SlideShare a Scribd company logo
Issues and Challenges Facing
Municipalities in Data Security
Owen Key
Chief Security Officer
City of Calgary
Oct 27, 2016 Cyber Summit 2016 2
City of Calgary - Corporate Security
Protection of assets
Assist other City of Calgary Business Units in providing public safety
initiatives
Promote organizational resilience through collaborative partnerships
which enable and enhance services provided by The City
Approach is to develop and implement innovative approaches in all
areas of security and risk management.
Oct 27, 2016 Cyber Summit 2016 3
Corporate
Security
Physical
Security
Technical
Operations
Information
Security
Security
Advisory
Investigations
§  City of Calgary has over 500 lines of
business and provides services that
range from recreation to transit to
police
§  Complex environment with numerous
touch points, integration with
business partners and third party or
arms length organizations
§  All services are dependant on IT
infrastructure being highly available
§  Duty to safeguard critical
infrastructure to ensure City services
continue
Oct 27, 2016 Cyber Summit 2016 4
City at a Glance
Stakeholders
11/1/16 Data Breaches: Causes, Prevention and Containment 5
Calgary
CITIZENS
MAYOR AND
COUNCIL
CITY
MANAGER
AND SENIOR
LEADERSHIP
PARTNER
ORGANIZATION
S
DEPARTMENTS
AND BUSINESS
UNITS
CITY AUDITOR
Integration
Oct 27, 2016 Cyber Summit 2016 6
Oct 27, 2016 Cyber Summit 2016 7
•  Speed and rate of data creation is
increasing rapidlyData Velocity
•  City has multiple discreet data sets in
both structured and unstructured
storage
Data Variety
•  Volume of information is explodingData Volume
Risk Based Approach to Security
11/1/16 Presentation 8
Risk Evaluation
Risk
Response
Risk
Governance
Moving Forward – Laying the Foundations
20/09/2016 Data Breaches: Causes, Prevention and Containment 9
Building up the physical and operational security
showed the value of investing in security
Next layer was to build
a fully integrated
security program
which included cyber
and information
security
Implementation – Driving Factors
11/1/16 Presentation 10
Increasingly mobile workforce
Increasing security awareness in key
decision makers
Lack of visibility into our systems
Risk Based approach to business
comes into play
Increasingly interconnected
Increasing public awareness of
Cyber incidents
Increase in Cyber incidents
Calgary experiences large natural
Disaster
Internal Factors External Factors
Need for
Cyber
Security
Program
Security through Design
Oct 27, 2016 Cyber Summit 2016 11
§  Increased investment in information security
tools have provided additional layers of defense
to reduce risk
§  Building security into project design and
ensuring safe integration is key to protect data
and infrastructure
§  Investment in enterprise solutions to provide
additional alerting, reporting and security
protection
Connected Devices
Oct 27, 2016
Cyber Summit 2016 12
City of Calgary - CCTV at a Glance
Oct 27, 2016 Cyber Summit 2016 13
Ø  The City of Calgary through Corporate Security,
Calgary Transit, Roads and Calgary Parking Authority
has deployed approximately 3,000 cameras.
Ø  Cameras are deployed based on what’s required to
ensure the safety and security of the public,
employees, information, sites and assets.
Ø  Regular risk assessments and security audits are
completed on all existing and new City of Calgary
facilities
Oct 27, 2016 Cyber Summit 2016 14
CS
Secure
Storage
Analytics
Calgary
Data
City Network Infrastructure
Corporate Security CCTV Network
DATA
EXCHANGE
RECORDED
VIDEO
City
Business
Units
LIVE
VIDEO
DATA
EXCHANGE
Camera’s as a Sensor
Oct 27, 2016 Cyber Summit 2016 15
§  Cameras are primarily used by The City as
a sensor. They collect video images and
meta data which can be used to enhance
the ability of the recipient to provide
effective assessment and response.
§  The use of a single or limited number of
devices to capture varying data streams
useful to more than one user
§  Sensors as a Service and Common Mode Cameras together allow for
ability to tie in additional data capture points.
Freedom of Information
Oct 27, 2016 Cyber Summit 2016 16
Ø  “Personal Information” is defined in section 1(n) of the FOIP Act as
recorded information about an identifiable individual, including: the
individual’s race, colour, national or ethnic origin; the individual’s age or
sex; the individual’s inheritable characteristics; information about an
individual’s physical or mental disability; and any other identifiable
characteristics listed in that section.
Ø  “Surveillance System” refers to a mechanical or electronic system or
device that enables continuous or periodic video recording, observing or
monitoring of personal information about individuals in open, public
spaces (including streets, highways, parks), public buildings (including
provincial and local government buildings, libraries, health care facilities,
public housing and educational institutions) or public transportation,
including school and municipal transit buses or other similar vehicles.
§  Authority to use CCTV is granted under
S. 33 of the Freedom of Information and
Protection of Privacy Act
§  Careful consideration is always given to
balance both the privacy of individuals
and ensure personal and public safety
§  Corporate Security continue to meet the
requirements for collecting video under
the Freedom of Information & Protection
of Privacy Act. This includes, providing
a business case for gathering video,
alerting citizens that they are being
recorded and protecting the video.
Oct 27, 2016 Cyber Summit 2016 17
Authority to Collect
Monitoring
Oct 27, 2016 Cyber Summit 2016 18
§  Corporate Security utilizes an
enterprise video management system
to monitor cameras from its Integrated
Security Centre.
§  System provides efficiencies and
effectiveness in monitoring and
response.
§  Reduces the number of ad-hoc
standalone systems that require
manual and onsite review.
§  In order to remotely monitor cameras via the network, streaming is
performed at a lower frame rate and definition than what is recorded at
the edge level.
Security of Data
Oct 27, 2016 Cyber Summit 2016 19
§  City of Calgary Corporate Security
employees are the only persons to have
administrative rights to the DVRs and
NVRs and are responsible for providing
DVDs (read only media and watermarked)
to the Law Department or Calgary Police
Service as directed.
§  Information is stored at the location of the
NVR and is under lock and key.
§  Information is only collected if movement
is detected within the area (incident
based).
§  Audit Logs
Storage and Retention of Video
Oct 27, 2016 Cyber Summit 2016 20
§  Data retention policies are crucial for managing the increase in storage
cost/ Requirements.
§  City retention policy for all video is 14 days or 31 days
§  Storage surplus required for proper function and allowance for
“protecting” video for investigative purposes (25% or more is ideal).
§  Most City of Calgary sites use distributed, edge level recording
1.  Bandwidth – The required bandwidth for recording high quality imagery either
exceeds the limitations of the network in remote locations or seriously affects quality
of service for users at the remote site.
2.  Autonomy– In the event of failure of the network, edge level recorders continue to
record.
Oct 27, 2016 Cyber Summit 2016 21
Calgary Recreation (Facility Security)
Roads Department
(Traffic Monitoring)
Calgary Parking Authority (parking usage)
Calgary Transit
(BRT, bus performance)
Calgary Police Service
(LPR, incident investigation)
Water
(flood, water level monitoring)
Internal Clients External Clients
Roads Department
(Traffic Monitoring)
University of Calgary
(Utilizes traffic data for research projects)
Data aggregation and correlation
Oct 27, 2016 Cyber Summit 2016 22
Sensor
Data
•  Water Sensors
•  CCTV
•  Traffic sensors
•  Access control
•  Public/ smart lighting
•  WiFi
•  Geolocation data
•  Traffic control/
intersection camera
feeds
Service
Based Data
•  Transactional Data
(PoS)
•  Registration/ facility
use
•  Land use
•  Tax Information
•  Permit and
Development
•  Parking
Striking the Balance
11/1/16 Presentation 23
Openness Protection
Secure personal
and critical data
Large public facing
presence
Must Remain
Operational
Accessible
Information
Routine Disclosure
Obligations
Open Data
Initiatives
Oct 27, 2016
Presentation
24
Security
Privacy
Oct 27, 2016 Cyber Summit 2016 25
Questions

More Related Content

Viewers also liked

Telecommunications 2016: The Challenges Facing Local Government
Telecommunications 2016: The Challenges Facing Local Government Telecommunications 2016: The Challenges Facing Local Government
Telecommunications 2016: The Challenges Facing Local Government
Best Best and Krieger LLP
 
Telecom sector in india
Telecom sector in indiaTelecom sector in india
Telecom sector in india
Akash Rangari
 
Telecom sector in india
Telecom sector in indiaTelecom sector in india
Telecom sector in india
Rohan Nagpal
 
Fiji water. david soriano mc guinness
Fiji water. david soriano mc guinnessFiji water. david soriano mc guinness
Fiji water. david soriano mc guinness
David Mc Guinness
 
Telecom Sector in India
Telecom Sector in IndiaTelecom Sector in India
Telecom Sector in India
Sandeep Sreenivasa
 
telecommunication-ppt
telecommunication-ppttelecommunication-ppt
telecommunication-pptsecomps
 

Viewers also liked (8)

Telecommunications 2016: The Challenges Facing Local Government
Telecommunications 2016: The Challenges Facing Local Government Telecommunications 2016: The Challenges Facing Local Government
Telecommunications 2016: The Challenges Facing Local Government
 
Telecom sector in india
Telecom sector in indiaTelecom sector in india
Telecom sector in india
 
Telecom sector in india
Telecom sector in indiaTelecom sector in india
Telecom sector in india
 
Telecom sector in india
Telecom sector in indiaTelecom sector in india
Telecom sector in india
 
Fiji water. david soriano mc guinness
Fiji water. david soriano mc guinnessFiji water. david soriano mc guinness
Fiji water. david soriano mc guinness
 
Telecom Sector in India
Telecom Sector in IndiaTelecom Sector in India
Telecom Sector in India
 
Telecom ppt
Telecom pptTelecom ppt
Telecom ppt
 
telecommunication-ppt
telecommunication-ppttelecommunication-ppt
telecommunication-ppt
 

Similar to Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data

Connected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxConnected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptx
brigel529
 
Case studies Safe Cities
Case studies Safe CitiesCase studies Safe Cities
Case studies Safe Cities
Axis Communications
 
I80 Smart Corridor Project
I80 Smart Corridor ProjectI80 Smart Corridor Project
I80 Smart Corridor Project
Mahesh Mahajan
 
IoT in Public Sector
IoT in Public Sector IoT in Public Sector
IoT in Public Sector Bessie Wang
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Santosh Khadsare
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
Adlan Hussain
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
Shreyas Satpute
 
Public safety interoperability: an international perspective
Public safety interoperability: an international perspectivePublic safety interoperability: an international perspective
Public safety interoperability: an international perspective
Comms Connect
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
GAURAV. H .TANDON
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation Sector
European Services Institute
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case Studies
Connected Futures
 
Dilip Hanumara - Enhancing Quality of Living with Smart Cities.pptx
Dilip Hanumara - Enhancing Quality of Living with Smart Cities.pptxDilip Hanumara - Enhancing Quality of Living with Smart Cities.pptx
Dilip Hanumara - Enhancing Quality of Living with Smart Cities.pptx
FIWARE
 
Cybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionCybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & Construction
Aronson LLC
 
ITS development in Kajang city
ITS development in Kajang cityITS development in Kajang city
ITS development in Kajang city
engrasha
 
fINAL SMART CITYseamless communication and collaboration between citizens and...
fINAL SMART CITYseamless communication and collaboration between citizens and...fINAL SMART CITYseamless communication and collaboration between citizens and...
fINAL SMART CITYseamless communication and collaboration between citizens and...
sol zem
 
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS PresentationSolent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
Nine23Ltd
 
RSITS: Road safety Intelligent Transport System in Deep Federated Learning As...
RSITS: Road safety Intelligent Transport System in Deep Federated Learning As...RSITS: Road safety Intelligent Transport System in Deep Federated Learning As...
RSITS: Road safety Intelligent Transport System in Deep Federated Learning As...
Abdullah Raza
 
Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoring
ijtsrd
 
Cisco connect winnipeg 2018 unlocking business value with network programma...
Cisco connect winnipeg 2018   unlocking business value with network programma...Cisco connect winnipeg 2018   unlocking business value with network programma...
Cisco connect winnipeg 2018 unlocking business value with network programma...
Cisco Canada
 

Similar to Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data (20)

Connected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxConnected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptx
 
Case studies Safe Cities
Case studies Safe CitiesCase studies Safe Cities
Case studies Safe Cities
 
I80 Smart Corridor Project
I80 Smart Corridor ProjectI80 Smart Corridor Project
I80 Smart Corridor Project
 
IoT in Public Sector
IoT in Public Sector IoT in Public Sector
IoT in Public Sector
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Public safety interoperability: an international perspective
Public safety interoperability: an international perspectivePublic safety interoperability: an international perspective
Public safety interoperability: an international perspective
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation Sector
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case Studies
 
Dilip Hanumara - Enhancing Quality of Living with Smart Cities.pptx
Dilip Hanumara - Enhancing Quality of Living with Smart Cities.pptxDilip Hanumara - Enhancing Quality of Living with Smart Cities.pptx
Dilip Hanumara - Enhancing Quality of Living with Smart Cities.pptx
 
Cybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionCybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & Construction
 
ITS development in Kajang city
ITS development in Kajang cityITS development in Kajang city
ITS development in Kajang city
 
SEA Newsletter Spring 2014
SEA Newsletter Spring 2014SEA Newsletter Spring 2014
SEA Newsletter Spring 2014
 
fINAL SMART CITYseamless communication and collaboration between citizens and...
fINAL SMART CITYseamless communication and collaboration between citizens and...fINAL SMART CITYseamless communication and collaboration between citizens and...
fINAL SMART CITYseamless communication and collaboration between citizens and...
 
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS PresentationSolent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
 
RSITS: Road safety Intelligent Transport System in Deep Federated Learning As...
RSITS: Road safety Intelligent Transport System in Deep Federated Learning As...RSITS: Road safety Intelligent Transport System in Deep Federated Learning As...
RSITS: Road safety Intelligent Transport System in Deep Federated Learning As...
 
Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoring
 
Cisco connect winnipeg 2018 unlocking business value with network programma...
Cisco connect winnipeg 2018   unlocking business value with network programma...Cisco connect winnipeg 2018   unlocking business value with network programma...
Cisco connect winnipeg 2018 unlocking business value with network programma...
 

More from Cybera Inc.

Cyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and DemocracyCyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and Democracy
Cybera Inc.
 
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cybera Inc.
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cybera Inc.
 
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cybera Inc.
 
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cybera Inc.
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cybera Inc.
 
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cybera Inc.
 
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cybera Inc.
 
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cybera Inc.
 
Privacy, Security & Access to Data
Privacy, Security & Access to DataPrivacy, Security & Access to Data
Privacy, Security & Access to Data
Cybera Inc.
 
Do Universities Dream of Big Data
Do Universities Dream of Big DataDo Universities Dream of Big Data
Do Universities Dream of Big Data
Cybera Inc.
 
Predicting the Future With Microsoft Bing
Predicting the Future With Microsoft BingPredicting the Future With Microsoft Bing
Predicting the Future With Microsoft Bing
Cybera Inc.
 
Analytics 101: How to not fail at analytics
Analytics 101: How to not fail at analyticsAnalytics 101: How to not fail at analytics
Analytics 101: How to not fail at analytics
Cybera Inc.
 
Are MOOC's past their peak?
Are MOOC's past their peak?Are MOOC's past their peak?
Are MOOC's past their peak?
Cybera Inc.
 
Opening the doors of the laboratory
Opening the doors of the laboratoryOpening the doors of the laboratory
Opening the doors of the laboratory
Cybera Inc.
 
Open City - Edmonton
Open City - EdmontonOpen City - Edmonton
Open City - Edmonton
Cybera Inc.
 
Unlocking the power of healthcare data
Unlocking the power of healthcare dataUnlocking the power of healthcare data
Unlocking the power of healthcare data
Cybera Inc.
 
Checking in on Healthcare Data Analytics
Checking in on Healthcare Data AnalyticsChecking in on Healthcare Data Analytics
Checking in on Healthcare Data Analytics
Cybera Inc.
 
Open access and open data: international trends and strategic context
Open access and open data: international trends and strategic contextOpen access and open data: international trends and strategic context
Open access and open data: international trends and strategic context
Cybera Inc.
 
I didn't know i was a geomatics company
I didn't know i was a geomatics companyI didn't know i was a geomatics company
I didn't know i was a geomatics company
Cybera Inc.
 

More from Cybera Inc. (20)

Cyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and DemocracyCyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and Democracy
 
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
 
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
 
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
 
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
 
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
 
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
 
Privacy, Security & Access to Data
Privacy, Security & Access to DataPrivacy, Security & Access to Data
Privacy, Security & Access to Data
 
Do Universities Dream of Big Data
Do Universities Dream of Big DataDo Universities Dream of Big Data
Do Universities Dream of Big Data
 
Predicting the Future With Microsoft Bing
Predicting the Future With Microsoft BingPredicting the Future With Microsoft Bing
Predicting the Future With Microsoft Bing
 
Analytics 101: How to not fail at analytics
Analytics 101: How to not fail at analyticsAnalytics 101: How to not fail at analytics
Analytics 101: How to not fail at analytics
 
Are MOOC's past their peak?
Are MOOC's past their peak?Are MOOC's past their peak?
Are MOOC's past their peak?
 
Opening the doors of the laboratory
Opening the doors of the laboratoryOpening the doors of the laboratory
Opening the doors of the laboratory
 
Open City - Edmonton
Open City - EdmontonOpen City - Edmonton
Open City - Edmonton
 
Unlocking the power of healthcare data
Unlocking the power of healthcare dataUnlocking the power of healthcare data
Unlocking the power of healthcare data
 
Checking in on Healthcare Data Analytics
Checking in on Healthcare Data AnalyticsChecking in on Healthcare Data Analytics
Checking in on Healthcare Data Analytics
 
Open access and open data: international trends and strategic context
Open access and open data: international trends and strategic contextOpen access and open data: international trends and strategic context
Open access and open data: international trends and strategic context
 
I didn't know i was a geomatics company
I didn't know i was a geomatics companyI didn't know i was a geomatics company
I didn't know i was a geomatics company
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data

  • 1. Issues and Challenges Facing Municipalities in Data Security Owen Key Chief Security Officer City of Calgary
  • 2. Oct 27, 2016 Cyber Summit 2016 2 City of Calgary - Corporate Security Protection of assets Assist other City of Calgary Business Units in providing public safety initiatives Promote organizational resilience through collaborative partnerships which enable and enhance services provided by The City Approach is to develop and implement innovative approaches in all areas of security and risk management.
  • 3. Oct 27, 2016 Cyber Summit 2016 3 Corporate Security Physical Security Technical Operations Information Security Security Advisory Investigations
  • 4. §  City of Calgary has over 500 lines of business and provides services that range from recreation to transit to police §  Complex environment with numerous touch points, integration with business partners and third party or arms length organizations §  All services are dependant on IT infrastructure being highly available §  Duty to safeguard critical infrastructure to ensure City services continue Oct 27, 2016 Cyber Summit 2016 4 City at a Glance
  • 5. Stakeholders 11/1/16 Data Breaches: Causes, Prevention and Containment 5 Calgary CITIZENS MAYOR AND COUNCIL CITY MANAGER AND SENIOR LEADERSHIP PARTNER ORGANIZATION S DEPARTMENTS AND BUSINESS UNITS CITY AUDITOR
  • 6. Integration Oct 27, 2016 Cyber Summit 2016 6
  • 7. Oct 27, 2016 Cyber Summit 2016 7 •  Speed and rate of data creation is increasing rapidlyData Velocity •  City has multiple discreet data sets in both structured and unstructured storage Data Variety •  Volume of information is explodingData Volume
  • 8. Risk Based Approach to Security 11/1/16 Presentation 8 Risk Evaluation Risk Response Risk Governance
  • 9. Moving Forward – Laying the Foundations 20/09/2016 Data Breaches: Causes, Prevention and Containment 9 Building up the physical and operational security showed the value of investing in security Next layer was to build a fully integrated security program which included cyber and information security
  • 10. Implementation – Driving Factors 11/1/16 Presentation 10 Increasingly mobile workforce Increasing security awareness in key decision makers Lack of visibility into our systems Risk Based approach to business comes into play Increasingly interconnected Increasing public awareness of Cyber incidents Increase in Cyber incidents Calgary experiences large natural Disaster Internal Factors External Factors Need for Cyber Security Program
  • 11. Security through Design Oct 27, 2016 Cyber Summit 2016 11 §  Increased investment in information security tools have provided additional layers of defense to reduce risk §  Building security into project design and ensuring safe integration is key to protect data and infrastructure §  Investment in enterprise solutions to provide additional alerting, reporting and security protection
  • 12. Connected Devices Oct 27, 2016 Cyber Summit 2016 12
  • 13. City of Calgary - CCTV at a Glance Oct 27, 2016 Cyber Summit 2016 13 Ø  The City of Calgary through Corporate Security, Calgary Transit, Roads and Calgary Parking Authority has deployed approximately 3,000 cameras. Ø  Cameras are deployed based on what’s required to ensure the safety and security of the public, employees, information, sites and assets. Ø  Regular risk assessments and security audits are completed on all existing and new City of Calgary facilities
  • 14. Oct 27, 2016 Cyber Summit 2016 14 CS Secure Storage Analytics Calgary Data City Network Infrastructure Corporate Security CCTV Network DATA EXCHANGE RECORDED VIDEO City Business Units LIVE VIDEO DATA EXCHANGE
  • 15. Camera’s as a Sensor Oct 27, 2016 Cyber Summit 2016 15 §  Cameras are primarily used by The City as a sensor. They collect video images and meta data which can be used to enhance the ability of the recipient to provide effective assessment and response. §  The use of a single or limited number of devices to capture varying data streams useful to more than one user §  Sensors as a Service and Common Mode Cameras together allow for ability to tie in additional data capture points.
  • 16. Freedom of Information Oct 27, 2016 Cyber Summit 2016 16 Ø  “Personal Information” is defined in section 1(n) of the FOIP Act as recorded information about an identifiable individual, including: the individual’s race, colour, national or ethnic origin; the individual’s age or sex; the individual’s inheritable characteristics; information about an individual’s physical or mental disability; and any other identifiable characteristics listed in that section. Ø  “Surveillance System” refers to a mechanical or electronic system or device that enables continuous or periodic video recording, observing or monitoring of personal information about individuals in open, public spaces (including streets, highways, parks), public buildings (including provincial and local government buildings, libraries, health care facilities, public housing and educational institutions) or public transportation, including school and municipal transit buses or other similar vehicles.
  • 17. §  Authority to use CCTV is granted under S. 33 of the Freedom of Information and Protection of Privacy Act §  Careful consideration is always given to balance both the privacy of individuals and ensure personal and public safety §  Corporate Security continue to meet the requirements for collecting video under the Freedom of Information & Protection of Privacy Act. This includes, providing a business case for gathering video, alerting citizens that they are being recorded and protecting the video. Oct 27, 2016 Cyber Summit 2016 17 Authority to Collect
  • 18. Monitoring Oct 27, 2016 Cyber Summit 2016 18 §  Corporate Security utilizes an enterprise video management system to monitor cameras from its Integrated Security Centre. §  System provides efficiencies and effectiveness in monitoring and response. §  Reduces the number of ad-hoc standalone systems that require manual and onsite review. §  In order to remotely monitor cameras via the network, streaming is performed at a lower frame rate and definition than what is recorded at the edge level.
  • 19. Security of Data Oct 27, 2016 Cyber Summit 2016 19 §  City of Calgary Corporate Security employees are the only persons to have administrative rights to the DVRs and NVRs and are responsible for providing DVDs (read only media and watermarked) to the Law Department or Calgary Police Service as directed. §  Information is stored at the location of the NVR and is under lock and key. §  Information is only collected if movement is detected within the area (incident based). §  Audit Logs
  • 20. Storage and Retention of Video Oct 27, 2016 Cyber Summit 2016 20 §  Data retention policies are crucial for managing the increase in storage cost/ Requirements. §  City retention policy for all video is 14 days or 31 days §  Storage surplus required for proper function and allowance for “protecting” video for investigative purposes (25% or more is ideal). §  Most City of Calgary sites use distributed, edge level recording 1.  Bandwidth – The required bandwidth for recording high quality imagery either exceeds the limitations of the network in remote locations or seriously affects quality of service for users at the remote site. 2.  Autonomy– In the event of failure of the network, edge level recorders continue to record.
  • 21. Oct 27, 2016 Cyber Summit 2016 21 Calgary Recreation (Facility Security) Roads Department (Traffic Monitoring) Calgary Parking Authority (parking usage) Calgary Transit (BRT, bus performance) Calgary Police Service (LPR, incident investigation) Water (flood, water level monitoring) Internal Clients External Clients Roads Department (Traffic Monitoring) University of Calgary (Utilizes traffic data for research projects)
  • 22. Data aggregation and correlation Oct 27, 2016 Cyber Summit 2016 22 Sensor Data •  Water Sensors •  CCTV •  Traffic sensors •  Access control •  Public/ smart lighting •  WiFi •  Geolocation data •  Traffic control/ intersection camera feeds Service Based Data •  Transactional Data (PoS) •  Registration/ facility use •  Land use •  Tax Information •  Permit and Development •  Parking
  • 23. Striking the Balance 11/1/16 Presentation 23 Openness Protection Secure personal and critical data Large public facing presence Must Remain Operational Accessible Information Routine Disclosure Obligations Open Data Initiatives
  • 25. Oct 27, 2016 Cyber Summit 2016 25 Questions