Overview
Syllabus
RSAConference 2020
The Real Value of SG
SG is a transformation journey-preparations needs to start today From 4G Security to 5G Security through combination of technologies
SG use cases & services have demanding, diverse and dynamic requirements
Security landscape is changing
Architecture view: SG security operations requirements for CSP
From LTE to SG: Adopting New Networking Paradigms
3GPP standard Security Architecture 4G vs SG, a brief comparison 4G (LTE) Security
Key Cloud Security Risks Security Challenges
Cloud Infrastructure threat landscape
IoT eco system and threats at different levels
Changing landscape...
Regulatory requirements across the Globe Countries must consider 5G specific regulations as an extension of Cybersecurity guidelines
Design for Security
How should CSPs address each security domain
Four key 5G security operations capabilities to help CSPs build digital trust
Best practices. Use of next generation technologies in SG Security
Network Slicing Security & Network Slice Isolation
A few case studies Creating foundation for comprehensive 5G Security measures
In summary. Key recommendations
Apply the learnings from this session Points to ponder....
Taught by
RSA Conference