Thur., Apr 15, 2021 11 AM – 12 PM PDT
Learn what’s needed to deliver on a robust security strategy that incorporates continuous testing to pre-emptively identify vulnerabilities and prioritize risk mitigation. Both operators and equipment manufacturers need comprehensive security plans.
As 5G implementations evolve and mature, security will become even stronger. We will see added encryption, additional defense at the edge of the network, and technologies such as network function virtualization, mobile edge computer, and network slicing that can make networks more secure.
The impact of 5G technology continues to expand as networks are introduced in cities around the U.S.