-

ISACA Guide Helps Enterprises Manage Privacy Risk and Threats of 5G Technology

Free resource also provides mitigating controls for 5G privacy threats

SCHAUMBURG, Ill.--(BUSINESS WIRE)--5G technology can transform the experience of its users – providing a faster network with greater capacity and less delay – but with its new capabilities come new privacy threats. ISACA’s white paper, 5G Privacy: Addressing Risk and Threats, reviews 5G technology from the privacy perspective, including user privacy-related elements, threats, and mechanisms and regulatory means to address threats and risk.

Several industries use applications powered by 5G services, but those with most potential for transformation by its adoption include retail, healthcare and manufacturing. The publication explores the capabilities of 5G technology, including:

  • Supporting diverse types of static and mobile Internet of Things (IoT) devices
  • Decreasing network energy usage
  • Meeting technical and services requirements of specific customers/market segments via the 5G network slicing function
  • Revolutionizing industries by offering endless possibilities with virtually no limits, such as drone deliveries, cloud-connected traffic control, and remote surgery.

Privacy on the 5G network can be divided into three main categories:

  • Data privacy: With many smart and heterogeneous devices residing on and connected to each other on a 5G network, the network will have a huge volume of data, such as sensitive banking information, that must be protected.
  • Location privacy: With the introduction of 5G, several service providers constantly track the location of users who access services via the network.
  • Identity privacy: Identity-related information associated with a device, system or individual must be provided to and used by a 5G network to establish a connection.

The ISACA paper delves into 5G-related privacy threats related to those categories and shares mitigating controls for each one. The privacy threats highlighted include:

  1. Identity privacy exposure (user identity catching)
  2. Risk of unauthorized data access and data breaches
  3. Issues in transboundary data flow (transborder privacy requirement differences)

“With the expanded surface and granularity of 5G technology, new privacy concerns arise, including a very high risk of leaking personal data or exposing hints that could reveal sensitive personal information,” says Safia Kazi, Principal, Privacy Professional Practices at ISACA. “To build and maintain the trust relationship between consumers and service providers, effective consideration of privacy issues is critical.”

To download a complimentary copy of 5G Privacy: Addressing Risk and Threats, visit https://store.isaca.org/s/store#/store/browse/detail/a2S4w000005Gu8KEAS. Access additional ISACA resources at www.isaca.org/resources and www.isaca.org/digital-trust, and ISACA’s privacy-focused Engage community here.

About ISACA

ISACA® (www.isaca.org) is a global community advancing individuals and organizations in their pursuit of digital trust. For more than 50 years, ISACA has equipped individuals and enterprises with the knowledge, credentials, education, training and community to progress their careers, transform their organizations, and build a more trusted and ethical digital world. ISACA has more than 165,000 members in 188 countries, including 225 chapters worldwide. Through its foundation One In Tech, ISACA supports IT education and career pathways for underresourced and underrepresented populations.

Contacts

Bridget Drufke, bdrufke@isaca.org, +1.847.660.5554

Emily Ayala, communications@isaca.org, +1.847.385.7223

ISACA


Release Summary
ISACA guide helps enterprises manage privacy risk and threats of 5G technology
Release Versions

Contacts

Bridget Drufke, bdrufke@isaca.org, +1.847.660.5554

Emily Ayala, communications@isaca.org, +1.847.385.7223

Social Media Profiles
More News From ISACA

ISACA Digital Trust Workforce Development Program to Prepare More than 130 Learners for Tech Jobs in 2026

SCHAUMBURG, Ill.--(BUSINESS WIRE)--ISACA and the ISACA Foundation are expanding the ISACA Digital Trust Workforce Development Program in select cities across the United States. The expansion was made possible thanks to a grant from the Caterpillar Foundation to the ISACA Foundation. The ISACA Digital Trust Workforce Development Program helps individuals build practical, job-ready skills and earn ISACA certificates that support entry into the IT workforce. The program’s courses, which are suppor...

AI Use Accelerates, While Governance and ROI Lag, Says New ISACA Research

SCHAUMBURG, Ill.--(BUSINESS WIRE)--While 90 percent believe employees are using artificial intelligence in their organization, only 22 percent say AI return on investment (ROI) has met or exceeded their expectations, according to ISACA’s new 2026 AI Pulse Poll. With responses from more than 3,400 digital trust professionals across IT audit, governance, cybersecurity, privacy and emerging technology roles, ISACA’s poll finds that AI has become embedded in day-to-day work; however, governance and...

As AI Adoption Outpaces Controls, ISACA Launches Advanced in AI Risk Certification

SCHAUMBURG, Ill.--(BUSINESS WIRE)--As organizations increasingly leverage AI across their business, risk professionals face the challenge of balancing AI’s transformative potential with vigilant risk management in light of new vulnerabilities, threats, and risk. To equip IT risk professionals with the specialized skills and knowledge to manage these complex risks, ISACA has introduced the new Advanced in AI Risk (AAIR) certification. The AAIR credential validates candidates’ ability to evaluate...
Back to Newsroom