry/Government

Closing the Gap Industry/Academia/Government working together to address Joint Task Force on Cybersecurity Education is a collaboration between international computing societies, Academic institutions, Industry and Government to develop comprehensive curricular guidance Internship Programs and Partnerships between Academia and Industry provide the bridge to the specialized skills required by Industry NIST Cybersecurity Workforce Framework is enabling a common lexicon to understand and communicate workforce requirements Communications Industry and Government partnership through the FCC Communications Security, Reliability and Interoperability Council developed best practice recommendations

What s next? T-Mobile and University of Washington Partnership Critical Infrastructure resource development pilot program Skills assessment toolset; results in improved positioning of students 90% conversion rate from intern to full time practicioner Alignment to telecom industry specific needs Feedback process to improve program for each iteration Expansion to other (non-telecom) critical infrastructure players

Summary Wireless Industry Leadership in Cybersecurity Enables 5G 5G Cybersecurity is not just about protecting things People are Critical Wireless Industry is partnering with Academia and Government to address the Workforce gap Wireless Industry leadership is developing and improving programs that will benefit ALL critical infrastructure providers as we evolve the 5G

Presented by

Chris White Head of Network Algorithms, Analytics, Control, and Security Research Lab Nokia Bell Labs

The Security Challenge of the Future X network Christopher A. White Lab Leader - Networks, Algorithms, Analytics, Control and Security Nokia Bell Labs

The Challenge: touching the world as easily as a child draws on a sidewalk.

Massive Scale Access Converged Edge Cloud Smart Network Fabric Universal Adaptive Core 1 Scalable Remote Massive MIMO The creation of ultra-small and ultra-close access nodes The emergence of the edge cloud for low latency and high performance 2 3 Creating dynamically reconfigurable IP + optical metro and core networks Access-agnostic core for seamless user experience 4 Network attach Session mgmt. Policy control Programmable Network OS Augmented Cognition Systems Digital Value Platforms Dynamic Data Security 5 Net OS Net OS Net OS The emergence of the network OS to enable programmability and network federation Pervasive cognitive capabilities for operating networks & systems 7 Net OS 6 8 Digital value platforms augmented by advanced network capabilities The emergence of new trust models & security architectures Adaptable Security Digital Trust The 8 domains of the new digital reality

The Future X network must support this new reality

Service Customized Network Slices Enabled by Network Function Virtualization (NFV) Mobility Network Slice Enterprise Network Slice Network OS Smart Network Fabric Enabled by Software Defined Networks (SDN) ACCESS CORE METRO Securing the network: Cognitive + Converged + Adaptive

Securing the devices: Self configuring, Digital trust, IoT networking

? Physical World Digital World Securing the data: Augmenting Intelligence

Perhaps this is the new way to interact with data?

Presented by