Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity

Managing the 5G risks in an unified and standardized way

By Nuno Teodoro
5g security risks
May 10, 2021

Inevitably, following the 4G, the new 5G generation is here to stay. In an era where the Internet of Things (IoT), Smart Cities, Intelligent Vehicles and machine-to-machine connections are a reality, 5G brings yet another layer of innovation and support for this evolutionary trend, unveiling a plethora of business cases and capabilities.

The 5G is expected to hugely impact our economy and society thus making it one of the most important recent innovations of the telecommunications field. The ability of the 5G capabilities for offering better quality and reliability to an entire population, is of the utmost relevance, along with the promise of low latency and high speed associated with reliability that promises to dramatically change the way society communicates and provides ubiquitous connectivity, enhancing machine to machine connectivity and interaction.

As most often, new technologies usually introduce both digital and business revolution along with a plethora of new threat vectors. 5G is no exception, and in particular with the exposure of new connected devices, industries and services, sensitive assets will undoubtedly be affected by new cyber threat agents.

As part of the evolving threat landscape, along with the political, social and economic impact of 5G threats, a detailed assessment on this technology has been made, where core network, access management and SDN threats (among others) have been identified, culminating in a series of controls specifically designed for their mitigation.

As part of this great effort to standardize an approach to secure the 5G networks, a toolbox was defined by the EU for supporting the 5G security, scoping strategic measures, technical measures and supporting actions. The overall goal is to ensure the 5G networks’ resilience given their relevance for the modern society and the impact on digital communications, and critical infrastructures such as energy, transport, banking and health.

Where does the EU stand on 5G cybersecurity?

As part of this joint effort and following the Cybersecurity Act, ENISA will be requested to contribute and support the development of a cybersecurity certification scheme for 5G along with the cooperation of all the relevant stakeholders. This way, the European Cybersecurity Certification Group (ECCG), NIS Cooperation Group and the 5G standardization will be direct stakeholders for this activity, where 5G experts from private companies and organizations will work together for the achievement of a common goal.

A common understanding of the impact of such threats was defined and a risk management approach created, where some such measure have been drafted by the NIS Cooperation Group within the Cybersecurity of 5G networks EU Toolbox, supporting the overall objective of standardizing the 5G cybersecurity approach.

As widely known, one of the core measures is the suppliers risk profile assessment and the application of restrictions for suppliers considered to be high risk, where applying exclusions to those vendors is included as a measure for risk mitigation for key-assets. It should be noted, however, that the definition of what is a high-risk suppliers is not yet created, thus created for now a common baseline for risk assessment for all vendors. Coincidently, it was noted that there wasn’t a common framework in place to assess the risk profile of individual suppliers. This was be a core improvement, designing and implementing a common ground for assessment, transparent and uniform to be used across the EU.

The reality is that there is now a twofold range of actions that scope both 5G technology suppliers (that might or might not be classified as high-risk vendors), and MNOs, that will use these vendors’ technology. Not only mobile operators will have to strengthen their security requirements and monitoring, they will also need to assess the risk profile on their suppliers and apply a risk based approach for maintaining the necessary cyber hygiene on the core, network management and access network functions. From an ecosystem perspective, strategies such as multi-vendor strategy to avoid or manage supplier dependency will have to be put in place in order to ensure adequate balance at a national level.

Major telecom equipment providers support the EU to raise a unified 5G security evaluation and certification standard, strengthening the EU role and national authorities with open and transparent supervision. The right of choosing 5G suppliers should belong to the operators and with less restrictions from governments, relying on the compliance with an open, transparent and standardized framework.

Moreover, the suppliers’ assessment should be based on facts and follow consistent and measurable principles to create a fair and trustworthy environment.

It is only by creating this fairness and transparency within the 5G suppliers’ ecosystem that the world will fully benefit of the best technologies, embracing what will be a technology driven deployment and innovation, rather than a political one.

A standardized approach will create a baseline for assessment based on real threats and measurable mitigation controls, where the major telecom providers should be able to play all by the same rules, demonstrating commitment with the cybersecurity standards and best practices, creating a trust ecosystem among nations.

 

KEYWORDS: cyber security risk and resilience risk management tools technology

Share This Story

Nuno

Nuno Teodoro is a Global Fortune 500 Chief Information Security Officer at Huawei with expertise in Cybersecurity Strategies and Programs, Threat Intelligence , SOCs, Cyber Crime and Warfare, Data Privacy and Application Security Programs.

 

 

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!