{"id":12966,"date":"2020-04-15T10:00:51","date_gmt":"2020-04-15T09:00:51","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=12966"},"modified":"2020-04-15T10:00:51","modified_gmt":"2020-04-15T09:00:51","slug":"cybersecurity-issues-around-smart-city-2-2","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/","title":{"rendered":"Cybersecurity issues around Smart City (2\/2)"},"content":{"rendered":"<p><em>In a previous <\/em><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/cybersecurity-issues-around-smart-city-1-2\/\"><em>article<\/em><\/a><em>, we saw that the Smart City was inducing a paradigm shift which, combined with the general public&#8217;s high expectations on the security of its data, required adapting the approach to such a project. Indeed, as the Smart City develops, urban activity becomes more and more dependent on its services, increasing not only its security needs, but also the interest of cyber attackers. Based on these observations, the challenge will therefore be to identify a new approach to take account of Cyber \u200b\u200bSecurity risks and, if not completely eliminate them, to reduce them. This is the purpose of this second article.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>Building a Smart City project with Cybersecurity<\/h2>\n<p>It is essential to integrate cyber security aspects from the start of a Smart City project. Indeed, carrying it out later in the project may prove to be more complex and expensive, with the risk of not dealing with it \/ not being able to deal with all the risks.<\/p>\n<p>This requires <strong>rethinking the organization of the project regarding data and security governance<\/strong>: security principles must be defined at the global project level and considered by each of the sub-projects composing the Smart City, depending on their constraints. This is particularly true as Smart Cities involve many actors with different core businesses, means and cybersecurity maturity. A global and shared vision is essential to ensure that each element processes the data with the appropriate level of security.<\/p>\n<p>It is then necessary <strong>to define the main principles of architecture and interoperability<\/strong>, according to the constraints inherent to the Smart City, related to Edge Computing and the deployment of objects in a hostile environment. System resilience must be at the heart of safety requirements, as the fall or compromise of one element should not cause the entire system to fall.<\/p>\n<p>To this end, common <strong>standards<\/strong> must be adopted, based on specific frameworks such as ETSI or OneM2M. These increase the chances of maintaining scalable interoperable systems. More generally, the NIST or the ISO 27002 standard are proven Cybersecurity frameworks on which it would be interesting to rely.<\/p>\n<p>The development mode must be <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/\">agile<\/a>, integrating a long-term vision to anticipate new use cases, and with short milestones in order to quickly deliver the first services. <strong>Cybersecurity must be included in the development process<\/strong>, by defining Evil User Stories, enabling risks to be identified and considered each time services or the information system evolves, and by appointing cybersecurity experts in a support and validation role.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-12967 media-12967\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12967 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image1.png\" alt=\"\" width=\"1740\" height=\"571\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image1.png 1740w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image1-437x143.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image1-71x23.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image1-768x252.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image1-1536x504.png 1536w\" sizes=\"auto, (max-width: 1740px) 100vw, 1740px\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p>Defining and maintaining a satisfactory level of security will, more than ever, require the rigorous integration of security in all phases of the project, which may lead to greater but necessary human and technological investments.<\/p>\n<p>&nbsp;<\/p>\n<h2>Protecting critical and regulated data<\/h2>\n<p>Given the propensity of the Smart City to collect and process large amounts of data, their protection will primarily involve <strong>identifying critical data and assets.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-12969 media-12969\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12969 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image2.png\" alt=\"\" width=\"1340\" height=\"661\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image2.png 1340w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image2-387x191.png 387w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image2-71x35.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image2-768x379.png 768w\" sizes=\"auto, (max-width: 1340px) 100vw, 1340px\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p>Most of the services offered by the Smart City are aimed at citizens. Therefore, personal and potentially sensitive data will be collected. Furthermore, a loss of availability or integrity of certain services could have serious repercussions since some components of the IS have a direct hold on the physical world. <strong>Smart Cities are not exempt from regulations<\/strong>, in particular the General Data Protection Regulations (GDPR), but also, depending on usage, from the General Security Regulations (GSR), the Military Programming Law (MPL) or the Network and Information Security (NIS) directive, whose data protection requirements will have to be integrated into the programs.<\/p>\n<p>Levels of data sensitivity classification must therefore be formalized in order to enable the prioritization of actions and the setting up of an appropriate framework for the processing of critical data such as encryption and anonymization.<\/p>\n<p>The problem of access to data should also be raised. There are many actors in the Smart City and it will be necessary to segment the &#8220;vision&#8221; they may have of the IS. This will involve a preliminary phase of defining the authorization profiles, necessary to respect the principle of least privilege, combined with a regular review of their assignments to ensure that they are still legitimate.<\/p>\n<p>&nbsp;<\/p>\n<h2>Operating in trusted environments<\/h2>\n<figure id=\"post-12971 media-12971\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12971 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image-4.png\" alt=\"\" width=\"1612\" height=\"203\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image-4.png 1612w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image-4-437x55.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image-4-71x9.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image-4-768x97.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image-4-1536x193.png 1536w\" sizes=\"auto, (max-width: 1612px) 100vw, 1612px\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p>The Smart City project will necessarily rely on <strong>different technical and organizational foundations<\/strong>. If these bases are to the Information System what foundations are to a house, it is easy to understand that it will be difficult to build anything if this base is fragile.<\/p>\n<p>As always, these technical bases must be covered by fundamental security measures: implementation of trust bubbles, hardening of systems, patch management, securing of privileged accounts and their use, etc.<\/p>\n<p>Furthermore, an information system with a large attack area such as the Smart City will necessarily have to break with the traditional security model known as &#8220;castle security&#8221;, by relying more on aspects of partitioning and access control of the data itself. The conformity of assets within the information system will have to be continuously evaluated using common configuration and hardening frameworks. Exposed systems and applications must be subject to controls and audits, particularly during the development phase, but also during the operational phase.<\/p>\n<p>In addition, business continuity and disaster recovery will have to be at the heart of the security strategy. Plans will have to be formalized, but also tested, including both technical considerations such as the resilience of different systems, with the ability to restore systems independently of each other, and organizational considerations through crisis management exercises.<\/p>\n<p>Finally, as Smart City involves many players, all stakeholders should ensure the implementation of significant means in the protection of the information systems involved and comply with the requirements of the project&#8217;s security policy. To do this, they will have to be contractually committed, at the very least by including security requirements in contracts, but also by formalizing and implementing security assurance plans, particularly for the most critical service providers. Regular controls may be commissioned to ensure that the security level is maintained over time and to address future risk scenarios.<\/p>\n<p>&nbsp;<\/p>\n<h2>Detecting, reacting and sharing<\/h2>\n<p>The Smart City cannot do without <strong>a service to detect and deal with security incidents.<\/strong><\/p>\n<p>It will be necessary to collect traces of activity on the systems and look for weak signals. In view of the large number of events to be processed, it will be essential to define the risks to be guarded against and to rely on correlation solutions to facilitate these searches. The use of automation tools will allow a first sorting of false positives, facilitating the work of analysts in the qualification of security alerts.<\/p>\n<p>The detection and response service can be built using the PDIS and PRIS standards. Qualified external suppliers may be used for these two services as required.<\/p>\n<p>The use of <strong>Cyber Threat Intelligence services<\/strong> will bring a significant efficiency gain in the creation and enrichment of SOC detection rules. Indeed, it will be possible to adopt a proactive detection posture by monitoring attacks that have targeted Smart Cities and the operating modes used. This will also have the advantage of improving the efficiency of the response service by saving precious investigation time.<\/p>\n<p>Finally, the process of handling significant and major security incidents cannot be carried out without the formalization of a <strong>crisis management unit<\/strong>, composed of actors with well-defined roles and trained for this exercise. Particular attention will be paid to the external communication system, since the &#8220;severity&#8221; of a crisis depends as much on the event that caused it as on how it is perceived by the outside world.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-12973 media-12973\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-12973\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image3.png\" alt=\"\" width=\"1647\" height=\"873\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image3.png 1647w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image3-360x191.png 360w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image3-71x39.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image3-768x407.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Image3-1536x814.png 1536w\" sizes=\"auto, (max-width: 1647px) 100vw, 1647px\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p>In conclusion, and as we have seen through these two articles, the Smart City is a self-evident development in an era where demographic, ecological and economic issues are all intertwined. Its promises are seductive, but the implementation framework may give rise to some fears.<\/p>\n<p>As with any digital transformation, ensuring a level of security in line with the challenges of the project will necessarily involve identifying the vulnerabilities and security risks it generates.<\/p>\n<p><strong>In the era of cyber-warfare and cyber-threats<\/strong>, the Smart City should be considered as a Digital Service Provider, within the meaning of the NIS directive, and be protected by security measures adapted to this status.<\/p>\n<p>The provision of secure services, respectful of their users&#8217; data, is a sine qua non condition for the success of a Smart City project, the benefits of which will only be matched by the magnitude of the impact of a successful cyberattack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a previous article, we saw that the Smart City was inducing a paradigm shift which, combined with the general public&#8217;s high expectations on the security of its data, required adapting the approach to such a project. Indeed, as the&#8230;<\/p>\n","protected":false},"author":140,"featured_media":12629,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3266,2777],"tags":[3471,3470,3106,2817,3181,3493,3472,3126],"coauthors":[1011,3460],"class_list":["post-12966","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security-en","category-cybersecurity-digital-trust","tag-architecture-en","tag-change","tag-data-en","tag-data-protection","tag-iot-en","tag-risks","tag-smart-city-en","tag-soc-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity issues around Smart City (2\/2) - Risk Insight<\/title>\n<meta name=\"description\" content=\"The challenge is to identify the approach to be implemented to take into account cybersecurity risks around Smart City and to reduce them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity issues around Smart City (2\/2) - Risk Insight\" \/>\n<meta property=\"og:description\" content=\"The challenge is to identify the approach to be implemented to take into account cybersecurity risks around Smart City and to reduce them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-15T09:00:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/02\/Fotolia_83508559_Subscription_Monthly_XXL-pari.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1869\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Herv\u00e9 Guillou-Hely, Pierre Tinland\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Herv\u00e9 Guillou-Hely, Pierre Tinland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/\"},\"author\":{\"name\":\"Herv\u00e9 Guillou-Hely\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/58b4c24f08f89648f2d9aa4fa07118d1\"},\"headline\":\"Cybersecurity issues around Smart City (2\/2)\",\"datePublished\":\"2020-04-15T09:00:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/\"},\"wordCount\":1408,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/02\/Fotolia_83508559_Subscription_Monthly_XXL-pari.jpg\",\"keywords\":[\"architecture\",\"change\",\"data\",\"data protection\",\"IoT\",\"risks\",\"smart city\",\"SOC\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/\",\"name\":\"Cybersecurity issues around Smart City (2\/2) - Risk Insight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/02\/Fotolia_83508559_Subscription_Monthly_XXL-pari.jpg\",\"datePublished\":\"2020-04-15T09:00:51+00:00\",\"description\":\"The challenge is to identify the approach to be implemented to take into account cybersecurity risks around Smart City and to reduce them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/02\/Fotolia_83508559_Subscription_Monthly_XXL-pari.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/02\/Fotolia_83508559_Subscription_Monthly_XXL-pari.jpg\",\"width\":2560,\"height\":1869,\"caption\":\"Flat design illustration with Eiffel tower in Paris town, France\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity issues around Smart City (2\/2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/58b4c24f08f89648f2d9aa4fa07118d1\",\"name\":\"Herv\u00e9 Guillou-Hely\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/herve-guillou-hely\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity issues around Smart City (2\/2) - Risk Insight","description":"The challenge is to identify the approach to be implemented to take into account cybersecurity risks around Smart City and to reduce them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity issues around Smart City (2\/2) - Risk Insight","og_description":"The challenge is to identify the approach to be implemented to take into account cybersecurity risks around Smart City and to reduce them.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/","og_site_name":"RiskInsight","article_published_time":"2020-04-15T09:00:51+00:00","og_image":[{"width":2560,"height":1869,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/02\/Fotolia_83508559_Subscription_Monthly_XXL-pari.jpg","type":"image\/jpeg"}],"author":"Herv\u00e9 Guillou-Hely, Pierre Tinland","twitter_misc":{"Written by":"Herv\u00e9 Guillou-Hely, Pierre Tinland","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/"},"author":{"name":"Herv\u00e9 Guillou-Hely","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/58b4c24f08f89648f2d9aa4fa07118d1"},"headline":"Cybersecurity issues around Smart City (2\/2)","datePublished":"2020-04-15T09:00:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/"},"wordCount":1408,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/02\/Fotolia_83508559_Subscription_Monthly_XXL-pari.jpg","keywords":["architecture","change","data","data protection","IoT","risks","smart city","SOC"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/","name":"Cybersecurity issues around Smart City (2\/2) - Risk Insight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/02\/Fotolia_83508559_Subscription_Monthly_XXL-pari.jpg","datePublished":"2020-04-15T09:00:51+00:00","description":"The challenge is to identify the approach to be implemented to take into account cybersecurity risks around Smart City and to reduce them.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/02\/Fotolia_83508559_Subscription_Monthly_XXL-pari.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/02\/Fotolia_83508559_Subscription_Monthly_XXL-pari.jpg","width":2560,"height":1869,"caption":"Flat design illustration with Eiffel tower in Paris town, France"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/cybersecurity-issues-around-smart-city-2-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity issues around Smart City (2\/2)"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/58b4c24f08f89648f2d9aa4fa07118d1","name":"Herv\u00e9 Guillou-Hely","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/herve-guillou-hely\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/140"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=12966"}],"version-history":[{"count":2,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12966\/revisions"}],"predecessor-version":[{"id":12976,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12966\/revisions\/12976"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/12629"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=12966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=12966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=12966"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=12966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}