The communications industry presents a truly irresistible target to cybercriminals. This is because telecom not only serves as the foundation for all other critical infrastructure, it also carries personal and sensitive data for individuals, businesses and government. By carrying out a cyberattack on a telecommunications operator, a hacker can cause massive phone and internet outages, crippling business and disrupting everyday life in a multitude of ways. As the internet and mobile devices proliferate across the globe, the cyber landscape grows ever more complicated, with increasingly sophisticated cyberattacks that are capable of profound and even life-threatening damage.
Telecom equipment manufacturers must defend against external attacks involving supervisory control and data acquisition (SCADA) security pertaining to industrial control systems, and telecom equipment security. Device security vulnerabilities are growing, and denial-of-service attacks are a major threat. “Always-on” services and the IoT complicate cybersecurity for telecom companies, especially those providing cloud-based and online services.
To combat this threat, industry and government must work together to share information and minimize risk. Trust in our networks depends on a strong and adaptable cyber ecosystem. TIA works to secure trust in networks by advocating public policy positions on the security of information and communications technology (ICT) equipment and services related to critical infrastructure, supply chain and information sharing. To boost cybersecurity, TIA supports public-private partnerships, industry-led best practices through it's Technology Programs focused on assurance and global standards.
TIA also supports U.S. government information-sharing initiatives to provide the industry with the threat information to safeguard networks and participates in multi-stakeholder groups such as the Sector Coordinating Councils within the Department of Homeland Security, which serve as the sector's voice and facilitates the government's collaboration with the sector for critical infrastructure security and resilience activities. Cybersecurity funding for federal research efforts is also critical. TIA helps shape government decisions, for example, with filings on NIST cybersecurity frameworks, and new cyber legislation such as the CLOUD Act.
Kevin Koppenhaver, Senior Program Director at Belcan, spoke from the TIA Connectivity Jam in Dallas, TX about cybersecurity in avionics and automotive. Koppenhaver stressed the issue of vulnerabilities that are created when adding nodes to devices, and whether industry is reviewing the process of adding network nodes.
Steve Orrin, Chief Technologist at Intel Federal tells TIA NOW about the security challenges facing data centers from both physical and cyber threats. What improvements should organizations implement in the near term to help address these threats?
Gone are the days of simply connecting devices to one another, as leading industry CTOs are now showing the true value of the Internet of Things. At TIA's 2016 CTO Council Meeting in Austin, TX, over 30 industry luminaries discussed and debated IoT applications, IoT challenges and future IoT technologies.
To give us an overview of the current and impending trends in the 2016-2020 edition of the MR&F are John Jackson, Program Vice President for Mobility Research at IDC and John Jacobs, VP of Market Intelligence and Strategy for TIA.
At the Smart grid convention, GridWeek, TIA NOW spoke with George Arnold, the National Coordinator for Smart Grid Interoperability at NIST, about the challenges in Smart Grid development with cybersecurity, standards, technology and harmony within global systems.
It's time once again for TIA's annual Spring Policy Summit in Cambridge, MD on April 11th-13th. The 15th annual SPS event will host industry and government to find solutions and create thought leadership. Topics will include trade, spectrum and the Internet of Things.