Episode 8: 5G – With Great Power, Comes Great Responsibility
5G connectivity promises to break traditional paradigms of data delivery by providing network connectivity virtually everywhere. To accommodate this new paradigm in diverse data delivery, the building out of 5G infrastructures is underway. It is expected that in two years’ time 5G will reach 25 billion connected devices globally and this number will triple to 75 Billion by 2025. For enterprises and subscribers, it will enable exciting new low latency, high performance and reliable connectivity that will create new business opportunities. For mobile network operators it will unlock significant new revenue-generating opportunities. 5G is poised to change how digital technology-based solutions are delivered and consumed across different industry verticals by connecting people and devices using high quality services whenever wherever. Our economy, and our national security had so many participants, each reliant on the other and none of which have the final responsibility for enterprise /subscriber data security. Some believe that consumers should be given the tools which can make informed decisions. The concept of shared responsibility model between cloud service providers and enterprises will be extended to these Telco edge and cloud edge sites.
In this episode Neira is joined by Prashant Deo, Senior Information Security Consultant at Tata Consultancy Services and Chen Arbel, Vice President Business Development, 5G & Cloud Security and Thales.
Neira advises organisations of all sizes on payments, fintech, regtech, cybercrime, information security, regulations (e.g. PSD2, GDPR, AML) & digital innovation. With more than 20 years in financial services & technology, she believes in change through innovation & partnerships and always strives to demystify the hype surrounding current issues. She enjoys her work as a strategic board advisor and non-executive director. She also provides coaching, training/e-learning, speaking, payment security expert witness services, and helps with M&As cybersecurity due diligence. She likes engaging on social media & regularly addresses global audiences in person or virtually.
She is the 1st Advisory Committee member for PCI-Pal, a global leader in secure payments & chairs the Advisory Board for mobile innovator Ensygnia. She is proud to be an Ambassador for the Emerging Payments Association and a friend of the Global Cyber Alliance. You'll find her on the Refinitiv list of Top 100 Influencers in Financial Services, the Planet Compliance Top 50 RegTech Influencers, the SC Magazine list of the UK's 50 Most Influential Women in Cyber-Security 2019, the Cybersecurity Ventures Women Know Cyber 2019 (100 Fascinating Women Fighting Cybercrime), the Jax Finance Top 20 Social Influencers in Fintech 2017, the City AM Powerful Women in the City List, the Richtopia Top 100 Most Influential People in Fintech. Tripwire nominated her "Top Influencer in Security To Follow on Twitter" in January 2015, CEOWorld Magazine nominated her Top Chief Security Officer to Follow on Twitter in April 2014, she is the Merchant Payments Ecosystem Acquiring Personality of the Year 2013, the SC Magazine Information Security Person of the Year 2012 and is an InfoSecurity Europe Hall of Fame alumni. She was voted to the Top 10 Most Influential People in Information Security by SC Magazine & ISC2 in 2010 & has served on the PCI SSC Board of Advisors for 4 years. She is a British Computer Society Fellow.
Neira has previously worked for Barclaycard, Santander, Abbey National, Oracle Corp. and Unisys. Her clients span industry sectors, including financial services, fintech, retail, legal, consulting, information security & technology.
She loves technology and cars...
Our Guest Speakers
Prashant is currently Senior Information Security Consultant at Tata Consultancy Services, a global leader in IT services, consulting & business solutions with a large network of innovation & delivery centers. He has over 20 years experience in lead roles in Cyber Security Consulting and Cyber Defense Operations. Prashant is currently Service Delivery Lead for Security Solutions and Services at TCS, managing end to end project delivery for Infrastructure Security Solutions and Identity & Access Management Solutions, Security Operations Management and Management of Information Security for all client deliverables.
With over 20 years of information security, Chen has served in key development roles leading to uniquely powerful innovations that effectively align data security technology with real-life business objectives. Playing a leading role in the implementation of security solutions within some of the world’s largest organizations, Chen has worked in all major industries on strategic initiatives that deliver clear business advantages through unmatched technology. Chen held a government classified technology position in North America and served as Captain for the Defense Force where he gained extensive information security experience.
About this Episode
The power and responsibility of 5G
Two years from now, 5G technology is predicted to host 25 billion device connections. Imagine that you are a market analyst, and you needed to forecast the number of 5G connected devices in the year 2025, less than 1500 days from today. You might try and calculate this by considering how many humans are on the planet, but that would simply not explain how there will be 25 billion devices in only two years - yet there are only 7.9 Billion people on the planet right now. That essentially means that every person in the industrialized world will have more than 3 connected devices.
If you took a conservative approach, predicting that there would be 50 billion 5G connected devices by 2025, you would be caught short, as the actual prediction is 75 billion 5G connected devices by the year 2025. Lets stop for a moment and let that soak in – 75 billion 5G connected devices in a world populated by 8 billion people. That is more than 9 devices per person.
It is easy to contemplate the enormous opportunities that 5G presents for all industries. This is more than just the ability to see videos faster. Every critical infrastructure sector will be able to function with previously unforeseen high-quality services, maximizing not only business profits, but also service efficiency.
There is, however a seriousness consideration to this new technology; data security. Where should data security be assigned? Who should hold the responsibility of ensuring the data is secure? One solution is a “shared responsibility” model, which, by its name alone, infers how complex this new technology is; simply too big for one security custodian.
From my own professional experiences of occupying roles in the implementation of security solutions within some of the world’s largest organizations, as well as once holding a government classified technology position, I thought it would be interesting to explore some of these ideas with a like-minded security professional.
In this episode of the Thales Security Sessions Podcast, I spoke with Prashant Deo, the Senior Information Security Consultant at Tata Consultancy Services (TCS). Prashant has over 20 years of experience in lead roles in Cyber Security Consulting and Cyber Defense Operations. He currently serves as the Service Delivery Lead for Security Solutions and Services at TCS, managing end-to-end project delivery for Infrastructure Security Solutions and Identity & Access Management Solutions, Security Operations Management and Management of Information Security for all client deliverables.
We can celebrate all of the advances that will occur as a result of 5G, but this high-speed, low-latency data movement also creates an acceleration of security concerns. Data transmission and storage will create a faster set of cascading events that must be met with equally powerful security.
Many cybersecurity professionals are concerned about 5G security, and many people may even misunderstand the problem, assuming that 5G is simply a faster version of what previously existed. However, 5G is not simply a bigger valve that was opened up on an invisible pipe. It is fundamentally different in its design. The entire security core is different than earlier wireless technologies. The virtualization and shared infrastructure aspects of 5G are unique.
Of course, with all technology, complexity is the enemy, and these new advances mean that the attack vectors will also increase. The security implications of 5G are brought to the real-world, for example, when we consider the interactions of autonomous vehicles. These vehicles must operate in harmony with other vehicles, weather, and pedestrian conditions. This data will all be fed from disparate systems, and the automobiles will also generate data back to those systems.
Another part of the shared responsibility model is the interconnection between the cloud service that holds all the data, and the service provider that delivers the data. As Prashant points out, there are more components to the shared security model; it is a full ecosystem. When we think of the split-second decisions required to operate an automobile, it becomes clear how a breakdown of any of the components that comprise that ecosystem can have tragic consequences.
It is evident that when 5G is fully implemented, every entity involved will have to enhance security to handle the broader responsibilities that make 5G so desirable. Why is data security and privacy heightened in this new environment? A simple explanation is that with this new technology, the average person will produce 1 Gigabyte of data per day. To put that into perspective, the contents of an entire doctoral thesis does not generate that much data.
We all want the benefits of 5G technology. It will certainly improve our lives, but we cannot enter into this new arena without a well-planned security model. Tune in to hear our discussion surrounding this intricate challenge.
Security Sessions Podcast
For the latest on cloud & data security
This podcast series explores the technologies, people, and processes behind information security. We’ll delve into topics like data security, remote access and digital transformation, as well as the people and technology that make it all work behind the scenes. We’ll speak to Thales and industry experts to bring you fresh perspectives on how to navigate the world of cloud security.
We invite you to subscribe to Security Sessions, a podcast bringing you insights from industry experts on the latest cloud & data security news and trends.
Listen to Previous Podcasts
Series 2 Podcasts
Episode 1: The 2021 Thales Access Management Index
The shift to remote working and the acceleration of cloud-based services have put a strain on identity and access management infrastructure. As remote access becomes the norm rather than the exception, many organisations need to evolve their security approaches in a world where there is no longer a defined perimeter, according to the 2021 Thales Access Management Index.
In this first Thales Security Sessions episode of series 2, François Lasnier, VP Authentication and Access Management Products at Thales, joins regular host, Neira Jones, to talk through the key findings of the report. They will discuss how COVID has introduced new security concerns around remote working, and explore some of the key challenges of trusted access in a cloud-first world.
Series 1 Podcasts
Episode 1: Real Threats for Real People – What has the pandemic taught us?
Are businesses being forced into digital transformation too quickly and therefore cutting corners? How to businesses adapt to the changing threat vectors as more valuable data gets pushed further out into the infrastructure due to remote working? These are some of the questions we are exploring with guests Rick Robinson and Todd Moore.
Episode 2: More digital, more risk: where is the trust?
More digital, means more ecommerce, more digital payments, more financial fraud and cybercrime and ultimately more risk. Many organisations within the payment sector are being pushed into digitisation more quickly as they move to operate online to keep cash flow – without doing necessary due diligence on the best solution or vendor and with security not really on their agenda. These are some of the issues we are exploring with guests Arthur van der Merwe and Simon Keates.
Episode 3: Do you know who I am? The digital identity challenge
More digital also means more interactions where the various parties are interacting without knowing each other. This is linked to the much needed focus on digital identity, IAM, CIAM, authentication, behavioural analytics. Has the pandemic forced people’s perception of digital identity to change as they have been forced to accept the digital transformation in their own lives? Our host Neira Jones discussed this topic with guests Sundaram Lakshmanan and Francois Lasnier.
Episode 4: Time for the crystal ball – What to expect in 2021
In this episode we are looking ahead at what we can expect in 2021 and reviewing how 2020’s remote working, separation from family and teams have changed us. Have a listen to some of the interesting insights from Neira’s guests, Troels Oerting, Chairman of the Board of the World Economic Forum’s Centre for Cybersecurity (C4C) and Ashvin Kamaraju, CTO and Vice President Engineering at Thales Cloud Protection & Licensing.
Episode 5: The Challenges of Digital Transformation
Many businesses have been forced to accelerate their digital transformation strategies due to the pandemic and doing it successfully has become a major challenge. What do organisations do to transform their infrastructure to where it needs to be from a technology standpoint? The new threats are here to stay – so what is the best DX practice from a technology point of view? How do you focus on the technology process and preservation of your infrastructure?
Episode 6: Data Beyond Borders: The Schrems II Aftermath
Are the current rules and regulations for securing information and maintaining privacy fit for purpose when you think about the future? Do you think work and lifestyle changes brought about by Covid-19 will have a regulatory impact that we need to plan for? Neira discusses these questions with Enza Iannopollo, Senior Analyst at Forrester and Thales’ own Mukesh Chandak, Business Development Director.
Episode 7: More digital, more cloud: To trust or not to trust
More digital will mean more cloud. Now in the second year, the Covid-19 coronavirus pandemic has prompted an acceleration in the adoption of cloud technologies by IT leaders worldwide, which looks set to continue for the foreseeable future. Previously organizations have primarily looked at new application development and deployment for cloud, taking a ‘cloud first’ approach. However many have now pivoted towards a ‘cloud now’ approach. In this two-part episode Neira talks to Chris Harris, EMEA Technical Director at Thales and Vaughn Stewart, VP of Technology Alliance Partners, Pure Storage.
Episode 8: 5G – With Great Power, Comes Great Responsibility
5G is poised to change how digital technology-based solutions are delivered and consumed across different industry verticals by connecting people and devices using high quality services whenever wherever. In this episode Neira is joined by Prashant Deo, Senior Information Security Consultant at Tata Consultancy Services and Chen Arbel, Vice President Business Development, 5G & Cloud Security and Thales.
Bonus Episode: The Shift to Passwordless Authentication
Passwordless and FIDO authentication is one of the hottest topics on the radar of identity and access management professionals. While passwordless authentication offers convenience for end users, not all methods offer the same level of protection. In this special bonus edition podcast, Garrett Bekker, principal cybersecurity analyst at from 451 Research and Asaf Lerner, Director of Product Management at Thales discuss the merits and various angles of moving to passwordless.
Episode 9: The 2021 Thales Data Threat Report
The shift to remote work and the acceleration of the shift to cloud-based infrastructure have profoundly impacted security teams. With the security risks and threats that these changes pose, most organizations have some work to do to improve their security posture, according to the new 2021 Thales Data Threat Report. In this episode, Neira Jones is joined by Todd Moore, VP Encryption Products at Thales, to talk through the key findings of the report. They’ll take a look back at the key trends seen in 2020 and the impacts of the pandemic that have carried over into 2021.
Episode 10: IoT Security Trends
Organizations have only just begun discovering and benefiting from the opportunities provided by the Internet of Things. The ability to capture and analyze data from distributed connected devices offers the potential to optimize processes, create new revenue streams, and improve customer service. However, the IoT also exposes organizations to new security vulnerabilities introduced by increased network connectivity and devices that are not secured by design. And advanced attackers have demonstrated the ability to pivot to other systems by leveraging vulnerabilities in IoT devices. For this episode, host Neira Jones is joined by Ellen Boehm, VP, IoT Strategy and Operations at Keyfactor, and Paul Hampton, Senior Product Manager at Thales.
Episode 11: Quantum Computing
The threat and arrival of quantum computers is ever-present with physics breakthroughs, more Qubits, quantum “supremacy”, and cloud service providers designing quantum computers, but what does it really mean to data protection? Is it really the end of encryption as we know it? In Episode 11 of the Thales Security Sessions, host Neira Jones is joined by Mike Brown, CTO at Isara, and Michael Gardiner, Solution Architect at Thales, to discuss the ways in which quantum computing will change the technology landscape, and how organizations can deal with the potential security threats that quantum brings.
Bonus Episode: Encryption in Quantum Resistant Networks
Network security encompasses the security tools, policies, and techniques used to monitor, prevent, and respond to unauthorized network access. Having such a broad definition and, therefore, challenging approach, it is important that businesses know what key areas to focus on and what enterprise tech solutions they should look to ensure appropriate, airtight protection. Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting, speaks with Julian Fay, CTO at Senetas, a global partner of Thales. The pair explore the primary concerns of network security within the realm of data in motion with the help of key findings from our latest global survey on the encryption of public/private networks.
Bonus Episode: Adopting the Shared Security Management Model
Shared security, also known as shared responsibility, is a cloud security management model that describes the distribution of enterprise data security management and accountability between a company and its cloud service provider(s). The framework essentially enables improved productivity and unparalleled agility, so why isn't every organization adopting it? Dr. Eric continues with Chris Martin at Thales, delving into the main areas of organizational risk concerning cloud migration and vendor native decisions before shedding light on the limitations of a single service provider. The guests then discuss the shared security model - its benefits and the implementation process. Final thoughts centre on what organizations need to understand about control over all users and effectively build a best practice shared security strategy.
Episode 12: Building a Trusted World for Crypto Payments
Bitcoin and other cryptocurrencies have exploded in value—making them an ever-more attractive target for scammers and hackers. So is cryptocurrency secure? How can businesses and individuals make sure they protect their digital investments? And what are the key security measures that should be implemented to secure the cryptocurrency backend? In this episode, we’ll be exploring the current cryptocurrency landscape, and how we can make a trusted world for crypto payments. Joining our regular host Neira Jones for this episode, we have Nitin Gaur, Director, IBM Financial Sciences and Digital Assets and Krishna Ksheerabdhi, VP Product Marketing, Thales.