Page 42 - Cyber Warnings
P. 42







Securing the Future of Everything Wireless

By: Heather Lee, Show Director & Conventions AVP




For cybersecurity professionals, asking “What’s the next big thing?” is like asking “What’s the
next big security risk?” IoT, Bring Your Own Device (BYOD), mobile malware, use of company
devices on insecure Wi-Fi hot spots and other advances in technology are rapidly changing the
cyber defense industry as we know it.

By 2020, Gartner predicts that more than 25 percent of identified attacks in enterprises will
involve IoT—but IoT will account for less than 10 percent of IT security budgets. The added
security risks that accompany our increasingly mobile working world must be addressed quickly
and efficiently for these innovations to be a benefit, rather than a burden, to organizations. IT
departments must keep up to date on the security implications of mobile and connected
technology in tandem with the process of adopting them into their enterprise.

To stay up to date with the latest security strategies for IoT and everything wireless, thousands
of attendees from the wireless industry will gather in September at CTIA Super Mobility 2016 to
acquire vital information on new technologies, issues and practices by attending the CTIA
Mobile Intelligence Conference.

The CTIA Mobile Intelligence Conference is an open-dialogue program designed to propel the
wireless industry forward. These educational sessions will allow attendees to stay abreast of
crucial technical intelligence, best business practices and the key issues in cybersecurity for the
next generation of wireless technology.

As part of the CTIA Mobile Intelligence Conference’s Everything Connected: Smart City +
Smart Consumer track, speakers will tackle issues surrounding consumer privacy and data
security and how these impact the evolution of 5G services and applications.

In the session “Securing the Foundation of A 5G World: Establishing a Framework for
Cybersecurity that Enables IoT,” attendees will learn how cyberattacks on U.S. businesses and
their communications networks are a part of today’s digital economy, as much a part of doing
business in the mobile broadband marketplace as deploying spectrum.


The Everything Enterprise: 5G Use Cases track will focus on the evolving approach to
cybersecurity solutions. The “Cybersecurity: Understanding the Ecosystem” session will
examine mobile cybersecurity as a team sport where all ecosystem players—carriers,
manufacturers, applications developers, stores and platform providers among others—must
work together to protect an open ecosystem in which cyber threats have grown and become
increasingly sophisticated.

A key theme for this track will be how the openness and global reach of the wireless internet
requires flexibility, information sharing, collaboration and vigilance as well as the importance of


42 Cyber Warnings E-Magazine – May 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   37   38   39   40   41   42   43   44   45   46   47