In June, I attended the TIA Connectivity Jam in Dallas, where I participated as a panel moderator and table ambassador on the topic of cybersecurity. The discussions were engaging and informative, and they introduced new ways of addressing the future of IoT, 5G, smart cities, data management, our workforce and more. Here, I share some fresh insights from the event related to the big-picture question of where the information age is taking us, along with the pressing challenge of securing our networks.\nA five-category method for identifying industry leaders\nI was fascinated and enlightened by the "Information Age" keynote delivered by Southern Methodist University professor Dr. Shervani, who offered a forward-thinking approach to understanding companies and identifying industry leaders in the information age.\nThe five types of businesses in the information space, as he described, fall into one or more of these categories:\n\nPipeline \u2013 Includes the information pipes, such as wire, satellite, connectivity, cable, wireless, radio, etc. (e.g., Comcast, Dish AT&T, etc.).\nDistributors \u2013 Includes companies that have platforms, bundled devices and software, and primarily store and deliver others\u2019 content and products (e.g., Spotify, Netflix, and others).\nContent \u2013 Includes original content creators (e.g., EA, DreamWorks, etc.).\nData Mining \u2013 Includes peer-to-peer platforms enabling the exchange of data and information to uncover private information and assets (e.g., Uber, Bitcoin, etc.).\nEntities \u2013 Includes distribution providers that use \u201cconnected intelligence\u201d embedded in devices and entities including IoT and connected machines\/devices (e.g., Google\u2019s Alexa, Samsung\u2019s Bixby, Robotics, etc.).\n\nCompanies playing in three or more of these categories, such as Amazon, are leading the industry,\u00a0Dr. Shervani said.\nRobotics is not a threat\nDr. Shervani also noted that labor will become an increasingly smaller part of our work day as we shift our focus to designing and making tools that enhance labor productivity and efficiency. Perhaps of comfort to many, Dr. Shervani asserted that robotics is not a threat, due to the decreasing overall global population, and that humans will need robots to keep up with production demand.\nCybersecurity in today\u2019s age demands bridging the skills gap\nAs part of the TIA Connectivity Jam, I moderated a panel session on securing networks, devices, and the workplace, and leveraging the NIST framework to set the stage for better, more proactive planning. The discussion featured an esteemed panel of business and government leaders representing organizations such as Harris County (Houston), PWC, SEI, and Aviall, a Boeing company. As part of the session, we jumped into collaborative groups to explore key issues even further \u2013 this was one of the important features of the TIA conference, to engage the senior-level audience in a give-and-take that would result in actionable next steps.\nOur conversations led to consensus around the fact that there is an existing skills gap in obtaining and hiring a workforce that can meet today\u2019s business and government security needs. In order to address this skills gap, participants recommended industry collaboration with local or national schools and universities, updating curriculum to focus on cybersecurity in the workplace, and ensuring continuing education is available to promising students.\nOn the flip side, session participants agreed that we should also be open to hiring skilled professionals who may not necessarily have an advanced degree, but may be just as well equipped, if not better equipped, to take on cybersecurity positions. Other participant recommendations included the following:\n\nContinuing Employee Education \u2013 Ensuring all team members have an understanding of key definitions and terms, recognizing that security is a business issue not an IT issue.\nCyber Attack Planning \u2013 Establishing an escalation plan that the entire company adopts and is aware of in the event of a new threat or attack.\nSetting a High Product Security Standard \u2013 Demanding more from your suppliers\/vendors so that security is designed into the product.\nExpecting the Unexpected \u2013 The reality is that many workers are the ones who are breaching and hacking networks, so always be alert for cyber-attacks from unexpected places.\n\nThese are just a few of the lessons I learned at the TIA Connectivity Jam, which examined a number of other issues with the same intensity and results-driven approach. For video of event sessions and interviews with speakers, visit TIANow.