Future Mobile Industry Data 2025: Mark Clancy of T-Mobile Discusses Prioritizing Security in a Mobile-Centric World
In a significant stride towards enhancing mobile system security, T-Mobile, a leading telecommunications company, has introduced network slicing in its 5G network. This innovative technology creates dedicated virtual networks within the physical 5G infrastructure, offering priority access, enhanced performance, and tailored network functions for specific users or applications [1].
Mark Clancy, the Senior Vice President for Cybersecurity at T-Mobile, has emphasised the importance of maintaining robust security in mobile systems. He suggested intersecting asset inventory with device security status for effective management [2]. One of the key areas where T-Mobile is making a difference is in the security of federal agencies.
T-Mobile's flagship network slice, T-Priority, is designed specifically for first responders and federal agencies. It provides a priority, mission-critical 5G connectivity layer that offers faster speeds, lower latency, and more reliable data service even during network congestion [2][4]. This is crucial in disaster zones or emergency situations, as demonstrated by T-Priority's support for data-intensive applications like drones, AI-enabled tools, body-worn cameras, and mapping technologies during wildfires and other emergencies [2].
The network slicing technology also enhances security by isolating the data and communication of these agencies on a dedicated virtual network separate from general public traffic [2]. This segmentation reduces the risk of interference, eavesdropping, or congestion-induced failures, ensuring that critical government and defense communications remain secure and reliable. T-Mobile has also collaborated with the Department of Defense to provide 5G services, leveraging these capabilities to maintain global network reliability and security for military operations [2].
T-Mobile's 5G network includes the 5G slicing capability, which is not available in non-standalone core or 4G networks. The company has also implemented satellite coverage in addition to ground-based coverage to support federal missions in austere areas with limited communications [3].
Clancy also recommended adopting a continuous authentication model instead of the traditional terminal-age password mode of user authentication. He emphasised the importance of managing and paying attention to all devices, connecting access policies to only allow critical applications from managed devices [2]. Agencies also need to examine the security status of these devices, according to Clancy.
In the face of the increasing integration of artificial intelligence (AI) into mobile systems, Clancy highlighted the need for agencies to have visibility into the threat environment for effective threat intelligence [5]. He suggested that a vendor with extensive network coverage and data from a device population in the millions could aid in threat intelligence. Agencies can counter AI-enhanced malicious activities with techniques such as applying large language models to network log data, according to Clancy, a method that increases staff productivity in terms of hunting and searching for bad activity [5].
In summary, T-Mobile's network slicing offers dedicated, isolated virtual networks for specific users like federal agencies and first responders, ensures priority access to resources during peak usage or emergencies, supports advanced, data-heavy applications required by first responders, enhances security by isolating sensitive communications in dedicated slices, and is powered by T-Mobile’s 5G standalone core network architecture, which is currently unique among major U.S. carriers [1][2][4]. This approach directly addresses the communication needs of federal agencies during critical missions, ensuring both high performance and advanced security on T-Mobile’s 5G network.
Cybersecurity is a crucial focus for T-Mobile, with Mark Clancy, the Senior Vice President for Cybersecurity, emphasizing the need for device security status and asset inventory management for effective security measures [2]. In the context of industry exchange, T-Mobile is collaborating with the Department of Defense to provide 5G services and enhance cybersecurity, leveraging technologies like network slicing to create dedicated virtual networks for federal agencies, ensuring both priority access and secure communication [2].