EUR USD GBP
+353-1-416-8900REST OF WORLD
1-800-526-8630U.S. (TOLL FREE)

Cyber threats go global: Managing privacy, policy and security

  • ID: 1955608
  • Report
  • October 2011
  • Region: Global
  • 20 Pages
  • TM Forum
1 of 4
TM Forum’s Quick Insights reports take the communication industry’s hottest topics and offer preliminary research and analysis, often including interviews with senior executives and ideas from corresponding executive roundtables events. Written by renowned industry journalists and analysts the reports ask the questions we all want to know of opinion-leading senior executives.

In this Quick Insights report:

How to keep communications service provider's networks secure and customer data private is an issue galloping up the corporate agenda. Many would argue progress isn’t fast enough, is late in the day and that things look set to get worse.

Breaches in security and privacy can damage countries, companies and individuals. However, in this era of what McKinsey describes as “big data” enterprises are acquiring huge amounts of information (seen as key to productivity and profit), while at the same time downgrading security to enable simpler communication with users via websites. The result? Information given in good faith by customers is at risk of theft and misuse in an increasingly alarming number of ways.

This report explores the simple measures that can be taken to improve matters quickly, including those specific to OSS; it looks at how policy-based management is used now and how it could evolve as the means to cope with security and privacy in the face of ever-increasing data.

Addressing security and privacy requires collaboration among service providers; they don’t compete when it comes to these issues. Take inspiration by reading about TM Forum’s award-winning collaboration work with the defense industry.

Finally, the report concludes that tackling security and privacy needs to be universal and strategic, not an afterthought. Organizations need strong leadership to set out the business case for implementing the measures required.

Please note: This report is free to TM Forum members.
READ MORE
Note: Product cover images may vary from those shown
2 of 4
Executive summary

Section 1
The scale, scope and nature of the problem

Section 2
Start with the ‘simple’ stuff

Section 3
Policies are the way forward – where we are now and where we need to go

Section 4
Some future issues and solutions

Section 5
We don’t compete on security

Sponsored feature
RSA
Note: Product cover images may vary from those shown
3 of 4
- AT&T
- CitiBank
- Deutsche Telecom
- Ericsson
- IBM
- Mitre
- McKinsey
- NSN
- RSA
- Sony
- TM Forum
- Twinsec
- Vodafone D2
- Wipro
Note: Product cover images may vary from those shown
4 of 4
Note: Product cover images may vary from those shown
Adroll
adroll