corporate governance – T-Mobile’s chief information security officer will regularly report to the board of directors on T-Mobile’s network security status and the business risks posed by network security. This is a basic requirement for all well-governed companies. To govern effectively, corporate boards need visibility and experience in the cybersecurity space. This commitment ensures that boardroom understanding of cyber security is a key priority going forward.
Modern Zero Trust Architecture – T-Mobile has agreed to move to a modern zero-trust architecture and segment its network. This is one of the most important changes an organization can make to improve its security posture.
Powerful identity and access management – T-Mobile is committed to widespread adoption of multi-factor authentication methods across its network. This is a critical step in ensuring the security of critical infrastructure, such as our telecommunications networks. Abuse of authentication methods, such as through leakage, theft or deliberate sale of credentials, is a leading method of breach and ransomware attacks. Consistent application of best practice identities and access methods will improve your network security posture more than almost any other single change.