-

ISACA Guide Helps Enterprises Manage Privacy Risk and Threats of 5G Technology

Free resource also provides mitigating controls for 5G privacy threats

SCHAUMBURG, Ill.--(BUSINESS WIRE)--5G technology can transform the experience of its users – providing a faster network with greater capacity and less delay – but with its new capabilities come new privacy threats. ISACA’s white paper, 5G Privacy: Addressing Risk and Threats, reviews 5G technology from the privacy perspective, including user privacy-related elements, threats, and mechanisms and regulatory means to address threats and risk.

Several industries use applications powered by 5G services, but those with most potential for transformation by its adoption include retail, healthcare and manufacturing. The publication explores the capabilities of 5G technology, including:

  • Supporting diverse types of static and mobile Internet of Things (IoT) devices
  • Decreasing network energy usage
  • Meeting technical and services requirements of specific customers/market segments via the 5G network slicing function
  • Revolutionizing industries by offering endless possibilities with virtually no limits, such as drone deliveries, cloud-connected traffic control, and remote surgery.

Privacy on the 5G network can be divided into three main categories:

  • Data privacy: With many smart and heterogeneous devices residing on and connected to each other on a 5G network, the network will have a huge volume of data, such as sensitive banking information, that must be protected.
  • Location privacy: With the introduction of 5G, several service providers constantly track the location of users who access services via the network.
  • Identity privacy: Identity-related information associated with a device, system or individual must be provided to and used by a 5G network to establish a connection.

The ISACA paper delves into 5G-related privacy threats related to those categories and shares mitigating controls for each one. The privacy threats highlighted include:

  1. Identity privacy exposure (user identity catching)
  2. Risk of unauthorized data access and data breaches
  3. Issues in transboundary data flow (transborder privacy requirement differences)

“With the expanded surface and granularity of 5G technology, new privacy concerns arise, including a very high risk of leaking personal data or exposing hints that could reveal sensitive personal information,” says Safia Kazi, Principal, Privacy Professional Practices at ISACA. “To build and maintain the trust relationship between consumers and service providers, effective consideration of privacy issues is critical.”

To download a complimentary copy of 5G Privacy: Addressing Risk and Threats, visit https://store.isaca.org/s/store#/store/browse/detail/a2S4w000005Gu8KEAS. Access additional ISACA resources at www.isaca.org/resources and www.isaca.org/digital-trust, and ISACA’s privacy-focused Engage community here.

About ISACA

ISACA® (www.isaca.org) is a global community advancing individuals and organizations in their pursuit of digital trust. For more than 50 years, ISACA has equipped individuals and enterprises with the knowledge, credentials, education, training and community to progress their careers, transform their organizations, and build a more trusted and ethical digital world. ISACA has more than 165,000 members in 188 countries, including 225 chapters worldwide. Through its foundation One In Tech, ISACA supports IT education and career pathways for underresourced and underrepresented populations.

Contacts

Bridget Drufke, bdrufke@isaca.org, +1.847.660.5554

Emily Ayala, communications@isaca.org, +1.847.385.7223

ISACA


Release Summary
ISACA guide helps enterprises manage privacy risk and threats of 5G technology
Release Versions

Contacts

Bridget Drufke, bdrufke@isaca.org, +1.847.660.5554

Emily Ayala, communications@isaca.org, +1.847.385.7223

Social Media Profiles
More News From ISACA

ISACA, Nasscom Join Hands to Standardize Digital Skills for India’s Workforce

NEW DELHI--(BUSINESS WIRE)--ISACA, a global professional association and learning organization working in digital trust fields serving 185,000 members and operating in more than 190 countries, has exchanged an MoU with IT-ITeS SSC Nasscom, the national standard-setting body for IT skills for the alignment of its credentials to NSQF (National Skill Qualification Framework). Sector Skills Council Nasscom, set up under the aegis of National Skill Development Corporation (NSDC) and Ministry of Skil...

Four Ways to Incorporate AI into Threat Intelligence Programs

SCHAUMBURG, Ill.--(BUSINESS WIRE)--Threat environments have become more complex, especially with the rise of generative AI and the rapid commercialization of the cybercrime ecosystem. Enterprises have also long struggled to realize meaningful value from traditional cyberthreat intelligence programs. However, there are steps that cybersecurity professionals can take to improve the effectiveness of their threat intelligence programs, as outlined in ISACA’s new white paper, Building a Threat-Led C...

AI-Driven Cyber Threats Are the Biggest Concern for Cybersecurity Professionals Going Into 2026, Finds New ISACA Research

LONDON--(BUSINESS WIRE)--Over half (51%) of European IT and cybersecurity professionals fear AI-driven cyber threats and deepfakes will keep them up at night next year, according to new ISACA research. What’s driving this concern is a lack of preparedness for AI-related risks across the industry. Only 14% of respondents feel their organisation is very prepared to manage the risks associated with generative AI solutions in 2026. The majority (82%) feel they are only somewhat prepared, not very p...
Back to Newsroom