HANNOVER MESSE 2019,
01 - 05 April
In 5G several levels of Orchestrator (a virtual network architect) are needed to manage IT, Trunking and Radio networks at speed. A “virtual security architect” called a Security Orchestrator is necessary. When correctly implemented, the Orchestrators redesign the network several times each day to respond to changes in enterprise requirements such as innovation and incident mitigation. Security Orchestrators meet surveillance, privacy, compliance, and national security requirements at once. This automation is critical to meet M2M ROI, 5G scalability, and GDPR. T
his can be met through a combination of Security Orchestration and Network Slicing, a kind of orchestrated 5G custom network. Finally, 5G Security Orchestration must be implemented in such a way Apex-level Incident Responders can still use their skills while not being burnt out by increases in scale. When these rare Apex Responders leave it results in an irreplaceable loss.
So far no information materials were provided for this event. Please contact the organizer directly for further information.
Principle Threat Defence Architect, Trend Micro
Go to profile