It’s taken some time but 5G is finally here, and unlike former next generation wireless technologies, which were basically just gradual improvements, 5G is a massive transformation that will completely change how networks are deployed, utilized, and secured. But getting your business to 5G will take a little more than just flipping a switch.

In the second episode of this three-part podcast series, we’ll chat about the migration from 4G to 5G and how businesses will need to focus on building the right foundation to protect these new networks and follow key steps to embed security throughout their infrastructure. Listen below:

A Successful 5G Transformation Demands a New and Better Approach to Network Security

 

Speakers:

fortinet_tom_walker

Tom Walker

Manager, Consulting Systems Engineering (Telco/SP), Fortinet

With over 19 years’ experience in the Network Security industry, Tom brings a wealth of subject matter expertise. Holding technically-focused and lead positions at industry stalwart vendors such as Nortel, Juniper and more recently at Fortinet as Manager, Consulting Systems Engineering. With a background expertise originating in Enterprise technologies and diversifying into Carrier networks and more specifically Mobile Packet Core. A true understanding of the technical, operational and business challenges that Cybersecurity requirements impose on Mobile Operators. Tom has helped countless Mobile Operator customers to build, strengthen and enhance the Cybersecurity capabilities in an ever changing and evolving world.

 

Jim Rapoza

Research Director, Aberdeen

Jim Rapoza is a Research Director at Aberdeen, focused on the increasing technology pressures that organizations are confronting within their IT infrastructures. He is the winner of five awards of excellence in technology journalism, co-chaired a summit on technology industry security practices, and a frequent speaker at technology conferences and expositions