The Telecommunication Industry Association
need to be at an all-time high – confidence that can only come by ensuring the integrity of the information and communication technology (ICT) supply chain. The Threat is Real The fragmentation of the ICT supply chain has resulted in the globalization of resources and a growing number of companies involved in developing and deploying the components, devices, platforms, and services that comprise the telecommunications infrastructure and transmit, store, or analyze massive amounts of information. With more players around the globe, the ICT supply chain has become increasingly complex and vulnerable. And with more connected devices than ever, evildoers have more ways to develop sophisticated cyberattack techniques and back-door mechanisms. Whether it’s malicious malware, denial-of-service (DoS) attacks, or counterfeit components that increase exposure to additional risk, the threat is real. Studies estimate that more than five billion records, including credit card numbers and other highly-sensitive information, were exposed through data breaches in 2019. And it’s not just sensitive personal consumer data that cybercriminals are after. In today’s political landscape, news of potential cyberattacks from foreign adversary nations is on the rise and considered one of the greatest threats to the U.S. As a result, there is ongoing bipartisan government legislation to address ICT supply chain security. Following the 2018 Cybersecurity and Infrastructure Security Agency Act, the FCC has adopted regulations to ban recipients of U.S. government funds from using untrusted vendors, and the Department of Commerce has released rules that prohibit potentially risky private-sector transactions with foreign adversaries. The Department of Defense has put forward a framework that will set supply chain security standards for its contractors, and federal task forces like the Department THE TELECOMMUNI CAT ION INDUSTRY ASSOC I AT ION
Made with FlippingBook
RkJQdWJsaXNoZXIy MTI5MjAx