SlideShare a Scribd company logo
2016
Privacy & Cyber-Physical Security in European Cities
1
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
2
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
3
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
........................................................................................................ 1
........................................................................................................ 4
........................................................... 5
....................................................................................... 10
......................................................................................... 13
................................................................................................... 14
.............................................................................................................. 16
.............................................................................................................. 17
............................................................................................................... 18
............................................................................................................... 20
.......................................................................................... 21
.................................................................................................. 21
........................................................................................ 23
............................................................ 26
............................................................................................ 28
................................................................ 30
....................................................... 30
........................................................ 31
.............................................................................................. 33
........................................................................................................... 35
References ............................................................................................................. 37
Privacy & Cyber-Physical Security in European Cities
4
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
5
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
1 European Commission (2010) Comparative Study on Different Approaches to new privacy challenges, in
particular in the light of Technological Developments.
Privacy & Cyber-Physical Security in European Cities
6
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
2 European Commission (2012) Regulation of the European Parliament and of the Council on the
protection of individuals with regard to the processing of personal data and on the movement of such data
(General Data Protection Regulation).
3 http://www.allenovery.com/publications/en-gb/data-protection/Pages/Timetable.aspx
4 Commission of the European Communities (2009) COMMUNICATION… on Critical Information
Infrastructure Protection (CIIP) –Protecting Europe from large scale cyber-attacks and disruptions:
enhancing preparedness, security and resilience.
Privacy & Cyber-Physical Security in European Cities
7
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
8
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
5 European Commission (2011) COMMUNICATION…on Critical Information Infrastructure Protection –
Achievements and next steps: towards global cyber-security.
6 European Commission (2012) COMMUNICATION…on Tackling Crime in our Digital age: Establishing a
European Cybercrime Centre
7 European Commission (2013) Proposal for a Directive of European Parliament and of the Council
concerning measures to ensure a high common level of network and information security across the
Union.
8 European Commission (2013) Commission Staff Working Document – Impact Assessment
Privacy & Cyber-Physical Security in European Cities
9
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk



Privacy & Cyber-Physical Security in European Cities
10
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
11
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
12
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
13
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
14
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
9 http://www.washingtonpost.com/sf/business/2015/07/22/hacks-on-the-highway/
Privacy & Cyber-Physical Security in European Cities
15
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
10 Securing Smart Cities is a non-profit global initiative that aims to solve the existing and future
cybersecurity problems of smart cities through collaboration between companies, governments and other
actors. See securingsmartcities.org for more information.
11 https://www.enisa.europa.eu/activities/Resilience-and-CIIP/smart-infrastructures/intelligent-public-
transport/smart-cities-architecture-model
Privacy & Cyber-Physical Security in European Cities
16
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
12 http://money.cnn.com/2015/07/17/technology/ucla-health-hack/
13 http://www.wsj.com/articles/anthem-hacked-database-included-78-8-million-people-1424807364
14 http://www.ft.com/cms/s/2/f3cbda3e-a027-11e5-8613-08e211ea5317.html#axzz3vA6qRxP8
Privacy & Cyber-Physical Security in European Cities
17
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
18
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
15 http://www.bbc.com/news/technology-35297464
16 http://www.wired.com/2016/01/everything-we-know-about-ukraines-power-plant-hack/
Privacy & Cyber-Physical Security in European Cities
19
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
17 https://www.washingtonpost.com/blogs/checkpoint-washington/post/foreign-hackers-broke-into-
illinois-water-plant-control-system-industry-expert-says/2011/11/18/gIQAgmTZYN_blog.html
Privacy & Cyber-Physical Security in European Cities
20
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
18 http://www.theregister.co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/
Privacy & Cyber-Physical Security in European Cities
21
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk





Privacy & Cyber-Physical Security in European Cities
22
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Yes
50%
Unsure
17%
In the
process of
creating a
strategy
25%
No
8%
DOES YOUR CITY HAVE A STRATEGY FOR THE
PRIVACY OF CITIZENS?
Yes
67%
No
33%
IS THE PRIVACY STRATEGY BEING
IMPLEMENTED?
Privacy & Cyber-Physical Security in European Cities
23
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk







Yes
41%
Unsure
42%
No
17%
IS THE STRATEGY ON HOW TO HANDLE
PERSONAL AND SENSITIVE DATA
AVALIABLE PUBLICLY?
Yes
45%
Unsure
44%
No
11%
IS YOUR CITY’S PRIVACY STRATEGY
COMPLIANT WITH THE GDPR?
Privacy & Cyber-Physical Security in European Cities
24
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Yes
67%
In the
process of
creating a
strategy
25%
No
8%
DOES YOUR CITY HAVE A STRATEGY FOR
CYBER-PHYSICAL SECURITY?
Yes
87%
No
13%
IS THE CYBER-PHYSICAL SECURITY
STRATEGY BEING IMPLEMENTED?
Privacy & Cyber-Physical Security in European Cities
25
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Yes
75%
Unsure
17%
No
8%
DOES YOUR ORGANIZATION CONDUCT REGULAR
REVIEWS OF KNOWN AND POTENTIAL CYBER-
PHYSICAL VULNERABILITIES IN YOUR DATA
SYSTEMS?
Yes
17%
No
83%
DOES YOUR ORGANIZATION
OUTSOURCE CYBER-SECURITY?
Privacy & Cyber-Physical Security in European Cities
26
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Yes
67%
Unsure
16%
No
17%
DOES YOUR ORGANIZATION CONDUCT
REGULAR SECURITY TRAINING FOR IT
USERS?
Yes
75%
Unsure
8%
No
17%
DOES YOUR ORGANIZATION HAVE A RISK
MITIGATION STRATEGY FOR CYBER-
SECURITY?
Yes
50%
Unsure
50%
IS YOUR CITY’S CYBER-PHYSICAL SECURITY
STRATEGY COMPLIANT WITH THE GDPR?
Privacy & Cyber-Physical Security in European Cities
27
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Yes
33%
Unsure
50%
No
17%
IS YOUR MUNICIPALITY COMPLIANT WITH THE
GDPR?
Privacy & Cyber-Physical Security in European Cities
28
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
29
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
30
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
31
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
32
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
A
C C
C
BB
B
Privacy & Cyber-Physical Security in European Cities
33
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk



19 http://securingsmartcities.org/wp-content/uploads/2015/11/Guidlines_for_Safe_Smart_Cities.pdf
Privacy & Cyber-Physical Security in European Cities
34
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk



Privacy & Cyber-Physical Security in European Cities
35
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
20 http://eur-lex.europa.eu/
21 http://ec.europa.eu/index_en.htm
22 http://surveyacademy.com/wp-content/uploads/2010/07/Increasing-Survey-Response-Rates.pdf
Privacy & Cyber-Physical Security in European Cities
36
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
Please contact Smart City Catalyst on
www.scc-eu.dk
Valdemarsgade 73, ST.TV
DK-1665 Copenhagen V
Vat.no 34488258
info@scc-eu.dk
Privacy & Cyber-Physical Security in European Cities
37
Copyright©2016 Smart City Catalyst
all rights reserved
info@scc-eu.dk
References
Allen & Overy (2015) The EU General Data Protection Regulation – Timetable. (Available at
http://www.allenovery.com/publications/en-gb/data-protection/Pages/Timetable.aspx)
BBC News (2016) Hackers caused power cut in western Ukraine – US. (Retrieved from http://www.bbc.com/news/technology-
35297464)
CNN Money (2015) UCLA Health hacked, 4.5 million victims. (Retrieved from http://money.cnn.com/2015/07/17/technology/ucla-
health-hack/)
European Commission (2009) COMMUNICATION… on Critical Information Infrastructure Protection (CIIP) –Protecting Europe from
large scale cyber-attacks and disruptions: enhancing preparedness, security and resilience.
European Commission (2010) Comparative Study on Different Approaches to new privacy challenges, in particular in the light of
Technological Developments.
European Commission (2011) COMMUNICATION…on Critical Information Infrastructure Protection – Achievements and next steps:
towards global cyber-security.
European Commission (2012) COMMUNICATION…on Tackling Crime in our Digital age: Establishing a European Cybercrime Centre
European Commission (2012) Regulation of the European Parliament and of the Council on the protection of individuals with regard
to the processing of personal data and on the movement of such data (General Data Protection Regulation).
European Commission (2013) Proposal for a Directive of European Parliament and of the Council concerning measures to ensure a
high common level of network and information security across the Union.
European Commission (2013) Commission Staff Working Document – Impact Assessment
European Union Agency for Network and Information Security (2015) Cyber security for Smart Cities - An architecture model for
public transport.
Financial Times – The Big Read (2015) Cyber security: Attack of the health hackers. (Retrieved from
http://www.ft.com/cms/s/2/f3cbda3e-a027-11e5-8613-08e211ea5317.html#axzz3vA6qRxP8).
FireEye (2015) Cyber Threats to The Nordic Region. (Retrieved from https://www.fireeye.com/content/dam/fireeye-
www/global/en/current-threats/pdfs/rpt-nordic-threat-landscape.pdf)
International Telecommunication Union (2014) ITU-T Focus Group on Smart Sustainable Cities - Smart water management in cities.
Focus Group Technical Report. FG-SSC.
Securing Smart Cities (2015) An Emerging US (and World) Threat: Cities Wide Open to Cyber Attacks. (Avaliable at
http://securingsmartcities.org/)
Securing Smart Cities (2015) Cyber Security Guidelines for Smart City Technology Adoption. (Avaliable at
http://securingsmartcities.org/)
The Register (2001) Hacker jailed for revenge sewage attacks. (Retrieved from
http://www.theregister.co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/)
The Washington Post (2011) Foreign hackers targeted U.S. Water plant in apparent malicious cyber attack, expert says. (Retrieved
from https://www.washingtonpost.com/blogs/checkpoint-washington/post/foreign-hackers-broke-into-illinois-
water-plant-control-system-industry-expert-says/2011/11/18/gIQAgmTZYN_blog.html)
The Washington Post (2015) Hacks on the highway - Automakers rush to add wireless features, leaving our cars open to hackers.
(Retrieved from http://www.washingtonpost.com/sf/business/2015/07/22/hacks-on-the-highway/)
The Wall Street Journal (2015) Anthem: Hacked Database Included 78.8 Million People. (Retrieved from
http://www.wsj.com/articles/anthem-hacked-database-included-78-8-million-people-1424807364)
Wired (2016) Everything We Know About Ukraine’s Power Plant Hack. (Retrieved from
http://www.wired.com/2016/01/everything-we-know-about-ukraines-power-plant-hack/)

More Related Content

What's hot

Connected IO: Smart Cities
Connected IO: Smart CitiesConnected IO: Smart Cities
Connected IO: Smart Cities
danielpwardmbd
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
segughana
 
Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013
Turvallisuus2013
 
Security Research Day Summary of Input
Security Research Day Summary of InputSecurity Research Day Summary of Input
Security Research Day Summary of Input
IoTUK
 
Smart Cities Day 2 Urban Innovation
Smart Cities Day 2 Urban InnovationSmart Cities Day 2 Urban Innovation
Smart Cities Day 2 Urban Innovation
4 All of Us
 
ITU Internet of Things Compendium 2016
ITU Internet of Things Compendium 2016ITU Internet of Things Compendium 2016
ITU Internet of Things Compendium 2016
ITU
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
ITU
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
segughana
 
Internet of Things (IoT) Smart City Insights from Patents
Internet of Things (IoT) Smart City Insights from PatentsInternet of Things (IoT) Smart City Insights from Patents
Internet of Things (IoT) Smart City Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
Mohammad Mohtashim
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
segughana
 
IoT enabled Smart Mobility: Hype or Reality?
IoT enabled Smart Mobility: Hype or Reality?IoT enabled Smart Mobility: Hype or Reality?
IoT enabled Smart Mobility: Hype or Reality?
Srinivasan Ramaswamy
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
Pasquale Puzio
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
segughana
 
internet of things
internet of thingsinternet of things
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
Qian JIN
 
M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.
Pedro Menendez-Valdes
 
TelcoME2015_IOTRegulation
TelcoME2015_IOTRegulationTelcoME2015_IOTRegulation
TelcoME2015_IOTRegulation
EamonHolley
 
New ITU Standard on Identity & Access Management
New ITU Standard on Identity & Access ManagementNew ITU Standard on Identity & Access Management
New ITU Standard on Identity & Access Management
ITU
 
Safety check IoT Automobile
Safety check IoT AutomobileSafety check IoT Automobile
Safety check IoT Automobile
Akshank Shah
 

What's hot (20)

Connected IO: Smart Cities
Connected IO: Smart CitiesConnected IO: Smart Cities
Connected IO: Smart Cities
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013
 
Security Research Day Summary of Input
Security Research Day Summary of InputSecurity Research Day Summary of Input
Security Research Day Summary of Input
 
Smart Cities Day 2 Urban Innovation
Smart Cities Day 2 Urban InnovationSmart Cities Day 2 Urban Innovation
Smart Cities Day 2 Urban Innovation
 
ITU Internet of Things Compendium 2016
ITU Internet of Things Compendium 2016ITU Internet of Things Compendium 2016
ITU Internet of Things Compendium 2016
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
Internet of Things (IoT) Smart City Insights from Patents
Internet of Things (IoT) Smart City Insights from PatentsInternet of Things (IoT) Smart City Insights from Patents
Internet of Things (IoT) Smart City Insights from Patents
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
IoT enabled Smart Mobility: Hype or Reality?
IoT enabled Smart Mobility: Hype or Reality?IoT enabled Smart Mobility: Hype or Reality?
IoT enabled Smart Mobility: Hype or Reality?
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
 
internet of things
internet of thingsinternet of things
internet of things
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
 
M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.
 
TelcoME2015_IOTRegulation
TelcoME2015_IOTRegulationTelcoME2015_IOTRegulation
TelcoME2015_IOTRegulation
 
New ITU Standard on Identity & Access Management
New ITU Standard on Identity & Access ManagementNew ITU Standard on Identity & Access Management
New ITU Standard on Identity & Access Management
 
Safety check IoT Automobile
Safety check IoT AutomobileSafety check IoT Automobile
Safety check IoT Automobile
 

Viewers also liked

Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber Security
Neil Parker
 
C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...
C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...
C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...
acinfotec
 
Cyber security in smart cities
Cyber security in smart cities  Cyber security in smart cities
Cyber security in smart cities
Aboul Ella Hassanien
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security
 
Cyber services IoT Security
Cyber services IoT Security Cyber services IoT Security
Cyber services IoT Security
Gábor Nagymajtényi
 
Project soli
Project  soliProject  soli
Project soli
ankit kaim
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 
7 Strategies for Reducing IoT Cyber Risk
7 Strategies for Reducing IoT Cyber Risk 7 Strategies for Reducing IoT Cyber Risk
7 Strategies for Reducing IoT Cyber Risk
Hector Del Castillo, CPM, CPMM
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
OWASP EEE
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
IoT613
 
Smart Cities in the IoT Era
Smart Cities in the IoT EraSmart Cities in the IoT Era
Smart Cities in the IoT Era
Opposing Force S.r.l.
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
JAZEEL K T
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
CA Technologies
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
Dr. Mazlan Abbas
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
SlideShare
 

Viewers also liked (17)

Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber Security
 
C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...
C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...
C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...
 
Cyber security in smart cities
Cyber security in smart cities  Cyber security in smart cities
Cyber security in smart cities
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Cyber services IoT Security
Cyber services IoT Security Cyber services IoT Security
Cyber services IoT Security
 
Project soli
Project  soliProject  soli
Project soli
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
 
7 Strategies for Reducing IoT Cyber Risk
7 Strategies for Reducing IoT Cyber Risk 7 Strategies for Reducing IoT Cyber Risk
7 Strategies for Reducing IoT Cyber Risk
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
Smart Cities in the IoT Era
Smart Cities in the IoT EraSmart Cities in the IoT Era
Smart Cities in the IoT Era
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 

Similar to Privacy & cyber-physical security in eu cities 2016

Business intelligence on the chinese greentech market
Business intelligence on the chinese greentech marketBusiness intelligence on the chinese greentech market
Business intelligence on the chinese greentech market
EC2i
 
Libelium IoT to promote democracy and transparency
Libelium IoT to promote democracy and transparencyLibelium IoT to promote democracy and transparency
Libelium IoT to promote democracy and transparency
J On The Beach
 
IoT Scotland 2018
IoT Scotland 2018IoT Scotland 2018
IoT Scotland 2018
Ray Bugg
 
COST Action CA16222 on Autonomous and Connected Transport –How block chain co...
COST Action CA16222 on Autonomous and Connected Transport –How block chain co...COST Action CA16222 on Autonomous and Connected Transport –How block chain co...
COST Action CA16222 on Autonomous and Connected Transport –How block chain co...
Federico Costantini
 
Design Portfolio
Design PortfolioDesign Portfolio
Design Portfolio
Vijay Pisal
 
Smart cities uk 2018 stream 2 - infrastructure
Smart cities uk 2018 stream 2 - infrastructureSmart cities uk 2018 stream 2 - infrastructure
Smart cities uk 2018 stream 2 - infrastructure
Scott Buckler
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
CYBERWISER .eu
 
Business intelligence on the US greentech market
Business intelligence on the US greentech marketBusiness intelligence on the US greentech market
Business intelligence on the US greentech market
EC2i
 
Internet of Things Workshop
Internet of Things WorkshopInternet of Things Workshop
Internet of Things Workshop
Dr. Mazlan Abbas
 
Internet of Things - The Tip of an Iceberg
Internet of Things - The Tip of an IcebergInternet of Things - The Tip of an Iceberg
Internet of Things - The Tip of an Iceberg
Dr. Mazlan Abbas
 
Smart & Connected Communities / Addressing cities challenges with refined dat...
Smart & Connected Communities / Addressing cities challenges with refined dat...Smart & Connected Communities / Addressing cities challenges with refined dat...
Smart & Connected Communities / Addressing cities challenges with refined dat...
Mindtrek
 
Smartweek 2014 - Internet of Things (closing day 1 keynote)
Smartweek 2014 - Internet of Things (closing day 1 keynote)Smartweek 2014 - Internet of Things (closing day 1 keynote)
Smartweek 2014 - Internet of Things (closing day 1 keynote)
Rick Huijbregts
 
Matthew Bailey IoT Keynote - Future of Wireless, Humanity and our Planet
Matthew Bailey IoT Keynote - Future of Wireless, Humanity and our PlanetMatthew Bailey IoT Keynote - Future of Wireless, Humanity and our Planet
Matthew Bailey IoT Keynote - Future of Wireless, Humanity and our Planet
Matthew Bailey
 
Xvidia Acre Conf ppt
Xvidia Acre Conf  pptXvidia Acre Conf  ppt
Xvidia Acre Conf ppt
ars756
 
uniten-june21-v1-160621070721.pdf
uniten-june21-v1-160621070721.pdfuniten-june21-v1-160621070721.pdf
uniten-june21-v1-160621070721.pdf
Lê Duy Tân
 
Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)
Dr. Mazlan Abbas
 
IOT for Smart City
IOT for Smart CityIOT for Smart City
IOT for Smart City
Dr. Mazlan Abbas
 
Presentacion Wim Elfrink IoT World Forum Chicago
Presentacion Wim Elfrink IoT World Forum ChicagoPresentacion Wim Elfrink IoT World Forum Chicago
Presentacion Wim Elfrink IoT World Forum Chicago
Felipe Lamus
 
Wim Elfrink Keynote Slides
Wim Elfrink Keynote Slides Wim Elfrink Keynote Slides
Wim Elfrink Keynote Slides
Bessie Wang
 
ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility
Rick Huijbregts
 

Similar to Privacy & cyber-physical security in eu cities 2016 (20)

Business intelligence on the chinese greentech market
Business intelligence on the chinese greentech marketBusiness intelligence on the chinese greentech market
Business intelligence on the chinese greentech market
 
Libelium IoT to promote democracy and transparency
Libelium IoT to promote democracy and transparencyLibelium IoT to promote democracy and transparency
Libelium IoT to promote democracy and transparency
 
IoT Scotland 2018
IoT Scotland 2018IoT Scotland 2018
IoT Scotland 2018
 
COST Action CA16222 on Autonomous and Connected Transport –How block chain co...
COST Action CA16222 on Autonomous and Connected Transport –How block chain co...COST Action CA16222 on Autonomous and Connected Transport –How block chain co...
COST Action CA16222 on Autonomous and Connected Transport –How block chain co...
 
Design Portfolio
Design PortfolioDesign Portfolio
Design Portfolio
 
Smart cities uk 2018 stream 2 - infrastructure
Smart cities uk 2018 stream 2 - infrastructureSmart cities uk 2018 stream 2 - infrastructure
Smart cities uk 2018 stream 2 - infrastructure
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
 
Business intelligence on the US greentech market
Business intelligence on the US greentech marketBusiness intelligence on the US greentech market
Business intelligence on the US greentech market
 
Internet of Things Workshop
Internet of Things WorkshopInternet of Things Workshop
Internet of Things Workshop
 
Internet of Things - The Tip of an Iceberg
Internet of Things - The Tip of an IcebergInternet of Things - The Tip of an Iceberg
Internet of Things - The Tip of an Iceberg
 
Smart & Connected Communities / Addressing cities challenges with refined dat...
Smart & Connected Communities / Addressing cities challenges with refined dat...Smart & Connected Communities / Addressing cities challenges with refined dat...
Smart & Connected Communities / Addressing cities challenges with refined dat...
 
Smartweek 2014 - Internet of Things (closing day 1 keynote)
Smartweek 2014 - Internet of Things (closing day 1 keynote)Smartweek 2014 - Internet of Things (closing day 1 keynote)
Smartweek 2014 - Internet of Things (closing day 1 keynote)
 
Matthew Bailey IoT Keynote - Future of Wireless, Humanity and our Planet
Matthew Bailey IoT Keynote - Future of Wireless, Humanity and our PlanetMatthew Bailey IoT Keynote - Future of Wireless, Humanity and our Planet
Matthew Bailey IoT Keynote - Future of Wireless, Humanity and our Planet
 
Xvidia Acre Conf ppt
Xvidia Acre Conf  pptXvidia Acre Conf  ppt
Xvidia Acre Conf ppt
 
uniten-june21-v1-160621070721.pdf
uniten-june21-v1-160621070721.pdfuniten-june21-v1-160621070721.pdf
uniten-june21-v1-160621070721.pdf
 
Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)
 
IOT for Smart City
IOT for Smart CityIOT for Smart City
IOT for Smart City
 
Presentacion Wim Elfrink IoT World Forum Chicago
Presentacion Wim Elfrink IoT World Forum ChicagoPresentacion Wim Elfrink IoT World Forum Chicago
Presentacion Wim Elfrink IoT World Forum Chicago
 
Wim Elfrink Keynote Slides
Wim Elfrink Keynote Slides Wim Elfrink Keynote Slides
Wim Elfrink Keynote Slides
 
ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility
 

Recently uploaded

在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
9d5c8i83
 
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRISTTRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
Cheong Man Keong
 
2024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 412024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 41
JSchaus & Associates
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
Scalabrini Institute for Human Mobility in Africa
 
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Congressional Budget Office
 
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
taqyea
 
Border towns and spaces of (in)visibility.pdf
Border towns and spaces of (in)visibility.pdfBorder towns and spaces of (in)visibility.pdf
Border towns and spaces of (in)visibility.pdf
Scalabrini Institute for Human Mobility in Africa
 
加急办理华威大学毕业证硕士文凭证书原版一模一样
加急办理华威大学毕业证硕士文凭证书原版一模一样加急办理华威大学毕业证硕士文凭证书原版一模一样
加急办理华威大学毕业证硕士文凭证书原版一模一样
uu1psyf6
 
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your WillMilton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
fundraising4
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
JSchaus & Associates
 
G7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdfG7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdf
Energy for One World
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
narinav14
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
narinav14
 
UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024
Energy for One World
 
Antyodaya saral portal haryana govt schemes
Antyodaya saral portal haryana govt schemesAntyodaya saral portal haryana govt schemes
Antyodaya saral portal haryana govt schemes
narinav14
 
Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021
Congressional Budget Office
 
G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024
Energy for One World
 
CBO's Immigration Projections - Presentation
CBO's Immigration Projections - PresentationCBO's Immigration Projections - Presentation
CBO's Immigration Projections - Presentation
Congressional Budget Office
 
How To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity JourneyHow To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity Journey
Aggregage
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
teeaszt
 

Recently uploaded (20)

在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
 
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRISTTRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
 
2024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 412024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 41
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034
 
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
 
Border towns and spaces of (in)visibility.pdf
Border towns and spaces of (in)visibility.pdfBorder towns and spaces of (in)visibility.pdf
Border towns and spaces of (in)visibility.pdf
 
加急办理华威大学毕业证硕士文凭证书原版一模一样
加急办理华威大学毕业证硕士文凭证书原版一模一样加急办理华威大学毕业证硕士文凭证书原版一模一样
加急办理华威大学毕业证硕士文凭证书原版一模一样
 
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your WillMilton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
 
G7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdfG7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdf
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
 
UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024
 
Antyodaya saral portal haryana govt schemes
Antyodaya saral portal haryana govt schemesAntyodaya saral portal haryana govt schemes
Antyodaya saral portal haryana govt schemes
 
Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021
 
G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024
 
CBO's Immigration Projections - Presentation
CBO's Immigration Projections - PresentationCBO's Immigration Projections - Presentation
CBO's Immigration Projections - Presentation
 
How To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity JourneyHow To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity Journey
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
 

Privacy & cyber-physical security in eu cities 2016

  • 2. Privacy & Cyber-Physical Security in European Cities 1 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk
  • 3. Privacy & Cyber-Physical Security in European Cities 2 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk
  • 4. Privacy & Cyber-Physical Security in European Cities 3 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk ........................................................................................................ 1 ........................................................................................................ 4 ........................................................... 5 ....................................................................................... 10 ......................................................................................... 13 ................................................................................................... 14 .............................................................................................................. 16 .............................................................................................................. 17 ............................................................................................................... 18 ............................................................................................................... 20 .......................................................................................... 21 .................................................................................................. 21 ........................................................................................ 23 ............................................................ 26 ............................................................................................ 28 ................................................................ 30 ....................................................... 30 ........................................................ 31 .............................................................................................. 33 ........................................................................................................... 35 References ............................................................................................................. 37
  • 5. Privacy & Cyber-Physical Security in European Cities 4 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk
  • 6. Privacy & Cyber-Physical Security in European Cities 5 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk 1 European Commission (2010) Comparative Study on Different Approaches to new privacy challenges, in particular in the light of Technological Developments.
  • 7. Privacy & Cyber-Physical Security in European Cities 6 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk 2 European Commission (2012) Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the movement of such data (General Data Protection Regulation). 3 http://www.allenovery.com/publications/en-gb/data-protection/Pages/Timetable.aspx 4 Commission of the European Communities (2009) COMMUNICATION… on Critical Information Infrastructure Protection (CIIP) –Protecting Europe from large scale cyber-attacks and disruptions: enhancing preparedness, security and resilience.
  • 8. Privacy & Cyber-Physical Security in European Cities 7 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk
  • 9. Privacy & Cyber-Physical Security in European Cities 8 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk 5 European Commission (2011) COMMUNICATION…on Critical Information Infrastructure Protection – Achievements and next steps: towards global cyber-security. 6 European Commission (2012) COMMUNICATION…on Tackling Crime in our Digital age: Establishing a European Cybercrime Centre 7 European Commission (2013) Proposal for a Directive of European Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union. 8 European Commission (2013) Commission Staff Working Document – Impact Assessment
  • 10. Privacy & Cyber-Physical Security in European Cities 9 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk   
  • 11. Privacy & Cyber-Physical Security in European Cities 10 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk
  • 12. Privacy & Cyber-Physical Security in European Cities 11 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk
  • 13. Privacy & Cyber-Physical Security in European Cities 12 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk
  • 14. Privacy & Cyber-Physical Security in European Cities 13 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk
  • 15. Privacy & Cyber-Physical Security in European Cities 14 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk 9 http://www.washingtonpost.com/sf/business/2015/07/22/hacks-on-the-highway/
  • 16. Privacy & Cyber-Physical Security in European Cities 15 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk 10 Securing Smart Cities is a non-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments and other actors. See securingsmartcities.org for more information. 11 https://www.enisa.europa.eu/activities/Resilience-and-CIIP/smart-infrastructures/intelligent-public- transport/smart-cities-architecture-model
  • 17. Privacy & Cyber-Physical Security in European Cities 16 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk 12 http://money.cnn.com/2015/07/17/technology/ucla-health-hack/ 13 http://www.wsj.com/articles/anthem-hacked-database-included-78-8-million-people-1424807364 14 http://www.ft.com/cms/s/2/f3cbda3e-a027-11e5-8613-08e211ea5317.html#axzz3vA6qRxP8
  • 18. Privacy & Cyber-Physical Security in European Cities 17 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk
  • 19. Privacy & Cyber-Physical Security in European Cities 18 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk 15 http://www.bbc.com/news/technology-35297464 16 http://www.wired.com/2016/01/everything-we-know-about-ukraines-power-plant-hack/
  • 20. Privacy & Cyber-Physical Security in European Cities 19 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk 17 https://www.washingtonpost.com/blogs/checkpoint-washington/post/foreign-hackers-broke-into- illinois-water-plant-control-system-industry-expert-says/2011/11/18/gIQAgmTZYN_blog.html
  • 21. Privacy & Cyber-Physical Security in European Cities 20 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk 18 http://www.theregister.co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/
  • 22. Privacy & Cyber-Physical Security in European Cities 21 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk     
  • 23. Privacy & Cyber-Physical Security in European Cities 22 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk Yes 50% Unsure 17% In the process of creating a strategy 25% No 8% DOES YOUR CITY HAVE A STRATEGY FOR THE PRIVACY OF CITIZENS? Yes 67% No 33% IS THE PRIVACY STRATEGY BEING IMPLEMENTED?
  • 24. Privacy & Cyber-Physical Security in European Cities 23 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk        Yes 41% Unsure 42% No 17% IS THE STRATEGY ON HOW TO HANDLE PERSONAL AND SENSITIVE DATA AVALIABLE PUBLICLY? Yes 45% Unsure 44% No 11% IS YOUR CITY’S PRIVACY STRATEGY COMPLIANT WITH THE GDPR?
  • 25. Privacy & Cyber-Physical Security in European Cities 24 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk Yes 67% In the process of creating a strategy 25% No 8% DOES YOUR CITY HAVE A STRATEGY FOR CYBER-PHYSICAL SECURITY? Yes 87% No 13% IS THE CYBER-PHYSICAL SECURITY STRATEGY BEING IMPLEMENTED?
  • 26. Privacy & Cyber-Physical Security in European Cities 25 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk Yes 75% Unsure 17% No 8% DOES YOUR ORGANIZATION CONDUCT REGULAR REVIEWS OF KNOWN AND POTENTIAL CYBER- PHYSICAL VULNERABILITIES IN YOUR DATA SYSTEMS? Yes 17% No 83% DOES YOUR ORGANIZATION OUTSOURCE CYBER-SECURITY?
  • 27. Privacy & Cyber-Physical Security in European Cities 26 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk Yes 67% Unsure 16% No 17% DOES YOUR ORGANIZATION CONDUCT REGULAR SECURITY TRAINING FOR IT USERS? Yes 75% Unsure 8% No 17% DOES YOUR ORGANIZATION HAVE A RISK MITIGATION STRATEGY FOR CYBER- SECURITY? Yes 50% Unsure 50% IS YOUR CITY’S CYBER-PHYSICAL SECURITY STRATEGY COMPLIANT WITH THE GDPR?
  • 28. Privacy & Cyber-Physical Security in European Cities 27 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk Yes 33% Unsure 50% No 17% IS YOUR MUNICIPALITY COMPLIANT WITH THE GDPR?
  • 29. Privacy & Cyber-Physical Security in European Cities 28 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk
  • 30. Privacy & Cyber-Physical Security in European Cities 29 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk
  • 31. Privacy & Cyber-Physical Security in European Cities 30 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk
  • 32. Privacy & Cyber-Physical Security in European Cities 31 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk
  • 33. Privacy & Cyber-Physical Security in European Cities 32 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk A C C C BB B
  • 34. Privacy & Cyber-Physical Security in European Cities 33 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk    19 http://securingsmartcities.org/wp-content/uploads/2015/11/Guidlines_for_Safe_Smart_Cities.pdf
  • 35. Privacy & Cyber-Physical Security in European Cities 34 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk   
  • 36. Privacy & Cyber-Physical Security in European Cities 35 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk 20 http://eur-lex.europa.eu/ 21 http://ec.europa.eu/index_en.htm 22 http://surveyacademy.com/wp-content/uploads/2010/07/Increasing-Survey-Response-Rates.pdf
  • 37. Privacy & Cyber-Physical Security in European Cities 36 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk Please contact Smart City Catalyst on www.scc-eu.dk Valdemarsgade 73, ST.TV DK-1665 Copenhagen V Vat.no 34488258 info@scc-eu.dk
  • 38. Privacy & Cyber-Physical Security in European Cities 37 Copyright©2016 Smart City Catalyst all rights reserved info@scc-eu.dk References Allen & Overy (2015) The EU General Data Protection Regulation – Timetable. (Available at http://www.allenovery.com/publications/en-gb/data-protection/Pages/Timetable.aspx) BBC News (2016) Hackers caused power cut in western Ukraine – US. (Retrieved from http://www.bbc.com/news/technology- 35297464) CNN Money (2015) UCLA Health hacked, 4.5 million victims. (Retrieved from http://money.cnn.com/2015/07/17/technology/ucla- health-hack/) European Commission (2009) COMMUNICATION… on Critical Information Infrastructure Protection (CIIP) –Protecting Europe from large scale cyber-attacks and disruptions: enhancing preparedness, security and resilience. European Commission (2010) Comparative Study on Different Approaches to new privacy challenges, in particular in the light of Technological Developments. European Commission (2011) COMMUNICATION…on Critical Information Infrastructure Protection – Achievements and next steps: towards global cyber-security. European Commission (2012) COMMUNICATION…on Tackling Crime in our Digital age: Establishing a European Cybercrime Centre European Commission (2012) Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the movement of such data (General Data Protection Regulation). European Commission (2013) Proposal for a Directive of European Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union. European Commission (2013) Commission Staff Working Document – Impact Assessment European Union Agency for Network and Information Security (2015) Cyber security for Smart Cities - An architecture model for public transport. Financial Times – The Big Read (2015) Cyber security: Attack of the health hackers. (Retrieved from http://www.ft.com/cms/s/2/f3cbda3e-a027-11e5-8613-08e211ea5317.html#axzz3vA6qRxP8). FireEye (2015) Cyber Threats to The Nordic Region. (Retrieved from https://www.fireeye.com/content/dam/fireeye- www/global/en/current-threats/pdfs/rpt-nordic-threat-landscape.pdf) International Telecommunication Union (2014) ITU-T Focus Group on Smart Sustainable Cities - Smart water management in cities. Focus Group Technical Report. FG-SSC. Securing Smart Cities (2015) An Emerging US (and World) Threat: Cities Wide Open to Cyber Attacks. (Avaliable at http://securingsmartcities.org/) Securing Smart Cities (2015) Cyber Security Guidelines for Smart City Technology Adoption. (Avaliable at http://securingsmartcities.org/) The Register (2001) Hacker jailed for revenge sewage attacks. (Retrieved from http://www.theregister.co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/) The Washington Post (2011) Foreign hackers targeted U.S. Water plant in apparent malicious cyber attack, expert says. (Retrieved from https://www.washingtonpost.com/blogs/checkpoint-washington/post/foreign-hackers-broke-into-illinois- water-plant-control-system-industry-expert-says/2011/11/18/gIQAgmTZYN_blog.html) The Washington Post (2015) Hacks on the highway - Automakers rush to add wireless features, leaving our cars open to hackers. (Retrieved from http://www.washingtonpost.com/sf/business/2015/07/22/hacks-on-the-highway/) The Wall Street Journal (2015) Anthem: Hacked Database Included 78.8 Million People. (Retrieved from http://www.wsj.com/articles/anthem-hacked-database-included-78-8-million-people-1424807364) Wired (2016) Everything We Know About Ukraine’s Power Plant Hack. (Retrieved from http://www.wired.com/2016/01/everything-we-know-about-ukraines-power-plant-hack/)