{"id":15133,"date":"2016-03-29T17:05:36","date_gmt":"2016-03-29T17:05:36","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5351"},"modified":"2019-11-15T06:58:23","modified_gmt":"2019-11-15T11:58:23","slug":"introducing-the-smart-city-department-cyber-security-role-guide","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/introducing-the-smart-city-department-cyber-security-role-guide\/15133\/","title":{"rendered":"Introducing &#8220;The Smart City Department Cyber Security Role&#8221; guide"},"content":{"rendered":"<p><a href=\"http:\/\/securingsmartcities.org\/\" target=\"_blank\" rel=\"noopener nofollow\">Securing Smart Cities<\/a>, the not-for-profit global initiative that addresses the cyber security challenges of smart cities, last week released guidelines on the role of information security within a smart city department (SCD): <strong>The Smart City Department Cyber Security role and implications<\/strong>. Kaspersky Lab\u2019s Mohamad Amin Hasbini, Senior Security Researcher and Securing Smart Cities board member is one of the authors of this paper.<\/p>\n<p>\u201c\u2026As each organization requires its own smartness assessment and development, it has become clear that responsibilities, processes execution and decision making need to be institutionalized\u201d, the paper reads, going to to state that \u201csmart city departments\u201d or \u201csmart city offices\u201d are to be established in the large organizations to arrange what is called \u201csmart city compatibility\u201d. Their function will become not unlike IT departmets in the 2000s: independent smart city departments will emerge within the organizations (governments and businesses) isolation their political aspects from the technological ones, the paper predicts, while managing the city requirements and controlling its operations.<\/p>\n<p>The new document discusses \u201cthe Smart City Department information security role, its influence on technology adoption, services quality\u2026 and communication resilience\u201d. The guide itself is not a detailed testing or assessment program, but rather an illustration of key elements that organizations need to be aware of to achieve the best safety and resilience of complex information systems that will be in the foundation of smart cities.<\/p>\n<p>Information security is paramount here, for self-obvious reasons, and SCDs are responsible for \u201cdigesting\u201d cyber security organizational requirements, providing support to Information security teams in defining the technologies needed and the cyber security strategy to be adopted, paper authors say. These requirements should also be communicated and made fully understandable to decision makers.<\/p>\n<p>\u201cThese guidelines are yet another step towards Securing Smart Cities (SSC), as the name of the initiative suggests. We\u2019re trying to enhance everyone\u2019s understanding of the smart city requirements, by developing useful insights and sharing expertise with the people who will be responsible for the development and management of smart cities. The document is based on the experience of the SSC community members, who are involved in large scale cyber governance, as well as other security specialists: from penetration testers to industrial security experts,\u201d said Mohamad Amin Hasbini.<\/p>\n<p>The paper\u2019s authors state that in reality SCDs have already been established in a number of cities aimed at acquiring \u201csmart\u201d status. About 80 cities in the world are expected to become \u201csmart\u201d by 2025, and eight years in this field is a very short term.<\/p>\n<p>For a full copy of the Smart City Department Cyber Security Role and Implications guide, please visit: <a href=\"http:\/\/securingsmartcities.org\/?p=483\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/securingsmartcities.org\/?p=483?utm_source=smm_kb&amp;utm_medium=Ww_kb_o_2903<\/a><\/p>\n<p>For a full copy of the Cyber Security Guidelines for Smart City Technology Adoption, please visit: <a href=\"http:\/\/securingsmartcities.org\/wp-content\/uploads\/2015\/11\/Guidlines_for_Safe_Smart_Cities.pdf?utm_source=smm_kb&amp;utm_medium=Ww_kb_o_2903\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/securingsmartcities.org\/wp-content\/uploads\/2015\/11\/Guidlines_for_Safe_Smart_Cities.pdf<\/a><\/p>\n<p>For more information, and to see the most recent updates on Securing Smart Cities activities, please visit: <a href=\"http:\/\/securingsmartcities.org\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/securingsmartcities.org<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The guide itself is not a detailed testing or assessment program, but rather an illustration of key elements that organizations need to be aware of to achieve the best safety and resilience of complex information systems that will be in the foundation of smart cities. <\/p>\n","protected":false},"author":209,"featured_media":15354,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[],"class_list":{"0":"post-15133","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/introducing-the-smart-city-department-cyber-security-role-guide\/15133\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/introducing-the-smart-city-department-cyber-security-role-guide\/15133\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/introducing-the-smart-city-department-cyber-security-role-guide\/15133\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15133"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15133\/revisions"}],"predecessor-version":[{"id":30308,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15133\/revisions\/30308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15354"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}