Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity News

The Importance of Securing Sensitive Data in a 5G World

By Scott Sykes, Samuel Visner
Cybersecurity Leadership Images
April 15, 2019

The pace of change within communications networks is happening at speeds not seen since the shift from circuit-switched networks to IP began a couple of decades ago. Today, we are in the midst of the next major transformation to hit communications networks: the evolution to a new, 5G- and IPv6-enabled global IT infrastructure.

While many operators around the world are already claiming to offer 5G services, and vendors are getting ready to roll out the latest handsets and other devices to take advantage of the speed and unique new services that will be possible with these new networks, it will be anywhere from another year to several years before we truly see 5G become ubiquitous.  In any case, the onrush of adoption is likely to be swift, and the cybersecurity solutions necessary to operate in this new environment must be prepared now.

As the global IT ecosystem changes dramatically in the next few years, there will exist tremendous opportunities for operators as well as their customers. Operators will be able to deliver cutting-edge new services that support futuristic endeavors such as VR/AR, smart cars, robotics, smart cities, and drones, and other things previously seen only in science-fiction. With the advent of 5G, demand for these and other services by consumers will grow faster than we can imagine.

But even if true, global 5G will be incremented over the next few years, it’s not too early to start thinking about one of the major issues that arises in discussions around 5G-enabled and 5G-ready networks: cybersecurity.

Once 5G, and by extension its enabling services and technologies – such as IoT, IPv6, and M2M – permeates the communications landscape, operators will need to face, understand, and overcome a whole new set of security challenges that will be more complex than anything that’s come before.

Secure the Endpoints, Secure the Data

The number of 5G-enabled devices is expected to grow rapidly, and when one factors in the seemingly endless number of IoT-related end points – sensors in healthcare and traffic applications, automobile telematics units, drones, devices in a smart home, and other use cases that form the basis of smart cities – the need for security becomes critical at multiple levels.

  • Customer data – The data flowing into and out of devices needs to be secure to protect the privacy of subscribers and the integrity of the information itself. In the case of IoT end points such as sensors, data could be constantly moving from one point to another very rapidly and all of that needs to be kept safe from prying eyes and those who would undermine its integrity.
  • Transaction data – With the onset of 5G, we’ll start seeing much more activity in the network core and increased requirements for securing those resources, including commerce transactions.
  • Network data – Preventing breaches to the network at the core, where most services will reside, is also top of the list of concerns for operators.

All of this becomes even more complex when one considers that 5G will enable network slicing, the ability to create multiple simultaneous mini networks that operate under different sets of security and service requirements. This ability to turn up quickly a 5G instance for a specific period of time, in a specific place, will make security an even higher priority and that much more of a challenge for operators, who will be the ones tasked with securing these various data types.

Their customers will inevitably turn to them in the event of a problem, and operators will be tasked with resolving any issues, which will require significant levels of knowledge and proficiency around security issues. For these reasons, most operators will not be able to go it alone when it comes to overcoming the security hurdles of 5G and other shifts in communications networks. Rather, they will need to work with trusted partners that have the expertise, track record, and experience to ensure data integrity, customer privacy and compliance with any mandates or orders.

Keys to a Secure Network

Given the burden being placed on operators regarding network and IT security within the advanced communications networks of today and the future, they will have to rely heavily on their vendors and suppliers to provide the highest levels of assurance and risk mitigation across next-generation networks.  A shared model of responsibility will be required, one that unites customers and operators in pursuit of effective 5G cybersecurity.

This shared model can include:

  • A dedicated security organization to support continuous monitoring of operator networks and data;
  • Support for established security protocols and standards;
  • Strong focus on personal data security and privacy, including identifying and protecting sensitive information;
  • Auditing and assurance mechanisms to provide customers the best possible security infrastructure for the vendor’s products, solutions and services.

Having these policies and framework in place is critical for vendors working with operators as they roll out next-generation networks, but in addition there needs to be the solid experience and knowledge to back it up.

An Enhanced Security Plan

Operators need to ensure subscriber and other data is secure within the confines of their network as well as when data traverses public or private clouds. By implementing a strategy operators can protect sensitive data, as well as the software and services used to store and process that data and to apply it to their needs.

This strategy would incorporate the principles of the shared model of responsibility outlined above and go further through alignment with industry security frameworks and standards in order to bring the highest levels of assurance to customers.

This includes providing industry leading secure services and solutions designed to ensure the confidentiality, integrity and availability of our own data and our customers’ data and systems, against the fast-evolving threats of cyber criminals, hackers and other forms of intrusion and disruption.

 

KEYWORDS: 5G cyber security cybersecurity robotics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Scott sykes

Scott Sykes is a contributing writer and the Senior Director of Global Security Organization at Netcracker Technology, in Boston, and a former Board Member of the Virginia Cyber Security Partnership, in Richmond, VA.

Samuel visner

Samuel Visner is a contributing writer and the Director of the National Cybersecurity Federally Funded Research and Development Center (MITRE), sponsored by the National Institute of Science and Technology. He also serves as the Security Director for Netcracker Technology Corporation and as a member of the Cyber Council of the Intelligence and National Security Alliance and the Cyber Committee of the Armed Forces Communications and Electronics Association.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Digital Trust

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • digital landscape

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • SEC0219-data-Feat-slide1_900px

    Securing a World-Class Data Center

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • September 3, 2024

    From DDoS Protection to WAAP: How Layered Protection Enhances Your Cybersecurity Strategy

    ON DEMAND: By participating in the webinar, attendees will gain enhanced knowledge of cyber threats and understand the current spectrum of cyber threats facing businesses.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!