Skip to content

Cybersecurity

cyber security

The communications industry presents a truly irresistible target to cybercriminals. This is because telecom not only serves as the foundation for all other critical infrastructure, it also carries personal and sensitive data for individuals, businesses and government. By carrying out a cyberattack on a telecommunications operator, a hacker can cause massive phone and internet outages, crippling business and disrupting everyday life in a multitude of ways. As the internet and mobile devices proliferate across the globe, the cyber landscape grows ever more complicated, with increasingly sophisticated cyberattacks that are capable of profound and even life-threatening damage.

Telecom equipment manufacturers must defend against external attacks involving supervisory control and data acquisition (SCADA) security pertaining to industrial control systems, and telecom equipment security. Device security vulnerabilities are growing, and denial-of-service attacks are a major threat. “Always-on” services and the IoT complicate cybersecurity for telecom companies, especially those providing cloud-based and online services.

To combat this threat, industry and government must work together to share information and minimize risk. Trust in our networks depends on a strong and adaptable cyber ecosystem. TIA works to secure trust in networks by advocating public policy positions on the security of information and communications technology (ICT) equipment and services related to critical infrastructure, supply chain and information sharing. To boost cybersecurity, TIA supports public-private partnerships, industry-led best practices through it's Technology Programs focused on assurance and global standards.

TIA also supports U.S. government information-sharing initiatives to provide the industry with the threat information to safeguard networks and participates in multi-stakeholder groups such as the Sector Coordinating Councils within the Department of Homeland Security, which serve as the sector's voice and facilitates the government's collaboration with the sector for critical infrastructure security and resilience activities. Cybersecurity funding for federal research efforts is also critical. TIA helps shape government decisions, for example, with filings on NIST cybersecurity frameworks, and new cyber legislation such as the CLOUD Act.

Cybersecurity: Creating New Vulnerabilities

Kevin Koppenhaver, Senior Program Director at Belcan, spoke from the TIA Connectivity Jam in Dallas, TX about cybersecurity in avionics and automotive. Koppenhaver stressed the issue of vulnerabilities that are created when adding nodes to devices, and whether industry is reviewing the process of adding network nodes.

video
Data Center Security: Physical, Digital and the Insider Threat

Steve Orrin, Chief Technologist at Intel Federal tells TIA NOW about the security challenges facing data centers from both physical and cyber threats. What improvements should organizations implement in the near term to help address these threats?

video
IoT Applications: TIA’s 2016 CTO Council Meeting

Gone are the days of simply connecting devices to one another, as leading industry CTOs are now showing the true value of the Internet of Things. At TIA's 2016 CTO Council Meeting in Austin, TX, over 30 industry luminaries discussed and debated IoT applications, IoT challenges and future IoT technologies.

video
ICT Market Analysis: 20 Year Anniversary of TIA’s Market Review and Forecast

To give us an overview of the current and impending trends in the 2016-2020 edition of the MR&F are John Jackson, Program Vice President for Mobility Research at IDC and John Jacobs, VP of Market Intelligence and Strategy for TIA.

video
Network Security: Security Silos to Solutions

Gee Rittenhouse, SVP of Engineering for Cisco’s Security Business Group, tells us why protecting the communications network and millions of connected devices is now a security concern that cuts across dozens of technologies and verticals.

video
IoT Policy Challenges Then and Now

NTIA policy analyst Travis Hall speaks with TIA NOW about the policy challenges around developing IoT technologies.

video
Solving the IoT Challenge: TIA’s CTO Council 2016

As network business and digital services come together and telcos expand revenue opportunities through IoT adoption, what challenges exist not only in IoT adoption, but also to develop, deploy and monetize new connected services?

video
TIA NOW talks to NIST’s George Arnold at GridWeek

At the Smart grid convention, GridWeek, TIA NOW spoke with George Arnold, the National Coordinator for Smart Grid Interoperability at NIST, about the challenges in Smart Grid development with cybersecurity, standards, technology and harmony within global systems.

video
AT&T and Supply Chain

AT&T's President of Supply Chain and Fleet Operations, Tim Harden, talks to TIA NOW about supply chain issues from cybersecurity and vendor competition to spectrum and high-speed broadband deployment.

video
Securing the Machine Network: What’s our Role?

How can M2M and security providers collaborate to develop and deliver secure solutions? What does the value chain look like today and how can we work together to simplify the process for corporate adopters?

video
Who “Controls” the Internet?

Join TIA NOW, Bloomberg BNA and Communications Daily as they discuss the recent announcement by the U.S. Dept. Of Commerce on Internet governance. Also, net neutrality loses little steam as industry stakeholders gear up for what could be a challenging road ahead.

video
TIA’s 15th Annual Spring Policy Summit 2014

It's time once again for TIA's annual Spring Policy Summit in Cambridge, MD on April 11th-13th. The 15th annual SPS event will host industry and government to find solutions and create thought leadership. Topics will include trade, spectrum and the Internet of Things.

video