India, 12 October, 2023-by Chandrodaya Prasad is the Executive Vice President of Product Management and Product Marketing at SonicWall. 
“Today’s threats are too numerous, too sophisticated and too diverse, thus requiring cooperation and collaboration, as no single vendor can claim complete expertise or cover all aspects of cybersecurity alone”, Chandrodaya Prasad, EVP, Product Management & Product Marketing at SonicWall
What investments are needed to reduce cyber-risks while enabling connectivity? Are current levels of investment enough?
To reduce cyber-risks while enabling connectivity, investments are needed in the following areas:
• Advanced cybersecurity infrastructure, including firewalls, intrusion detection systems, and encryption tools.
• Continuous monitoring and threat detection tools to detect and respond to security incidents in real-time.
• Security training and awareness programs for employees and users.
• R&D in cutting-edge security solutions, AI-driven threat analysis, and machine learning-based intrusion detection.
• Regular audits and vulnerability assessments to identify potential security gaps.
While significant investments have been made in cybersecurity, especially with the advent of 5G and IoT devices, it’s hard to determine universally if the levels are “enough.” The rapidly evolving nature of cyber threats means that investment needs to be continuous and adaptive.
What security controls and standards are being deployed to ensure networks are secure by design?
Many organizations and standard-setting bodies emphasize “security by design” principles. This includes:
• Implementing encryption at both the transport and application layers.
• Multi-factor authentication for users and administrators.
• Network segmentation to limit lateral movement of potential intruders.
• Regular patching and updates to address known vulnerabilities.
• International standards such as ISO/IEC 27001 for information security management.
How are governments and industry working to put in place secure standards for 5G?
Governments and industry groups are collaborating to set standards and best practices for 5G security. Examples include:
The 3rd Generation Partnership Project (3GPP) defining security standards and protocols for mobile networks, including 5G.
Collaboration between national and international regulatory bodies to set standards and guidelines.
Governments instituting regulations and requirements for 5G equipment vendors to ensure that equipment is secure from vulnerabilities.
Encouraging or mandating regular security audits for 5G network providers.
How can different players in the 5G ecosystem work together to mitigate cyber-risks?
As we continue to venture deeper into the digital age, the threats and challenges posed by bad actors in the cyber domain have never been more pressing. The increasing sophistication and frequency of cyber-attacks should not be seen merely as challenges, but as a clarion call to underscore the critical responsibility. We as cybersecurity vendors, share in not only safeguarding our partners and customers but also in creating a more secure cyberspace for everyone.
No single vendor can claim complete expertise or cover all aspects of cybersecurity alone. The threats are too numerous, too sophisticated, and too diverse. That’s why cooperation and collaboration among us are vital. By sharing threat intelligence, best practices, and technological advancements, we can build a robust, collective defense against the ever-increasing cyber threats. Let’s remember that our customers trust us to protect them, to guide them, and to be the vigilant guards standing at the forefront of the cybersecurity battleground.
• Collaboration and Information Sharing: Players can share threat intelligence and collaborate on best practices for mitigating threats.
• Joint R&D: They can invest in joint research initiatives to develop more secure technologies and solutions.
• Unified Standards: Players can work towards adopting and implementing unified security standards across the 5G ecosystem.
• Interoperable Solutions: Ensure that security solutions are interoperable across different vendors and network configurations.
• Transparency: Maintain transparency about security measures and incidents to build trust among stakeholders.
Will mitigation of and resilience against these risks be enough to ensure trust in a hyper-connected world?
While mitigation and resilience are crucial components, they alone may not be enough to ensure trust. Trust in a hyper-connected world also requires:
• Transparency: Entities need to be transparent about their security practices, breaches, and how user data is managed.
• Education and Awareness: Users need to be educated about the risks and best practices for securing their devices and data.
• Regulatory Oversight: Governments may need to play a role in regulating and overseeing cybersecurity practices to ensure compliance and build public trust.
• Rapid Response: Swift action in response to breaches or vulnerabilities can help restore trust.
In the end, trust is a multifaceted issue that goes beyond just technical solutions. It encompasses public perception, regulatory environments, corporate practices, and more.
Disclaimer: The views expressed by tech experts on 24x7newsworld.com are their own and not those of the website or its management. 24x7newsworld.com advises users to check with certified experts before taking any investment decisions.










































