As 5G technology continues to be rolled out worldwide—providing latency of a mere 1 millisecond—it is critical that information security professionals become familiar with 5G system architecture and security architecture, as well as the risks that come with implementing new cellular technologies. ISACA’s new white paper, 5G Security: Addressing Risk and Threats of Mobile Network Technologies, explores these topics, and compares 5G technology with 4G and previous generation cellular technologies.

The paper also identifies the new risks introduced through implementing 5G technology, and how 5G security features address threats posed by the technology, which can include bidding down attacks, exploitation of user plane integrity and abuse of remote access.

Professionals and their organizations can also realize substantial benefits through implementing 5G technology. The paper details 5G’s vast improvements over the current capabilities of the 4G and previous networks, including:

  1. 5G technology’s faster network with higher capacity can serve the connectivity needs of the Internet of Things (IoT) ecosystem, eliminating lags in data transmission across the network.
  2. 5G technology’s flexibility can support many static and mobile IoT devices, which have a diverse range of speed, bandwidth and quality of service requirements.
  3. 5G technology will result in a 90% reduction in network energy usage with up to 10 years’ worth of battery life for low-powered IoT devices.

“After more than a decade with 4G, 5G technology will strongly improve individuals’ lives and business processes,” says Ronke Oyemade, CISM, CISA, CRISC, CDPSE, PMP manager, financial compliance – IT, CNN-Turner Broadcasting Systems, and lead developer of the paper. “Despite the risks and threats that can come with new mobile network technology, 5G security architecture’s features better mitigate existing risks from previous cellular technologies.”

5G Security: Addressing Risk and Threats of Mobile Network Technologies is complimentary and can be downloaded at Visit for additional ISACA resources, and join ISACA’s Emerging Technology Engage Group to discuss the topic further.