Page 61 - Cyber Warnings
P. 61
Securing Today’s Mobile-First Society
By Heather Lee, Show Director & Conventions AVP
If you looked at the people around you, most of them probably have their heads down looking at
their mobile devices. So it is no surprise that Americans’ data usage in 2015 more than doubled
over the previous year.
CTIA’s annual survey found that Americans used 9.6 trillion megabytes of mobile data in 2015–
the equivalent of streaming nearly 60,000 videos every minute. Who is securing this data? What
happens if cyberthieves hack in? How do you handle a data breach?
Current 4G cellular systems provide a high level of security for users and operators. But with the
rapid adoption rate of new mobile and connected technology, organizations are challenged with
securing new technology as quickly as it’s released and widely adopted.
Maintaining security and trust are key as the Internet of Things (IoT) and 5G emerge, especially
with the vast amount of data and personal information associated with these technologies.
With Americans’ mobile-first lives at home and work, it’s critical companies make mobile
security a top priority. The company who is best at securing their customers’ data and has the
least breaches is the one who will outlast their competitors.
To keep up with the latest security strategies for IoT, 5G and everything wireless, CTIA Super
Mobility 2016 provides you with an opportunity to engage with thousands of wireless industry
professionals to strategize the latest challenges in cybersecurity and share vital information on
new technologies, issues and practices. Gemalto, General Dynamics Information Technology,
ORBCOMM and SyncDog are a few of the CTIA Super Mobility exhibiting companies ready to
get you on the fast track to achieving cybersecurity.
CTIA’s Mobile Intelligence Conference is an open-dialogue program comprised of educational
sessions on a wide array of topics, including crucial technical intelligence, best business
practices and the key issues in cybersecurity for the next generation of wireless technology.
The Everything Enterprise: 5G Use Cases track features the session “Cybersecurity:
Understanding the Ecosystem.”
As the prevalence of cyberthreats has grown and become increasingly sophisticated, the
session will discuss
Why and how carriers, manufacturers, application developers, stores and platform
providers can work together to protect an open ecosystem.
Best practices in monitoring and sharing information about cyberthreats and
effective counter measures.
61 Cyber Warnings E-Magazine – June 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide