Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Leadership and ManagementAccess ManagementIdentity ManagementPhysical SecurityVideo SurveillanceCybersecurity NewsGovernment: Federal, State and Local

Can We Be Smarter Than The Smart Cities We’re Building?

By Peter Alexander
city2-900px.jpg
January 27, 2018

Imagine a world where everything is connected. All information and communication technologies are integrated into a single, consolidated platform. With the rapid increase in smart city capabilities, this idea may soon become our reality. The smart cities vision is to seamlessly integrate information and communication technologies with the internet of things (IoT) to increase efficiency, reduce costs, and enhance communications between networks. The end goal is to enable cities to leverage their IoT devices to create a more cohesive and connected environment.

Songdo, South Korea has already begun implementing smart city features. Key features include automatic climate control, computerized access, and electronic sensors that enable the city’s so-called “brain” to track and respond to the movement of residents. As for the US, many cities are working diligently to incorporate smart city features. For instance, some cities have installed sensors in their water mains to identify costly and wasteful water leaks, others are conducting computer-based analysis of live video feeds in an effort to aid law enforcement and solve crimes; yet other cities are implementing sophisticated traffic flow and available parking space prediction and management systems.

As more locations embark on adopting the smart city vision, reliance on data accuracy and speed of transmission will continue to grow, allowing all infrastructures to be connected through a single network. Although this single network vision has many benefits, it also creates a single path, through which a threat can infiltrate the cities’ entire network; and if that happens, repercussions may be catastrophic.

The recent WannaCry and Petya outbreaks serve as proof of the destruction a single malware can inflict on critical infrastructures. Now imagine the amount of damage an attack like that could inflict on a smart city. Cybercriminals are becoming more creative and strategic when it comes to their attack methods. They target networks most able to rapidly propagate the attack and simultaneously unleash the most chaos; think of hospitals, financial institutions, schools, emergency services and public networks. Clearly, for the smart city idea to safely become a reality, smart and effective protection of IoT networks from cyber-attack must be a priority.

Smart initiatives have already fallen victim to the ploys of cybercrime, causing immense amounts of damage and confusion. In December 2015, the Ukraine suffered a massive grid cyber-attack, this grid attack led to interruption of electricity and water supplies to tens of thousands of homes in the middle of a freezing winter. The repercussions were both frightening and dangerous, and showed the impact that an isolated attack can have, when targeted at a critical infrastructure.  Smart initiatives connect all infrastructures, and as such enables would-be cyber criminals to wreak havoc on a much larger scale. One outdated patch can easily provide the ‘back-door’ needed by a cyber-threat actor to infect a city’s entire network, including ALL critical infrastructures. With new technology comes new responsibility—and with that, more security responsibility.

In order to address this increasingly complex challenge, smart cities must implement a robust security system to protect essential data and digital assets. What is needed is seamless protection of networks against threats before threat actors have the chance to strike. A consolidated architecture across network, cloud and endpoints, including mobile, is a solution that will effectively protect smart cities against the next cyber-attack. In today’s reality we cannot afford to passively wait for the next WannaCry or Petya attack to hit.

Relying on just a firewall to provide a safe and predictable perimeter is a thing of the past; protection needs to use more than detection and consistently deliver protection. Smart cities are built with the excitement of new - yet still unimagined societal benefits. However, without the proper protection, inhabitants of smart cities will be at risk for a large scale data breach along with malfunctioning critical infrastructures.   What we can be sure of is there will be more and more sophisticated cyber-attacks.  In a future where smart cities become the norm, how we protect ourselves from the next breach will not only be important for the corporate world, it will also have a big impact on the viability of our physical and personal worlds too.

 

KEYWORDS: city surveillance cyber security Internet of Things (IoT) smart cities

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Peter alexander security magazine
Peter Alexander is the Chief Marketing Officer at Check Point. He leads Check Point’s Marketing Organization, including Corporate Marketing, Corporate Communications, GEO/Field Marketing, Strategic Marketing, and Demand Generation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • smart-city

    Inside the Connected World: Can a City Be Smart and Safe?

    See More
  • city-enews

    Strength in Numbers: How Amplified Intelligence Can Foster Safer, Smarter Cities

    See More
  • Securing Cities: Can We Do It Better?

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing