Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
An initial perspective on the future of privacy by Stephen Deadman, Group Privacy Officer at Vodafone. This is the starting point for the global future agenda discussions taking place through 2015 as part of the the futureagenda2.0 programme. www.futureagenda.org
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
An initial perspective on the future of privacy by Stephen Deadman, Group Privacy Officer at Vodafone. This is the starting point for the global future agenda discussions taking place through 2015 as part of the the futureagenda2.0 programme. www.futureagenda.org
Internet of Everything: A $4.6 Trillion Public-Sector OpportunityJoseph M Bradley
More than perhaps any technological advance since the dawn of the Internet, the Internet of Everything (IoE) — the networked connection of people, process, data, and things — holds tremendous potential for helping public-sector leaders address their many challenges, including the gap separating citizen expectations and what governments are currently delivering.
AI is now an important component of sectors such as healthcare, agriculture, public administration and transportation, and is helping to address major challenges such as ageing and climate change. However, there is currently a lack of transparency in algorithmic governance systems, and this is worsened when these algorithms are integrated into already opaque governance structures in our cities. Moreover, over the past decade, the propagation of sensors and data collection machines in so-called ‘smart cities’ by both the public and the private sectors has created democratic challenges around AI, surveillance capitalism, and protecting citizens’ digital rights to privacy and ownership.
Constant vigilance and insightful analysis are a government’s best defences against crime. Easier said than done. With limited human and digital resources, many cities are beginning to solve crimes, and avoid the conditions that enable them, by tapping into the eyes, ears and phones of their best and most abundant asset: citizens.
Data Provenance is the third of Future Agenda’s ‘World in 2030’ foresights. In our data abundant, interconnected world mutual dependencies are often at the heart of key infrastructure. In this ever-expanding environment, it is vital to ensure that data systems are trusted. This is where data provenance comes in. Knowing the origin of data can help to assess its quality, accuracy and reliability. It also allows us to assess value and ownership and could contribute to the redistribution of profit when data is resold or reused. But does ubiquitous provenance mean that we will never be able to do anything, even remotely privately, ever again? And will the benefits of greater cyber security be an adequate compensation for this?
Drawn from multiple expert discussions around the world, this foresight is one of 50 looking at the key issues for the next decade that are being shared throughout 2020.
https://www.futureagenda.org/foresights/dataprovenance/
https://www.futureagenda.org/the-world-in-2030/
Il World Energy Focus, nuovo mensile online della WEC's community, una e-publication gratuita per essere sempre aggiornato sugli sviluppi del settore energetico. Il World Energy Focus contiene news, interviste esclusive e uno spazio dedicato agli eventi promossi dai singoli Comitati Nazionali.
Ten future global trends impacting the mining industryFuture Agenda
Future of Mining
Technological, social and regulatory change are all have major implications for the world’s mining sector. Ahead of a speech next month in China, this an overview of ten key global future trends that may well have significant impact. Drawn from projects on the future of data, work, land use and automation, this presents ten of the shifts underway and illustrates some of the associated areas of change.
If you have any comments or additions, do let us know and we can include in an updated view coming out later in the year.
Presentazione di Antonio Cordella al seminario "E-Government: Teorie e Pratiche nei Paesi Maturi e in via di Sviluppo"
www.thinkinnovation.org
www.forumpa.it
Vodafone Turkey The world in 2020 - 14 05 15Future Agenda
An upcoming talk for Vodafone at the Digital Transformation Summit takig place in Istanbul, Turkey on 14 May. This gives an overview of Future Agenda, highlights some digital related topics from the first programme, shares some of the data aligned insights emergign from the second programme now underway and also suggests some areas where data could have positive impact in the future
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
globalaviationairospace.com
Cyber security for telecommunications companies
The rewards and risks of the cloud, devices, and data
The fastest growing sources of security incidents, increase over 2013
Security strategies for evolving technologies
Strategic initiatives to improve cybersecurity
Internet of Everything: A $4.6 Trillion Public-Sector OpportunityJoseph M Bradley
More than perhaps any technological advance since the dawn of the Internet, the Internet of Everything (IoE) — the networked connection of people, process, data, and things — holds tremendous potential for helping public-sector leaders address their many challenges, including the gap separating citizen expectations and what governments are currently delivering.
AI is now an important component of sectors such as healthcare, agriculture, public administration and transportation, and is helping to address major challenges such as ageing and climate change. However, there is currently a lack of transparency in algorithmic governance systems, and this is worsened when these algorithms are integrated into already opaque governance structures in our cities. Moreover, over the past decade, the propagation of sensors and data collection machines in so-called ‘smart cities’ by both the public and the private sectors has created democratic challenges around AI, surveillance capitalism, and protecting citizens’ digital rights to privacy and ownership.
Constant vigilance and insightful analysis are a government’s best defences against crime. Easier said than done. With limited human and digital resources, many cities are beginning to solve crimes, and avoid the conditions that enable them, by tapping into the eyes, ears and phones of their best and most abundant asset: citizens.
Data Provenance is the third of Future Agenda’s ‘World in 2030’ foresights. In our data abundant, interconnected world mutual dependencies are often at the heart of key infrastructure. In this ever-expanding environment, it is vital to ensure that data systems are trusted. This is where data provenance comes in. Knowing the origin of data can help to assess its quality, accuracy and reliability. It also allows us to assess value and ownership and could contribute to the redistribution of profit when data is resold or reused. But does ubiquitous provenance mean that we will never be able to do anything, even remotely privately, ever again? And will the benefits of greater cyber security be an adequate compensation for this?
Drawn from multiple expert discussions around the world, this foresight is one of 50 looking at the key issues for the next decade that are being shared throughout 2020.
https://www.futureagenda.org/foresights/dataprovenance/
https://www.futureagenda.org/the-world-in-2030/
Il World Energy Focus, nuovo mensile online della WEC's community, una e-publication gratuita per essere sempre aggiornato sugli sviluppi del settore energetico. Il World Energy Focus contiene news, interviste esclusive e uno spazio dedicato agli eventi promossi dai singoli Comitati Nazionali.
Ten future global trends impacting the mining industryFuture Agenda
Future of Mining
Technological, social and regulatory change are all have major implications for the world’s mining sector. Ahead of a speech next month in China, this an overview of ten key global future trends that may well have significant impact. Drawn from projects on the future of data, work, land use and automation, this presents ten of the shifts underway and illustrates some of the associated areas of change.
If you have any comments or additions, do let us know and we can include in an updated view coming out later in the year.
Presentazione di Antonio Cordella al seminario "E-Government: Teorie e Pratiche nei Paesi Maturi e in via di Sviluppo"
www.thinkinnovation.org
www.forumpa.it
Vodafone Turkey The world in 2020 - 14 05 15Future Agenda
An upcoming talk for Vodafone at the Digital Transformation Summit takig place in Istanbul, Turkey on 14 May. This gives an overview of Future Agenda, highlights some digital related topics from the first programme, shares some of the data aligned insights emergign from the second programme now underway and also suggests some areas where data could have positive impact in the future
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
globalaviationairospace.com
Cyber security for telecommunications companies
The rewards and risks of the cloud, devices, and data
The fastest growing sources of security incidents, increase over 2013
Security strategies for evolving technologies
Strategic initiatives to improve cybersecurity
Cybersecurity, a priority for leaders today. Not only operational and financi...Andrea Mennillo
Today the battlefield for security has expanded into the technological sphere. Every digital process, resource, database or virtual platform is vulnerable to cyberattacks. The problem has global significance.
Bulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docxRAHUL126667
Bulletin
of the
Atomic
Scientists
IT IS 5 MINUTES TO MIDNIGHT
®
Feature
Eyes wide shut: The growing
threat of cyber attacks on
industrial control systems
Joel F. Brenner
Abstract
When industrial control systems are connected to the Internet, they can be vulnerable to cyber attacks. At risk
are energy sources and electric grids, water and sewer systems, manufacturing, banks, transportation and
communication networks, and other systems that may be targeted by hackers, terrorists, or enemy states
seeking to wreak economic havoc. Despite a series of well-publicized cyber attacks in recent years, few
companies have taken the steps necessary to isolate industrial control systems and sensitive information,
and to limit the damage an attack can inflict. Security is not just a matter of dealing with technical issues, which
are fairly straightforward and tactical. The strategic issue is governance: coordinating the efforts of various
departments to ensure that information technology works together with physical security, legal counsel,
human resources, and operations management.
Keywords
cyber attack, cyber security, denial of service, industrial control systems, Maroochy Shire, RasGas, Saudi
Aramco, Stuxnet
T
hirteen years ago, a disgruntled
sewer system operator in Maroochy
Shire, Australia, filled his car with a
laptop and radio equipment apparently
stolen from his employer and drove
around giving radio commands to the
pumps and valves that controlled the
local sewers. Pumping stations went hay-
wire. Raw sewage poured into local
waterways. Creek water turned black,
fish died, and the stench was appalling
(Brenner, 2011). This was an early warning
of the danger inherent in connecting
industrial control systems to the Internet,
but Maroochy Shire was far away, and
very few people were paying attention.
Nasty things that start on the other
side of the world have a way of ending
up on oneÕs own doorstep, however, and
the vulnerability to electronic mayhem of
control systems that run railway switches,
air traffic control systems, manufacturing,
financial systems, and electric grids is
now an endemic condition. In Brazil, a
cyber attack in 2007 plunged more than
three million people into total darkness
and knocked the worldÕs largest iron
ore producer offline, costing that one
Bulletin of the Atomic Scientists
69(5) 15–20
! The Author(s) 2013
Reprints and permissions:
sagepub.co.uk/journalsPermissions.nav
DOI: 10.1177/0096340213501372
http://thebulletin.sagepub.com
company alone about $7 million (CBS
News, 2009).1
The worldÕs superpower is not invin-
cible either. Today the North American
electric grid is being attacked fer-
ociously and oftenÑsometimes by intru-
ders so skillful that government help is
needed to fend them off. Municipal water
and sewer systems are also vulnerable.
Even the US military recently warned
that it canÕt guarantee its own operations
under a sophisticated cyber attack, and
that US allies are in the same posit ...
Cybersecurity of Smart Cities is a controversial topic today. Researchers and professionals are debating the viability and sustainability of a large complex environment, which heavily relies on the digital infrastructure, especially from a cybersecurity perspective. Smart cities continuously deploy and update information and communication technology (ICT) to enhance the quality of life for citizens.
Implementation of Cyber Security in Corporate Sector of PakistanIJAEMSJORNAL
We live in a time when knowledge is easily accessible and people are connected throughout the world. The technological improvements that modern states use to advance include streamlined online bill payments, improved healthcare systems, sophisticated transportation networks, the use of artificial intelligence, cutting-edge communication systems, and technological warfare. Despite the fact that technology has made it possible to break down geographical borders, the widespread use of technology has led to the emergence of new challenges and concerns. Hacking, bank fraud, money laundering, data breaches, unauthorized acquisition of state secrets, and targeted attacks on critical infrastructure are just a few of the criminal activities and threats that plague the digital world today. These crimes have all emerged as major facets of modern cyber warfare. Such threats can affect both wealthy and developing countries, creating a challenging situation for national security. Among these countries, Pakistan and other emerging nations are particularly at risk. The nation has a sizable population of business users who are unfamiliar with information technology, which makes it more difficult for governmental and legislative authorities to regulate the nation's digital environment. Recent catastrophic cyberattacks on Pakistani institutions' most essential websites have successfully breached significant digital installations. Legislators in Pakistan have responded by introducing cyber legislation, but it doesn't seem like they fully address the variety of online threats. This study paper is focused on creating a framework for the adoption of cyber security in Pakistan's corporate sector and investigating workable solutions to serious cybersecurity issues. In order to generate findings, a qualitative research methodology was used, gathering information from both primary and secondary sources. Finally, the study makes a number of suggestions on how Pakistan's corporate sector may implement cyber security.
The Cyberspace and Intensification of Privacy Invasioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Issues with respect to the proper ownership and jurisdiction of information contained on the internet have set the stage for an ongoing legal debate over Cyber-Law and its impact on Cyber-Crime.
Enhanced Global Cyber-Security and proposed governing regulations are not a luxury, but a necessity, for today’s business and government entities which operate in real time environments.
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...SG Analytics
However, the adoption of cloud-based cybersecurity products and the advent of IoT security across organizations is likely to create lucrative opportunities for the entire ecosystem; businesses, governments, and cybersecurity vendors.
Visit: https://www.sganalytics.com/blog/increasing-cyberattacks-resulting-in-a-demand-for-cybersecurity-solutions/
White Paper: IoT Security – Protecting the Networked SocietyEricsson
The Internet of Things (IoT) is expanding rapidly, and is expected to comprise 18 billion connected devices by 2022. But the assumptions of trust which formed the backdrop to the early development of the internet no longer apply in the early stages of IoT development. Privacy and security concerns are ever increasing, especially given the growing significance of IoT in corporate, government, and critical infrastructure contexts. Likewise, the commodification of IoT components incorporated across diverse product ranges and deployed in both managed and unmanaged use cases brings significant security challenges and creates potential for novel types of attack. The proactive cooperation of all key stakeholders will be necessary to realize the considerable economic benefits of the IoT, while protecting security, safety, and privacy.
The Influence of Artificial Intelligence on E-Governance and Cybersecurity in...Shakas Technologies
The Influence of Artificial Intelligence on E-Governance and Cybersecurity in Smart Cities A Stakeholder’s Perspective.
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
The Internet of Things (IoT) has been developing over the last 20 years and is often referred to as Industry 4.0 or the “fourth industrial revolution.” It is an umbrella term for all the digital assets and entities connected to the internet. Many of these are intangibles, such as data, human capital via artificial intelligence (AI), intellectual property (IP), and cyber; as such, they need to be made tangible to address value on a balance sheet. Others are connected entities, such as sensor devices, collecting and receiving information in an intelligent fashion across networks.
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
Varsha Sewlal
Executive Legal & Deputy Information Officer, Railway Safety Regulator on Cyber Attacks on Critical Infrastructure at Public Sector Cybersecurity Summit 2024. #PublicSec2024
Similar to NEC Public Safety | Integrating Physical & Cyber Security (20)
NEC Public Safety | NEC Airport Security Advances with Business Traveller NEC Public Safety
The airport experience is fast evolving with a host of technological innovation. Business Traveller cathes up with industry leaders in the airport technology, NEC Corporation to learn more.
Reach out at safety@nec.com.sg if you would like to learn more.
NEC Public Safety | NEC XON 2020 Vision by Walter LeeNEC Public Safety
2020 Vision - A Future Beyond Imagination
Walter Lee, Evangelist & Government Relations Director of NEC Global Safety Division shares the 2020 Vision during the annual NEC XON Summit 2019.
NEC XON is an annual invitation-only summit gathering C suite executives and other delegates from across Africa to expose them to how innovative technology can help improve the lives of Africans.
Reach out at safety@nec.com.sg if you would like to have more details.
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...NEC Public Safety
Michael O'Connell, Vice President and Executive Advisor of NEC Corporation, speaks at Interpol World 2019.
Physical world and cyber space: risks closer than you might think
Countries around the globe are at the mercy of different types of security risks, such as smuggling of drugs, weapons and people, terrorism, among others. But one thing they all have in common: most attacks are architected and managed by the internet. Today, it is almost impossible to disassociate the threats from the physical world from the virtual. In a figurative way, we can imagine that the two scopes are sewn together by an invisible line that draws them ever closer.
Reach out at safety@nec.com.sg if you would like to have more details.
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...NEC Public Safety
Michael O'Connell, Vice President and Executive Advisor of NEC Corporation speaks at the II International Security Symposium on 19 and 20 March.
During his presentation, he shared the importance of using biometrics to ensure the work of law enforcement agencies, ensuring unrivaled agility and accuracy in preventing and combating cybercrime.
Reach out at safety@nec.com.sg if you would like to have more details.
NEC Public Safety | New Technologies to Investigate Human Trafficking and Mig...NEC Public Safety
Michael O'Connell, Vice President and Executive Advisor of NEC Corporation speaks at "Private Sector Workshop on Trafficking in Human Beings and People Smuggling" organised by INTERPOL in Lyon, France on 14 - 15 March 2019.
During his presentation, he shared how new technologies can be employed to investigate human trafficking and migrant smuggling.
Reach out at safety@nec.com.sg if you would like to have more details.
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges NEC Public Safety
Michael O'Connell, Vice President and Executive Advisor of NEC Corporation speaks at UAE Ministry of Interior (MOI) Innovation and Foresight Summit in Abu Dhabi in Feb 2019.
In his session "Innovation can be channeled to solve future challenges", he talks about how it is possible to mitigate risks to our common security needs
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety
Walter Lee, Evangelist and Government Relations Leader, delivered a lecture “Technology Foresight: Human Evolution or Revolution?” to a Post Graduate students of the Management of Technology, School of Engineering, National University of Singapore on 28 Jan. The topic revolved around how AI, IoT and Big-Data is transforming economies and societies.
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety
Walter Lee, Evangelist & Government Relations leader of NEC Global Safety Division shares about Riding the Wave of Disruption at NEC Xon Summit 2018 .
Industry 4.0 unleashes tremendous opportunity for Africa to ride this next wave of transformation. It is about thee total democratisation of the industry whereby B-B, B-C, C-C are forever integrated into A-B-C: Artificial Intelligence and Blockchain, empowering the supply chain of Business to Consumers to Business in an unending loop.
Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter LeeNEC Public Safety
Powering the Internet of Identities with integrated cyber-physical security.
The Internet of Things is driving the integration of the cyber and physical state today. in order to ensure that commercial transactions and government services can be further enhanced, digital identity is critical, and will be the cornerstone that defines the very fabric of public safety in future societies.
NEC is unique in providing multi-layered security solutions, allowing us to assemble different solutions in response to the complexity of the different layers and provide a turn-key solution to our clients.
Walter Lee, Evangelist & Government Relations leader of NEC Global Safety Division shares about AI for Next Generation Cyber Defense.
Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
Biometric technologies use biological features such as fingerprints, veins, faces and irises to identify individuals. They greatly improve the accuracy and reliability of identification and verification systems by taking out the element of human error. In the area of public safety, biometric technologies in the form of fingerprinting, iris and facial recognition have made a significant contribution to border control and law enforcement. Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
The importance of being human-centric instead of techno-centric is now fundamentally assessed in the context of secure digital identity for the financial services landscape.
Forward-looking banks and financial institutions are increasingly responding with resources and investments that deliver NEC’s state-of-the-art authentication methods
to meet consumer expectations. As a result, NEC’s vantage point goes far beyond cutting-edge technologies and solutions, such as integration of multimodal biometrics. Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety
For casino gaming operators, facial recognition is a tool that can empower them to transform how they operate and find new answers in a complex environment. This paper aims to present how the technology can answer some the most pressing challenges facing a global casino gaming market. Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety
Securing Experiences via Digital Identity by Frost & Sullivan. An Executive Briefing on how Digital Identity helps securing our world from Airport to Critical Infrastructures. Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
Safe Cities Index 2017 by Economists. A ranking of global cities in term of Public Safety. Brought to you by NEC. To find out more, do visit http://safecities.economist.com/ or http://www.nec.com/safety
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Generating a custom Ruby SDK for your web service or Rails API using Smithy
NEC Public Safety | Integrating Physical & Cyber Security
1. A Frost & Sullivan White Paper
Commissioned by NEC
We Accelerate Growth
WWW.FROST.COM
Integrating Physical
and Cyber Security for
Safer Cities
2. IOT-ENABLED CUSTOMER EXPERIENCE
THE WORLD IN 2030
INTEGRATING PHYSICAL AND CYBER SECURITY CONCERNS
KEY APPLICATIONS AUTHORITIES SHOULD CONSIDER
CASE STUDIES
KEY CHALLENGES IN IMPLEMENTATION
RECOMMENDATIONS IN DEPLOYING SAFE CITY SOLUTIONS
THE LAST WORD
3
6
10
18
24
28
31
Table of
Contents
2
4. 4
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
A DYSTOPIAN VIEW
OF THE FUTURE
The implications of globalization are more prominent than
ever. As people become more mobile, the mass movement of
people into urban centres in search of opportunities create
unprecedented challenges. Urban planners come under
pressure to devise smarter ways to manage public safety,
transportation, sanitation, and law enforcement. Cities
compete with one another for resources and those that are
effective in attracting and retaining talented people are
more likely to succeed than those that are not. Corporations
and government agencies are investing heavily in cutting-
edge solutions and infrastructure development. While it is
still too early to measure the full impact of technology on
society, its pervasiveness continues to be felt.
While technological tools are key enablers to solving urban
challenges, society does expect the government to ensure
that their benefits outweigh the accompanying problems.
When expectations fall short, people are inclined to express
their frustrations through social media.
As governments address the various urban challenges facing
cities using smart and safe city solutions, how will society
look like in 2030?
In time to come, the proliferation of technology will address
a number of urban problems we face today. One of the most
significant improvements will be in public safety as public
infrastructureisvirtualizedusingembeddedsensors,cameras,
and wireless connectivity. As the pace of urbanization picks
up, authorities are channeling more resources to modernize
aging infrastructure. While this is beneficial, the costs
involved and the sheer scale of dependence on them will
make critical infrastructure vulnerable to cyber-attacks.
5. 5
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
To safeguard critical infrastructure, authorities deploy smart
city technologies to the point of subjecting cities to complete
dependence on them. While the technology offers benefits
in improving efficiencies, services and security, questions
surrounding privacy, potential discrimination and restrictions
to freedom do arise. Will a substantial reduction in crime rates
make people feel safer?
Governments tend to believe that technology can replace the
various aspects of law enforcement, without taking into account
the growing unease among people with the idea of surveillance
cameras and sensors in public areas.
Technology is improving efficiencies for
corporations and government agencies
by automating more labor-intensive
processes, gradually taking away jobs
from people. The resulting impact of
unemployment could be worsened by
rising costs in transportation, housing, and
healthcare. Digitizing public infrastructure
could translate into higher costs for the
community.
The problem started when an overly technology-centric
approach is taken. Government authorities depend on
technology and efficiency to improve the quality of life in cities.
However, the impact of smart city programs may not always
benefit the people. The irony is that countries that are at the
forefront of technology are said to be no happier than those
lagging behind technologically.
Ideally, technological tools should lead to inclusiveness where
citizens are empowered with information and alternatives to
choose. As urban planners begin to understand that technology
alone cannot solve all urban problems, they are shifting toward
holistic solutions that bring the community and stakeholders
together onboard the ecosystem and sustain them.
7. 7
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
Fast population growth in the city are putting a strain on existing
infrastructure, as many have not been designed to cope with the
demands of urbanization. The onset of aging is also besetting
these facilities. In response, urban planners are striving towards
digitization to increase automation and responsiveness.
The Internet of Things (IoT) are making the world increasingly
connected. Technology convergence is integrating the physical and
digital worlds, achieving efficiency levels not previously possible.
However, this convergence can also present new challenges to urban
planners and corporations.
For decades, the air gap separating operational technology and
information technology made internal systems resilient. Cyber security
was hardly an issue. The conventional focus was on protecting critical
assets from physical attacks via restricted access, monitoring, and
safeguarding security around the premises. Nevertheless, critical
infrastructure remain vulnerable to physical attacks until today. Public
places are often the choice for physical attacks despite of heightened
security.
7
8. 8
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
PHYSICAL VULNERABILITY CYBER VULNERABILITY
Long queues waiting to go through
rigorous security checks at airports
make them highly attractive soft
targets
Transformers that are typically placed
outdoors make substations and power
lines vulnerable to physical attacks
Physical breaches and unauthorized
facility access may lead to vandalism
and theft of assets and/or disruption
of services
Lack of established practices in
emerging market economies to ensure
the security of people and physical
assets during incidents
Emotional and hostile behaviour of
individual/s at the venues subject
spectators to physical harm
Individuals have limited capacity in
controlling threats to physical safety
in densely populated areas
Increase in automated self-service
installations that allow check-ins,
baggage drops, and ID scans with
minimal human intervention present
risks
Technological innovations such as
connected devices present new
access points for invading the electric
grid
Frequent target of cyber-attacks with
occurrence expected to be on a rise
due to political dissent
Ability to penetrate and disable
critical infrastructure from a remote
place undetected
Attacks on connected networks can
disrupt operational systems and cause
power outages
Identifiable information of individuals
can be exposed through the hacking
of public infrastructure
AIRPORTS
POWER
GENERATION
GOVERNMENT
SERVICES
DISASTER
MANAGEMENT
STADIUMS AND
BIG EVENT
VENUES
CITIZEN SAFETY
9. 9
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
Legacy systems lack the capabilities to detect and report on operational problems. Connecting these systems
to a network makes them even more vulnerable to intrusion from a remote location. The integration of
operational technology and information technology exposes critical assets to a higher level of vulnerability
which existing systems have not been designed to meet.
Long-established physical security practices often mislead security managers into believing that their networks
are secure when in fact they are more vulnerable due to the lack of integration between their physical security
and cyber security. Organizations are not taking sufficient measures to protect themselves. For example, in
early 2017, a ransomware attack on the digital key system of a luxury hotel in Austria prevented 180 hotel
guests from entering or leaving their rooms. The attack forced the Romantik Seehotel Jäegerwirt Hotel to
accede to hackers’ demands, by paying the ransom of €1,500 in Bitcoins (approximately $1.88 million).
Cyber-attacks are growing in scale and frequency at an alarming rate, reaching levels of sophistication that are
difficult for authorities to trace. Holding an organization ransom can potentially lead to not only the disruption
of operations and financial losses, but also physical harm. Attacks on transportation, water, telecommunication,
energy, finance, government, and healthcare services have the capacity to destabilize an economy. While
attackers may not have the skills, access rights or resources to destroy sophisticated equipment, a malware
system hack can go undetected for some time and shut down the system until the financial demands are met.
For example, a cyber-attack on Ukraine’s power grid in the winter of 2015 left approximately 700,000 people
without power for several hours. In 2016, Verizon reported an intrusion into its water treatment system where
attackers altered settings related to water flow and the amount of chemicals for treating drinking water.
While security managers are familiar with the common types of cyber security attacks such as denial of
service, malware, and phishing attacks, the rapid evolution of physical-cyber integration is likely to generate
new vulnerabilities requiring decision-makers to have an in-depth understanding of future risks and to prepare
for them. Cross-industry collaboration is essential in bringing together all relevant stakeholders. For example,
the proliferation of electric cars can present new access points for invading the grid, making it necessary for
power companies to work with automotive companies to strengthen their defense against physical-cyber
threats. Organizations need to be a step ahead of cyber criminals. As they begin to mitigate physical and cyber
security concerns, organizations can be better equipped to identify more “weak spots” by looking beyond
their respective industries.
11. 11
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
Urban planners are juggling with multiple challenges to
make cities better and more livable, as part of efforts to
increase their competitive advantage. They are deploying
more innovative ways of delivering public services.
However, apart from enhancing operational efficiencies,
urban planners are becoming mindful of the various threats
that could negate their efforts. In the past, urban planners
were most concerned about physical threats and natural
disasters. Present technological innovations are introducing
cyber threats that were not major concerns before. Thus,
safety needs to be defined beyond physical threats.
There are numerous technological tools designed to
produce safer outcomes. How can urban planners leverage
horizontal technologies such as the IoT, big data, artificial
intelligence, biometrics, and cyber security, and the
integration of various emerging technologies? While there
are numerous applications urban planners could consider, it
is essential to prioritize resources by identifying the six most
critical applications. They include border control, critical
infrastructure protection, citizen safety, government services,
natural disaster management, stadiums, and big events
venues.
12. 12
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
BORDER
CONTROL
CRITICAL
INFRASTRUCTURE
PROTECTION
CITIZEN SAFETY
KEY APPLICATIONS TYPES OF INNOVATIVE TECHNOLOGIES
With the increase in passenger traffic, preventing long queues at airport security
checkpoints is a top priority. Multimode authentication for face, fingerprint,
and iris recognition enables passengers to be verified at electronic gates with
minimal human intervention while enhancing the flow of security checks. The
deployment of high-resolution cameras, facial recognition algorithm, and
advanced analytics that cross-reference to databases enable border control
agencies to detect suspects and take immediate action before they leave the
country.
GOVERNMENT
SERVICES
Multiple users are accessing government services from their mobile devices,
making agencies vulnerable to Internet threats. Capabilities to detect cyber
security threats, information leaks, website manipulations, and machine
learning enable systems to identify new cyber-attack patterns. Multimodal
biometric solutions safeguard unauthorized access with video surveillance and
alert options to support security personnel. Face recognition for surveillance
using “facetraps” are gaining popularity with cameras installed in places (e.g.,
elevators, counters, TV monitors) where people are likely to look directly into a
camera without realizing it.
Disruptions in critical infrastructure operations can bring about physical
harm and potentially destabilize an economy. Surveillance capability can be
enhanced with movement sensors, high-resolution cameras, and behavioural
analytics that detect suspicious behaviour in restricted premises and control
access using multimodal biometrics.
Cyber security applications include a multi-layered defense for SCADA systems
that detect abnormal behaviour with sensing, monitoring, and situational
awareness while providing decision-makers with meaningful forensic insights
to investigate security breaches.
The proliferation of innovative technologies in the form of wearables and mobile
devices provide law enforcement officers with body cameras, handheld consoles
for fingerprint reading, license plate readers, facial recognition technologies,
and personal radar for detecting movements in places suspected of illegal
activities. Over time, drones will be increasingly deployed for surveillance and
monitoring especially in sparsely populated less accessible areas. Drawing
data from several inter-agency databases, crime analytics provide insights on
criminal patterns and predict when and where the next incident may occur.
13. 13
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
KEY APPLICATIONS TYPES OF INNOVATIVE TECHNOLOGIES
NATURAL
DISASTER
MANAGEMENT
STADIUMS AND
BIG EVENT
VENUES
While it is impossible to prevent the occurrence of natural disasters, urban
planners seek a system that could, over time, show them and predict when
and where a natural disaster is going to happen as well as the extent of the
resulting impact. Sensors could be installed in risk-prone areas to collect data
for analysis and scenario planning to enable rescuers to promptly identify the
areas at risk and evacuate people before a disaster happens.
Public safety is a primary concern of law enforcement agencies during
major events with global media coverage, while the smooth running of an
event is the main priority of event organizers. Cyber-attacks that penetrate
internal controls can bring down the operating system utilized by the event.
Therefore integrating cyber and physical security is critical in protecting the
network against ransomware attacks. Concurrently, the use of video analytics
and advanced facial recognition is crucial in spotting rowdy and emotional
sentiments that are characteristic of violent behaviour within large crowds in a
stadium even when people are not directly facing a camera.
14. 14
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
Ongoing concerns about government security
infrastructure across many regions of the world are
expected to drive the need for advancing border
control systems. The global security market is
estimated to be worth US$72.6 billion at the end
of 2016. Increased priority in cyber security is
transforming border control and biometric security
into a fast-moving sector with well-developed policies,
best practices, and legislation to support investment
that will protect specific areas of the border.
At the same time, higher passenger volumes at
airports and the accompanying risks as soft targets
are increasingly demanding cutting-edge screening
technologies to prevent long queues at customs
checks. Long-term security investments are set to
continue as airports seek to streamline systems and
balance rigorous safety procedures with enhancing
customer satisfaction levels using non-invasive
security technology. Although airports traditionally
focus on physical security, greater importance in
cyber security investments can be expected with
widespread connection of digital systems.
15. 15
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
AIRPORT SECURITY MARKET: TOTAL EXPENDITURE,
GLOBAL, 2014-2033
0.0
1,000.0
2,000.0
3,000.0
4,000.0
5,000.0
$ MILLION
2014 2015 2016 2017 2018 2019 2020 2021 2022 2023
Safety and security are major concerns for the utilities sector. Although physical security
controls guarding restricted premises are well established, the growing use of connected
systems demands the deployment of tighter cyber security measures. Utilities companies
are coming to terms with the importance of building tighter cyber security measures into
their automation processes. The provision of cyber security is coming on par with the
overall physical security of the utility site including the emphasis on protecting remotely
controlled operations.
While many biometric applications cater primarily to government needs, they are
increasingly deployed in the private sector across several industries. The tourism sector
is raising the level of customer experience with multimodal biometrics to provide access
and authentication for entry into various facilities and enabling secure payments in
hotels or resort premises. The use of facial recognition is particularly useful in casinos
for spotting VIP guests and celebrities to provide preferential treatment, and identifying
blacklisted guests who have been banned from entering the premises.
Africa
Latin America
EuropeAsia-Pacific
Middle-East
Central Asia
North America Source: Frost & Sullivan
16. 16
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
UTILITIES SECURITY MARKET: EXPENDITURE,
GLOBAL, 2014-2023
4,500.0
4,000.0
3,500.0
2,500.0
3,000.0
2,000.0
1,500.0
1,000.0
500.0
0.0
$ MILLION
2014 2015 2016 2017 2018 2019 2020 2021 2022 2023
Africa
Latin America
EuropeAsia-Pacific
Middle-East
Central Asia
North America Source: Frost & Sullivan
Facial recognition technology is also gaining traction in retail outlets for its anti-theft
and customer behavior tracking features. High-resolution cameras and advanced
analytics are deployed in luxury stores to match shoppers’ faces to a database
containing the photographs of past shoplifters. The technology is also being used
to access customers’ responses to displays and promotions, and to understand their
behavior to devise more effective pricing and marketing strategies.
The automotive industry is looking toward biometrics to strengthen vehicle security.
Replacing physical keys and fobs with more secure methods are under serious
consideration, to address the ongoing vehicle theft and hijacking concerns. The
adoption of multimodal biometrics provides a compelling point of differentiation for
automotive makers. Besides allowing recognized people from entering and activating
a car, iris detection tracks the alertness of drivers. In instances where a driver is falling
asleep, the system will bring the vehicle safely to a halt.
17. 17
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
Aggregated data on people in the streets, malls, and other
public places can be extremely valuable information, for
instance, to help authorities in tracking criminal suspects.
Sharing of data among collaborative stakeholders can make
a city a safer place for all.
With no direct interaction with people, biometrics is among
the least invasive methods of assessing an individual.
Nevertheless, people are aware that their movements are
increasingly monitored, raising security and privacy concerns.
People want to know how their information is being used.
For biometrics to take off on a large scale, governments and
organizations need to be more transparent in addressing
these concerns.
19. 19
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
CASE STUDY 1
PUBLIC SAFETY WITH AN INTEGRATED
IT SOLUTION
Tigre City, Argentina
Safety and security are top priorities for the local government of Tigre.
NEC has been contracted to provide a holistic urban monitoring system
to boost the safety and security of public places within the city. The
solution comprises an advanced surveillance system with the installation
of approximately 1,000 CCTV cameras at key public locations, intelligent
video analysis, and a command-and-control center.
The system includes video monitoring, urban surveillance, advanced
facial recognition, and behavior detection to help the police identify
criminals, locate missing people, and spot suspicious behavior within a
large crowd. A large amount of the data captured is processed in real
time using NEC’s image analysis technology to detect danger.
NEC also provides a wide variety of technologies to secure the road
networks including real-time detection of human behavior associated
with potential crimes such as speeding, double riding, and riding without
helmets. The solution is also equipped with license plate recognition
capabilities to locate stolen vehicles. Since the implementation of the
NEC system, vehicle thefts in Tigre have dropped by 40%.
Situated 32km northwest of Argentina’s capital, Buenos Aires,
Tigre is a city of 400,000 people. Since the 1990s, the city has been
experiencing rapid population growth giving rise to the number of
private neighborhoods. Tigre is also gaining popularity as a holiday
destination among Argentines and overseas tourists.
20. 20
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
NEC installed its NeoFace® Watch solution in
14 international airports in Brazil including the
Governador André Franco Montoro International
Airport (Guarulhos Airport) in Sao Paolo, and
Antônio Carlos Jobim International Airport (Galeão
Airport) in Rio de Janeiro. The solution is designed to
identify potential suspects, who have been registered
as being involved in suspicious activity by the agency,
at the customs checkpoint.
CASE STUDY 2
TACKLING TAX EVASION WITH FACIAL RECOGNITION
The 14 international airports in Brazil installed
with NEC’s NeoFace® Watch solution are:
Brazil
Tax evasion is a serious problem for the Brazilian
government, resulting in losses amounting to
US$280 billion in 2015, making it the second highest
in the world. The Receita Federal, Brazil’s National
Tax Collection Agency, appointed NEC to support its
efforts in stemming tax losses.
Tancredo Neves (Belo Horizonte, Minas Gerais)
Juscelino Kubitschek (Brasília, Distrito Federal)
Viracopos (Campinas, Sao Paolo)
Afonso Pena (Curitiba, Parana)
Hercílio Luz (Florianópolis, Santa Catarina)
Pinto Martins (Fortaleza, Ceará)
Eduardo Gomes (Manaus, Amazonas)
Augusto Severo (Natal, Rio Grande do Norte)
Salgado Filho (Porto Alegre, Rio Grande do Sul)
Gilberto Freyre/Guararapes (Recife, Pernambuco)
Antônio Carlos Jobim/Galeão (Rio de Janeiro, Rio de Janeiro)
Dep. Luís Eduardo Magalhães (Salvador, Bahia)
Governador André Franco Montoro/Cumbica (Guarulhos, Sao Paolo)
Cataratas (Foz do Iguacu, Parana)
Countries with Largest Tax Evasion Amount
Source: Richard Murphy, Tax Justice Network
Tax Loss - $ billions
US
Brazil
Italy
Russia
Germany
France
Japan
China
UK
Spain
337.3
280.1
238.7
221
215
171.3
171.1
134.4
109.2
107.4
21. 21
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
CASE STUDY 3
SECURITY OPERATION CENTERS
Case Study: Tackling Cybercrimes
Hackers are always on the lookout for new ways to bypass control
systems of enterprises. Adequate preparedness for cyber-attacks is
not easy to achieve as there are unforeseen threats. Organizations
can no longer take the passive approach and react only when an
attack takes place. Instead, a defensive and proactive approach is
needed to monitor, analyze, and plan scenarios, and identify steps to
respond to an attack.
To strengthen customer readiness and defense against cyber threats,
NEC has established Security Operation Centers (SOCs) in Japan,
the Americas, and Europe. As a subsidiary of the NEC Group, the
SOCs utilize different time zones across the three regions to provide
round-the-clock managed security services that receive and monitor
emergency responses to cyber threats from customers around the
world. With an interconnected network that shares cyber intelligence
on cyber threats, it continuously innovates to manage emerging
threats.
22. 22
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
CASE STUDY 4
BIOMETRIC BORDER SCREENING FOR
PUBLIC SAFETY
Case Studies: Airports and Stadiums
With 30 million passengers in 2015, the JFK International Airport in
New York City is the largest international airport in the US with the
longest average waiting time.
The sheer volume of passengers passing through the airport creates
a challenging environment for airport officials to ensure effective and
efficient border safety without compromising passenger convenience
and comfort.
To enable customs officers to screen passengers speedily and
accurately, NEC installed its facial recognition solution, NeoFace
Match, at the airport in 2016. NeoFace Match makes it difficult for
passengers to counterfeit a passport and protects legitimate ones
from fraud and identity theft. Using one-to-one facial comparison, it
matches the photograph taken during customs inspection against the
photo stored in a passenger’s e-passport chip. The results are shown
in a numerical rating system that indicates whether a passenger is
legitimate or requires additional screening.
John F. Kennedy International Airport, US
23. 23
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
With a seating capacity of over 40,000 spectators, the Estadio
Atanasio Girardot is the third largest stadium in Colombia. The
key public safety concern among law enforcement agencies has
been around crime, violent behaviour and vandalism during major
sporting events.
In 2016, NEC successfully deployed its facial recognition solution that
used 170 surveillance cameras strategically positioned throughout
the vicinity. It allows security personnel to monitor the situation and
observe large crowds from various control centres. Besides detecting
disruptive behaviour, NEC’s facial recognition solution is able to detect
and identify soccer fans who had caused trouble in previous events
CASE STUDY 5
BIOMETRICS FOR ACCESS CONTROL IN
SPORTS STADIUM
Medellin, Colombia
25. 25
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
The integration of physical and digital worlds is
helping cities to cope with the effects of urbanization
and population growth. While digitization of the
environmental and business landscapes brings
enormous benefits, it exposes agencies, corporations,
and citizens to unprecedented risks. To ensure that
cities are resilient against security threats, adequate
measures are critical to minimizing the risk of a setback
in terms of financial losses, physical harm, and loss of
confidence in decision-makers. As air gaps in control
systems are gradually removed, intruders are finding
ways to take control of critical infrastructure that people
are heavily reliant upon. The rise in cyber-attacks carried
out in the past year alone sends an ominous signal to all
decision-makers. As the threat of cyber-attacks looms
over critical assets, it is imperative for urban planners to
overcome the following challenges:
More and more cities are becoming smarter with the
deployment of innovative technologies.
25
26. 26
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
Existence of
legacy systems
Absence of
citizen-driven
approach
Low
willingness to
collaborate
among policy
makers
Preference for
status quo
Poor clarity
in project
requirements
Outdated
policies
Insufficient
experience in
country-wide
deployments
Lack of human
resource with
necessary skill
sets
High reliance on existing control systems sourced from different vendors
and running on proprietary systems that operate in silos breaks down
communication among the different systems. Their lack of compatibility with
smart technologies create challenges in deploying innovative solutions.
Technological innovations focus excessively on operating efficiencies and
cost savings, which aim to solve problems faced by urban planners. Lack of
transparency in their implementation can result in privacy concerns among
the community.
Strong silo mentality coupled with mistrust among policy makers and
government agencies cause stakeholders to compete on safe city initiatives
independently rather than collaborate toward a common goal.
Conservative and risk-adverse urban planners who lack vision choose the
conservative, wait-and-see approach to save costs until they encounter a
cyber-attack.
Overly ambitious goals covering numerous aspects but lacking in clarity on
definitions of stakeholders and project funders, expected outcomes, and
challenges in managing expectations cause unnecessary delays.
Slow amendments to outdated regulations and practices create barriers in
adopting technological innovations, causing enterprises and manpower talent
to move to cities that have progressed beyond this hurdle.
Several safe city projects have been carried out on small scales, hence limiting
the experience of urban planners in deploying country-wide implementation
for adequate planning, strategizing, and avoiding costly pitfalls.
Source: Frost & Sullivan
Organizations may not have human resource with the necessary skill sets to
harness the value of big data analytics and develop meaningful insights to
introduce innovative changes and solutions.
26
27. 27
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
With multiple parties striving to make cities safer places
to live, it is easy for urban planners to lose focus after a
while. Many of them commence with realistic plans to
start small and scale up. However, as more stakeholders
come on board, requirements and considerations are
inclined to increase, with unexpected challenges likely
to occur. Urban planners with insufficient experience
in the implementation of safe city initiatives may not
be able to anticipate the potential challenges that can
have costly consequences.
27
29. 29
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
Focusing solely on deploying the best technological solutions does
not necessarily make a city more secure. People are increasingly aware
of authorities continuously monitoring and tracking their movements.
Stakeholders require urban planners and decision-makers to be more
transparent about the data on individuals they are capturing and how
the data is used.
As people become more critical of the authorities, getting the active
support of all stakeholders is even more essential. A mindset shift
from a top-down decision-making approach to one that facilitates
the roles of stakeholders on the ground is required. A bold vision of
the future entails evolving from an efficiency-driven city to one that
embodies the following characteristics.
An Inclusive Society where authorities no longer dictate the safe city
landscape. Instead, they relinquish some command-and-control to
take on the role of facilitator that brings together various stakeholders
in a constructive dialog. Partnerships among private enterprises,
entrepreneurs, non-profit entities, and community activists are likely
to drive innovative solutions and policy modifications along every
stage of the safe city program.
Law enforcement officials can become more effective with the support
of the community. Citizens could work collectively with the authorities
in reducing crime and social unrest. Commercial entities, households,
and individuals can also share video footage of incidents captured
on their devices and surveillance cameras to supplement authorities
with robust intelligence resources. People should have a strong say
in revising policies on data privacy and protection and no longer feel
threatened about surrendering their data to the authorities.
A UTOPIAN VISION OF A SAFER
CITY DRIVEN BY COMMUNITY AND
STAKEHOLDERS
30. 30
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
An Empowered City that enables people across a broad spectrum
of sectors to offload repetitive tasks to automation to focus on
building new skill sets. Tertiary institutions should work closely with
the industries to identify and equip people with skills to cope with
technological disruptions. Rather than being displaced by robots,
professionals undergo reskilling to make better use of cutting-edge
technologies to produce better outcomes not possible before.
A Safe City is better equipped to absorb and rebound from the
impact of external forces. Policymakers no longer work in silos, but
collaborate actively by sharing data and tackling common problems
via an integrated platform. Integrating multiple forms of threats raises
the effectiveness of law enforcement, public safety, crime prevention,
and disaster management. Agencies are able to carry out scenario
planning and anticipate incidents together. They adopt a consistent
approach, so all parties know what to expect and what to do in the
event of a crisis or attack. People are calm in the face of an unexpected
event if they have been involved in the planning and deployment of
the contingency measures.
31. 31
WWW.FROST.COMINTEGRATING PHYSICAL AND CYBER SECURITY FOR SAFER CITIES
Accelerating urban development is necessitating an urgent response
to addressing multiple forms of threats proactively and identifying
a technology vendor with a proven track record in leading safe city
solutions. Screening vendors involves a broad understanding of
their best practices, resources, and expertise. You want somebody
reliable that brings strong technical capabilities, established strategic
partnerships, and thought-leadership to anticipate when, where, and
the extent of the next security attack.
NEC displays extensive capabilities in advanced technologies and
solutions that are aligned with the challenges facing organizations.
Its leadership in biometrics, video analytics, and big data analytics
are incorporated into diverse verticals-focused solutions addressing
security challenges under different scenarios. With years of experience
in security solutions, NEC remains committed to its “Safer City” vision
with solutions that bring about a win-win outcome for all stakeholders.
The Last Word
07
Some photos are for illustration purposes only.
32. Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary innovation that address-
es the global challenges and related growth opportunities that will make or break today’s market participants. For more than 50
years, we have been developing growth strategies for the Global 1000, emerging businesses, the public sector and the investment
community. Is your organization prepared for the next profound wave of industry convergence, disruptive technologies, increasing
competitive intensity, Mega Trends, breakthrough best practices, changing customer dynamics and emerging economies?
For information regarding permission, write:
Frost & Sullivan
331 E. Evelyn Ave., Suite 100
Mountain View, CA 94041
Schedule a meeting with our global team to experience
our thought leadership and to integrate your ideas, opportunities and
challenges into the discussion.
Visit our Digital Transformation web page.
Interested in learning more about the topics covered in this white
paper? Call us at 877.GoFrost and reference the paper you’re
interested in.We’ll have an analyst get in touch with you.
Attend one of our Growth Innovation & Leadership (GIL)
events to unearth hidden growth opportunities.