The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
5G introduces new security features to protect the network, but it also introduces new security challenges. These challenges include a multi-tiered cloud architecture with services and content moving closer to the network edge, the proliferation of IoT devices and applications, and an order of magnitude increase in available bandwidth. This presentation will explore the security features of 5G, investigate what can go wrong and recommend best practices to avoid potential problems. It will focus on the challenges of securing multi-vendor services in cloud environments at the extreme edge of the radio access network, and how to secure the unlimited variety or IoT applications that 5G will support.