Log In Now!

Best practice: Cybersecurity in 5G Operations

Start Date:8/6/2020

Start Time:11:00 AM EDT

Duration:60 minutes

Abstract:

Cyber threats can appear from a multitude of places suddenly – hence why they seek to “attack” the network. To keep pace with cyber threats, CISO´s need to be able to scan for threats, identify and fingerprint new threats as they arise, and understand how best to respond to them, all in real time. 
 
Implementing end-to-end security operations is the best way to build trust, but this can’t be done without with a combination of three key factors. 
Enter the “Triangle of Trust,” a visual union of INSIGHT, SCALABILITY and ADAPTIVENESS that CSPs can reference when securing 5G operations.  
 
In this engaging, informative webinar, you’ll learn from best practice cases how modern security operations can handle a vastly greater level of complexity with: 
 
- Automated workflows that constantly measure risk levels,  
- Control access to key operational systems and  
- Orchestrate responses to legitimate incidents. 

Not registered for the "Best practice: Cybersecurity in 5G Operations " webcast and interested in signing up? Click below:

Register Now!

Speakers

Gerald Reddig

Head of Portfolio Marketing

Nokia Software Security

Gerald Reddig is a senior business leader with more than 20 years management experience in the IT and telecommunication industry. He is leading Nokia’s portfolio marketing for Security and Network Management solutions. He holds a master’s degree in business administration and engineering and held positions in product management and business development including leadership responsibilities for European projects in the field of mobile Internet and communication services. He is a member of the broadband forum, directs Nokia’s membership in the IoT Cybersecurity Alliance as well as leading Nokia’s Security Center in Finland.

Email Address

Password

Forgot Password?

If you receive an "Already Logged In" message, wait 1 minute before re-entering.


Terms Of Use | Privacy Policy | Computer Tips | Login Help

By logging in, you agree to the Terms of Use and Privacy Policy.