5G Security - CTIA · Source: Ericsson Mobility Report November 2016 Connected Devices in 2022 29,7...

Preview:

Citation preview

Jason BoswellHead of Security, IT, and Cloud

Ericsson North America

Drew MorinDirector Federal Cybersecurity

Technology and Engineering ProgramsT-Mobile USA

Chris WhiteHead of Algorithms, Analytics,

Control, and Security Research LabNokia Bell Labs

5G Security

Jason BoswellHead of Security, IT, and Cloud

Ericsson North America

Jason S. Boswell, CISSP

Head of Security, IT & Cloud Consulting Apr 27, 2017Ericsson, Market North America

5G SecurityCTIA Cybersecurity summit

1300ICT transformation projects

Ericsson

39000patents

180Countries

140years

2.5Bserved by installed base

1Bin managed networks

TRUST STACK, A HOLISTIC APPROACH

NEED

S

TRUSTED BUSINESS

TRUSTED OPERATIONS

TRUSTED NETWORK INFRASTRUCTURE

TRUSTED HW & SW

ENA

BLE

S

Source: Ericsson Mobility Report

November 2016

Connected Devices

in 202229,7 BILLION 18,1 billion

M2M/IOT DEVICES

8,6 billionMOBILE PHONES

4.6 Billion in 2015

3 billionPC/TABLET/LAPTOP/FIXED PHONES

3.7 Billion in 2015

7.1 Billion in 2015

Technology Drivers

IoT5G Cloud

Enabling the networked society

Key 5G Security challenges

NEW service delivery MODELSNEW Business & trust MODELS

Evolved threat landscape Critical infrastructure

Ready for the challenge

Network slicing & virtualization enable

isolated sub-networks

Multi-stakeholder: 5G security baseline

IoT authentication and transport layer security

OTT Service enablement

Greater resiliency, protection & recovery

Presented by

Drew MorinDirector Federal Cybersecurity Technology and

Engineering Programs

T-Mobile USA

5G Impact

• Global spending on cybersecurity products & services

are predicted to exceed $1 trillion over the next 5

years

• Cisco and Microsoft both predict 50 billion devices will

be connected to the Internet by 2020

• By 2020, data volumes online are expected to be 50

times greater than today

5G Drives Unprecedented Growth

5G Drives Jobs

Economic benefit is estimated to be

at $500B and result in the creation

of an estimated 3 million jobs

New jobs could be up to 40x the

number of jobs created in network

providers

Cybersecurity workforce growth will

be across all industry sectors

Economic Benefits of 5G are Even Greater than the

direct jobs and investments in Networks

0 50000 100000 150000 200000 250000 300000 350000 400000 450000

California

Florida

New York

Oregon

South Dakota

Axi

s Ti

tle

Expected Jobs By State

Network Other Jobs

True Software

Symantec estimates 6 million positions globally with 1.5 million

cybersecurity job openings unfilled by 2019

The Global Information Security Workforce Study released earlier this

year projects a shortage of 1.8 million professionals by 2022

Human attack surface to reach 4 billion people by 2020

The Human Element of Cybersecurity

Why the Gap?

Curriculum guidelines are still evolving; there is no standard baseline

The Skill level is not entry level; each industry requires specialization

There is a lack of qualified instructors; skilled practitioners are recruited

by Industry/Government

The demand is growing at a faster rate than supply

Closing the Gap

Joint Task Force on Cybersecurity Education is a collaboration between

international computing societies, Academic institutions, Industry and

Government to develop comprehensive curricular guidance

Internship Programs and Partnerships between Academia and Industry

provide the bridge to the specialized skills required by Industry

NIST Cybersecurity Workforce Framework is enabling a common lexicon

to understand and communicate workforce requirements

Communications Industry and Government partnership through the FCC

Communications Security, Reliability and Interoperability Council

developed best practice recommendations

Industry/Academia/Government working together to address

What’s next?

Critical Infrastructure resource development pilot program

Skills assessment toolset; results in improved positioning of students

90% conversion rate from intern to full time practicioner

Alignment to telecom industry specific needs

Feedback process to improve program for each iteration

Expansion to other (non-telecom) critical infrastructure players

T-Mobile and University of Washington Partnership

Summary

5G Cybersecurity is not just about protecting things – People are Critical

Wireless Industry is partnering with Academia and Government to

address the Workforce gap

Wireless Industry leadership is developing and improving programs that

will benefit ALL critical infrastructure providers as we evolve the 5G

Wireless Industry Leadership in Cybersecurity Enables 5G

Presented by

Chris WhiteHead of Network Algorithms, Analytics, Control,

and Security Research Lab

Nokia Bell Labs

The Security Challenge of the Future X network

Christopher A. WhiteLab Leader - Networks, Algorithms, Analytics, Control and Security

Nokia Bell Labs

The Challenge: touching the world as easily as a child draws on a sidewalk.

The emergence of the edge cloud for low latency and high performance

The emergence of the network OS to enable programmability and network federation

Pervasive cognitive capabilities for operating networks & systems

The emergence of new trust models & security architectures

Universal Adaptive CoreSmart Network Fabric

Programmable Network OS Augmented Cognition Systems Dynamic Data Security

Adaptable Security

DigitalTrust

Creating dynamically reconfigurable IP + optical metro and core networks

Converged Edge Cloud

3

2

Net OS

Net OS

Net OS5

6 8

Access-agnostic core for seamless user experience

4

The creation of ultra-small and ultra-close access nodes

1

Massive Scale Access

Scalable

Remote

Massive

MIMO

Network attach

Session mgmt.

Policy control

Digital value platforms augmented by advanced network capabilities

7

Digital Value Platforms

Net OS

The 8 domains of the new digital reality

The Future X network must support this new reality

METRO

COREACCESS

Enterprise Network Slice

Mobility Network Slice

Smart

Network FabricEnabled by Software

Defined Networks (SDN)

Service Customized

Network SlicesEnabled by

Network Function

Virtualization (NFV)

Network OS

Securing the network: Cognitive + Converged + Adaptive

Securing the devices: Self configuring, Digital trust, IoT networking

?

Physical World Digital World

Securing the data: Augmenting Intelligence

Perhaps this is the new way to interact with data?

Presented by

Recommended