Completed
In summary. Key recommendations
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
5G Trust Model - Recommendations and Best Practices for CSPs
Automatically move to the next video in the Classroom when playback concludes
- 1 RSAConference 2020
- 2 The Real Value of SG
- 3 SG is a transformation journey-preparations needs to start today From 4G Security to 5G Security through combination of technologies
- 4 SG use cases & services have demanding, diverse and dynamic requirements
- 5 Security landscape is changing
- 6 Architecture view: SG security operations requirements for CSP
- 7 From LTE to SG: Adopting New Networking Paradigms
- 8 3GPP standard Security Architecture 4G vs SG, a brief comparison 4G (LTE) Security
- 9 Key Cloud Security Risks Security Challenges
- 10 Cloud Infrastructure threat landscape
- 11 IoT eco system and threats at different levels
- 12 Changing landscape...
- 13 Regulatory requirements across the Globe Countries must consider 5G specific regulations as an extension of Cybersecurity guidelines
- 14 Design for Security
- 15 How should CSPs address each security domain
- 16 Four key 5G security operations capabilities to help CSPs build digital trust
- 17 Best practices. Use of next generation technologies in SG Security
- 18 Network Slicing Security & Network Slice Isolation
- 19 A few case studies Creating foundation for comprehensive 5G Security measures
- 20 In summary. Key recommendations
- 21 Apply the learnings from this session Points to ponder....