Telecom industry fears high costs due to cybersecurity regulation
Briefly

Telecom industry fears high costs due to cybersecurity regulation
"Mobile operators spend between $15 billion and $19 billion (€13 billion to €16.4 billion) annually on cybersecurity. That amount is expected to rise to $40 billion to $42 billion by 2030. The GSMA issues this warning in a study entitled 'The Impact of Cybersecurity Regulation on Mobile Operators'. The report reveals that mobile operators face poorly designed, inconsistent, or overly prescriptive regulations. This results in unnecessary costs and diverts resources away from actual risk mitigation."
""Mobile networks carry the world's digital heartbeat," said Michaela Angonius, GSMA Head of Policy and Regulation. "As cyber threats escalate, operators are investing heavily to keep societies safe - but regulation must help, not hinder, those efforts." Prescriptive "check-box" rules that prescribe tools or processes rather than focusing on actual security outcomes are an additional burden. One operator reported that up to 80 percent of their cybersecurity operations team's time is spent on audits and compliance tasks, rather than threat detection or incident response."
Mobile operators currently spend $15–19 billion annually on cybersecurity, with projected costs rising to $40–42 billion by 2030. Poorly designed, inconsistent, and overly prescriptive regulations increase operational costs and shift focus from real security risks. Fragmentation and overlapping obligations force operators to comply with multiple, sometimes conflicting, requirements and to submit repeated incident reports in different formats. Prescriptive "check-box" rules prioritize specific tools or processes over security outcomes, causing substantial portions of cybersecurity teams' time to go to audits and compliance instead of threat detection and incident response. Six core principles are outlined to improve regulation, including harmonization, consistency, risk- and results-based approaches, industry collaboration, security-by-design, and strengthening capacity.
Read at Techzine Global
Unable to calculate read time
[
|
]