5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms, Analytics, Control, and Security Research Lab Nokia Bell Labs
Jason Boswell Head of Security, IT, and Cloud Ericsson North America
5G Security CTIA Cybersecurity summit Jason S. Boswell, CISSP Head of Security, IT & Cloud Consulting Apr 27, 2017 Ericsson, Market North America
Ericsson 140 years 39000 patents 1B in managed networks 180 Countries 1300 ICT transformation projects 2.5B served by installed base
ENABLES TRUST STACK, A HOLISTIC APPROACH TRUSTED BUSINESS NEEDS TRUSTED OPERATIONS TRUSTED NETWORK INFRASTRUCTURE TRUSTED HW & SW
Enabling the networked society Connected Devices in 2022 8,6 billion MOBILE PHONES 7.1 Billion in 2015 3.7 Billion in 2015 3 billion PC/TABLET/LAPTOP/FIXED PHONES 29,7 BILLION 18,1 billion M2M/IOT DEVICES 4.6 Billion in 2015 Source: Ericsson Mobility Report November 2016 Technology Drivers 5G IoT Cloud
Key 5G Security challenges NEW Business & trust MODELS NEW service delivery MODELS Evolved threat landscape Critical infrastructure
Ready for the challenge Multi-stakeholder: 5G security baseline Network slicing & virtualization enable isolated sub-networks IoT authentication and transport layer security Greater resiliency, protection & recovery OTT Service enablement
Presented by
Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA
5G Impact 5G Drives Unprecedented Growth Global spending on cybersecurity products & services are predicted to exceed $1 trillion over the next 5 years Cisco and Microsoft both predict 50 billion devices will be connected to the Internet by 2020 By 2020, data volumes online are expected to be 50 times greater than today
Axis Title 5G Drives Jobs Economic Benefits of 5G are Even Greater than the direct jobs and investments in Networks Expected Jobs By State Economic benefit is estimated to be at $500B and result in the creation of an estimated 3 million jobs New jobs could be up to 40x the number of jobs created in network providers Cybersecurity workforce growth will be across all industry sectors South Dakota Oregon New York Florida California 0 50000 100000 150000 200000 250000 300000 350000 400000 450000 Network Other Jobs
True Software The Human Element of Cybersecurity Symantec estimates 6 million positions globally with 1.5 million cybersecurity job openings unfilled by 2019 The Global Information Security Workforce Study released earlier this year projects a shortage of 1.8 million professionals by 2022 Human attack surface to reach 4 billion people by 2020
Why the Gap? The demand is growing at a faster rate than supply Curriculum guidelines are still evolving; there is no standard baseline The Skill level is not entry level; each industry requires specialization There is a lack of qualified instructors; skilled practitioners are recruited by Industry/Government
Closing the Gap Industry/Academia/Government working together to address Joint Task Force on Cybersecurity Education is a collaboration between international computing societies, Academic institutions, Industry and Government to develop comprehensive curricular guidance Internship Programs and Partnerships between Academia and Industry provide the bridge to the specialized skills required by Industry NIST Cybersecurity Workforce Framework is enabling a common lexicon to understand and communicate workforce requirements Communications Industry and Government partnership through the FCC Communications Security, Reliability and Interoperability Council developed best practice recommendations
What s next? T-Mobile and University of Washington Partnership Critical Infrastructure resource development pilot program Skills assessment toolset; results in improved positioning of students 90% conversion rate from intern to full time practicioner Alignment to telecom industry specific needs Feedback process to improve program for each iteration Expansion to other (non-telecom) critical infrastructure players
Summary Wireless Industry Leadership in Cybersecurity Enables 5G 5G Cybersecurity is not just about protecting things People are Critical Wireless Industry is partnering with Academia and Government to address the Workforce gap Wireless Industry leadership is developing and improving programs that will benefit ALL critical infrastructure providers as we evolve the 5G
Presented by
Chris White Head of Network Algorithms, Analytics, Control, and Security Research Lab Nokia Bell Labs
The Security Challenge of the Future X network Christopher A. White Lab Leader - Networks, Algorithms, Analytics, Control and Security Nokia Bell Labs
The Challenge: touching the world as easily as a child draws on a sidewalk.
Massive Scale Access Converged Edge Cloud Smart Network Fabric Universal Adaptive Core 1 Scalable Remote Massive MIMO The creation of ultra-small and ultra-close access nodes The emergence of the edge cloud for low latency and high performance 2 3 Creating dynamically reconfigurable IP + optical metro and core networks Access-agnostic core for seamless user experience 4 Network attach Session mgmt. Policy control Programmable Network OS Augmented Cognition Systems Digital Value Platforms Dynamic Data Security 5 Net OS Net OS Net OS The emergence of the network OS to enable programmability and network federation Pervasive cognitive capabilities for operating networks & systems 7 Net OS 6 8 Digital value platforms augmented by advanced network capabilities The emergence of new trust models & security architectures Adaptable Security Digital Trust The 8 domains of the new digital reality
The Future X network must support this new reality
Service Customized Network Slices Enabled by Network Function Virtualization (NFV) Mobility Network Slice Enterprise Network Slice Network OS Smart Network Fabric Enabled by Software Defined Networks (SDN) ACCESS CORE METRO Securing the network: Cognitive + Converged + Adaptive
Securing the devices: Self configuring, Digital trust, IoT networking
? Physical World Digital World Securing the data: Augmenting Intelligence
Perhaps this is the new way to interact with data?
Presented by