Plan to participate in TIA’s annual strategic Conference, October 8-10, 2013 in Washington, DC.
Cybersecurity
| MAIN | M2M | SPECTRUM & JOBS | NETWORKS | CYBER SECURITY | SUSTAINABILITY |

In the global drive toward cloud services, everyone is vulnerable: corporations, individuals, data center/hosting service providers, network operators. The "Internet of Things" -where everything is connected - underscores the growing need for improved security and solutions that work in today's bandwidth-starved, cloud-based architecture.
More TIA NOW Video on Security
- Cybersecurity Takes Center Stage on the Hill

Bob Dix, VP of Gov't Affairs and Critical Infrastructure Protection for Juniper Networks, recently testified recent at a House Communications Subcommittee hearing. Here he discusses we can do as an industry to protect ourselves. - Cloud Computing Revolution: Cybersecurity, the cloud and innovation are all necessary to keep the network moving forward. What should you know?
- The List - Privacy and Data Retention: Phil Attfield, CEO and co-founder of Sequitur Labs, joins discusses the yeas and nays of data retention in the U.S. and around the globe.
- 5 Topics in Cyber Security, Public and Private: Senior Special Agent Jeff Shaffer of the U.S. Secret Service shares his views about cyber security and ways the private sector can further their relationships with government agencies.
TIA 2012: Inside the Network
The TIA 2012: Inside the Network Conference and Exhibition features an entire educational track - Security, Authentication & Privacy (sponsored by McAfee) - devoted to improve authentication to secure, networks, and the applications themselves. Sessions include a review of the standard tools for security - cryptography, public key encryption, etc.; coverage of national trends in security and authentication, and an exploration of strategic issues such as liability, cost of data breaches and risk.
This track is designed to offer network operators and broadband service providers a top-down look at the new framework of security. Attendee take-aways include information on what carriers need to do, in terms of hardware, software and services upgrade, embedding security solutions and what is needed to bundle security with their existing enterprise offerings.
- View the two-day agenda for the event, being held June 5-7, 2012 at the Gaylord Hotel and Convention Center in Dallas.
- Watch Video: "A Brave New World Needs Security" with Tyson Macauley, Security Liaison Officer at Bell Canada, who will participate in a panel discussion on “Strategies, Solutions and Best Practices to Secure the Cloud” at TIA 2012.
TIA Cybersecurity Policy Initiatives
TIA applauded the House passage of the Cyber Intelligence Sharing and Protection Act (CISPA) and called for swift Senate action to improve the nation's cybersecurity.
TIA President Grant Seiffert commented, "CISPA strikes the right balance between strong cyber protection and a flexible, innovation-friendly framework. The legislation takes a significant step forward in safeguarding consumers and businesses from increasingly aggressive and sophisticated cyber attacks. At the same time, it establishes a collaborative approach that won't introduce heavy bureaucracy that could harm high tech innovation. The relationship between government and industry that this bill supports is critical to the current and future economic success and security of America." (Read the full statement here.)
TIA recently sent a letter to House Speaker John Boehner (R-OH) and Minority Leader Nancy Pelosi (D-CA) urging them to support cybersecurity measures that protect U.S. innovation and reflect the borderless, global nature of today’s cyber threats.
The letter — which can be viewed in its entirety here — encourages members of Congress to focus on the following policy goals and legislation:
- Improving Information-Sharing. Ensure that the private sector has access to information necessary to defend against cyber attacks, protect the private sector from liability for its efforts to improve cybersecurity, and support existing information-sharing and analysis organizations. TIA supports the Cyber Intelligence Sharing Protection Act (H.R. 3523).
- Supporting Cybersecurity Research and Development. Increase federal cybersecurity R&D activities to complement the significant efforts already being made by the ICT industry in this area. TIA supports the Cybersecurity Enhancement Act (H.R. 2096), and also supports the Advancing America's Networking and Information Technology Research and Development Act (H.R. 3834).
- FISMA Reform. TIA supports efforts to improve and harmonize cybersecurity programs across government agencies. In doing so, Congress should focus on the security practices of agencies and their personnel while avoiding ICT security standard requirements that could prove disruptive to the ICT supply chain.
- Improving Public Awareness Through Education. TIA strongly supports federal efforts to increase awareness of cybersecurity issues among both institutional users and the general public.
TIA also recently issued a Policy Statement and filed Comments with the National Telecommunications and Information Administration (NTIA) regarding its Multistakeholder Process to Develop Consumer Data Privacy Codes of Conduct. TIA wrote:
"The focus of privacy protection should be on how information is used, collected, and safeguarded, not on which technology is used for those functions. Technological convergence has made legal and regulatory distinctions between 'networked' and 'brick and mortar' consumer relationships irrelevant. Regulations based on invalid distinctions can fail in their purpose and do real economic harm by discouraging the adoption of network technologies."
More on recent TIA activity:
- TIA Committed to Working With Congress to Enhance Cybersecurity
- TIA Cites Privacy Issue in Urging FCC to Take Measured Approach in E-911 Rulemaking Process (Read TIA’s full comments)
Standards, Technology and Security
- TIA's Releases First Smart Device Communications Specification Laying Foundation for Future Standards on M2M and the Internet of Things: New standard addresses security, including data content, authentication, and signaling. Watch video explaining this landmark standard.
- TIA, Georgia Institute of Technology Sign MOU to Develop Standardization Collaboration Focused on Security
TIA 2012 ICT Market Review and Forecast
As the number of devices connected to the Internet begins to exceed the number of available addresses under the current version of the Internet Protocol, the next step in the IP evolution, the transition to IPv6 (Internet Protocol version 6), will not only provide a virtually unlimited number of IP addresses (340 trillion trillion trillion), it will also include a boon for security.
IPv6 requires the use of the IP Security Protocol (IPSec), the protocol for IP encryption and authentication. It ensures interoperability among different IPv6 implementations and encryption of all information passing through the Internet. The current version, by contrast, was not designed to incorporate a security protocol, requiring security such as IPSec to be separately provided at the end points of the connection.
IPv6 also mandates mobile connectivity. IPv6 allows seamless handoffs between access technologies.
Purchase TIA's 2012 ICT Market Review and Forecast today! TIA member companies pay only $700 for 550 pages of data and trends analysis for U.S. and international markets.
Facebook/Twitter Lists
Rural #Broadband Deployment video with Shirley Bloomfield, CEO of @NTCA http://t.co/3N5nigFktr
05.07.2013 // Retweets: 0
“Society has moved, we didn’t exchange info on phones 10 years ago,” says Ryan Brown from @intelsys #ICT #M2M#IoT, http://t.co/dbByEtslq4
05.07.2013 // Retweets: 2
@TIA_Now is the official video sponsor of @NVTCSMC Destination Innovation Event #tech #video http://t.co/0nLlu9T7kc
05.06.2013 // Retweets: 0
“IT and app space has more of a cowboy mentality,” says Fred Yentz from ILS #ICT, #M2M, #IoT, http://t.co/dbByEtslq4
05.04.2013 // Retweets: 0
TIA Releases Statements on Pritzker and Froman Nominations https://t.co/7meKLcsL44 @CommerceGov
05.02.2013 // Retweets: 0
AT&T's President of Supply Chain and Fleet Operations Tim Harden talks to @TIA_NOW about supply chain in the #network http://t.co/LWMPeUlNx4
05.02.2013 // Retweets: 1
Last week was a busy one at the World Trade Organization (WTO) in Geneva, Switzerland. The signs are very encouraging that the member countries of the WTO are back on track to move the WTO’s trade liberalization agenda forward – from the new International Services Agreement (ISA) to the ongoing negotiations to expand the existing WTO Information Technology Agreement (ITA).
M2M and Global Communications - Part 2

-Grant Seiffert, TIA President
M2M and Global Communications - Part 1
-Grant Seiffert, TIA President

Shaping the Future of the Industry
How Policy, Politics and Power Are Changing the ICT Market - Part 3
By Grant Seiffert
President, Telecommunications Industry








