Addressing security risks to 5G providers
The escalating cyber threat, featuring relentless and sophisticated attacks targeting the country’s critical national infrastructure, has seen the UK Government respond in several ways. This includes publishing the Telecoms (Security) Bill to ensure telecommunications providers better manage security risks within their supply chain and enhance the security and resilience of their nationwide infrastructure.
Trusted telecoms security
Leonardo has significant experience in the telecoms sector, and most recently helped one of the UK’s largest telco organisations understand how applicable the new Bill’s regulations are to them, and how compliant they are across their three largest customers.
Furthermore, we work with leading telecoms providers to help secure the UK’s mobile broadband networks (3G/4G/5G) in both public and private networks – providing risk assessment and management, security architecture review and development, security compliance and assurance for the 3/4/5G network infrastructure.
Leonardo is currently undertaking several initiatives and pilots with 5G private/hybrid technology to establish the best practices to secure these networks and ensure the resilience of the services that they provide. This includes partnering with innovative telecommunication providers to explore and develop new 5G solutions and business models spanning industrial, defence, public safety and critical infrastructure.
As part of the 3GPP Standards Development Programme, Leonardo attends all ETSI MCX 4G and 5G Plugtests to ensure open and reliable broadband communication implementations.
Fit for the future
Being certified by the National Cyber Security Centre, Leonardo had sight of the Telecoms (Security) Bill throughout its development, and understands the detailed technical requirements needed to achieve compliance, as well as how to effectively deliver these for telecoms operators.
We can therefore assist telecoms providers and vendors within their supply chain, conducting comprehensive vulnerability assessments of current operations and identifying immediate and longer-term mitigating actions to ensure they are compliant with the Bill.