5G Trust Model - Recommendations and Best Practices for CSPs

5G Trust Model - Recommendations and Best Practices for CSPs

RSA Conference via YouTube Direct link

RSAConference 2020

1 of 21

1 of 21

RSAConference 2020

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

5G Trust Model - Recommendations and Best Practices for CSPs

Automatically move to the next video in the Classroom when playback concludes

  1. 1 RSAConference 2020
  2. 2 The Real Value of SG
  3. 3 SG is a transformation journey-preparations needs to start today From 4G Security to 5G Security through combination of technologies
  4. 4 SG use cases & services have demanding, diverse and dynamic requirements
  5. 5 Security landscape is changing
  6. 6 Architecture view: SG security operations requirements for CSP
  7. 7 From LTE to SG: Adopting New Networking Paradigms
  8. 8 3GPP standard Security Architecture 4G vs SG, a brief comparison 4G (LTE) Security
  9. 9 Key Cloud Security Risks Security Challenges
  10. 10 Cloud Infrastructure threat landscape
  11. 11 IoT eco system and threats at different levels
  12. 12 Changing landscape...
  13. 13 Regulatory requirements across the Globe Countries must consider 5G specific regulations as an extension of Cybersecurity guidelines
  14. 14 Design for Security
  15. 15 How should CSPs address each security domain
  16. 16 Four key 5G security operations capabilities to help CSPs build digital trust
  17. 17 Best practices. Use of next generation technologies in SG Security
  18. 18 Network Slicing Security & Network Slice Isolation
  19. 19 A few case studies Creating foundation for comprehensive 5G Security measures
  20. 20 In summary. Key recommendations
  21. 21 Apply the learnings from this session Points to ponder....

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.