cyber security

The communications industry presents a truly irresistible target to cybercriminals. This is because telecom not only serves as the foundation for all other critical infrastructure, it also carries personal and sensitive data for individuals, businesses and government. By carrying out a cyberattack on a telecommunications operator, a hacker can cause massive phone and internet outages, crippling business and disrupting everyday life in a multitude of ways. As the internet and mobile devices proliferate across the globe, the cyber landscape grows ever more complicated, with increasingly sophisticated cyberattacks that are capable of profound and even life-threatening damage.

Telecom equipment manufacturers must defend against external attacks involving supervisory control and data acquisition (SCADA) security pertaining to industrial control systems, and telecom equipment security. Device security vulnerabilities are growing, and denial-of-service attacks are a major threat. “Always-on” services and the IoT complicate cybersecurity for telecom companies, especially those providing cloud-based and online services.

To combat this threat, industry and government must work together to share information and minimize risk. Trust in our networks depends on a strong and adaptable cyber ecosystem. TIA works to secure trust in networks by advocating public policy positions on the security of information and communications technology (ICT) equipment and services related to critical infrastructure, supply chain and information sharing. To boost cybersecurity, TIA supports public-private partnerships, industry-led best practices through it's Technology Programs focused on assurance and global standards.

TIA also supports U.S. government information-sharing initiatives to provide the industry with the threat information to safeguard networks and participates in multi-stakeholder groups such as the Sector Coordinating Councils within the Department of Homeland Security, which serve as the sector's voice and facilitates the government's collaboration with the sector for critical infrastructure security and resilience activities. Cybersecurity funding for federal research efforts is also critical. TIA helps shape government decisions, for example, with filings on NIST cybersecurity frameworks, and new cyber legislation such as the CLOUD Act.

TIA Reply Comments in the Matter of Protecting Against National Security Threats to the Communications Supply Chain Through FCC Programs

TIA Comments on Protecting Against National Security Threats to the Communications Supply Chain Through FCC Programs

TIA Endorses FCC Action on National Security

WASHINGTON, D.C., June 1, 2018 – The FCC should ban the use of federal subsidies for products from suppliers deemed to pose a national security risk, including Huawei, and ZTE, said the Telecommunications Industry Association, the largest trade association for the manufacturers and suppliers of information and communications technology (ICT) products and services. In comments…

Every Cloud Has a Cybersecurity Lining

What are the key security challenges facing enterprise networks as we move through the cloud/SDN transition phase? Will multiple vendors in a cloud infrastructure create bigger security challenges? Siobhan Moran and Brett Young, Principal Consultants at Leidos Cyber, join TIA NOW to discuss the challenges network developers face in securing the data center.

Extreme Makeover: Network Edition

What does it take to redefine a network as part of an overall digital transformation? Gee Rittenhouse, Senior VP of Engineering for Cisco’s Security Business Group, and Amol Phadke, Managing Director of Global Network Strategy at Accenture, join TIA NOW with insights.

Cybersecurity: Creating New Vulnerabilities

Kevin Koppenhaver, Senior Program Director at Belcan, spoke from the TIA Connectivity Jam in Dallas, TX about cybersecurity in avionics and automotive. Koppenhaver stressed the issue of vulnerabilities that are created when adding nodes to devices, and whether industry is reviewing the process of adding network nodes.

Data Center Security: Physical, Digital and the Insider Threat

Steve Orrin, Chief Technologist at Intel Federal tells TIA NOW about the security challenges facing data centers from both physical and cyber threats. What improvements should organizations implement in the near term to help address these threats?

IoT Applications: TIA’s 2016 CTO Council Meeting

Gone are the days of simply connecting devices to one another, as leading industry CTOs are now showing the true value of the Internet of Things. At TIA's 2016 CTO Council Meeting in Austin, TX, over 30 industry luminaries discussed and debated IoT applications, IoT challenges and future IoT technologies.

ICT Market Analysis: 20 Year Anniversary of TIA’s Market Review and Forecast

To give us an overview of the current and impending trends in the 2016-2020 edition of the MR&F are John Jackson, Program Vice President for Mobility Research at IDC and John Jacobs, VP of Market Intelligence and Strategy for TIA.

Network Security: Security Silos to Solutions

Gee Rittenhouse, SVP of Engineering for Cisco’s Security Business Group, tells us why protecting the communications network and millions of connected devices is now a security concern that cuts across dozens of technologies and verticals.

IoT Policy Challenges Then and Now

NTIA policy analyst Travis Hall speaks with TIA NOW about the policy challenges around developing IoT technologies.

Solving the IoT Challenge: TIA’s CTO Council 2016

As network business and digital services come together and telcos expand revenue opportunities through IoT adoption, what challenges exist not only in IoT adoption, but also to develop, deploy and monetize new connected services?