Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical SecurityCybersecurity NewsGovernment: Federal, State and Local

How to Lay the Groundwork for Protecting Smart City Connectivity

By Kevin Taylor
smartcity
February 12, 2019

Most people in the physical security industry are familiar with the 5 Ds: deter, detect, delay, deny and defend. These principles seem universally applicable for facility or asset protection use cases. But what principles should we apply in areas of open public access? Whether we call them smart cities or connected communities, one thing is certain: The mega-trends of our populations concentrating into urban areas and the Internet of Things (IoT) explosion are blurring the lines of perimeters. Infrastructure and network-connected devices are being deployed in mind-boggling numbers across the landscape of our towns and cities, where the sort of physical security principles commonly used to protect centralized assets are difficult and expensive to implement.

And physical perimeters are not the only gray areas. Systems are accessing data from third-party devices, and with the big data/open data movement, access to information is being granted more and more frequently to unknown, or at least lesser-known, users.

In this new era of distributed intelligent endpoints where standards are not yet established, what guiding principles can early adopters turn to when the objectives shift from loss prevention and asset protection to other broader goals, such as first responder efficiency, pedestrian/cyclist/vehicular mobility and safety, process control, data integrity, resiliency and sustainability.

Below is a look at two concepts practitioners can include in their governance framework as they start their city down the path to becoming a smart city not only from a technology deployment perspective, but also from the perspective of having a healthy, resilient and connected smart infrastructure.

You Can’t Have (and Probably Don’t Want) It All

There’s so much bleeding-edge technology in the market targeted at solving problems for the cities of today and tomorrow that it’s hard not to fall into the “kid in the candy store” trap. But not every platform addresses a problem your specific community is facing. So, prioritization becomes more important than ever.

If you’ve never watched Simon Sinek present on “always start with the why,” I recommend you do so next opportunity you have a few spare minutes. The core principle is the easiest concept in the world to grasp. To paraphrase, before you do anything, clearly define why it needs to be done. If there’s not a clear and definable why, then scrap the idea and move on to something of real importance. Local governments rarely have surplus capital just waiting to be spent, so it’s important that spending is laser-focused toward solutions to actual problems. By starting with the why, a city can avoid throwing money at a “solution in search of a problem” simply because someone became enamored by a good sales pitch about a cool new technology.

The city of Atlanta successfully defined their “why” before committing to expenditures to upgrade technology along North Avenue, a primary east/west corridor through the heart of the city. It’s common knowledge that traffic congestion in Atlanta is a challenge, but a closer look at data revealed accident rates along North Avenue were nearly double the rates along other corridors of similar lane count and traffic volume. Furthermore, they put the spending decision of roadway upgrades directly in the hands of the citizens in the form of a ballot referendum, which passed overwhelmingly. City stakeholders knew they had a safety issue that needed to be addressed, and they knew it had public buy-in, so their “why” was very clearly defined.

The North Avenue Smart Corridor project was $3 million of a much larger transportation infrastructure upgrade in the city. North Avenue is now considered the smartest corridor in Georgia. With strategically deployed technology they were able to provide measurable results to an identified problem unique to their community. North Avenue is now a true multi-modal transportation corridor where vehicular travel times were maintained despite lane reductions and new provisions for cyclists and pedestrians, and a 25 percent reduction in traffic accidents along the corridor has been achieved. The project has received recognition from the American Council of Engineering Companies and at the Smart Cities Expo World Congress as a project of the year in its mobility segment.

If answers to the question “Why?” don’t always appear this clear for the multiple stakeholders in your local government, don’t lose heart. My recommendation is to develop a prioritization matrix so once a problem is identified, a decision can be made regarding things like: how important it is to deliver a solution, how much money should be directed to the solution, whether the solution delivers results with equity across the community and so on. The questions you want answered by your matrix will be unique to the values and goals of your community. The matrix should be a guiding light, not a law. The smart cities movement is still young, and most early adopters are true innovators, so I don’t advise that a framework be so rigid that it restricts creativity and diversity of thought.


Securing the Infrastructure and Devices

It’s no longer “if,” but “when” a cyber vulnerability will be discovered, or your organization will be targeted. Since smart cities leverage software platforms and distributed network endpoints and sensors, it is critical that technology vendor partners share common security goals with your city.

Like all networked devices, IP surveillance cameras and other IoT sensors are certainly not immune to cyberthreats. The first layer of cyber defense should be performed long before any device resides on the network. Once a municipality has determined that it makes sense to become a smart city, products should be qualified pre-purchase to ensure they offer the right balance of configuration options, allowing them to fit the policies and security standards put in place by the city's CIO/CTO office. The more configuration and protocols built into the product, the more versatile it will be over time, so if your department’s policies and security standards change, the product will be more likely to survive and maintain compliance on the network without require unique exceptions.

Some clients running mission-critical systems also prefer to source network-connected products in a manner that allows them to have a direct communication link and relationship with the organization that develops their own source code and API. While OEM relationships may help bring products to market at affordable prices, that additional layer can be a buffer between client and provider. This can result in negative experiences for the client should a situation ever arise that requires a technical support case to be escalated. Many end users, particularly those running open-architecture best-of-breed solutions, find valuable peace of mind in knowing they have a direct communication path to the firm that developed, owns and supports the source code, should the need ever arise.

Regardless of how you choose to define the term “smart city,” one constant is the need to ensure the stability and security of the infrastructure and devices that support these initiatives. The best time to address this challenge is in the beginning stage of a project. Municipalities must first determine whether a smart city initiative is viable and then take the proper steps to select the equipment and partners that will support and help secure the entire platform that makes up the project from design through deployment and beyond.

By applying the above concepts, cities can get off to a good start that will provide the reliability and security required to maintain connectivity in a smart city.

KEYWORDS: cyber vulnerabilities Internet of Things security technology smart cities

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin Taylor, Business Development Manager, Smart Cities, Axis Communications, Inc.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • medical professionals looking at computer

    3 steps to lay the foundation for stronger healthcare managed defense

    See More
  • Laying the Groundwork to Become an Effective Influencer

    See More
  • smart-city-freepik1170x658b6.jpg

    Big data and smart cities: How to battle the pandemic while preserving privacy

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing