Overview
Syllabus
Introduction
Agenda
Annie Bruce
Katherine Waldron
Can we build a reliable network
How do you secure everything
Is supply chain risk by country of origin
Risk mitigation
The risk isnt spying
Backdoors
Continuous Monitoring
America is not ready
Backdoors in supply chain
Security vs Surveillance
Cultural Shift in DoD
Play Both Ways
China Ignoring IP Law
No cartons of the world
Risk does not commute
A plausible argument
Why build a 5G network
Objective criteria and testing
Cybersecurity maturity model
Testing and standards
Independent testing
Human technology
Threelegged stool
Security is an insurmountable problem
Youre the supply chain
What tools are there
Are there resources out there
Baking security protocols
Innovation investments
Holding the line
We did the wrong thing
China and 5G
Taught by
RSA Conference