The continuing roll out of 5G promises to drastically increase the amount, variety, and sensitivity of data coursing through networks. Today’s CISOs must be ready. Credit: Protiviti CISOs throughout the telecommunications industry are preparing their data protection programs for a 5G future that will fully arrive in three to five years. Today, consumers have noticed their cellular devices begin to market and show the 5G label. But the not-too-distant future brings 5G in a wide range of areas such as artificial/augmented reality, production monitoring and delivery via 5G drones, on-demand private 5G networks, and a wide variety of use cases. At the same time, or shortly thereafter, CEOs in other industries will confront similar 5G risks and opportunities.5G is currently available in the U.S., but only in a limited capacity, as telecommunications companies make massive investments in the technology and infrastructure required to migrate from existing 3G and 4G networks.The new 5G towers being installed throughout the country will deliver 1,000X more data to 100X more devices with download speeds measured in gigabytes as opposed to the megabyte pace of 4G. From an infrastructure standpoint, telecommunications companies need to determine how they will leverage and protect the massive increase in data coursing through their networks. CISOs in other industries — especially manufacturing, automotive, healthcare, and the public sector — should also begin determining how to secure and leverage the data superabundance that 5G will produce.Within a few years, telecoms will be standing up private networks that provide 5G connectivity in response to client needs and events. For example, fire, police, and other first responders will be able to immediately stand up a 5G network to hasten the exchange of communications and data with hospitals, police, the community, and other stakeholders.5G also will further transform the driving experience. Drivers could have the option of uploading personal data (blood type, drug allergies, etc.) to their vehicles, as the information would prove crucial from a medical care perspective in the event of an accident. Data from the vehicle’s onboard diagnostic system also could be shared over a 5G network so that when a crash occurs, important information such as the vehicle’s speed, impact angle, location, and other crash data (along with the driver’s personal health data) are instantly transmitted to emergency response teams in order to expedite the appropriate triage at the scene and bring relevant expertise and materials needed.This life-saving scenario hinges on the degree to which large amounts of data at the network’s endpoint can be managed in a highly available, low latency, and utmost secure manner given the sensitivity of the information.Some 5G risks and opportunities will materialize in less than three years; others will take longer to play out: The rapid speed of disruptive innovations enabled by 5G and other emerging technologies was the third-highest ranked risk for 2030, as projected by the global collection of insights from 1,081 C-level executives and directors surveyed by Protiviti.Today, CISOs are working through who has responsibility for storing, securing, and safely disposing of that data in hundreds of 5G use-case scenarios, many of which could come online by 2025. How well CISOs and their organizations leverage 5G opportunities and prepare for the risks associated with the technology depends on how quickly they get in place plans and mechanisms for securing the approaching data superabundance today. Related content brandpost Sponsored by Protiviti Ransomware Crisis: 11 Actions to Secure Critical Infrastructure Help secure the critical systems that citizens rely on with these short- and long-term actions. By David Taylor and Justin Turner Apr 20, 2022 4 mins Ransomware brandpost Sponsored by Protiviti How to Integrate Threat and Vulnerability Management into Security Operations Understand the most common challenges and learn five best practices for overcoming cyber threats in your vulnerability management system. By Shinoy George Apr 14, 2022 6 mins Threat and Vulnerability Management brandpost Sponsored by Protiviti Five Best Practices for Implementing Zero Trust Follow these best practices to sustainably and efficiently embed Zero Trust Networking in your organization. By Megha Kalsi, Jon Medina Apr 12, 2022 5 mins Zero Trust brandpost Sponsored by Protiviti Securing Edge Cloud and 5G: How to Do It and Why It Matters The shift to 5G and the growth of edge cloud computing will present new security risks. Prepare to approach the edge (without tumbling over it) using these security tips. By Megha Kalsi, Rachel Catan, Jenny Martinez Apr 07, 2022 6 mins 5G PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe