View
6
Download
0
Category
Preview:
Citation preview
Jason BoswellHead of Security, IT, and Cloud
Ericsson North America
Drew MorinDirector Federal Cybersecurity
Technology and Engineering ProgramsT-Mobile USA
Chris WhiteHead of Algorithms, Analytics,
Control, and Security Research LabNokia Bell Labs
5G Security
Jason BoswellHead of Security, IT, and Cloud
Ericsson North America
Jason S. Boswell, CISSP
Head of Security, IT & Cloud Consulting Apr 27, 2017Ericsson, Market North America
5G SecurityCTIA Cybersecurity summit
1300ICT transformation projects
Ericsson
39000patents
180Countries
140years
2.5Bserved by installed base
1Bin managed networks
TRUST STACK, A HOLISTIC APPROACH
NEED
S
TRUSTED BUSINESS
TRUSTED OPERATIONS
TRUSTED NETWORK INFRASTRUCTURE
TRUSTED HW & SW
ENA
BLE
S
Source: Ericsson Mobility Report
November 2016
Connected Devices
in 202229,7 BILLION 18,1 billion
M2M/IOT DEVICES
8,6 billionMOBILE PHONES
4.6 Billion in 2015
3 billionPC/TABLET/LAPTOP/FIXED PHONES
3.7 Billion in 2015
7.1 Billion in 2015
Technology Drivers
IoT5G Cloud
Enabling the networked society
Key 5G Security challenges
NEW service delivery MODELSNEW Business & trust MODELS
Evolved threat landscape Critical infrastructure
Ready for the challenge
Network slicing & virtualization enable
isolated sub-networks
Multi-stakeholder: 5G security baseline
IoT authentication and transport layer security
OTT Service enablement
Greater resiliency, protection & recovery
Presented by
Drew MorinDirector Federal Cybersecurity Technology and
Engineering Programs
T-Mobile USA
5G Impact
• Global spending on cybersecurity products & services
are predicted to exceed $1 trillion over the next 5
years
• Cisco and Microsoft both predict 50 billion devices will
be connected to the Internet by 2020
• By 2020, data volumes online are expected to be 50
times greater than today
5G Drives Unprecedented Growth
5G Drives Jobs
Economic benefit is estimated to be
at $500B and result in the creation
of an estimated 3 million jobs
New jobs could be up to 40x the
number of jobs created in network
providers
Cybersecurity workforce growth will
be across all industry sectors
Economic Benefits of 5G are Even Greater than the
direct jobs and investments in Networks
0 50000 100000 150000 200000 250000 300000 350000 400000 450000
California
Florida
New York
Oregon
South Dakota
Axi
s Ti
tle
Expected Jobs By State
Network Other Jobs
True Software
Symantec estimates 6 million positions globally with 1.5 million
cybersecurity job openings unfilled by 2019
The Global Information Security Workforce Study released earlier this
year projects a shortage of 1.8 million professionals by 2022
Human attack surface to reach 4 billion people by 2020
The Human Element of Cybersecurity
Why the Gap?
Curriculum guidelines are still evolving; there is no standard baseline
The Skill level is not entry level; each industry requires specialization
There is a lack of qualified instructors; skilled practitioners are recruited
by Industry/Government
The demand is growing at a faster rate than supply
Closing the Gap
Joint Task Force on Cybersecurity Education is a collaboration between
international computing societies, Academic institutions, Industry and
Government to develop comprehensive curricular guidance
Internship Programs and Partnerships between Academia and Industry
provide the bridge to the specialized skills required by Industry
NIST Cybersecurity Workforce Framework is enabling a common lexicon
to understand and communicate workforce requirements
Communications Industry and Government partnership through the FCC
Communications Security, Reliability and Interoperability Council
developed best practice recommendations
Industry/Academia/Government working together to address
What’s next?
Critical Infrastructure resource development pilot program
Skills assessment toolset; results in improved positioning of students
90% conversion rate from intern to full time practicioner
Alignment to telecom industry specific needs
Feedback process to improve program for each iteration
Expansion to other (non-telecom) critical infrastructure players
T-Mobile and University of Washington Partnership
Summary
5G Cybersecurity is not just about protecting things – People are Critical
Wireless Industry is partnering with Academia and Government to
address the Workforce gap
Wireless Industry leadership is developing and improving programs that
will benefit ALL critical infrastructure providers as we evolve the 5G
Wireless Industry Leadership in Cybersecurity Enables 5G
Presented by
Chris WhiteHead of Network Algorithms, Analytics, Control,
and Security Research Lab
Nokia Bell Labs
The Security Challenge of the Future X network
Christopher A. WhiteLab Leader - Networks, Algorithms, Analytics, Control and Security
Nokia Bell Labs
The Challenge: touching the world as easily as a child draws on a sidewalk.
The emergence of the edge cloud for low latency and high performance
The emergence of the network OS to enable programmability and network federation
Pervasive cognitive capabilities for operating networks & systems
The emergence of new trust models & security architectures
Universal Adaptive CoreSmart Network Fabric
Programmable Network OS Augmented Cognition Systems Dynamic Data Security
Adaptable Security
DigitalTrust
Creating dynamically reconfigurable IP + optical metro and core networks
Converged Edge Cloud
3
2
Net OS
Net OS
Net OS5
6 8
Access-agnostic core for seamless user experience
4
The creation of ultra-small and ultra-close access nodes
1
Massive Scale Access
Scalable
Remote
Massive
MIMO
Network attach
Session mgmt.
Policy control
Digital value platforms augmented by advanced network capabilities
7
Digital Value Platforms
Net OS
The 8 domains of the new digital reality
The Future X network must support this new reality
METRO
COREACCESS
Enterprise Network Slice
Mobility Network Slice
Smart
Network FabricEnabled by Software
Defined Networks (SDN)
Service Customized
Network SlicesEnabled by
Network Function
Virtualization (NFV)
Network OS
Securing the network: Cognitive + Converged + Adaptive
Securing the devices: Self configuring, Digital trust, IoT networking
?
Physical World Digital World
Securing the data: Augmenting Intelligence
Perhaps this is the new way to interact with data?
Presented by
Recommended