[MUSIC] As you have learned in the previous modules, the mobility tran is continually evolving. It would be a mistake to consider mobility to just be a technical issue. Some may argue that effective policies that relate to mobility are just as important. For example, as Chris and Mandy talked about previously, companies have to implement container technologies as well as various policies to have a robust mobile enterprise solution. Imagine what can potentially happen if a company does not have a policy to deal with employees who leave an organization, but have sensitive corporate data on their personal devices. This is you bleeds into cyber security in general. The cyber security landscape has changed drastically over the last few years. It is now characterized by large scale security threats, such as massive distributed denial of service attacks or DDOS, and the surge of mobile malware and fraud. These new threats illustrate the importance of strengthening the resiliency of mobile networks against security attacks, ensuring full mobility network availability. For an organization, availability of resources is an important issue. In an always connected environment, downtime due to cyber attacks can result in millions being lost in revenue. The mobile ecosystem grows more and more complex with time. Just in the wireless sector, some of the important players include mobile network operators, manufacturers of hardware including mobile devices, chip sets, and network equipment, applications developers & marketplaces, operating system & support software vendors, and value added service providers such as those that offer wi-fi hotspot services. Cybersecurity involves all of these entities at many touchpoints in the integrated systems of systems that enables wireless environment, so essential today in the workplace. According to CTIA, the wireless association, which is an international industry trade group, there are five cornerstone elements of the mobile sector's cybersecurity focus. Consumers, the industry attempts to educate consumers by providing guides for best practices to protect personal data and avoid problems in the mobile environment. Devices, today's mobile devices are miniature computers that need to be secured against all sources of intrusions. Network-based security policies, network operators provide numerous options to consumers, enterprise managers, and end users to enable them to protect their information. This is especially important as more businesses and government enterprises permit BYOD in the workplace. The result is more emphasis on mobile device management or MDM systems designed to enforce network policies. Authentication and controls for devices and users. This is important since this is the process that identifies a user as being authorized to access information stored on a mobile device. Or over a network connection from the device. Cloud networks and services. The complex security solutions the industry provides encompasses multiple types of network connections. The cloud, the internet backbone, and storage or processing data that support industry security solutions. Based on what the ecosystem entails, the magnitude and nature of the challenge of delivering cybersecurity in the mobile environment requires the active participation of the entire landscape of mobile communications stakeholders. This includes industry, governments, consumers, and enterprises. You may think that introducing new standards and frameworks may be the solution. But think about this, standards would only introduce uniformity across key technologies. Its effect would create a standardized approach that would make it easier for criminal developers and hackers to model their products for sale. The best protection against such a cyber-threat scenario is the robust competition and freedom that currently exist throughout the US mobile industry, to innovate a variety of technical designs and solutions to common threats. All players share an economic interest in delivering effective cyber-security in insuring the entire inter-dependent mobile ecosystem deliver sustained, high value security for all users. [MUSIC]