Completed
Regulatory requirements across the Globe Countries must consider 5G specific regulations as an extension of Cybersecurity guidelines
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
5G Trust Model - Recommendations and Best Practices for CSPs
Automatically move to the next video in the Classroom when playback concludes
- 1 RSAConference 2020
- 2 The Real Value of SG
- 3 SG is a transformation journey-preparations needs to start today From 4G Security to 5G Security through combination of technologies
- 4 SG use cases & services have demanding, diverse and dynamic requirements
- 5 Security landscape is changing
- 6 Architecture view: SG security operations requirements for CSP
- 7 From LTE to SG: Adopting New Networking Paradigms
- 8 3GPP standard Security Architecture 4G vs SG, a brief comparison 4G (LTE) Security
- 9 Key Cloud Security Risks Security Challenges
- 10 Cloud Infrastructure threat landscape
- 11 IoT eco system and threats at different levels
- 12 Changing landscape...
- 13 Regulatory requirements across the Globe Countries must consider 5G specific regulations as an extension of Cybersecurity guidelines
- 14 Design for Security
- 15 How should CSPs address each security domain
- 16 Four key 5G security operations capabilities to help CSPs build digital trust
- 17 Best practices. Use of next generation technologies in SG Security
- 18 Network Slicing Security & Network Slice Isolation
- 19 A few case studies Creating foundation for comprehensive 5G Security measures
- 20 In summary. Key recommendations
- 21 Apply the learnings from this session Points to ponder....