<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Franklin Gothic Book";
panose-1:2 11 5 3 2 1 2 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
p.xmsonormal, li.xmsonormal, div.xmsonormal
{mso-style-name:x_msonormal;
margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
p.xmsonospacing, li.xmsonospacing, div.xmsonospacing
{mso-style-name:x_msonospacing;
margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.xcontentpasted0
{mso-style-name:x_contentpasted0;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">FYSA<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<div>
<div>
<p class="xmsonormal" style="margin-bottom:6.0pt;background:white"><span class="xcontentpasted0"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black">Today, the U.S. Cybersecurity and Infrastructure Security Agency (</span></span><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black"><a href="https://cisa.gov">CISA</a><span class="xcontentpasted0">),
the U.S. National Security Agency (</span><a href="https://www.nsa.gov/Cybersecurity/">NSA</a><span class="xcontentpasted0">), the U.S. Federal Bureau of Investigation (</span><a href="https://www.ic3.gov/">FBI</a><span class="xcontentpasted0">), the United
Kingdom National Cyber Security Centre (</span><a href="https://www.ncsc.gov.uk/">NCSC-UK</a><span class="xcontentpasted0">), the Australian Cybersecurity Centre (</span><a href="https://www.cyber.gov.au/">ACSC</a><span class="xcontentpasted0">), the Canadian
Centre for Cyber Security (</span><a href="https://cyber.gc.ca/en">CCCS</a><span class="xcontentpasted0">), and the New Zealand National Cyber Security Centre (</span><a href="https://www.ncsc.govt.nz/">NCSC-NZ</a><span class="xcontentpasted0">) published
</span><b><a href="https://www.cisa.gov/resources-tools/resources/cybersecurity-best-practices-smart-cities" title="https://www.cisa.gov/resources-tools/resources/cybersecurity-best-practices-smart-cities">Cybersecurity Best Practices For Smart Cities</a><span class="xcontentpasted0">.
</span> </b></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<p class="xmsonormal" style="margin-bottom:6.0pt;background:white"><span class="xcontentpasted0"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black">Integrating public services into a connected environment can increase the
efficiency and resilience of the infrastructure that supports day-to-day life in our communities. However, communities considering becoming smart cities should thoroughly assess and mitigate the cybersecurity risk that comes with this integration. </span></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<p class="xmsonormal" style="margin-bottom:6.0pt;background:white"><span class="xcontentpasted0"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black">The joint guide provides an overview of risks to smart cities, including
expanded and interconnected attack surface; information and communications technologies (ICT) supply chain risks; and increasing automation of infrastructure operations. To protect against these risks, the government partners offer three recommendations to
help communities strengthen their cyber postures: secure planning and design, proactive supply chain risk management, and operational resilience. </span></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<p class="xmsonormal" style="margin-bottom:6.0pt;background:white"><span class="xcontentpasted0"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black">As communities implement smart city technologies, this guidance provides
recommendations to balance efficiency and innovation with cybersecurity, privacy protections, and national security. </span></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<p class="xmsonormal" style="margin-bottom:6.0pt;background:white"><span class="xcontentpasted0"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black">Organizations should implement these best practices in alignment with their
specific cybersecurity requirements to ensure the safe and secure operation of infrastructure systems, protection of citizen’s private data, and security of sensitive government and business data. </span></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<p class="xmsonospacing" style="background:white"><span class="xcontentpasted0"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black">For more on CISA’s work to help cities and communities mitigate the cybersecurity risk,
visit CISA’s <a href="https://www.cisa.gov/topics/risk-management/connected-communities" title="https://www.cisa.gov/topics/risk-management/connected-communities">
Connected Communities</a>. </span></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif"><o:p></o:p></span></span></p>
<p class="xmsonospacing" style="background:white"><o:p> </o:p></p>
</div>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><b><span style="color:#1F497D">Theresa A. Masse<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity State Coordinator/Advisor, Region 10 (Oregon)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity and Infrastructure Security Agency<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Department of Homeland Security<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Phone: (503) 930-5671
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Email:</span><span style="font-size:10.0pt;color:#777777">
</span><a href="mailto:theresa.masse@cisa.dhs.gov"><span style="font-size:10.0pt;color:#0563C1">theresa.masse@cisa.dhs.gov</span></a><u><span style="font-size:10.0pt;color:#0760C1"><o:p></o:p></span></u></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><img border="0" width="97" height="97" style="width:1.0138in;height:1.0138in" id="Picture_x0020_1" src="cid:image001.png@01D972AF.74D30510"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="xmsonormal" style="margin-bottom:8.0pt;background:white"><span style="font-size:12.0pt"><o:p> </o:p></span></p>
</div>
</body>
</html>