BitDepth+Featured

TATT answers questions about its cybersecurity framework for telcoms, broadcasters

6 Mins read

Above: Aaron Simon

At CANTO’s 42nd AGM held at the Hyatt Regency from February 01 – 03, the Telecommunications Authority of TT (TATT) presented its “Cybersecurity Framework 
for Public Telecommunications Networks and Broadcasting Facilities” on the second day of the event.
Kirk Sookram, Deputy CEO of TATT made that presentation, but the authority passed questions about the presentation to Aaron Simon, Manager (Ag) Networks and Services, who provided these responses.

Q: This initiative by TATT is being positioned as being a responsibility to promote and protect the interests of the public. A National Cybersecurity Strategy has evidently been under discussion since 2012. Was there any specific incident or cluster of incidents that led to the decision to make it a specific requirement of licensees? 

A: The general importance being ascribed to cybersecurity at a national and global level prompted the commencement of this work by the Authority in early 2023. This was reinforced by the International Telecommunication Union’s Global Symposium for Regulators 2024, which impressed the need for regulatory measures to adopt cybersecurity standards and regulations (PDF) to safeguard against threats.

The well-publicized incident that occurred in late 2023 (TechNewsTT broke this story in October 2023), where consumer data stored by a public telecommunications services provider was maliciously accessed and published on the dark web, affirmed the Authority’s decision to develop its Cybersecurity Framework.

Q: I note the emphasis on cybersecurity considerations for telecommunications companies and broadcasting facilities, but print publishing houses. media vendors, have invested in online broadcast expansions of their offerings and operate online subscription models that also gather customer information. Is TATT considering widening the scope of its requirements to all media houses that gather customer information?

A: The Authority’s legislative oversight extends to the network operators and service providers authorised under the Act. Consequently, there is no intent from the Authority at this time to widen the scope of the Framework to all media houses that gather customer information.

Q: The consultative document (https://tatt.org.tt/wp-content/uploads/2026/01/Cybersecurity-Framework-for-Public-Telecom-Networks-and-Broadcasting-Facilities.pdf) was apparently published on January 30th, Is there a timeline established for the expected closing date and setting of schedules of reporting and review of what is being required of businesses that fall under TATT’s oversight?

A:The document published on January 30th 2026 is the approved version having gone through two rounds of public consultation in October 2024 and May 2025.
The Authority will inform the concessionaires of a suitable timeframe for submitting the conformance reports. This submission is meant to establish a baseline for monitoring the conformance of telecommunications network operators and broadcasters against the measures in the Framework. On receipt of the conformance reports, individual review sessions will be held with the concessionaires as required.

TATT’s consultative process for the Cybersecurity Framework

Q: Given the lack of legislative support for required reporting of cybersecurity incidents in Trinidad and Tobago, how confident is TATT that companies will do so under a regime of recommended measures and required measures given the challenges it has faced in enforcing measures that are actually supported by TT laws (number portability)?

A: There is legislative basis to require reporting of cybersecurity incidents by concessionaires to the Authority, specifically section 22(3)(c) of the Act, which states that every concessionaire shall provide information and reports to the Authority.
The Authority is comfortable there will be no challenges with these requirements as reporting of general outage incidents is already performed, and these requirements align with global best practice and were thoroughly ventilated during the consultation process.

Furthermore, under the monitoring and conformance section of the Framework, lack of compliance of operators with the cybersecurity measures may be shared with members of the public, which may affect whether their bids to provide services to public and private sector entities are favourably considered.

Q: TATT is asking these companies to adopt the ISO 27001, ITU-T X.1051 standard on information security requirements, and to report information gathered under those protocols among operators and incident response organisations. Is there any method of suasion that the authority expects to exercise to ensure that adoption of the standard and required reporting actually does happen?

A: The Authority encourages the adoption of ISO 27001, but it is not required. While we hope all the operators and broadcasters will aim for full adoption, we understand that it may not be possible for all.
TATT has the support of the TTBS, who is currently undertaking an assessment of the ITU-T X.1051 recommendation, also referred to as ISO 27011 standard, by a technical committee and it is expected that it will be adopted as a national standard.

Thus far, the technical committee meeting had no issues with the controls and guidelines stated in the ITU-T X.1051 recommendation.
Again, the disclosure of the level of conformance by operators is anticipated to provide additional incentive to adopt as many measures as possible, and the Authority envisages a collaborative approach with operators towards the adoption of the measures.

Q: What will TATT accept as “suitable independent certification” of an acceptable cybersecurity plan? Is there a panel or agency within TATT that will review these plans if they are submitted to the authority?

A: The Authority will accept certification from accredited independent organisations that perform such information security management systems assessments and audits. Examples include but are not limited to PricewaterhouseCoopers and Ernst & Young Limited.

As the Authority receives certifications, it will validate that the organisation supplying the certification is suitably accredited to provide the certification supplied. As for the method of review, while the Authority’s resources can review submitted plans for the purposes of the framework, the Authority can engage support from TT-CSIRT and iGovTT as required.
If necessary, a consultant with the requisite expertise can be contracted to review plans that are submitted.

Q: The consultative document lists numerous technical requirements for telecommunications companies and broadcasters. It cannot be enough to accept all statements of compliance by licensees at face value. How will TATT verify that statements given by licensees are, in fact, in place?

A: Verification checks will be conducted, as demonstrated in the last column of its conformance reporting template of its framework. The Authority has adopted a trust but verify approach to conformance reporting. Various methods of verification will be used, including technical reporting and on-site audits.

Q: There is a mix of commonsense precautious and deeply technical information in the consultative document, should citizens be concerned that TATT feels it necessary to point to preventive measures that amount to “don’t put your hand in a blazing fire” to telecommunications and broadcast professionals?

A: Conversely, we expect consumers to support the Framework. We expect consumers to feel reassured that this Framework was established to ensure their information is secured and consumer interests are protected. Furthermore, consumers will be empowered to choose the operators that they feel are most secure based on summary information provided by the Authority.

While some of the measures may seem commonsense precautions and many operators already follow cybersecurity best practices, the Framework establishes a common baseline and consistency across the industry, ensuring no critical security steps are overlooked.

Q:There are several requirements in the consultative document that leave critical decisions about equipment and systems to licensees, given oversight by the TT Bureau of Standards. How proficient is the TTBS likely to be in setting standards for highly technical, rapidly evolving purchases of that nature and how and by whom will they be reviewed?

A: Regarding vendor management, concessionaires are encouraged to ensure that procurement systems and procedures meet security standards defined by the concessionaire and relevant national authorities, including the TTBS. The TTBS has a very robust standards development process, including using expert technical committees, public consultation, and continual review, and therefore, is a trusted source for standards on vendor management to which concessionaires can look.

Q: The acquisition of customer information is a foundation of business data mining and targeting. How does TATT propose to monitor the level of PII gathering done by licensees?

A: The Telecommunications Act clearly define the purposes for which operators of public telecommunications networks should collect and use customer information, including PII. We currently have no reports or evidence of misuse that would warrant proactive monitoring of PII volumes, but we will continue to review complaints and conduct audits where required to ensure compliance. The use of PII to validate customers is becoming increasingly critical to ensure telecommunications connections are not abused.

Q: Is there some benchmarking by TATT of what constitutes a “meaningful cybersecurity incident” that merits reporting to the authority?

A: Meaningful cybersecurity incidents are those that result in loss or degradation of services, whether isolated or widespread, due to compromised network elements or that result in the compromise of user information. It is important to note that in the Framework, the measures for reporting of cyber incidents cover notification, reporting, and information sharing.

Information sharing between operators and broadcasters would include meaningful cyber incidents, but importantly, near misses or close calls that do not result in actual compromise of network elements or user information should be shared between operators. This is crucial to ensure proactive risk management and improvement in threat response.

Q: “Failure to submit the annual conformance report or comply with a required cybersecurity measure may be deemed as a breach of concession and the Authority shall act as prescribed under the concession or the Act.” What does this mean exactly? What punitive measures are available to TATT in the event of non-compliance? So far the authority has only spoken firmly and in a voice demonstrating annoyance despite court backing of its cases.

A: Currently, concessionaires who commit a material breach of a concession obligation commit an offence and may face the penalties stipulated under section 65 of the Act ($250,000 fine and imprisonment for five years). Also, a breach of the Act can give rise to an offence under section 71 of the Act ($25,000 fine). The Authority can also recommend the suspension/ termination of the concession, in accordance with section 30 of the Act. Furthermore, operators will be incentivised to meet the measures established through the availability and disclosure of their level of conformance with the framework.

News is a niche until it’s not

News is a niche until it’s not

The New York Times produced approximately 230 pieces of content per day on average; The Washington Post, more than 500 per day in 2016
Read More
FT’s second Next Gen News report offers deeper insights

FT’s second Next Gen News report offers deeper insights

Successful producers are reversing the journalism process, dismantling the inverted pyramid of news structure
Read More
Ransomware report notes fourth quarter 2025 attack surge

Ransomware report notes fourth quarter 2025 attack surge

"The year 2026 will likely see continued convergence of criminal innovation and AI capabilities, demanding that defenders adopt equally sophisticated technologies and intelligence-led approaches."
Read More
Hands-on with Apple’s Creator Studio as a non-subscriber

Hands-on with Apple’s Creator Studio as a non-subscriber

It’s not hard to imagine someone in a hurry clicking madly along only to find themselves a subscriber through haste.
Read More
Apple flirts with subscription software

Apple flirts with subscription software

Are we all being coaxed and tranquilized into accepting as a norm, the idea that the computing tools we pay for are not things we own anymore?
Read More
So long, and thanks for all the fish

So long, and thanks for all the fish

The only way forward for journalism is immersion in the unfamiliar by both journalists and their managers.
Read More
Cyberedge reports on cybersecurity trends

Cyberedge reports on cybersecurity trends

Mobile and web application vulnerabilities affect 90.9 per cent of respondents in the 2025 report and these weaknesses are contributing to the areas of greatest cybersecurity concern.
Read More
Samsung’s ZFlip 7 shows steady improvement

Samsung’s ZFlip 7 shows steady improvement

Being able to use a powerful wide-angle lens in what is essentially a next level selfie mode is a big step up for the phone's target market.
Read More
Digital New Year’s resolutions

Digital New Year’s resolutions

Every computer and smartphone has a digital calendar system, which means that you have a live appointment book capable of giving you reminders.
Read More
WiPay announces new strategy for services, payments

WiPay announces new strategy for services, payments

Are there enough bread and butter customers who need new options for travel, phone service and loan services to make those add-on businesses worth the time of WiPay.
Read More
Old Mac, new OS

Old Mac, new OS

The best OS versions to target are Sonoma and Sequoia because these systems are still receiving minor security and improvement updates.
Read More
Regional cybersecurity faces fire

Regional cybersecurity faces fire

Boards that are being formed now accept that both cybersecurity and Ethics, Compliance and Governance are critical components of their scope of responsibilities.
Read More
Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
News is a niche until it’s not News is a niche until it’s...
FT’s second Next Gen News report offers deeper insights FT’s second Next Gen News report...
Ransomware report notes fourth quarter 2025 attack surge Ransomware report notes fourth quarter 2025...
Hands-on with Apple’s Creator Studio as a non-subscriber Hands-on with Apple’s Creator Studio as...
Apple flirts with subscription software Apple flirts with subscription software
So long, and thanks for all the fish So long, and thanks for all...
Cyberedge reports on cybersecurity trends Cyberedge reports on cybersecurity trends
Samsung’s ZFlip 7 shows steady improvement Samsung’s ZFlip 7 shows steady improvement
Digital New Year’s resolutions Digital New Year’s resolutions
WiPay announces new strategy for services, payments WiPay announces new strategy for services,...
Old Mac, new OS Old Mac, new OS
Regional cybersecurity faces fire Regional cybersecurity faces fire
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
FeaturedOpinion

Strengthening Cloud Defense: The Shared Responsibility Model

4 Mins read
Every business process, whether it’s managed in-house or hosted in the cloud, still needs to have dedicated ownership to keep accountability where it belongs.
BitDepthFeatured

Ransomware report notes fourth quarter 2025 attack surge

4 Mins read
“The year 2026 will likely see continued convergence of criminal innovation and AI capabilities, demanding that defenders adopt equally sophisticated technologies and intelligence-led approaches.”
BitDepthFeatured

Cyberedge reports on cybersecurity trends

3 Mins read
Mobile and web application vulnerabilities affect 90.9 per cent of respondents in the 2025 report and these weaknesses are contributing to the areas of greatest cybersecurity concern.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
×
BitDepthFeatured

Why FNP means exactly nothing

0
Share your perspective in the comments!x
()
x