Endpoint Security , Internet of Things Security , Video

Addressing 5G Network and Equipment Vulnerabilities

Radhachran Shakya of Indian Department of Telecommunications on 5G Network Security
Radhachran Shakya, ITS, DDG - project management, Department of Telecommunications, India

Much groundwork needs to be laid to launch 5G services. The government and telecom groups must work with an ecosystem of partners from academia, research and development, standards bodies and telecom equipment and handset manufacturers, and all must tackle network and equipment security issues.

See Also: The Top 5 Security Practices With the Best Outcomes

"By nature, IP networks have vulnerabilities, and 5G networks can be accessed from edge networks," says Radhachran Shakya, who worked in ITS and DDG - project management - for the Department of Telecommunications in India. The government, research bodies and other stakeholders should factor in security by design, trusted supply chain, telecom equipment testing, security audits, cross-auditing and patch management, he says.

In this video interview with Information Security Media Group at ISMG's Cybersecurity Summit held in Mumbai, Shakya discusses:

  • Plans for rolling out 5G in India;
  • Business use cases for 5G services;
  • How to address security gaps in 5G networks and equipment.

Shakya, an officer of the Indian Telecom Services, has spent 33 years in the telecom industry in many roles, including policy formulation, regulatory and licensing, planning, operation, maintenance, quality assurance, capacity assessment, project management, business development and marketing.

About the Author

Brian Pereira

Brian Pereira

Sr. Director - Editorial, ISMG

Pereira has nearly three decades of journalism experience. He is the former editor of CHIP, InformationWeek and CISO MAG. He has also written for The Times of India and The Indian Express.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.