Report by Trend Micro
Trend Micro joint research with CTOne on 5G networks security
Key Findings
100% of IT and cybersecurity professionals say they are either currently using (86%) or evaluating their deployment (14%) private 5G networks.
50% of IT and cybersecurity professionals say they Deploy strict access controls for AI models to safeguard AI use for traffic monitoring/analysis are.
On average, less than a fifth (18%) of organisations' security budget is currently allocated to private 5G networks.
Nearly all IT and cybersecurity professionals said they are either currently using (62%) or planning to use (35%) AI-powered security tools for private 5G networks.
More than nine in ten organizations currently using AI security admit to facing challenges in deploying the tech to private 5G networks.
The most frequently cited challenges in deploying AI security to private 5G networks are: High costs (47%), Concerns over false positives/negatives (44%), A lack of internal expertise (37%).
Just a fifth (20%) of global organisations have a dedicated team for securing their communications networks.
44% of IT and cybersecurity professionals say they use data anonymisation techniques to safeguard AI use for traffic monitoring/analysis are.
The AI-powered capabilities viewed as essential for private 5G networks are: Predictive threat intelligence (58%), Continuous, adaptive authentication (52%), Zero trust enforcement (47%), Self-healing networks featuring AI automation (41%).
54% say they Ensure compliance with data privacy regulations like GDPR to safeguard AI use for traffic monitoring/analysis are.
51% of IT and cybersecurity professionals say they encrypt data at rest and in transit to safeguard AI use for traffic monitoring/analysis are.
The most frequently cited challenges in deploying AI security to private 5G networks are: High costs (47%), Concerns over false positives/negatives (44%), A lack of internal expertise (37%).
54% say they Ensure compliance with data privacy regulations like GDPR to safeguard AI use for traffic monitoring/analysis are.
50% of IT and cybersecurity professionals say they Deploy strict access controls for AI models to safeguard AI use for traffic monitoring/analysis are.
44% of IT and cybersecurity professionals say they use data anonymisation techniques to safeguard AI use for traffic monitoring/analysis are.
Responsibility for CT security often lies with the CTO (43%) and CIO (32%).
51% of IT and cybersecurity professionals say they encrypt data at rest and in transit to safeguard AI use for traffic monitoring/analysis are.