Cities Face Multiple Security Threats

With the rapid urbanisation of the world, cities everywhere are experiencing growth in both size and complexity. Each city has a unique set of circumstances, and city planners must defend against multiple types of security threats, both man-made and natural, physical and virtual.

So says Walter Lee, head of innovation management office: global safety division at NEC Corporation, who will be presenting on ‘Advanced technologies to keep cities safer,' at the IT Web Security Summit 2016 from 16 to 20 May at Vodacom World in Midrand.

He says attacks in prominent and developed cities over the past 18 months, for example Brussels, Paris, Sydney, and similar, have shown that threats will only become more disruptive and decentralised as criminals look for new ways to exploit the system.  "This puts a massive strain on governments to look for ways to defend on multiple fronts effectively and efficiently."

According to Lee, many of the challenges faced by city planners, ranging from terrorism to natural disasters, require the cooperation of different branches of the government. "To launch a coordinated response, different arms of the government, with different levels of access, must contribute their own sets of data input."

In these instances, he says technology can be used to facilitate cross-agency collaboration. In the aftermath of a disaster, governments need to swing quickly into the recovery stage. "Big data, including the latest machine-to-machine communication technologies, promises to enable the rapid response required."

He says at the end of the day the goal is to achieve situational awareness, a multifaceted understanding with reasoning capabilities that not only displays information but presents actionable intelligence.

Delegates attending Lee's talk will learn about two exciting technologies, face recognition and fingerprinting, and will share how these and other technologies have been deployed to help government agencies maintain safety, security and efficiency in their city operations.

ITWeb

« Pentagon Unprepared to Repel Cyber Attacks
Global 'Terror Database' Leaked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Lookout

Lookout

Lookout is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

Naq Cyber

Naq Cyber

Naq is the number one platform for SMEs looking to become legally compliant and protect against cybercrime and other data-related incidents.

Hayes Connor Solicitors

Hayes Connor Solicitors

Hayes Connor Solicitors is a specialist data breach and cybercrime law firm. We act for clients on individual data breaches and also where a group has been compromised as part of a targeted attack.

Infosec Institute

Infosec Institute

Infosec is a leading cybersecurity training company, we help IT and security professionals advance their careers with skills development and certifications.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Hexagon

Hexagon

Hexagon is a global leader in digital reality solutions. We are putting data to work to boost efficiency, productivity, quality and safety.

Mantodea Security

Mantodea Security

Mantodea Security is an industry-agnostic powerhouse backed by extensive experience and expertise in the realm of IT security.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.

M7 Services

M7 Services

M7 Services are a comprehensive Managed Services Provider (MSP) with a focus on delivering cutting-edge information technology solutions and unparalleled customer service.

Auraya

Auraya

Auraya develops its next generation voice biometric AI to deliver easy-to-use and highly secure speaker recognition and fraud detection capabilities.