There is an emerging importance of Smart City/Internet of Things (IoT) cyber security across local government. 
Smart cities are comprised of a highly complex,
interdependent network of devices, systems, platforms, and users. Smart energy,
utilities, water and wastage, parking and automotive, industrial and
manufacturing, building automation, e-government and telemedicine, surveillance
and public safety are just some of the verticals that vendors and governments
need to secure.
Councils too use IoT and Smart City initiatives to
provide better services to their LGAs in areas such as Industrial Control
Systems (ICS), water and sewer mechanisms (pumps, valves etc), road and asset
condition tracking, sprinklers and lights, CCTVs, building management systems
and the like. All these devices are internet enabled and hence susceptible to
attack.
Smart cities are increasingly under attack by
various threats. These include sophisticated cyberattacks on critical
infrastructure (water and sewer), bringing industrial control systems (ICS) to
a grinding halt, abusing low-power wide area networks (LPWAN) and device
communication hijacking, system lockdown threats caused by ransomware,
manipulation of sensor data to cause widespread panic (e.g., disaster detection
systems) and compromising personally identifiable information (PII), among many
others.
Councils need to ensure "security by
design" when embarking upon any type of Smart City/IoT initiative.
In practical terms, this means: 
- Conduct a Privacy Impact Assessment, a Business
 Impact Assessment and a Cyber Security Threat Assessment
 at the start of any such project. This will help identify the potential risks
 to security, privacy and availability before the system is built/designed. Once
 these assessments are conducted, specify the controls that must be built into
 the system/s. Don't forget that it's not just about breaching cyber security.
 Attackers are equally interested in denying service to smart city systems for
 fun (i.e. bringing the systems down).
- Embed the controls. Ensure the
 specified controls are built into the system from the start. It's far more
 costly and disruptive to try to retrofit controls once a system is built....so
 make sure they are "baked in" from the beginning.
- Independently validate the controls prior to
 implementation. This means engaging an independent party (i.e.
 independent of the people that "built" the system) to validate the
 adequacy of the controls. This may include vulnerability scanning, penetration
 testing, cyber security audits and/or code reviews.
- Ensure ongoing validation.
 Systems don't stay static. They are continually enhanced, upgraded, modified
 and uplifted. New vulnerabilities are found every other day. Councils should
 therefore be subjecting their Smart City technologies to independent security
 assessment following any significant change to a system and/or at least every year.
- Test Council's Cyber Incident Response Plan.
 Despite a Council's best efforts, adversaries will (unfortunately) often find a
 way through. Sometimes, it'll be as silly as switching sprinklers on and off,
 but other times it'll be as destructive as opening sewerage valves or disabling
 building management systems. Councils must have a documented Cyber Security
 Incident Response Plan, and these must be regularly tested (like testing a
 Business Continuity Plan).
For any further info, please contact us