SlideShare a Scribd company logo
Standards, Security, and Audit
Smart Cities – The Security Aspects
Graeme Parker
Managing Director - Parker Solutions Group
Extensive experience delivering Cyber Security, Business Continuity and Risk
Management solutions in multiple sectors including Government, Financial
Services, City Authorities, Health Services, Electrical and Power to
organizations across the globe.
Graeme provides consulting at the strategic, tactical and operational levels,
conducts and leads audits and leads numerous training events worldwide.
Contact Information
+44(0)1609 760293
graeme@parkersolutionsgroup.co.uk
www.parkersolutionsgroup.co.uk
https://uk.linkedin.com/in/graemeparker
twitter.com/parkerinfosol
https://www.facebook.com/Parker-
Solutions-Group-113377915344272/
3
City, Town, Municipality
Definition
• a large or important town.
• (in the U.S.) an incorporated municipality, usually governed by a
mayor and a board of aldermen or councilmen.
• the inhabitants of a city collectively:
• The entire city is mourning his death.
• (in Canada) a municipality of high rank, usually based on population.
• (in Great Britain) a borough, usually the seat of a bishop, upon
which the dignity of the title has been conferred by the crown.
• the commercial and financial area of London, England.
• a city-state.
4
Urbanization
UN 2015
• 50% of today’s world population live in urban areas (3.5 Billion)
• By 2030 this is predicted to rise to 60%
• 60% then now will be much different to 60% today
• 1 in 8 currently live in one of the worlds 28 “Mega Cities”
• By 2050 it is predicted that 64% of the developing world and 86% of
the developed world will be “urbanized”
• 95% of Urban Growth by 2050 is expected to take place in
developing countries
5
Challenges and Opportunities
Challenges
• Greater demand for natural resources – e.g. water and energy
• Demands on services – Education, healthcare, waste management
etc.
• Increasing pollution and impacts on biodiversity
• Climate change impact – cities take up 2% of Earths land but
account for 80% energy use and 75% carbon emissions (UN 2014)
• Pressure on housing and other resources can contribute to poverty
and crime and other social problems
• Cities are at risk of climate change impacts such as flooding and
weather events.
6
Challenges and Opportunities
Its not all bad..
Cities provide many opportunities including:
• Job and career opportunities
• Flow of ideas and business
• Ability to meet social aspirations of people
• Global connectivity and influence
• Incubators for new ideas, business and innovation
• Centres for education and learning
7
Rising to the Challenge
To meet these challenges cities are aiming to become:
But what does that mean??
8
Smart City
BSI 2014 one of many definitions
‘the effective integration of physical, digital and human systems
in the built environment to deliver sustainable, prosperous and
inclusive future for its citizens’ (BSI, 2014).
9
Smart City Vision
http://in.nec.com/en_IN/blog/smart-cities-
shaping-indias-future.html
10
Smart City Examples
Masdar City – A brand new sustainable City
11
Smart City Examples
Rio – An existing city adopting Smart technologies
12
Smart Cities Core Elements
Element Issues
Citizens Trust, accessibility, ease of use, top
down/bottom up, co-creation
Leadership and Strategy Strategy, effective leadership, inclusive
decision making, stakeholder
engagement, partnerships
Innovation and Enterprise Ecosystems, data economy, finance
business models
Infrastructure, technology, and data Future proofing, resilience, sensors, data,
privacy, security and ethics
Measurement and learning City performance, metrics and indicators,
ideas sharing
13
Open Data
Open Data Institute
Open data is data that anyone can access, use or share. Simple
as that. When big companies or governments release non-
personal data, it enables small businesses, citizens and medical
researchers to develop resources which make crucial
improvements to their communities.
14
Smart City Information and System Assets
City Assets
Assets
Infrastructure Publically Owned
Private sector infrastructure
Citizen owned data
Open data
Private data
Sensors and IoT devices
Industrial Control Systems
Citizen assets
Databases
Applications
Smart Devices
15
Threats – Traditional definition
ISO 27000, clause 2.77
Potential cause of an unwanted incident
which may result in harm to a system or an
organization
But what about the city?
The harm is much wider!!
16
Sources of Threat
Threat Source Examples
1 Organized Crime
Theft of personal data
Ransomware
2 Terrorist Groups
Distributed Denial of Service Attack
Intelligence gathering
3 Disgruntled Citizens
Service disruption
Website de-facement
4 Suppliers
Human error
Design and security flaws
5 Foreign Intelligence or Hostile
State
Eavesdropping and surveillance
Sabotage
6 Commercial Entities
Resale of citizen data
Invasion of privacy
7 Natural Events
Floods
Power Outages
17
Security Programme
A city wide security programme is required
To manage the many different assets and potential risks a city
wide security programme is needed
• All cities differ in terms of stakeholders and their contribution
to security but ultimately security policy should be set by the
city authorities (e.g. sponsors of the city initiatives)
But where do we start? Are there any standards?
18
Smart City Standards
BSI
PAS 180:2014 – Smart Cities – Vocabulary
PAS 181:2014 – Smart city framework – Guide to establishing
strategies for smart cities and communities
PAS 182:2014 – Smart city concept model – Guide for establishing a
model for data interoperability
Hypercat – A standard for secure and interoperable IoT for Cities – PAS
212:2016 – Automatic resource discovery for the Internet of Things –
Specification
ITU – FGSSC – Sustainable Cities Focus Groups
19
Security Standards
Standard Purpose
ISO/IEC 27001 Specifies the requirements for an Information
Security Management System
ISO/IEC 27002 Specifies a code of practice and security controls
to manager risks
NIST SP 800-82 Specifies a security programme and control for
SCADA and Industrial Control Systems
OWASP Describes web application security controls
PCI-DSS Details requirements for the security of
cardholder data
ISO/IEC 29100 Specifies the requirements for a Privacy
Framework
Government Standards and
Guides
Designed to address local risks and protect
government assets
ISO/IEC 27035 Designed for Incident Response
But where is the IOT Security Standards???
20
Highlights of the Smart City Security Programme
• Clearly Defined Roles and Responsibilities
• Clear Asset Ownership
• Security by Design
• Privacy Impact Assessments
• Vendor Management and Partnership
• Engagement with Authorities
• Citizen Education and Engagement
• Security Incident Response Processes
21
Roles and Responsbilities
• Roles and Asset Ownership need to be clear
• This could be within a city authority, vendor, or other
organisation but must be clear to all involved
22
Highlights of the Smart City Security Programme
Security by Design
• Security by design means:
• Ensuring security professionals are engaged from the initiation of an
idea
• Defining an approach to Security Architecture
• Ensuring relevant security standards are consulted and minimum
standards are defined
• Challenging vendors and suppliers to meet standards
• Making security criteria part of quality criteria
• Ensuring security is tested at logical points with clear acceptance
criteria
• Considering an Accreditation Strategy
• Agile is not a reason to ignore all of the above
23
Highlights of the Smart City Security Programme
Privacy by Design
• If we consider Security by Design then we need to also consider Citizens
Privacy
• Privacy Impact Assessments should be integral to the launch of all new
Citizen services or to changes in Citizen Services
Privacy impact assessments (PIAs) are a tool that you can use to identify and
reduce the privacy risks of your projects. A PIA can reduce the risks of harm to
individuals through the misuse of their personal information. It can also help
you to design more efficient and effective processes for handling personal
data.
- UK Information Commissioner
24
Highlights of the Smart City Security Programme
Vendor Management
For most smart cities vendors will be appointed or even play an
integral role through public/private partnerships or joint
ventures.
• Ensuring that vendors at all levels address security issues is
vital.
• An error in the chain can have significant impacts
• A clear vendor management process will be central to the
programme.
25
Engagement with Authorities
National, Regional and International Standards
City Authorities should stay ahead of developments and can play
a key role in shaping future standards, laws and regulations.
This could be at an International Level – E.g. ISO standards.
Sector level – E.g. influencing standards on IoT security amongst
vendors
Multinational Level – E.g. influencing policy or guidance at EU or
OECD level
26
Citizen Engagement and Education
Smart Citizens
Engaging Citizens is key to seizing the opportunities of Smart
Cities. It can also ensure understand their rights and how they
can protect themselves and other stakeholders
Citizens can be:
• Consumers
• Producer
• Prosumer
• Co-creators
27
Citizen Engagement and Education
Smart Citizens
How to engage and educate?
• Community Platforms such as Smart Citizen
• Projects aimed at all age groups and sectors of society
• Project Engagement – Waag Society
• Hackathons
• Soliciting feedback/surveys
• Information Security Awareness Campaigns
• Engagement events
28
IncidentsDisaster
Management Incidents and Events
High Risk occurrence
and low impact
Low Risk occurrence and
high impact
 Managed by the incident management
process
 Managed by the business continuity and
emergency management processes
Management of Residual Risk
29
Key Messages
• Smart City Security is a multi stakeholder activity
• It takes leadership and engagement
• It is vital not just to protect information but to protect citizens
and everything that a citizens depend upon
• It is a mutli disciplinary activity with security touching every
part of smart city planning, development, maintenance and
operations
• Industry needs to work on IoT Security Standards so we can
be confident in the devices deployed in Smart Cities
30
Key Messages
A Truly Smart City
http://in.nec.com/en_IN/blog/smart-cities-
shaping-indias-future.html
THANK YOU
?
123 456 789
name.surname@domain.com
www.domain.com
linkedin.com/name.surname
twitter.com/name.surname
fb.com/name.surname

More Related Content

What's hot

Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
Pasquale Puzio
 
Smart Cities in the AI Era
Smart Cities in the AI EraSmart Cities in the AI Era
Smart Cities in the AI Era
NVIDIA
 
Iot for smart city
Iot for smart cityIot for smart city
Iot for smart city
sanalkumar k
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
Vishnupriya T H
 
Artificial Intelligence in Security and Surveillance
Artificial Intelligence in Security and SurveillanceArtificial Intelligence in Security and Surveillance
Artificial Intelligence in Security and Surveillance
Gaurav Patwardhan
 
Internet of things
Internet of thingsInternet of things
Internet of things
Shahneel Siddiqui
 
Smart Cities Reference Architecture
Smart Cities Reference ArchitectureSmart Cities Reference Architecture
Smart Cities Reference Architecture
Alexander SAMARIN
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
Chetan Kumar S
 
Edge Computing
Edge Computing Edge Computing
Edge Computing
aNumak & Company
 
AI & IoT in the development of smart cities
AI & IoT in the development of smart citiesAI & IoT in the development of smart cities
AI & IoT in the development of smart citiesRaunak Mundada
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
Smarter cities and Artificial Intelligence
Smarter cities and Artificial IntelligenceSmarter cities and Artificial Intelligence
Smarter cities and Artificial Intelligence
Pietro Leo
 
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachThe Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
Deloitte United States
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
Dr. Mazlan Abbas
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
Eslam Nader
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
Amarjeetsingh Thakur
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
Cisco Canada
 
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
Slide Marvels
 
Internet of things
Internet of thingsInternet of things
Internet of things
Vikrant Negi
 

What's hot (20)

Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Smart Cities in the AI Era
Smart Cities in the AI EraSmart Cities in the AI Era
Smart Cities in the AI Era
 
Iot for smart city
Iot for smart cityIot for smart city
Iot for smart city
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Artificial Intelligence in Security and Surveillance
Artificial Intelligence in Security and SurveillanceArtificial Intelligence in Security and Surveillance
Artificial Intelligence in Security and Surveillance
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Smart Cities Reference Architecture
Smart Cities Reference ArchitectureSmart Cities Reference Architecture
Smart Cities Reference Architecture
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Edge Computing
Edge Computing Edge Computing
Edge Computing
 
AI & IoT in the development of smart cities
AI & IoT in the development of smart citiesAI & IoT in the development of smart cities
AI & IoT in the development of smart cities
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Smarter cities and Artificial Intelligence
Smarter cities and Artificial IntelligenceSmarter cities and Artificial Intelligence
Smarter cities and Artificial Intelligence
 
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachThe Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
 
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Similar to Smart Cities – The Security Aspects

Smart Cities - The Security Aspects
Smart Cities - The Security AspectsSmart Cities - The Security Aspects
Smart Cities - The Security Aspects
Graeme Parker
 
CISCO SMART CITY
CISCO SMART CITYCISCO SMART CITY
CISCO SMART CITY
Pujan Motiwala
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart cities
Saeed Al Dhaheri
 
John Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public SectorJohn Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public Sector
itnewsafrica
 
Securing Smart Cities
Securing Smart CitiesSecuring Smart Cities
Securing Smart Cities
James '​-- Mckinlay
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Judith Beckhard Cardoso
 
Smart cities
Smart citiesSmart cities
Smart cities
NikhilShinde136
 
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
Smart City
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
VMUG IT
 
White Paper on Smart Cities
White Paper on Smart CitiesWhite Paper on Smart Cities
White Paper on Smart Cities
DAYWATCHER.COM
 
ISO Smart City Infrastucture Frameworkv2
ISO Smart City Infrastucture Frameworkv2ISO Smart City Infrastucture Frameworkv2
ISO Smart City Infrastucture Frameworkv2Jonathan L. Tan, M.B.A.
 
AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things
Defence and Security Accelerator
 
Tan smart city infrastucture framework
Tan smart city infrastucture frameworkTan smart city infrastucture framework
Tan smart city infrastucture framework
Jonathan L. Tan, M.B.A.
 
A Quintessential smart city infrastructure framework for all stakeholders
A Quintessential smart city infrastructure framework for all stakeholdersA Quintessential smart city infrastructure framework for all stakeholders
A Quintessential smart city infrastructure framework for all stakeholders
Jonathan L. Tan, M.B.A.
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
SMARTCITY –a hype or reality ?
SMARTCITY –a hype or reality ?SMARTCITY –a hype or reality ?
SMARTCITY –a hype or reality ?
Panduit
 
Smart cities presentation
Smart cities presentationSmart cities presentation
Smart cities presentation
Association for Project Management
 

Similar to Smart Cities – The Security Aspects (20)

Smart Cities - The Security Aspects
Smart Cities - The Security AspectsSmart Cities - The Security Aspects
Smart Cities - The Security Aspects
 
CISCO SMART CITY
CISCO SMART CITYCISCO SMART CITY
CISCO SMART CITY
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart cities
 
John Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public SectorJohn Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public Sector
 
Securing Smart Cities
Securing Smart CitiesSecuring Smart Cities
Securing Smart Cities
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Smart cities
Smart citiesSmart cities
Smart cities
 
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
White Paper on Smart Cities
White Paper on Smart CitiesWhite Paper on Smart Cities
White Paper on Smart Cities
 
ISO Smart City Infrastucture Frameworkv2
ISO Smart City Infrastucture Frameworkv2ISO Smart City Infrastucture Frameworkv2
ISO Smart City Infrastucture Frameworkv2
 
AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things
 
Tan Smart City Infrastucture Framework
Tan Smart City Infrastucture FrameworkTan Smart City Infrastucture Framework
Tan Smart City Infrastucture Framework
 
Tan smart city infrastucture framework
Tan smart city infrastucture frameworkTan smart city infrastucture framework
Tan smart city infrastucture framework
 
Tan Smart City Infrastucture Framework
Tan Smart City Infrastucture FrameworkTan Smart City Infrastucture Framework
Tan Smart City Infrastucture Framework
 
A Quintessential smart city infrastructure framework for all stakeholders
A Quintessential smart city infrastructure framework for all stakeholdersA Quintessential smart city infrastructure framework for all stakeholders
A Quintessential smart city infrastructure framework for all stakeholders
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
SMARTCITY –a hype or reality ?
SMARTCITY –a hype or reality ?SMARTCITY –a hype or reality ?
SMARTCITY –a hype or reality ?
 
MESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - UpdatedMESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - Updated
 
Smart cities presentation
Smart cities presentationSmart cities presentation
Smart cities presentation
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 

Recently uploaded (20)

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 

Smart Cities – The Security Aspects

  • 1. Standards, Security, and Audit Smart Cities – The Security Aspects
  • 2. Graeme Parker Managing Director - Parker Solutions Group Extensive experience delivering Cyber Security, Business Continuity and Risk Management solutions in multiple sectors including Government, Financial Services, City Authorities, Health Services, Electrical and Power to organizations across the globe. Graeme provides consulting at the strategic, tactical and operational levels, conducts and leads audits and leads numerous training events worldwide. Contact Information +44(0)1609 760293 graeme@parkersolutionsgroup.co.uk www.parkersolutionsgroup.co.uk https://uk.linkedin.com/in/graemeparker twitter.com/parkerinfosol https://www.facebook.com/Parker- Solutions-Group-113377915344272/
  • 3. 3 City, Town, Municipality Definition • a large or important town. • (in the U.S.) an incorporated municipality, usually governed by a mayor and a board of aldermen or councilmen. • the inhabitants of a city collectively: • The entire city is mourning his death. • (in Canada) a municipality of high rank, usually based on population. • (in Great Britain) a borough, usually the seat of a bishop, upon which the dignity of the title has been conferred by the crown. • the commercial and financial area of London, England. • a city-state.
  • 4. 4 Urbanization UN 2015 • 50% of today’s world population live in urban areas (3.5 Billion) • By 2030 this is predicted to rise to 60% • 60% then now will be much different to 60% today • 1 in 8 currently live in one of the worlds 28 “Mega Cities” • By 2050 it is predicted that 64% of the developing world and 86% of the developed world will be “urbanized” • 95% of Urban Growth by 2050 is expected to take place in developing countries
  • 5. 5 Challenges and Opportunities Challenges • Greater demand for natural resources – e.g. water and energy • Demands on services – Education, healthcare, waste management etc. • Increasing pollution and impacts on biodiversity • Climate change impact – cities take up 2% of Earths land but account for 80% energy use and 75% carbon emissions (UN 2014) • Pressure on housing and other resources can contribute to poverty and crime and other social problems • Cities are at risk of climate change impacts such as flooding and weather events.
  • 6. 6 Challenges and Opportunities Its not all bad.. Cities provide many opportunities including: • Job and career opportunities • Flow of ideas and business • Ability to meet social aspirations of people • Global connectivity and influence • Incubators for new ideas, business and innovation • Centres for education and learning
  • 7. 7 Rising to the Challenge To meet these challenges cities are aiming to become: But what does that mean??
  • 8. 8 Smart City BSI 2014 one of many definitions ‘the effective integration of physical, digital and human systems in the built environment to deliver sustainable, prosperous and inclusive future for its citizens’ (BSI, 2014).
  • 10. 10 Smart City Examples Masdar City – A brand new sustainable City
  • 11. 11 Smart City Examples Rio – An existing city adopting Smart technologies
  • 12. 12 Smart Cities Core Elements Element Issues Citizens Trust, accessibility, ease of use, top down/bottom up, co-creation Leadership and Strategy Strategy, effective leadership, inclusive decision making, stakeholder engagement, partnerships Innovation and Enterprise Ecosystems, data economy, finance business models Infrastructure, technology, and data Future proofing, resilience, sensors, data, privacy, security and ethics Measurement and learning City performance, metrics and indicators, ideas sharing
  • 13. 13 Open Data Open Data Institute Open data is data that anyone can access, use or share. Simple as that. When big companies or governments release non- personal data, it enables small businesses, citizens and medical researchers to develop resources which make crucial improvements to their communities.
  • 14. 14 Smart City Information and System Assets City Assets Assets Infrastructure Publically Owned Private sector infrastructure Citizen owned data Open data Private data Sensors and IoT devices Industrial Control Systems Citizen assets Databases Applications Smart Devices
  • 15. 15 Threats – Traditional definition ISO 27000, clause 2.77 Potential cause of an unwanted incident which may result in harm to a system or an organization But what about the city? The harm is much wider!!
  • 16. 16 Sources of Threat Threat Source Examples 1 Organized Crime Theft of personal data Ransomware 2 Terrorist Groups Distributed Denial of Service Attack Intelligence gathering 3 Disgruntled Citizens Service disruption Website de-facement 4 Suppliers Human error Design and security flaws 5 Foreign Intelligence or Hostile State Eavesdropping and surveillance Sabotage 6 Commercial Entities Resale of citizen data Invasion of privacy 7 Natural Events Floods Power Outages
  • 17. 17 Security Programme A city wide security programme is required To manage the many different assets and potential risks a city wide security programme is needed • All cities differ in terms of stakeholders and their contribution to security but ultimately security policy should be set by the city authorities (e.g. sponsors of the city initiatives) But where do we start? Are there any standards?
  • 18. 18 Smart City Standards BSI PAS 180:2014 – Smart Cities – Vocabulary PAS 181:2014 – Smart city framework – Guide to establishing strategies for smart cities and communities PAS 182:2014 – Smart city concept model – Guide for establishing a model for data interoperability Hypercat – A standard for secure and interoperable IoT for Cities – PAS 212:2016 – Automatic resource discovery for the Internet of Things – Specification ITU – FGSSC – Sustainable Cities Focus Groups
  • 19. 19 Security Standards Standard Purpose ISO/IEC 27001 Specifies the requirements for an Information Security Management System ISO/IEC 27002 Specifies a code of practice and security controls to manager risks NIST SP 800-82 Specifies a security programme and control for SCADA and Industrial Control Systems OWASP Describes web application security controls PCI-DSS Details requirements for the security of cardholder data ISO/IEC 29100 Specifies the requirements for a Privacy Framework Government Standards and Guides Designed to address local risks and protect government assets ISO/IEC 27035 Designed for Incident Response But where is the IOT Security Standards???
  • 20. 20 Highlights of the Smart City Security Programme • Clearly Defined Roles and Responsibilities • Clear Asset Ownership • Security by Design • Privacy Impact Assessments • Vendor Management and Partnership • Engagement with Authorities • Citizen Education and Engagement • Security Incident Response Processes
  • 21. 21 Roles and Responsbilities • Roles and Asset Ownership need to be clear • This could be within a city authority, vendor, or other organisation but must be clear to all involved
  • 22. 22 Highlights of the Smart City Security Programme Security by Design • Security by design means: • Ensuring security professionals are engaged from the initiation of an idea • Defining an approach to Security Architecture • Ensuring relevant security standards are consulted and minimum standards are defined • Challenging vendors and suppliers to meet standards • Making security criteria part of quality criteria • Ensuring security is tested at logical points with clear acceptance criteria • Considering an Accreditation Strategy • Agile is not a reason to ignore all of the above
  • 23. 23 Highlights of the Smart City Security Programme Privacy by Design • If we consider Security by Design then we need to also consider Citizens Privacy • Privacy Impact Assessments should be integral to the launch of all new Citizen services or to changes in Citizen Services Privacy impact assessments (PIAs) are a tool that you can use to identify and reduce the privacy risks of your projects. A PIA can reduce the risks of harm to individuals through the misuse of their personal information. It can also help you to design more efficient and effective processes for handling personal data. - UK Information Commissioner
  • 24. 24 Highlights of the Smart City Security Programme Vendor Management For most smart cities vendors will be appointed or even play an integral role through public/private partnerships or joint ventures. • Ensuring that vendors at all levels address security issues is vital. • An error in the chain can have significant impacts • A clear vendor management process will be central to the programme.
  • 25. 25 Engagement with Authorities National, Regional and International Standards City Authorities should stay ahead of developments and can play a key role in shaping future standards, laws and regulations. This could be at an International Level – E.g. ISO standards. Sector level – E.g. influencing standards on IoT security amongst vendors Multinational Level – E.g. influencing policy or guidance at EU or OECD level
  • 26. 26 Citizen Engagement and Education Smart Citizens Engaging Citizens is key to seizing the opportunities of Smart Cities. It can also ensure understand their rights and how they can protect themselves and other stakeholders Citizens can be: • Consumers • Producer • Prosumer • Co-creators
  • 27. 27 Citizen Engagement and Education Smart Citizens How to engage and educate? • Community Platforms such as Smart Citizen • Projects aimed at all age groups and sectors of society • Project Engagement – Waag Society • Hackathons • Soliciting feedback/surveys • Information Security Awareness Campaigns • Engagement events
  • 28. 28 IncidentsDisaster Management Incidents and Events High Risk occurrence and low impact Low Risk occurrence and high impact  Managed by the incident management process  Managed by the business continuity and emergency management processes Management of Residual Risk
  • 29. 29 Key Messages • Smart City Security is a multi stakeholder activity • It takes leadership and engagement • It is vital not just to protect information but to protect citizens and everything that a citizens depend upon • It is a mutli disciplinary activity with security touching every part of smart city planning, development, maintenance and operations • Industry needs to work on IoT Security Standards so we can be confident in the devices deployed in Smart Cities
  • 30. 30 Key Messages A Truly Smart City http://in.nec.com/en_IN/blog/smart-cities- shaping-indias-future.html
  • 31. THANK YOU ? 123 456 789 name.surname@domain.com www.domain.com linkedin.com/name.surname twitter.com/name.surname fb.com/name.surname

Editor's Notes

  1. https://en.wikipedia.org/wiki/City A city is a large and permanent human settlement. Although there is no agreement on how a city is distinguished from a town in general English language meanings, many cities have a particular administrative, legal, or historical status based on local law. Cities generally have complex systems for sanitation, utilities, land usage, housing, and transportation. The concentration of development greatly facilitates interaction between people and businesses, sometimes benefiting both parties in the process, but it also presents challenges to managing urban growth. A big city or metropolis usually has associated suburbs and exurbs. Such cities are usually associated with metropolitan areas and urban areas, creating numerous business commuters traveling to urban centers for employment. Once a city expands far enough to reach another city, this region can be deemed a conurbation or megalopolis. Damascus is arguably the oldest city in the world. In terms of population, the largest city proper is Shanghai, while the fastest-growing is Dubai. The following article gives some interesting reading on urban growth: https://www.theguardian.com/cities/2015/nov/23/cities-in-numbers-how-patterns-of-urban-growth-change-the-world
  2. https://en.wikipedia.org/wiki/City A city is a large and permanent human settlement. Although there is no agreement on how a city is distinguished from a town in general English language meanings, many cities have a particular administrative, legal, or historical status based on local law. Cities generally have complex systems for sanitation, utilities, land usage, housing, and transportation. The concentration of development greatly facilitates interaction between people and businesses, sometimes benefiting both parties in the process, but it also presents challenges to managing urban growth. A big city or metropolis usually has associated suburbs and exurbs. Such cities are usually associated with metropolitan areas and urban areas, creating numerous business commuters traveling to urban centers for employment. Once a city expands far enough to reach another city, this region can be deemed a conurbation or megalopolis. Damascus is arguably the oldest city in the world. In terms of population, the largest city proper is Shanghai, while the fastest-growing is Dubai. The following article gives some interesting reading on urban growth: https://www.theguardian.com/cities/2015/nov/23/cities-in-numbers-how-patterns-of-urban-growth-change-the-world
  3. https://en.wikipedia.org/wiki/City A city is a large and permanent human settlement. Although there is no agreement on how a city is distinguished from a town in general English language meanings, many cities have a particular administrative, legal, or historical status based on local law. Cities generally have complex systems for sanitation, utilities, land usage, housing, and transportation. The concentration of development greatly facilitates interaction between people and businesses, sometimes benefiting both parties in the process, but it also presents challenges to managing urban growth. A big city or metropolis usually has associated suburbs and exurbs. Such cities are usually associated with metropolitan areas and urban areas, creating numerous business commuters traveling to urban centers for employment. Once a city expands far enough to reach another city, this region can be deemed a conurbation or megalopolis. Damascus is arguably the oldest city in the world. In terms of population, the largest city proper is Shanghai, while the fastest-growing is Dubai. The following article gives some interesting reading on urban growth: https://www.theguardian.com/cities/2015/nov/23/cities-in-numbers-how-patterns-of-urban-growth-change-the-world
  4. https://en.wikipedia.org/wiki/City A city is a large and permanent human settlement. Although there is no agreement on how a city is distinguished from a town in general English language meanings, many cities have a particular administrative, legal, or historical status based on local law. Cities generally have complex systems for sanitation, utilities, land usage, housing, and transportation. The concentration of development greatly facilitates interaction between people and businesses, sometimes benefiting both parties in the process, but it also presents challenges to managing urban growth. A big city or metropolis usually has associated suburbs and exurbs. Such cities are usually associated with metropolitan areas and urban areas, creating numerous business commuters traveling to urban centers for employment. Once a city expands far enough to reach another city, this region can be deemed a conurbation or megalopolis. Damascus is arguably the oldest city in the world. In terms of population, the largest city proper is Shanghai, while the fastest-growing is Dubai. The following article gives some interesting reading on urban growth: https://www.theguardian.com/cities/2015/nov/23/cities-in-numbers-how-patterns-of-urban-growth-change-the-world
  5. https://en.wikipedia.org/wiki/City A city is a large and permanent human settlement. Although there is no agreement on how a city is distinguished from a town in general English language meanings, many cities have a particular administrative, legal, or historical status based on local law. Cities generally have complex systems for sanitation, utilities, land usage, housing, and transportation. The concentration of development greatly facilitates interaction between people and businesses, sometimes benefiting both parties in the process, but it also presents challenges to managing urban growth. A big city or metropolis usually has associated suburbs and exurbs. Such cities are usually associated with metropolitan areas and urban areas, creating numerous business commuters traveling to urban centers for employment. Once a city expands far enough to reach another city, this region can be deemed a conurbation or megalopolis. Damascus is arguably the oldest city in the world. In terms of population, the largest city proper is Shanghai, while the fastest-growing is Dubai. The following article gives some interesting reading on urban growth: https://www.theguardian.com/cities/2015/nov/23/cities-in-numbers-how-patterns-of-urban-growth-change-the-world