Security and networks

Similar documents
5g and standards: managing complexity, ensuring interoperability

How to enable change-makers in the Networked Society. Telefonaktiebolaget LM Ericsson 2015 Ericsson June 2015

IOT, ENTERPRISES AND 5G

The 5G Business Potential. Terminsstart Telekom 2017 Monika Byléhn, 5G marketing director

importance of use cases

technology Catalyst For connected CARE Per Ljungberg Director, System and Technology Group Function Technology and Emerging Business Ericsson

HOT CONSUMER TRENDS Michael Björn PhD, Head of Research Ericsson ConsumerLab

Tehnika revolutsioon: uudsed targad lahendused, mis viivad interneti lõpptarbijani!

European Union Agency for Network and Information Security

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

Cisco Start. IT solutions designed to propel your business

Making 5G Real. Ericsson Internal Guilherme Alves Ericsson

CYBER SECURITY AIR TRANSPORT IT SUMMIT

Cybersecurity & Digital Privacy in the Energy sector

Dr. Fiona Williams Ericsson

ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis - Tunisia, Feb. 2017

Wireless Connectivity technologies evolution for Internet of Things and Machine to Machine communication

5g for connected industries

Thinking cities. Khalil Laaboudi. Smart & Sustainable Cities. Global Marketing

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Angela McKay Director, Government Security Policy and Strategy Microsoft

Cybersecurity Strategy of the Republic of Cyprus

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Innovation policy for Industry 4.0

Standards for V2X Communication and Implications for OEMs and ITS

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

CYBER SOLUTIONS & THREAT INTELLIGENCE

5G Techniques for Ultra Reliable Low Latency Communication. Dr. Janne Peisa Principal Researcher, Ericsson Research

Cyber COBIT. Ophir Zilbiger, CEO SECOZ Shay Zandani, CEO CyberARM. December 2013

Digital transformation in the Networked Society. Milena Matic Strategy, Marketing & Communications June 2016

Are we breached? Deloitte's Cyber Threat Hunting

Towards 5G Commercial Deployment. Janne Peisa, Ericsson Research

The Networked SocIety

Cyber Security in Europe

Provisional Translation

ICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015

Cybersecurity The Rough Road Beyond Awareness

Ericsson networked society. 27 th of September 2017, Espoo

Unleashing the potential of 5G. Guillaume Mascot Head of Government Relations APJ

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

New security solutions enabled by 5G

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

How will cyber risk management affect tomorrow's business?

align security instill confidence

June 2 nd, 2016 Security Awareness

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Business Potential from Industry Digitalization

NASSCOM Cyber Security Task Force 1 st Meeting. May 25, 2015

AKAMAI CLOUD SECURITY SOLUTIONS

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

USE CASES BROADBAND AND MEDIA EVERYWHERE SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

5G Enables Enterprise

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Network Vision: Preparing Telefónica for the next generation of services. Enrique Blanco Systems and Network Global Director

The need for collaboration across industries in Sweden. Torbjörn Lundahl Research Director at Ericsson Research Program manager 5G for Sweden

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Education Network Security

COUNTRY PROFILE. Malaysia

COUNTRY PROFILE. Croatia

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Global Security Operation Center GSOC

RWANDA S APPROACH TOWARDS EMERGING TECHNOLOGIES, opportunities and challenges

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

#ericssonlive Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt

ENISA EU Threat Landscape

COUNTRY PROFILE. Mexico

COUNTRY PROFILE. Colombia

Understanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center

Security Awareness Training Courses

CYBER THREAT IN AVIATION ARE YOU READY TO ADDRESS IT YET?

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

COUNTRY PROFILE AUSTRALIA

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

RUAG Cyber Security Understand Cyber. Protect Values.

Strategy is Key: How to Successfully Defend and Protect. Session # CS1, February 19, 2017 Karl West, CISO, Intermountain Healthcare

Securing Digital Transformation

Security by Default: Enabling Transformation Through Cyber Resilience

COUNTRY PROFILE. Philippines

TIES for Microsoft CityNext Next-Generation Situational Awareness

COUNTRY PROFILE. Taiwan

COUNTRY PROFILE. Estonia

Building a Resilient Security Posture for Effective Breach Prevention

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

Digital Security Risks to Transport Infrastructure: Automated Vehicles February, 2018

Transcription:

Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12, 2018

140 years 180 countries

the technology - Building a trusted ICT platform 1B in managed networks 2.5B Served by installed base The mobile infrastructure is the world s largest ICT technology platform there is no margin for errors

Consumer perception is that Everything gets attacked PCs Smartphones Social network services Internet service providers Social security registers Telecom operators Military equipment Commercial airlines Smart TVs Wearables 0% 10% 20% 30% 40% 50% 60% 70% Source: Ericsson ConsumerLab, 10 Hot Consumer Trends 2016, 2015. Base: 6,649 ios/android smartphone users aged 15 69 in Istanbul, Johannesburg, London, Mexico City, Moscow, New York, Paris, San Francisco, São Paulo, Shanghai, Singapore, Sydney and Tokyo

Threat landscape Advanced Persistent Threats Insiders Sophisticated Non-State Cyber Threat Actors THREAT actor Organized Crime Corporate / Industrial Espionage Terrorists Groups and Networks Hacktivists

Estimated global cost of cyber crime & espionage THREE ATTACK CATEGORIES CONFIENTIALITY INTEGRITY AVAILABILITY >400 BUSD Total global cost of cyber crime and espionage ~1% Of GDP Source: Estimating the Global Cost of Cybercrime, Intel Security, 2014

Mobile generations ACROSS time The foundation of mobile telephony Mobile telephony for everyone The foundation of mobile broadband The evolution of mobile broadband The Network for the Networked Society ~1980 ~1990 ~2000 ~2010 ~2020 Historically, higher peak data rates, denser infrastructure and more bandwidth have been the hallmark of each mobile technology generation! Access technologies & new air-interfaces have been the center of attention

5g is different: It s A network platform A common Network Platform designed to serve multiple industries and use cases, each with different requirements @ Digitalizing industries can be served with dynamic and secure Network Slices Emphasis as much on network core as on access

5g, the key core components Virtualization VNF VNF Software Defined Networking (SDN) Distributed Cloud Network Slicing VNF VNF VNF VNF Distributed Data Center Central Data Center

5g: the network as a platform Moving away from dedicated physical networks and resources for different applications S1 S2 Sn NW1 NW2 NWn To a Network Factory where new networks and architectures are manufactured by SW Network slices Media MBB Basic Health Service n Robotic communication f1 f2 fn Physical Resources (Access, Connectivity, Computing, Storage,..)

5g: The Network as a platform Network operators can tailor network slices to meet particular governmental, e-health, e-educational, consumer, enterprise, and industry demands The design of the different slices is an essential part of the network performance to serve multiple user groups and use cases, each with unique and specific requirements @ 10-100x 1000x 5x 100x Cost 10+ +20dB END-USER DATA RATES MOBILE DATA VOLUMES LOWER LATENCY MORE DEVICES DEVICE COST REDUCTION YEARS BATTERY LIFE BETTER COVERAGE

5g will support diverse use cases Massive MTC Critical MTC LOGISTICS TRAFFIC SAFETY & CONTROL SMART AGRICULTURE FLEET MANAGEMENT INDUSTRIAL APPLICATION & CONTROL REMOTE TRAINING SMART METER TRACKING REMOTE MANUFACTURING REMOTE SURGERY LOW COST, LOW ENERGY SMALL DATA VOLUMES MASSIVE NUMBERS Enhanced Mobile Broadband ULTRA RELIABLE VERY LOW LATENCY VERY HIGH AVAILABILITY ENTERPRISE VR/AR HOME MOBILE/ WIRELESS/ FIXED SMARTPHONES BROADCASTING VENUES NON-SIM DEVICES 4K/8K UHD

Every Company is a digital company 5G and IoT are game changers Public safety Shipping Utilities Everything connected Mining

What has changed? Threats & Issues Service providers Infrastructure operators Enterprises Devices Large Enterprise Small Enterprise The The edge edge is is blurred The The stakes are higher Any size biz is a target The The endpoint is blurred Cloud increases complexity to secure & variety of attack vectors Virtualization & decentralization brings new risks Critical infrastructure concerns Legacy systems exposed Balancing regulation, best practice and practical concerns Advanced malware, spyware, ransomware target new apps Targeted attacks, spear phishing & APT s Mobile & IoT device malware Devices connecting directly to cloud Variability & scale of IoT growth

Data Flow is the new Perimeter Data protection at all stages when created, stored, transmitted and used

OBJECTIVE: RESILIENCE Technology Resilience Process People

ENABLES TRUST STACK, A HOLISTIC APPROACH TRUSTED BUSINESS NEEDS TRUSTED OPERATIONS TRUSTED INFRASTRUCTURE TRUSTED HW & SW

TRUST STACK COMPONENTS TRUSTED BUSINESS Regulation, Customers, Partners and own ambitions TRUSTED OPERATIONS People + Processes + Tools Security & Privacy Risk Analysis Mitigation TRUSTED INFRASTRUCTURE End to end Security and Privacy architecture & configuration TRUSTED HW & SW Security & Privacy functions, characteristics & HW anchoring

Security as a business process Agile and responsive security process Comprehensive and Continuous Assessment Proactive Detection Ongoing risk based evaluation of exposure Business context related remedial actions Reduce risk by assessing vulnerabilities & threats Robust Defense Protect crucial assets and defend known vulnerabilities Detect threats that matter faster Agile Response Proactively respond to breaches quickly & effectively

Public policy landscape CAPABILITY = POWER OF HOW Industrial Policy, PPP, R&D REGULATION & LAW International Law, UN, Cyber Convention, FTA Standardization & Certification Competent Authorities, operational capabilities Domestic law, Telecom Law, Privacy Law, Finance Law, Critical Infra., Law, Public Procurement law, National Interest, Export Control, Foreign Trade and Investment Legislation, National Security Law.

Key Public policy issues Industrial espionage not on policy agenda Test & Verification Breach notification Privacy Data flows Encryption Security standards (degree), standardization, harmonization Insurance (private enforcement) Scope of security standards, i.e. Critical Infra etc e-evidence and lawenforcement access Liability (gov. enforcement)

Key public policy imperatives -Economic espionage INCREASE AWARENESS BUILD CAPABILITY: DETECT, PROTECT AND RESPOND Public POLICY RESPONSE PROTECTING CRITICAL SECTORS PROTECT INNOVATION FROM ESPIONAGE FDI SCREENING & SECURITY SCREENING