Cities Face Multiple Security Threats

With the rapid urbanisation of the world, cities everywhere are experiencing growth in both size and complexity. Each city has a unique set of circumstances, and city planners must defend against multiple types of security threats, both man-made and natural, physical and virtual.

So says Walter Lee, head of innovation management office: global safety division at NEC Corporation, who will be presenting on ‘Advanced technologies to keep cities safer,' at the IT Web Security Summit 2016 from 16 to 20 May at Vodacom World in Midrand.

He says attacks in prominent and developed cities over the past 18 months, for example Brussels, Paris, Sydney, and similar, have shown that threats will only become more disruptive and decentralised as criminals look for new ways to exploit the system.  "This puts a massive strain on governments to look for ways to defend on multiple fronts effectively and efficiently."

According to Lee, many of the challenges faced by city planners, ranging from terrorism to natural disasters, require the cooperation of different branches of the government. "To launch a coordinated response, different arms of the government, with different levels of access, must contribute their own sets of data input."

In these instances, he says technology can be used to facilitate cross-agency collaboration. In the aftermath of a disaster, governments need to swing quickly into the recovery stage. "Big data, including the latest machine-to-machine communication technologies, promises to enable the rapid response required."

He says at the end of the day the goal is to achieve situational awareness, a multifaceted understanding with reasoning capabilities that not only displays information but presents actionable intelligence.

Delegates attending Lee's talk will learn about two exciting technologies, face recognition and fingerprinting, and will share how these and other technologies have been deployed to help government agencies maintain safety, security and efficiency in their city operations.

ITWeb

« Pentagon Unprepared to Repel Cyber Attacks
Global 'Terror Database' Leaked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

ITRenew

ITRenew

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Liongard

Liongard

Liongard automates the management and protection of modern IT environments at scale for IT MSPs - Managed Service Providers and Enterprise IT Operations.

ActZero

ActZero

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats.

SLVA Cybersecurity

SLVA Cybersecurity

SLVA Cybersecurity excel at delivering security-as-a-service, fit-for-purpose, within the constraints of realistic budgets and business expectations.

Wing Security

Wing Security

Wing fosters a stronger security culture by engaging SaaS end-users and enabling easy communication with security teams.

Protecto

Protecto

Make privacy and governance effortless. Brakes allow you to drive faster. Stronger data privacy and security enable companies to unlock the full potential of the data.

Credo AI

Credo AI

Credo have pioneered a Responsible AI platform that enables context driven, comprehensive and continuous governance, oversight and accountability of AI.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.