Skip to main content

WEBINAR: 'We’re uniquely exposed to cyberthreats in this industry'

Watch on-demand: Defending ITS and Roadways from Cyberthreats
By Adam Hill November 1, 2024 Read time: 2 mins
Advanced ITS applications such as pedestrian safety are being built out around the world (© Hanohiki | Dreamstime.com)

Cisco's webinar Defending ITS and Roadways from Cyberthreats - a collaboration with ITS International - is now available to watch on-demand.

If you missed it, you can still register now and view the webinar in its entirety: click here to watch.

The fireside chat looked at the key capabilities of a modern and secure WAN infrastructure supporting advanced ITS applications, and considered what measures to prioritise in order to get an ITS security project off the ground.

Speakers are:

Cassie McEnroe, public sector sales lead, Cisco IIoT
Pete Kavanagh, principal architect, roadways solutions, Cisco IIoT
Paul Lennon, CTO, Skyline Technology Solutions
Moderator is: ITS International editor Adam Hill

One of the biggest questions from companies to the panel is ‘How do we get started?’

“It’s a journey and it’s not going to be one-size-fits-all,” says McEnroe. “Ten to 20 years ago, when we were building out intelligent transportation systems, it was very different."

“We talked about the advanced applications - V2X [Vehicle to Everything], transit signal priority, pedestrian safety – all being enabled and enhanced through the use of technology. But now those advanced applications are here today and they’re being implemented all over the world. Different organisations have very different thoughts about how you should approach security.”

In transportation there are some older pieces of equipment – dynamic message signs, for example - in the field that were never intended to be controlled, they don’t have such basic cybersecurity measures as password management, Lennon explains.

“You have assets out there which, by definition, are going to be vulnerable," he says. "And that’s a risk you just need to understand."

Kavanagh adds: “Back when some of this stuff was defined, security wasn’t really on anyone’s radar."

The good thing is that there’s an emerging acceptance of cybersecurity risks, he says.

"With a road traffic cabinet, it’s there on the street where the general public are walking by," Kavanagh continues. "We’re uniquely exposed in this industry. It’s important that we think about these cabinets as, effectively, an extension of our corporate network that needs to be equally as secured as if it’s in the office I’m sitting in.”

For more information on companies in this article

Related Content

  • Congress ‘needs a lesson in smart transportation’
    December 11, 2014
    Former US transportation secretary Ray LaHood says Congress needs to learn there’s more to transportation funding in the 21st century than building more roads and bridges. He urged smart transportation advocates attending the Smart City Council’s Smart Cities Now forum in San Diego this week to take their message to Congress. There are new people in Congress who are going to write a transportation bill, LaHood suggested, and if they don’t incorporate all of the smart technologies that the forum has
  • Bitsensing makes modern history in fair Verona
    July 3, 2025
    Shakespeare’s Verona was a place of star-cross’d lovers – today, it’s the traffic which is more of a problem. Euichul Kim at Bitsensing takes up our story…
  • AVs 'must serve society,' insists CCAV
    October 13, 2022
    UK government's AV champion among delegates at Autonomy's first London City Summit
  • Legalities of in-vehicle systems and cooperative infrastructures
    February 1, 2012
    Paul Laurenza of Dykema Gossett PLLC discusses the paths which lawmakers may go down on the route to making in-vehicle systems and cooperative infrastructures a reality. The question of whether or not to mandate in-vehicle systems for safety and other applications is a vexed one. There is a presumption on some parts that going down the road of forcing systems' fitment is somehow too domineering or restricting. Others would argue that it is the only realistic way of ensuring that systems achieve widespread d