SlideShare a Scribd company logo
1 of 18
Download to read offline
Security in Smart City Implementation:
Infrastructure and People
David Shearer
(ISC)2 Chief Executive Officer
dshearer@isc2.org | www.isc2.org
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Stakeholders Involved in Shaping a City
2
Political Leaders,
Managers and
Operators of the
Local Government
The Service Operators – public or
private:
Communication, Electricity,
Education, Transport, Water,
Waste, etc.
Investors:
Private Banks,
Venture Capitalists,
Pension Funds,
International Banks
Solution Providers:
Technology Providers,
Financiers and
Investors
End users and ‘Prosumers’:
Inhabitants and Local Business
Representatives
Source: International Electrotechnical
Commission- Orchestrating infrastructure for
Sustainable Smart Cities
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Operating Systems for City Infrastructure
» Smart cities are enabled by
recent advances in key
technologies:
• Pervasive sensor networks
• Low-cost communications
• Software-as-a-Service
» Pain points are awaiting to
be solved…
3
Source: International Electrotechnical Commission- Orchestrating infrastructure for sustainable Smart Cities
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Importance of Standards in Smart City
» Cloud is a crucial part of
any smart city
» Web-services over cloud
» A portal server can allow
for the creation of unified,
even if personalized, user
interfaces, taking into
account individual settings
such as language
» Who is managing the
‘Portal’ & the web service?
4
One portal server structure, integrating systems using standards
from IEC, ISO, JTC1, ITU-T
Source: InternationalElectrotechnicalCommission- Orchestratinginfrastructurefor sustainable
Smart Cities
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Cloud in a Smart City
• Awareness: Understanding current cloud
usage within an organization and/or a city
• Opportunism: Identifying strong cloud
adoption opportunities ( From ‘Cloud First’ to
‘Cloud-First Security-Now’ Policy)
• Strategy: Building cloud adoption program
- architecture, frameworks, business
alignment and IT skill sets
• Capacity Building: Assessment of own
enterprises’ needs for capacity building
and training in cloud computing-related
areas
5
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
(ISC)² Global Information Security Workforce Study
https://www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/GISWS/FrostSullivan-(ISC)%C2%B2-Global-Information-Security-Workforce-Study-2015.pdf
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Not a Question of if, But How Much
7
Source: 2015 (ISC)² Global InformationSecurity Workforce Study – A Frost and Sullivan Market Study
Most respondents made cloud a priority for their organizations
and continue to do so over the next two years.
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Prevalence of Cloud Models: SaaS, PaaS, IaaS
8
Source: 2015 (ISC)² GlobalInformation Security Workforce Study – A Frost and Sullivan Market Study
44
24
32
39
26
35
42
24
3534
26
4041
27
33
40
28
32
39
25
36
38
28
33
0
5
10
15
20
25
30
35
40
45
50
Software as a service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS)
Worldwide APAC Australia Hong Kong India Japan Singapore South Korea
In%
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Cloud Adoption Barriers
9
Source: 2015 Cloud Security SpotlightReport
Security is still the biggest perceived barrier to further cloud adoption.
Nine out of ten organizations are very or moderately concerned about
public cloud security.
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Security Concerns in Public Clouds
10
Source: 2015 Cloud Security SpotlightReport
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
CSA “Notorious 9 Security Threats”
73%
61%
59%
57% 56% 56% 55%
77%
69% 68%
62% 62%
65%
61%
78%
67% 68% 67%
63%
55%
59%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
Data loss Account Hijacking Malicious Insiders Insufficient Due
Diligence
Insecure APIs Denial of Service Abuse and
Nefarious Use
Worldwide APAC Singapore
11
Source: 2015 (ISC)² GlobalInformation Security Workforce Study – A Frost and Sullivan Market Study
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Elevating Cloud Assurance
12
Strong data encryption is the top overall choice for elevating cloud information
assurance among APAC countries. Singapore respondents see adopting
security governance as a way of elevating information assurance in the cloud.
18%
11%
9%
7%
6% 6%
16%
10%
7% 8%
7% 8%
14%
9%
4%
11%
5% 6%
0%
2%
4%
6%
8%
10%
12%
14%
16%
18%
20%
Strong encryption of
data
Continuous
monitoring
Incorporating
security into
software design and
implementation
Adopting security
governance
Implementing
identity based
network solutions
Employ Role Based
Access Controls
(RBAC)
Worldwide APAC Singapore
Source: 2015 (ISC)² GlobalInformation Security Workforce Study – A Frost and Sullivan Market Study
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Demand for Training and Education
In most areas in the APAC region including Singapore, cloud computing is the area requiring the most training
and education, however in Australia, training in BYOD and incident response ranked a close second.
Base: Filtered respondents (n=7,985).
0%
10%
20%
30%
40%
50%
60%
70%
Cloud
computing
Bring-your-
own-device
(BYOD)
Incidence
response
Informationrisk
management
Mobiledevice
management
Forensics
Applications
andsystem
development
security
Accesscontrol
systemsand
methodology
End-user
security
awareness
Security
management
Security
architecture
andmodels
Worldwide APAC Australia Hong Kong India Japan Singapore South Korea
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Industry Needs…
• Professionals who understand and can apply effective
security measures to cloud environments
• A reliable indicator of overall competency in cloud
security
• Roadmap and career path into cloud security
• Common global understanding of professional
knowledge and best practices in the design,
implementation and management of cloud
computing systems.
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Credentials for Industry Best Practices
CCSP
Deeper,
advanced
experience-based
cloud security knowledge
CCSK
Broad, Foundational, Baseline
Knowledge
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Cloud in the Future
Adoption of cloud-based cybersecurity services
• Entrust a broadening range of critical services to the cloud, including real -time
monitoring and analytics, advanced authentication and identity and access
management
Adoption of DevOps to DevSecOps
• Ensure security controls are applied and implemented as part of development before
operational acceptance.
• The importance of ‘bolted-in’ secure software development for cloud-based
operations
Wide use of SaaS covering any cloud service where consumers are able to access software
applications over the internet anywhere, anytime.
• These applications are hosted in the cloud and can be used for a wide range of tasks
for both individuals and organizations
16
© Copyright 1989 – 2016, (ISC)2 All Rights Reserved
Properly assess the overall security risk
Cloud providers need the expertise to also ensure
their services meet certain security requirements
Understand how cloud is changing information
security best practices
17
Mandate
© Copyright 1996-2015. (ISC)², Inc. All rights reserved.

More Related Content

What's hot

AI for Smart City Innovations with Open Data (tutorial)
AI for Smart City Innovations with Open Data (tutorial)AI for Smart City Innovations with Open Data (tutorial)
AI for Smart City Innovations with Open Data (tutorial)Biplav Srivastava
 
Smart & Secure City Solutions by Rupinder Singh
Smart & Secure City Solutions by Rupinder SinghSmart & Secure City Solutions by Rupinder Singh
Smart & Secure City Solutions by Rupinder SinghIPPAI
 
Singapore Smart Nation Programme. Notes for a weary pedestrian
Singapore Smart Nation Programme. Notes for a weary pedestrianSingapore Smart Nation Programme. Notes for a weary pedestrian
Singapore Smart Nation Programme. Notes for a weary pedestrianYuri Anisimov
 
A Full End-to-End Platform as a Service for Smart City Applications
A Full End-to-End Platform as a Service for SmartCity ApplicationsA Full End-to-End Platform as a Service for SmartCity Applications
A Full End-to-End Platform as a Service for Smart City ApplicationsCharalampos Doukas
 
Big data/Data Mining/IoT/Smart City
Big data/Data Mining/IoT/Smart CityBig data/Data Mining/IoT/Smart City
Big data/Data Mining/IoT/Smart Cityrashed sharif
 
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal SinghSmart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal SinghIPPAI
 
2017 Strategic Directions: Smart City/Smart Utility Report
2017 Strategic Directions: Smart City/Smart Utility Report2017 Strategic Directions: Smart City/Smart Utility Report
2017 Strategic Directions: Smart City/Smart Utility ReportBlack & Veatch
 
REDtone IOT Smart City Solutions - CitiAct and CitiSense
REDtone IOT Smart City Solutions - CitiAct and CitiSenseREDtone IOT Smart City Solutions - CitiAct and CitiSense
REDtone IOT Smart City Solutions - CitiAct and CitiSenseDr. Mazlan Abbas
 
Smart cities global experiences and lessons for india at ASCI Hyderabad 25 ...
Smart cities   global experiences and lessons for india at ASCI Hyderabad 25 ...Smart cities   global experiences and lessons for india at ASCI Hyderabad 25 ...
Smart cities global experiences and lessons for india at ASCI Hyderabad 25 ...Prakash Kumar
 
AI & IoT in the development of smart cities
AI & IoT in the development of smart citiesAI & IoT in the development of smart cities
AI & IoT in the development of smart citiesRaunak Mundada
 
IBM Smarter Cities Case Studies for Singapore
IBM Smarter Cities Case Studies for SingaporeIBM Smarter Cities Case Studies for Singapore
IBM Smarter Cities Case Studies for SingaporeTim Greisinger
 
Big Data & Smart Cities
Big Data & Smart CitiesBig Data & Smart Cities
Big Data & Smart CitiesMoutaz Haddara
 
CommunicAsia2015 Summit Programme (Updated)
CommunicAsia2015 Summit Programme (Updated)CommunicAsia2015 Summit Programme (Updated)
CommunicAsia2015 Summit Programme (Updated)Dr. Mazlan Abbas
 
IoT enabled Smart Mobility: Hype or Reality?
IoT enabled Smart Mobility: Hype or Reality?IoT enabled Smart Mobility: Hype or Reality?
IoT enabled Smart Mobility: Hype or Reality?Srinivasan Ramaswamy
 
Innovating for education in a smart nation
Innovating for education in a smart nationInnovating for education in a smart nation
Innovating for education in a smart nationEducationNC
 
ZTE - smart city solution overview
ZTE - smart city solution overviewZTE - smart city solution overview
ZTE - smart city solution overviewtechUK
 

What's hot (20)

AI for Smart City Innovations with Open Data (tutorial)
AI for Smart City Innovations with Open Data (tutorial)AI for Smart City Innovations with Open Data (tutorial)
AI for Smart City Innovations with Open Data (tutorial)
 
Smart & Secure City Solutions by Rupinder Singh
Smart & Secure City Solutions by Rupinder SinghSmart & Secure City Solutions by Rupinder Singh
Smart & Secure City Solutions by Rupinder Singh
 
Singapore Smart Nation Programme. Notes for a weary pedestrian
Singapore Smart Nation Programme. Notes for a weary pedestrianSingapore Smart Nation Programme. Notes for a weary pedestrian
Singapore Smart Nation Programme. Notes for a weary pedestrian
 
A Full End-to-End Platform as a Service for Smart City Applications
A Full End-to-End Platform as a Service for SmartCity ApplicationsA Full End-to-End Platform as a Service for SmartCity Applications
A Full End-to-End Platform as a Service for Smart City Applications
 
Big data/Data Mining/IoT/Smart City
Big data/Data Mining/IoT/Smart CityBig data/Data Mining/IoT/Smart City
Big data/Data Mining/IoT/Smart City
 
CISCO SMART CITY
CISCO SMART CITYCISCO SMART CITY
CISCO SMART CITY
 
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal SinghSmart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
 
2017 Strategic Directions: Smart City/Smart Utility Report
2017 Strategic Directions: Smart City/Smart Utility Report2017 Strategic Directions: Smart City/Smart Utility Report
2017 Strategic Directions: Smart City/Smart Utility Report
 
Smart City Strategy
Smart City StrategySmart City Strategy
Smart City Strategy
 
REDtone IOT Smart City Solutions - CitiAct and CitiSense
REDtone IOT Smart City Solutions - CitiAct and CitiSenseREDtone IOT Smart City Solutions - CitiAct and CitiSense
REDtone IOT Smart City Solutions - CitiAct and CitiSense
 
Smart cities global experiences and lessons for india at ASCI Hyderabad 25 ...
Smart cities   global experiences and lessons for india at ASCI Hyderabad 25 ...Smart cities   global experiences and lessons for india at ASCI Hyderabad 25 ...
Smart cities global experiences and lessons for india at ASCI Hyderabad 25 ...
 
AI & IoT in the development of smart cities
AI & IoT in the development of smart citiesAI & IoT in the development of smart cities
AI & IoT in the development of smart cities
 
IBM Smarter Cities Case Studies for Singapore
IBM Smarter Cities Case Studies for SingaporeIBM Smarter Cities Case Studies for Singapore
IBM Smarter Cities Case Studies for Singapore
 
Big Data & Smart Cities
Big Data & Smart CitiesBig Data & Smart Cities
Big Data & Smart Cities
 
Smart City India
Smart City IndiaSmart City India
Smart City India
 
CommunicAsia2015 Summit Programme (Updated)
CommunicAsia2015 Summit Programme (Updated)CommunicAsia2015 Summit Programme (Updated)
CommunicAsia2015 Summit Programme (Updated)
 
IoT enabled Smart Mobility: Hype or Reality?
IoT enabled Smart Mobility: Hype or Reality?IoT enabled Smart Mobility: Hype or Reality?
IoT enabled Smart Mobility: Hype or Reality?
 
Innovating for education in a smart nation
Innovating for education in a smart nationInnovating for education in a smart nation
Innovating for education in a smart nation
 
IOT in SMART Cities
IOT in SMART CitiesIOT in SMART Cities
IOT in SMART Cities
 
ZTE - smart city solution overview
ZTE - smart city solution overviewZTE - smart city solution overview
ZTE - smart city solution overview
 

Viewers also liked

Smart health healthcare cost projection
Smart health healthcare cost projectionSmart health healthcare cost projection
Smart health healthcare cost projectionNUS-ISS
 
NUS-ISS Learning Day 2016 - What Other IT Management Skills Should IT Project...
NUS-ISS Learning Day 2016 - What Other IT Management Skills Should IT Project...NUS-ISS Learning Day 2016 - What Other IT Management Skills Should IT Project...
NUS-ISS Learning Day 2016 - What Other IT Management Skills Should IT Project...NUS-ISS
 
NUS-ISS Learning Day 2016 - Improve IT Project Management and other IT Proces...
NUS-ISS Learning Day 2016 - Improve IT Project Management and other IT Proces...NUS-ISS Learning Day 2016 - Improve IT Project Management and other IT Proces...
NUS-ISS Learning Day 2016 - Improve IT Project Management and other IT Proces...NUS-ISS
 
Why ITSM Needs Lean IT
Why ITSM Needs Lean ITWhy ITSM Needs Lean IT
Why ITSM Needs Lean ITNUS-ISS
 
Health Analytics
Health AnalyticsHealth Analytics
Health AnalyticsNUS-ISS
 
5th Agile CoP Forum Agile Transformation Journey in IBM
5th Agile CoP Forum   Agile Transformation Journey in IBM5th Agile CoP Forum   Agile Transformation Journey in IBM
5th Agile CoP Forum Agile Transformation Journey in IBMNUS-ISS
 
Implementing ISO20000
Implementing ISO20000Implementing ISO20000
Implementing ISO20000NUS-ISS
 
Bhubaneswar Smart City winning plan
Bhubaneswar Smart City winning planBhubaneswar Smart City winning plan
Bhubaneswar Smart City winning planShailesh PATHAK
 
Smart Cities are the Internet of Things
Smart Cities are the Internet of ThingsSmart Cities are the Internet of Things
Smart Cities are the Internet of Thingszdshelby
 
Internet of Things for Smart Cities
Internet of Things for Smart CitiesInternet of Things for Smart Cities
Internet of Things for Smart CitiesMphasis
 
Iot for smart city
Iot for smart cityIot for smart city
Iot for smart citysanalkumar k
 
Geospatial analytics data science sg meetup
Geospatial analytics   data science sg meetupGeospatial analytics   data science sg meetup
Geospatial analytics data science sg meetupNUS-ISS
 
Smart City 44 use cases for IP video
Smart City 44 use cases for IP videoSmart City 44 use cases for IP video
Smart City 44 use cases for IP videoAxis Communications
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart CityDr. Mazlan Abbas
 

Viewers also liked (20)

Smart health healthcare cost projection
Smart health healthcare cost projectionSmart health healthcare cost projection
Smart health healthcare cost projection
 
NUS-ISS Learning Day 2016 - What Other IT Management Skills Should IT Project...
NUS-ISS Learning Day 2016 - What Other IT Management Skills Should IT Project...NUS-ISS Learning Day 2016 - What Other IT Management Skills Should IT Project...
NUS-ISS Learning Day 2016 - What Other IT Management Skills Should IT Project...
 
NUS-ISS Learning Day 2016 - Improve IT Project Management and other IT Proces...
NUS-ISS Learning Day 2016 - Improve IT Project Management and other IT Proces...NUS-ISS Learning Day 2016 - Improve IT Project Management and other IT Proces...
NUS-ISS Learning Day 2016 - Improve IT Project Management and other IT Proces...
 
Why ITSM Needs Lean IT
Why ITSM Needs Lean ITWhy ITSM Needs Lean IT
Why ITSM Needs Lean IT
 
Health Analytics
Health AnalyticsHealth Analytics
Health Analytics
 
5th Agile CoP Forum Agile Transformation Journey in IBM
5th Agile CoP Forum   Agile Transformation Journey in IBM5th Agile CoP Forum   Agile Transformation Journey in IBM
5th Agile CoP Forum Agile Transformation Journey in IBM
 
How safe is your city?
How safe is your city?How safe is your city?
How safe is your city?
 
Implementing ISO20000
Implementing ISO20000Implementing ISO20000
Implementing ISO20000
 
Bhubaneswar Smart City winning plan
Bhubaneswar Smart City winning planBhubaneswar Smart City winning plan
Bhubaneswar Smart City winning plan
 
IOT for Smart City
IOT for Smart CityIOT for Smart City
IOT for Smart City
 
Smart Cities are the Internet of Things
Smart Cities are the Internet of ThingsSmart Cities are the Internet of Things
Smart Cities are the Internet of Things
 
Internet of Things for Smart Cities
Internet of Things for Smart CitiesInternet of Things for Smart Cities
Internet of Things for Smart Cities
 
Iot for smart city
Iot for smart cityIot for smart city
Iot for smart city
 
Geospatial analytics data science sg meetup
Geospatial analytics   data science sg meetupGeospatial analytics   data science sg meetup
Geospatial analytics data science sg meetup
 
Smart City 44 use cases for IP video
Smart City 44 use cases for IP videoSmart City 44 use cases for IP video
Smart City 44 use cases for IP video
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
Smart city
Smart citySmart city
Smart city
 
PPT on SMART city
PPT on SMART cityPPT on SMART city
PPT on SMART city
 
Smart city presentation
Smart city presentationSmart city presentation
Smart city presentation
 

Similar to Security in Smart City Implementation: Infrastructure and People

Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case StudyAngie Miller
 
Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!
Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!
Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!TechWell
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Jenny Jenish kyzy
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
 
Cloud Asia Day 1 11.20 -11.40 Toru Nakamura
Cloud Asia Day 1 11.20 -11.40 Toru NakamuraCloud Asia Day 1 11.20 -11.40 Toru Nakamura
Cloud Asia Day 1 11.20 -11.40 Toru NakamuraCloudExpoAsia
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuNixu Corporation
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyCarlos Chalico
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMHector Del Castillo, CPM, CPMM
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...IRJET Journal
 
IBC-Feb-2020-1.pptx
IBC-Feb-2020-1.pptxIBC-Feb-2020-1.pptx
IBC-Feb-2020-1.pptxRuchi Gandhi
 

Similar to Security in Smart City Implementation: Infrastructure and People (20)

Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
Cloud security and adoption
Cloud security and adoptionCloud security and adoption
Cloud security and adoption
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 
Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!
Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!
Testing the Next Generation of Technologies: IoT, Mobile, and Cloud … Oh My!
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
Cloud Asia Day 1 11.20 -11.40 Toru Nakamura
Cloud Asia Day 1 11.20 -11.40 Toru NakamuraCloud Asia Day 1 11.20 -11.40 Toru Nakamura
Cloud Asia Day 1 11.20 -11.40 Toru Nakamura
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the sky
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
 
IBC-Feb-2020-1.pptx
IBC-Feb-2020-1.pptxIBC-Feb-2020-1.pptx
IBC-Feb-2020-1.pptx
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 

More from NUS-ISS

Designing Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee KheeDesigning Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee KheeNUS-ISS
 
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...NUS-ISS
 
How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...NUS-ISS
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationNUS-ISS
 
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...NUS-ISS
 
Understanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohNUS-ISS
 
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeNUS-ISS
 
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...NUS-ISS
 
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...NUS-ISS
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnNUS-ISS
 
Future of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfNUS-ISS
 
Future of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan MengNUS-ISS
 
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7NUS-ISS
 
Product Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud ServiceProduct Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud ServiceNUS-ISS
 
Overview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and FoundationsOverview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and FoundationsNUS-ISS
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive AnalyticsNUS-ISS
 
Feature Engineering for IoT
Feature Engineering for IoTFeature Engineering for IoT
Feature Engineering for IoTNUS-ISS
 
Master of Technology in Software Engineering
Master of Technology in Software EngineeringMaster of Technology in Software Engineering
Master of Technology in Software EngineeringNUS-ISS
 
Master of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business AnalyticsMaster of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business AnalyticsNUS-ISS
 
Diagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System ArchetypesDiagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System ArchetypesNUS-ISS
 

More from NUS-ISS (20)

Designing Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee KheeDesigning Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee Khee
 
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
 
How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
 
Understanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
 
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
 
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
 
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
 
Future of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
 
Future of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan Meng
 
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
 
Product Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud ServiceProduct Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud Service
 
Overview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and FoundationsOverview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and Foundations
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive Analytics
 
Feature Engineering for IoT
Feature Engineering for IoTFeature Engineering for IoT
Feature Engineering for IoT
 
Master of Technology in Software Engineering
Master of Technology in Software EngineeringMaster of Technology in Software Engineering
Master of Technology in Software Engineering
 
Master of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business AnalyticsMaster of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business Analytics
 
Diagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System ArchetypesDiagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System Archetypes
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Security in Smart City Implementation: Infrastructure and People

  • 1. Security in Smart City Implementation: Infrastructure and People David Shearer (ISC)2 Chief Executive Officer dshearer@isc2.org | www.isc2.org
  • 2. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Stakeholders Involved in Shaping a City 2 Political Leaders, Managers and Operators of the Local Government The Service Operators – public or private: Communication, Electricity, Education, Transport, Water, Waste, etc. Investors: Private Banks, Venture Capitalists, Pension Funds, International Banks Solution Providers: Technology Providers, Financiers and Investors End users and ‘Prosumers’: Inhabitants and Local Business Representatives Source: International Electrotechnical Commission- Orchestrating infrastructure for Sustainable Smart Cities
  • 3. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Operating Systems for City Infrastructure » Smart cities are enabled by recent advances in key technologies: • Pervasive sensor networks • Low-cost communications • Software-as-a-Service » Pain points are awaiting to be solved… 3 Source: International Electrotechnical Commission- Orchestrating infrastructure for sustainable Smart Cities
  • 4. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Importance of Standards in Smart City » Cloud is a crucial part of any smart city » Web-services over cloud » A portal server can allow for the creation of unified, even if personalized, user interfaces, taking into account individual settings such as language » Who is managing the ‘Portal’ & the web service? 4 One portal server structure, integrating systems using standards from IEC, ISO, JTC1, ITU-T Source: InternationalElectrotechnicalCommission- Orchestratinginfrastructurefor sustainable Smart Cities
  • 5. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Cloud in a Smart City • Awareness: Understanding current cloud usage within an organization and/or a city • Opportunism: Identifying strong cloud adoption opportunities ( From ‘Cloud First’ to ‘Cloud-First Security-Now’ Policy) • Strategy: Building cloud adoption program - architecture, frameworks, business alignment and IT skill sets • Capacity Building: Assessment of own enterprises’ needs for capacity building and training in cloud computing-related areas 5
  • 6. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved (ISC)² Global Information Security Workforce Study https://www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/GISWS/FrostSullivan-(ISC)%C2%B2-Global-Information-Security-Workforce-Study-2015.pdf
  • 7. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Not a Question of if, But How Much 7 Source: 2015 (ISC)² Global InformationSecurity Workforce Study – A Frost and Sullivan Market Study Most respondents made cloud a priority for their organizations and continue to do so over the next two years.
  • 8. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Prevalence of Cloud Models: SaaS, PaaS, IaaS 8 Source: 2015 (ISC)² GlobalInformation Security Workforce Study – A Frost and Sullivan Market Study 44 24 32 39 26 35 42 24 3534 26 4041 27 33 40 28 32 39 25 36 38 28 33 0 5 10 15 20 25 30 35 40 45 50 Software as a service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Worldwide APAC Australia Hong Kong India Japan Singapore South Korea In%
  • 9. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Cloud Adoption Barriers 9 Source: 2015 Cloud Security SpotlightReport Security is still the biggest perceived barrier to further cloud adoption. Nine out of ten organizations are very or moderately concerned about public cloud security.
  • 10. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Security Concerns in Public Clouds 10 Source: 2015 Cloud Security SpotlightReport
  • 11. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved CSA “Notorious 9 Security Threats” 73% 61% 59% 57% 56% 56% 55% 77% 69% 68% 62% 62% 65% 61% 78% 67% 68% 67% 63% 55% 59% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Data loss Account Hijacking Malicious Insiders Insufficient Due Diligence Insecure APIs Denial of Service Abuse and Nefarious Use Worldwide APAC Singapore 11 Source: 2015 (ISC)² GlobalInformation Security Workforce Study – A Frost and Sullivan Market Study
  • 12. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Elevating Cloud Assurance 12 Strong data encryption is the top overall choice for elevating cloud information assurance among APAC countries. Singapore respondents see adopting security governance as a way of elevating information assurance in the cloud. 18% 11% 9% 7% 6% 6% 16% 10% 7% 8% 7% 8% 14% 9% 4% 11% 5% 6% 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 20% Strong encryption of data Continuous monitoring Incorporating security into software design and implementation Adopting security governance Implementing identity based network solutions Employ Role Based Access Controls (RBAC) Worldwide APAC Singapore Source: 2015 (ISC)² GlobalInformation Security Workforce Study – A Frost and Sullivan Market Study
  • 13. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Demand for Training and Education In most areas in the APAC region including Singapore, cloud computing is the area requiring the most training and education, however in Australia, training in BYOD and incident response ranked a close second. Base: Filtered respondents (n=7,985). 0% 10% 20% 30% 40% 50% 60% 70% Cloud computing Bring-your- own-device (BYOD) Incidence response Informationrisk management Mobiledevice management Forensics Applications andsystem development security Accesscontrol systemsand methodology End-user security awareness Security management Security architecture andmodels Worldwide APAC Australia Hong Kong India Japan Singapore South Korea
  • 14. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Industry Needs… • Professionals who understand and can apply effective security measures to cloud environments • A reliable indicator of overall competency in cloud security • Roadmap and career path into cloud security • Common global understanding of professional knowledge and best practices in the design, implementation and management of cloud computing systems.
  • 15. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Credentials for Industry Best Practices CCSP Deeper, advanced experience-based cloud security knowledge CCSK Broad, Foundational, Baseline Knowledge
  • 16. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Cloud in the Future Adoption of cloud-based cybersecurity services • Entrust a broadening range of critical services to the cloud, including real -time monitoring and analytics, advanced authentication and identity and access management Adoption of DevOps to DevSecOps • Ensure security controls are applied and implemented as part of development before operational acceptance. • The importance of ‘bolted-in’ secure software development for cloud-based operations Wide use of SaaS covering any cloud service where consumers are able to access software applications over the internet anywhere, anytime. • These applications are hosted in the cloud and can be used for a wide range of tasks for both individuals and organizations 16
  • 17. © Copyright 1989 – 2016, (ISC)2 All Rights Reserved Properly assess the overall security risk Cloud providers need the expertise to also ensure their services meet certain security requirements Understand how cloud is changing information security best practices 17 Mandate
  • 18. © Copyright 1996-2015. (ISC)², Inc. All rights reserved.