Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity News

The Importance of Securing Sensitive Data in a 5G World

By Scott Sykes, Samuel Visner
Cybersecurity Leadership Images
April 15, 2019

The pace of change within communications networks is happening at speeds not seen since the shift from circuit-switched networks to IP began a couple of decades ago. Today, we are in the midst of the next major transformation to hit communications networks: the evolution to a new, 5G- and IPv6-enabled global IT infrastructure.

While many operators around the world are already claiming to offer 5G services, and vendors are getting ready to roll out the latest handsets and other devices to take advantage of the speed and unique new services that will be possible with these new networks, it will be anywhere from another year to several years before we truly see 5G become ubiquitous.  In any case, the onrush of adoption is likely to be swift, and the cybersecurity solutions necessary to operate in this new environment must be prepared now.

As the global IT ecosystem changes dramatically in the next few years, there will exist tremendous opportunities for operators as well as their customers. Operators will be able to deliver cutting-edge new services that support futuristic endeavors such as VR/AR, smart cars, robotics, smart cities, and drones, and other things previously seen only in science-fiction. With the advent of 5G, demand for these and other services by consumers will grow faster than we can imagine.

But even if true, global 5G will be incremented over the next few years, it’s not too early to start thinking about one of the major issues that arises in discussions around 5G-enabled and 5G-ready networks: cybersecurity.

Once 5G, and by extension its enabling services and technologies – such as IoT, IPv6, and M2M – permeates the communications landscape, operators will need to face, understand, and overcome a whole new set of security challenges that will be more complex than anything that’s come before.

Secure the Endpoints, Secure the Data

The number of 5G-enabled devices is expected to grow rapidly, and when one factors in the seemingly endless number of IoT-related end points – sensors in healthcare and traffic applications, automobile telematics units, drones, devices in a smart home, and other use cases that form the basis of smart cities – the need for security becomes critical at multiple levels.

  • Customer data – The data flowing into and out of devices needs to be secure to protect the privacy of subscribers and the integrity of the information itself. In the case of IoT end points such as sensors, data could be constantly moving from one point to another very rapidly and all of that needs to be kept safe from prying eyes and those who would undermine its integrity.
  • Transaction data – With the onset of 5G, we’ll start seeing much more activity in the network core and increased requirements for securing those resources, including commerce transactions.
  • Network data – Preventing breaches to the network at the core, where most services will reside, is also top of the list of concerns for operators.

All of this becomes even more complex when one considers that 5G will enable network slicing, the ability to create multiple simultaneous mini networks that operate under different sets of security and service requirements. This ability to turn up quickly a 5G instance for a specific period of time, in a specific place, will make security an even higher priority and that much more of a challenge for operators, who will be the ones tasked with securing these various data types.

Their customers will inevitably turn to them in the event of a problem, and operators will be tasked with resolving any issues, which will require significant levels of knowledge and proficiency around security issues. For these reasons, most operators will not be able to go it alone when it comes to overcoming the security hurdles of 5G and other shifts in communications networks. Rather, they will need to work with trusted partners that have the expertise, track record, and experience to ensure data integrity, customer privacy and compliance with any mandates or orders.

Keys to a Secure Network

Given the burden being placed on operators regarding network and IT security within the advanced communications networks of today and the future, they will have to rely heavily on their vendors and suppliers to provide the highest levels of assurance and risk mitigation across next-generation networks.  A shared model of responsibility will be required, one that unites customers and operators in pursuit of effective 5G cybersecurity.

This shared model can include:

  • A dedicated security organization to support continuous monitoring of operator networks and data;
  • Support for established security protocols and standards;
  • Strong focus on personal data security and privacy, including identifying and protecting sensitive information;
  • Auditing and assurance mechanisms to provide customers the best possible security infrastructure for the vendor’s products, solutions and services.

Having these policies and framework in place is critical for vendors working with operators as they roll out next-generation networks, but in addition there needs to be the solid experience and knowledge to back it up.

An Enhanced Security Plan

Operators need to ensure subscriber and other data is secure within the confines of their network as well as when data traverses public or private clouds. By implementing a strategy operators can protect sensitive data, as well as the software and services used to store and process that data and to apply it to their needs.

This strategy would incorporate the principles of the shared model of responsibility outlined above and go further through alignment with industry security frameworks and standards in order to bring the highest levels of assurance to customers.

This includes providing industry leading secure services and solutions designed to ensure the confidentiality, integrity and availability of our own data and our customers’ data and systems, against the fast-evolving threats of cyber criminals, hackers and other forms of intrusion and disruption.

 

KEYWORDS: 5G cyber security cybersecurity robotics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Scott sykes

Scott Sykes is a contributing writer and the Senior Director of Global Security Organization at Netcracker Technology, in Boston, and a former Board Member of the Virginia Cyber Security Partnership, in Richmond, VA.

Samuel visner

Samuel Visner is a contributing writer and the Director of the National Cybersecurity Federally Funded Research and Development Center (MITRE), sponsored by the National Institute of Science and Technology. He also serves as the Security Director for Netcracker Technology Corporation and as a member of the Cyber Council of the Intelligence and National Security Alliance and the Cyber Committee of the Armed Forces Communications and Electronics Association.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Data Stream

    The Five Rings: Understanding the importance of physical security of colocation data centers as a fundamental service during COVID-19

    See More
  • Digital Trust

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • digital landscape

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing