Spotlight

5G touches almost every aspect of the way we live our lives. It’s not just about faster, bigger or better, it’s about utilizing 5G as an enabler to a series of services that we all will consume in every aspect of our lives. The time is NOW to consider the security implications and cyber risk profile that come with 5G. The business operational risk, legal risk and reputational risk of not only the companies who provide 5G transport, but all companies, nation states and individuals who provide the services that will utilize 5G. The time is now to evaluate the cyber risk posture and apply innovative thoughts to how we can approach these challenges today and build for what’s to come tomorrow. Many IoT (Internet of Things) services will utilize 5G services. The intersection of 5G and IoT brings an extension of the existing threat surface that requires careful consideration from a cyber risk perspective. This white paper highlights innovative thoughts which enable you to take action and meet the challenges creating a security safety net for the successful deployment and consumption of 5G based services.

OTHER LIVE WEBINARS

SCTE LiveLearning for Professionals Webinar Series: Closing the Rural Digital Divide

August 18, 2022 | 11:00 AM ET

With the US government now doling out $9.2 billion from the new Rural Digital Opportunity Fund (RDOF) to spur broadband deployment in rural areas and much more aid likely on the way from President Biden's infrastructure bill, service providers of all kinds are now angling for a share of the large funding pie.
Register Now

SCTE LiveLearning for Professionals Webinar Series: Prepping Cable's Networks for 10G

July 21, 2022 | 11:00 AM ET

Facing the prospect of competition from 5G-enabled broadband services, the cable industry is ardently pursuing an ambitious 10G (as in 10 Gbps) initiative to develop its multi-gigabit broadband prowess over a mix of HFC, fiber and wireless networks. But, even with the release of CableLabs' new DOCSIS 4.0 spec last year, it's not clear that the industry is ready to make that next great leap to symmetrical 10 Gbps service.
Register Now

Pumping the Power of PON and Fiber

June 16, 2022 | 11:00 AM ET

Although DOCSIS still has plenty of fuel left in the tank, PON has clearly emerged as a critical alternative transmission method for the cable industry as operators increasingly install more fiber lines in their HFC plant. Whether they are leveraging EPON, GPON, 10G EPON, XGS PON or some other PON flavor, cablecos and vendors are increasingly deploying some version of PON technology over fiber to expand their bandwidth capacity.
Register Now

SCTE LiveLearning for Professionals Webinar Series: DAA Duo: Flexing Both MAC and PHY

March 17, 2022 | 11:00 AM ET

Following years of trials and tribulations, cable operators and vendors are increasingly rolling out distributed access architecture (DAA) technology to shift key functions and equipment from the cable headend to the HFC access network, thereby expanding the network's capacity to deliver new, more advanced services and operate more efficiently and effectively. Now, thanks to CableLabs' new Flexible MAC Architecture (FMA) spec, industry technologists can freely choose among Remote PHY, Remote MAC/PHY, virtual CMTS and other DAA variants to meet their customer needs.
Register Now

Spotlight

5G touches almost every aspect of the way we live our lives. It’s not just about faster, bigger or better, it’s about utilizing 5G as an enabler to a series of services that we all will consume in every aspect of our lives. The time is NOW to consider the security implications and cyber risk profile that come with 5G. The business operational risk, legal risk and reputational risk of not only the companies who provide 5G transport, but all companies, nation states and individuals who provide the services that will utilize 5G. The time is now to evaluate the cyber risk posture and apply innovative thoughts to how we can approach these challenges today and build for what’s to come tomorrow. Many IoT (Internet of Things) services will utilize 5G services. The intersection of 5G and IoT brings an extension of the existing threat surface that requires careful consideration from a cyber risk perspective. This white paper highlights innovative thoughts which enable you to take action and meet the challenges creating a security safety net for the successful deployment and consumption of 5G based services.

resources