administered by S30: Terrorism sources of guidance and support

Size: px
Start display at page:

Download "administered by S30: Terrorism sources of guidance and support"

Transcription

1 administered by S30: Terrorism sources of guidance and support Version 1 Published 2016

2 IMPORTANT NOTICE This document has been developed through RISCAuthority and published by the Fire Protection Association (FPA). RISCAuthority membership comprises a group of UK insurers that actively support a number of expert working groups developing and promulgating best practice for the protection of people, property, business and the environment from loss due to fire and other risks. The technical expertise for this document has been provided by the Technical Directorate of the FPA, external consultants, and experts from the insurance industry who together form the various RISCAuthority Working Groups. Although produced with insurer input it does not (and is not intended to) represent a paninsurer perspective. Individual insurance companies will have their own requirements which may be different from or not reflected in the content of this document. FPA has made extensive efforts to check the accuracy of the information and advice contained in this document and it is believed to be accurate at the time of printing. However, FPA makes no guarantee, representation or warranty (express or implied) as to the accuracy or completeness of any information or advice contained in this document. All advice and recommendations are presented in good faith on the basis of information, knowledge and technology as at the date of publication of this document. Without prejudice to the generality of the foregoing, FPA makes no guarantee, representation or warranty (express or implied) that this document considers all systems, equipment and procedures or state-of-the-art technologies current at the date of this document. Use of, or reliance upon, this document, or any part of its content, is voluntary and is at the user s own risk. Anyone considering using or implementing any recommendation or advice within this document should rely on his or her own personal judgement or, as appropriate, seek the advice of a competent professional and rely on that professional s advice. Nothing in this document replaces or excludes (nor is intended to replace or exclude), entirely or in part, mandatory and/ or legal requirements howsoever arising (including without prejudice to the generality of the foregoing any such requirements for maintaining health and safety in the workplace). Except to the extent that it is unlawful to exclude any liability, FPA accepts no liability whatsoever for any direct, indirect or consequential loss or damage arising in any way from the publication of this document or any part of it, or any use of, or reliance placed on, the content of this document or any part of it. 2 Security

3 Contents 1 Introduction Background Sources of advice Activities Guidance documents and websites Crowded places general guidance NaCTSO sector guides Other NaCTSO publications Additional documents and websites Technical publications for risk mitigation Specialist consultancy Terrorism sources of guidance and support 3

4 1 Introduction The expression there is no silver bullet probably applies to counterterrorism more than any other category of security countermeasure since the act of terrorism is held to cover such a diverse range of attack type from webpage defacement through to CBNR (chemical, biological, nuclear and radiological) attack. Consequently this challenges compilation of guidance in a succinct form but, fortunately, specialists in the police and security services, as well as certain respected outside bodies, have not been deterred and a wealth of guidance exists that tackles the subject in varying depth. The purpose of this document is to assist with navigation to sources of good practice. 2 Background As this document is prepared, the threat level for international terrorism in the UK stands at severe. Severe is taken to indicate that an attack is highly likely. There are five threat levels determined by the security services and severe stands at only one level below the highest level of threat, critical, which is taken to mean that an attack is expected imminently. MI5 set the level according to prevailing circumstances and therefore the level has fluctuated over the years according to domestic and international conditions. This is important because a security designer who assumes that the current level is somehow exceptional would be misled. Currently, Islamic inspired terrorism is the main focus of concern and traumatic events such as 9/11 (total destruction of the World Trade Centre) and 7/7 (central London bombings) are remembered by, or known to, today s security practitioners but it might be invidious to debate whether recent events have caused more or less terror than the activities of the Irish Republican Army (IRA) not so many years ago. In fact, Northern Ireland-related terrorism continues to pose a serious threat (notwithstanding the peace process) and it has to be taken into account by MI5 when they determine the current level of threat. Arguably, terrorism has existed since the beginning of civilisation and presumably landmarks such as 9/11 will be remembered alongside other seismic events from history such as the gun powder plot and the shooting of Archduke Franz Ferdinand. Thus, irrespective of prevailing threat level, the security risk assessment for locations sensitive to terrorist threat such as those hosting crowds and those with operations attracting the attention of terrorists such as political, military or national infrastructure operations, or places simply with an iconic presence, must make counterterrorism the priority. 3 Sources of advice National Counter Terrorism Security Office (NaCTSO) The National Counter Terrorism Security Office (NaCTSO) is part of the National Police Chiefs Council (NPCC) in support of the government s counterterrorism strategy. It supports a network of about 190 counterterrorism security advisors (CTSAs see below) working within local police forces to provide help, advice and guidance on counterterrorism protective security to specified industry sectors. The Centre for the Protection of National Infrastructure (CPNI) The CPNI is the government authority that provides advice on protecting the country s essential services, facilities and networks from terrorism and other threats. 4 Security

5 Counter-Terrorism Security Advisers (CTSA) Most police forces have at least two of these officers whose role is to identify and assess local critical sites that might be vulnerable to terrorist attack and generate suitable countermeasures. 4 Activities Project Argus These free events, delivered by CTSAs around the country, are open to those operating crowded places (retail, leisure etc). Managers and their staff are guided through a simulated terrorist attack to help them understand their reactions and plan initial responses to an incident. Project Griffin Project Griffin aims to engage, encourage and enable members of the community to work in partnership with the police to deter, detect and counter terrorist activity and crime. The half day sessions provided by police forces are free and can possibly be staged in-house. 5 Guidance documents and websites Protecting Against Terrorism, CPNI This publication contains sound advice as to good practice for protection and damage limitation. It sets out how a security plan can be developed and the key measures that can help protect staff, property and information. This document is recommended over others if a single, generic and comprehensive overview of the challenges facing a typical business is required. RIBA Guidance on Designing for Counter Terrorism, RIBA A thoroughly researched and comprehensive publication strong on planning advice for crowded places and sources of help. Although the target audience may be the architectural profession much of the content can be applied to security measures for existing premises. Resilient Design Tool for Counter Terrorism, Secured by Design and others A user friendly PDF-based tool addressing counterterrorism design features in new and existing developments planned for crowded public places. 6 Crowded places general guidance Although primarily directed at new developments, the advice in the following two publications is also relevant to improving the security of existing buildings: 1. Crowded Places: the Planning System and Counter Terrorism; and 2. Protecting Crowded Places: Design and Technical Issues. Note that specific requirements are in place for transport facilities, such as airports, railways Terrorism sources of guidance and support 5

6 and ports, some of which are legally binding. 7 NaCTSO sector guides The following guides all follow a similar pattern and each contains very similar security and business continuity advice but adapted where necessary for the particular sector. Each is very comprehensive. Counter Terrorism Protective Security Advice for General Aviation Advice to those working in the general aviation sector. Counter Terrorism Protective Security Advice for Commercial Centres Advice for commercial centres where large numbers of people congregate, such as Canary Wharf in London. Counter Terrorism Protective Security Advice for Higher and Further Education Advice for schools and colleges. Counter Terrorism Protective Security Advice for Health Advice for those responsible for counterterrorism in the public and private health sector. Counter Terrorism Protective Security Advice for Hotels and Restaurants Advice for those responsible for counterterrorism in hotels, restaurants and similar enterprises. Counter Terrorism Protective Security Advice for Pubs and Clubs Advice for those responsible for counterterrorism in pubs, clubs and nightclubs. Counter Terrorism Protective Security Advice for Shopping Centres Advice for those responsible for counterterrorism in shopping centres. Counter Terrorism Protective Security Advice for Stadia and Arenas Advice for those responsible for counterterrorism in stadia and arenas of all types and sizes. Counter Terrorism Protective Security Advice for Major Events Advice for those responsible for counterterrorism at major events where there may be a risk of a terrorist attack, either because of the nature of the event or the number or nature of the people who host or attend it. Counter Terrorism Protective Security Advice for Places of Worship Advice for those responsible for counterterrorism at places of worship that could be the target of a terrorist incident because of the nature of the establishment, the number of people who congregate in it, or due to special events. Counter Terrorism Protective Security Advice for your Business Outside of the UK Advice to those who own, operate, manage or work within various businesses outside of the UK. 6 Security

7 8 Other NaCTSO publications Hostile Reconnaissance Hostile reconnaissance is the term used by the security services for the methods used by terrorists to gather intelligence on potential targets preparatory to an attack. This short but useful document explains how those engaged in such reconnaissance might be spotted. Developing Dynamic Lockdown Procedures Contains practical procedures to dynamically lock down a site in response to a fast moving incident such as an attack with firearms or explosives. 9 Additional documents and websites Recognising the Terrorist Threat, National Counter Terrorism Security Office NaCTSO A concise guide to behaviour in the event of a terrorist attack plus a description of certain types of attack, some accompanied by advice on action for prevention and damage limitation but, overall, not the most coherent of documents. Preparing for Emergencies, Cabinet office Contains generic principles of emergency response and recovery, essentially for major incidents but not necessarily terrorist inspired. Concise, high-level but containing numerous useful links. The following three publications, albeit with a deal of overlap, establish high-level security, business resilience and business continuity principles without getting into great depth on risk mitigation. Secure in the Knowledge Strives to raise risk awareness, establishes basic risk management concepts and practice and suggests how risk management and insurance should be balanced. Specific advice on information security issues, less on terrorism as such. Counting the Cost, NaCTSO An easy to read high level guide to risk assessment and the basic principles of risk management but light on their specific application to terrorism and practical measures. Expecting the Unexpected Generic business interruption advice for major incidents (not just terrorism) preceded by some basic suggestions for risk identification and assessment. Preparing a Lockdown for your Trust, NHS Security Management Intended for use by National Health Service Local Security Management Specialists tasked with preparing a local lockdown plan for their trust. Terrorism sources of guidance and support 7

8 Contest annual report, Home Office Subtitled UK strategy for countering terrorism, this document provides insights to current threats and our national strategy for combating them. 10 Technical publications for risk mitigation (Note that in addition to the CPNI publications below there is a wealth of other publications on security matters available from CPNI.) Integrated Design for the Public Realm (Design Guide for Hostile Vehicle Mitigation), CPNI A comprehensive document to assist those responsible for integrating hostile vehicle mitigation (HVM) protective security measures into the public realm to ensure that the correct level of protection is provided. Bollards and Pedestrian Movement, CPNI Provides guidance to inform the planning and design of bollard schemes installed for the purpose of HVM. Vehicle Security Barriers Within the Streetscape, CPNI Describes the main reasons behind the need to deploy a vehicle security barrier and demonstrates how best to integrate barriers into the streetscape. Measures to Improve the Blast Resistance of Glazing, CPNI Provides guidance on the use of glazing to reduce potential hazards from flying glass in the event of an explosion and to provide guidance on the specification of more specialised glazing systems such as fixed point glazing, frequently used in new commercial developments. Influence of Delamination of Laminated Glass on its Blast Performance, CPNI Raises awareness of the effect of edge delamination of laminated glass, on the glass ability to resist a blast load. Fixed Point Glass: Specification for Blast Enhanced Fixings, CPNI Guidance for those designing or specifying a point-fixed glazing system where a degree of blast enhancement is required. The Right Glazing in the Right Place, Glass & Glazing Federation Generic information on impact performance of glass and safety glazing in critical locations, recommendations on the class of safety glass and plastics and also recommended thickness of glass. 8 Security

9 Laminated Glass, Glass & Glazing Federation Recommendations for application of laminated glass. Protecting people and property from terrorism, LPCB A pamphlet summarising the government s counterterrorism strategy and the role of LPCB testing and certification, particularly to LPS 1175 (Requirements and testing procedures for the LPCB approval and listing of intruder resistant building components, strongpoints, security enclosures and free-standing barriers). LPCB and PAS 68: Protecting buildings and crowded places, LPCB A brief explanation of the contents of BSI PAS 68 and PAS 69 with some text about testing and certification of vehicle barriers and other physical security products. 11 Specialist consultancy MMI Engineering offers technical consulting services to help commercial clients interpret and implement counterterrorist measures when required by security services. In particular, the company has many years experience in performing blast engineering to understand and mitigate the consequences from attacks by terrorists. Terrorism sources of guidance and support 9

10 NOTES 10 Security

11 NOTES Terrorism sources of guidance and support 11

12 administered by Fire Protection Association London Road Moreton in Marsh Gloucestershire GL56 0RH Tel: +44 (0) Website: The Fire Protection Association on behalf of RISCAuthority Printed by: XXX

Counter-Terrorism and the Protection of Crowded Places

Counter-Terrorism and the Protection of Crowded Places Counter-Terrorism and the Protection of Crowded Places Alasdair Booth MSc @CT_PhD_Student Supervisors: Dr Lee Bosher and Dr Ksenia Chmutina Background Information on Counter-Terrorism Security in the UK

More information

RiskTopics. Counter-Terrorism October 2017

RiskTopics. Counter-Terrorism October 2017 RiskTopics Counter-Terrorism October 2017 Terrorist groups use violence and threats of violence to publicise their causes and as a means to achieve their goals. They often aim to influence or exert pressure

More information

Crowded Places: The Planning System and Counter-Terrorism

Crowded Places: The Planning System and Counter-Terrorism Crowded Places: The Planning System and Counter-Terrorism March 2010 Crowded Places: The Planning System and Counter-Terrorism Page 2 Crowded Places: The Planning System and Counter-Terrorism March 2010

More information

GK SOLUTIONS PTY LTD COMPANY PROFILE

GK SOLUTIONS PTY LTD COMPANY PROFILE GK SOLUTIONS PTY LTD COMPANY PROFILE Company Profile Registered Business Name GK Solutions Pty Ltd ABN 23 770 995 016 Registered Business Address 18 Teak Street, Caulfield South, Victoria 3162 (PO Box

More information

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

LEADERSHIP GROUP LG (2017) Paper October 2017 RESILIENCE BOARD

LEADERSHIP GROUP LG (2017) Paper October 2017 RESILIENCE BOARD RESILIENCE BOARD Executive summary 1. At its meeting on 27 September, Leadership Group (LG) considered a proposal to establish a Resilience Board to take strategic oversight of personnel, physical and

More information

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY

More information

National Business Crime Partnership Association

National Business Crime Partnership Association National Business Crime Partnership Association A New National Association for Business Crime Reduction Partnerships (BCRPs) It is crucial to have a national representative body to support BCRP s, one

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Native American Risk Management Conference 20 July, 2018 Bridging the Gap: Delivering

More information

Office of Infrastructure Protection Overview

Office of Infrastructure Protection Overview Office of Infrastructure Protection Overview Harvey Perriott Protective Security Advisor North Texas District U.S. Department of Homeland Security Vision and Mission Vision A safe, secure, and resilient

More information

Max Security Solutions

Max Security Solutions Max Security Solutions Max Security Solutions Proactive Risk Management What we do Max Security provides comprehensive security and risk management solutions for the business sector, private clients and

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

keeping executives safe

keeping executives safe keeping executives safe Neil Austin and Lawrence Dando, two career surveillance specialists, established Mint Executive in 2015, having worked on and managed some of the most complex Police operations

More information

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification

More information

Securing strategic advantage

Securing strategic advantage Securing strategic advantage Protecting industrial control systems Cyber Supplier to UK Government Plan Design Enable In delivering our vision to be the best infrastructure company in the world, we pride

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM

21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM 21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM Increasing stability and security: Improving the environmental footprint of energy-related activities in the OSCE region CONCLUDING MEETING Prague, 11 13 September

More information

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response CYBER INCIDENT REPORTING GUIDANCE Industry Reporting Arrangements for Incident Response DfT Cyber Security Team CYBER@DFT.GSI.GOV.UK Introduction The Department for Transport (DfT) has produced this cyber

More information

A Safer World. A Secure Tomorrow. SECURITY AUDITS CONSULTANCY TRAINING.

A Safer World. A Secure Tomorrow. SECURITY AUDITS CONSULTANCY TRAINING. A Safer World. A Secure Tomorrow. SECURITY AUDITS CONSULTANCY TRAINING www.consultmipl.com MIPL is a security consulting company from India, offering sustainable designs and solutions for security management.

More information

Action Plan to enhance preparedness against CBRN security risks

Action Plan to enhance preparedness against CBRN security risks Action Plan to enhance preparedness against CBRN security risks 8 March 2018 Wiktor WOJTAS European Commission DG 2017 Counterterrorism Package - a number of measures to support Member States in fighting

More information

June 5, 2018 Independence, Ohio

June 5, 2018 Independence, Ohio June 5, 2018 Independence, Ohio The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Securing the Nation at the Community Level 2018 Cuyahoga

More information

Form doesn t have to follow function

Form doesn t have to follow function Form doesn t have to follow function 02 www.marshalls.co.uk www.marshalls.co.uk 03 The psychology behind keeping the public safe from vehicle attacks A shift in focus for terror organisations over recent

More information

Defence and Security

Defence and Security Defence and Security 13 HVM Perimeter Security Deployed at Westminster 2 Our Story TSP Projects is an innovative solutions driven company which prides itself on engineering projects and products, tailored

More information

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent

More information

POSITION DESCRIPTION

POSITION DESCRIPTION UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

Level 3 Implementing an ICT systems security policy ( / )

Level 3 Implementing an ICT systems security policy ( / ) Level 3 Implementing an ICT systems security policy (7540-032/7630-333) Systems and Principles (QCF) Assignment guide for Candidates Assignment A www.cityandguilds.com September 2012 Version 5.0 About

More information

Fighting Hunger Worldwide. WFP Field Security Keeping you safe & secure

Fighting Hunger Worldwide. WFP Field Security Keeping you safe & secure Fighting Hunger Worldwide WFP Field Security Keeping you safe & secure April 2016 Safety and security: a top priority In the field, our security risk management personnel provide specific knowledge of

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

TSP Technical Solutions in Partnership

TSP Technical Solutions in Partnership TSP Technical Solutions in Partnership Discovering our customers needs and delivering the correct solutions: on budget, on time, first time. w: tspprojects.co.uk t: +44(0)1904 454600 Offices in Birmingham,

More information

National Strategy for CBRNE Standards

National Strategy for CBRNE Standards National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September

More information

CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS. Overview of CIP in Australia

CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS. Overview of CIP in Australia CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS Overview of CIP in Australia Greg Scott Leader, Critical Infrastructure Project Risk & Impact Analysis Group Geoscience Australia Greg.Scott@ga.gov.au

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape

More information

Chartered Membership: Professional Standards Framework

Chartered Membership: Professional Standards Framework Chartered Membership: Professional Standards Framework Foreword The Chartered Institute of Architectural Technologists (CIAT) is the lead professional body for Architectural Technology and the UK Competent

More information

ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response

ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT ACTIVE SHOOTER RESPONSE Responding to armed assault acts of terrorism and active shooter incidents Acts of terrorism and shootings in public places have become

More information

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT) ASEAN REGIONAL FORUM INTER-SESSIONAL SUPPORT GROUP MEETING ON CONFIDENCE BUILDING MEASURES (ISG on CBMs) Beijing, 20-22 November 2003 THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Cybersecurity Landscape Major Data Breaches (e.g., OPM, IRS) Data Breach Notification Laws Directors Derivative Suits Federal Legislation

More information

Level 1 Internet Safety for IT Users ( )

Level 1 Internet Safety for IT Users ( ) Level 1 Internet Safety for IT Users (7574-135) ITQ (QCF) Assignment guide for Candidates Assignment A www.cityandguilds.com November 2011 Version 1.0 About City & Guilds City & Guilds is the UK s leading

More information

Joint ICTP-IAEA School of Nuclear Energy Management November 2012

Joint ICTP-IAEA School of Nuclear Energy Management November 2012 2374-20 Joint ICTP- School of Nuclear Energy Management 5-23 November 2012 Establishing National Nuclear Security Infrastructure (Module 9 Topics 3 & 4) EVANS Rhonda International Atomic Energy Agency,

More information

SECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011

SECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011 American Chemistry Council Responsible Care SECURITY CODE 7 April 2011 Debra Phillips Managing Director, Responsible Care American Chemistry Council Why develop a Separate Security Code? Need for a clearly

More information

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale

More information

The National Fire Chiefs Council. Roy Wilsher Chair National Fire Chiefs Council

The National Fire Chiefs Council. Roy Wilsher Chair National Fire Chiefs Council The National Fire Chiefs Council Roy Wilsher Chair National Fire Chiefs Council @NFCCChair @NFCC_FireChiefs NFCC Drivers for Change NFCC important contribution to supporting FRAs and the UK Fire Sector;

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

Critical Infrastructure

Critical Infrastructure Critical Infrastructure 1 Critical Infrastructure Can be defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and

More information

Automatic Number Plate Recognition (ANPR) ANPR Strategy Infrastructure Development

Automatic Number Plate Recognition (ANPR) ANPR Strategy Infrastructure Development Automatic Number Plate Recognition (ANPR) ANPR Strategy 2016-2020 Infrastructure Development Version 1 July 2017 Document Control Change Control Version Date Change Author 0.1 1 June 2016 Initial draft

More information

Member of the County or municipal emergency management organization

Member of the County or municipal emergency management organization EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,

More information

The APEC Model. Global Partnership through Regional Initiatives

The APEC Model. Global Partnership through Regional Initiatives The APEC Model Global Partnership through Regional Initiatives Tony Beard Office of Transport Security (OTS), Department of Transport and Regional Services (DOTARS), Australia Office of Transport Security

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

Cyber Threat Landscape April 2013

Cyber Threat Landscape April 2013 www.pwc.co.uk Cyber Threat Landscape April 2013 Cyber Threats: Influences of the global business ecosystem Economic Industry/ Competitors Technology-led innovation has enabled business models to evolve

More information

COUNTER-TERRORISM. Future-oriented policing projects

COUNTER-TERRORISM. Future-oriented policing projects COUNTER-TERRORISM Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through the Interpol

More information

Security Director - VisionFund International

Security Director - VisionFund International Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone

More information

Strategic Security Analyst

Strategic Security Analyst Strategic Security Analyst Location: [North America] [United States] Town/City: Monrovia Category: Security Job Type: Fixed term, Full-time *Preferred location: USA, UK or Australia where WVI is registered*

More information

Vulnerability Assessments and Penetration Testing

Vulnerability Assessments and Penetration Testing CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze

More information

Level 3 Install, configure and integrate networked hardware and software ( )

Level 3 Install, configure and integrate networked hardware and software ( ) Level 3 Install, configure and integrate networked hardware and software (7540-361) Systems and Principles Assignment guide for Candidates Assignment A www.cityandguilds.com September 2017 Version 5.0

More information

Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay

Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay Assistant Director General Office of State Security and Emergency Coordination Department of the Premier and Cabinet

More information

People Assets Reputation

People Assets Reputation Welcome to Spearpoint International LLC The risks faced by global business are greater now than ever, the increasing danger from terrorism and the ever present threat from organized and opportunistic crime

More information

Emergency Management Response and Recovery. Mark Merritt, President September 2011

Emergency Management Response and Recovery. Mark Merritt, President September 2011 Emergency Management Response and Recovery Mark Merritt, President September 2011 Evolution of Response and Recovery Emergency Management Pendulum Hurricane Andrew August 24, 1992 9/11 Terrorist Attacks

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

how to manage risks in those rare cases where existing mitigation mechanisms are insufficient or impractical.

how to manage risks in those rare cases where existing mitigation mechanisms are insufficient or impractical. Contents Introduction... 2 Purpose of this paper... 2 Critical Infrastructure Security and Resilience... 3 The National Security Environment... 5 A Proactive and Collaborative Approach... 7 Critical Infrastructure

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

The Age of Heightened Security

The Age of Heightened Security The Age of Heightened Security Critical Asset Inventory and Protection Plan Electronic Intrusion and Attack Prevention Iowa Homeland Security Initiative 1 The Age of Heightened Security Intelligence Gathering

More information

Level 1 Internet Safety for IT Users ( )

Level 1 Internet Safety for IT Users ( ) Level 1 Internet Safety for IT Users (7574-135) ITQ (QCF) Assignment guide for Candidates Assignment B www.cityandguilds.com November 2011 Version 1.0 About City & Guilds City & Guilds is the UK s leading

More information

Remit Issue April 2016

Remit Issue April 2016 1 Introduction Remit Issue 02 18 April 2016 1.1 This document defines the scope, purpose and working arrangements for the High Integrity Systems Group. High integrity systems are playing an increasingly

More information

Statement of Chief Richard Beary President of the International Association of Chiefs of Police

Statement of Chief Richard Beary President of the International Association of Chiefs of Police Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

ACI-NA 2018 Risk Management Conference SAFETY Act. Washington, D.C

ACI-NA 2018 Risk Management Conference SAFETY Act.  Washington, D.C ACI-NA 2018 Risk Management Conference SAFETY Act Akmal Ali, J.D. akmal.ali@catalystdc.com Principal, Catalyst Partners 1250 Connecticut Ave. NW www.catalystdc.com Washington, D.C. 20036 Following the

More information

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

SAFETY Act AAPA Port Security Seminar July 19, 2012 Miami, FL. Washington, D.C

SAFETY Act AAPA Port Security Seminar July 19, 2012 Miami, FL.   Washington, D.C SAFETY Act AAPA Port Security Seminar July 19, 2012 Miami, FL Akmal Ali, J.D. akmal.ali@catalystdc.com Principal, Catalyst Partners 1250 Connecticut Ave. NW www.catalystdc.com Washington, D.C. 20036 World

More information

Privacy Impact Assessment

Privacy Impact Assessment Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT

PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT HOUSE TRANSPORTATION & INFRASTRUCTURE SUBCOMMITTEE ON RAILROADS Oversight Hearing on Railroad Security

More information

HPH SCC CYBERSECURITY WORKING GROUP

HPH SCC CYBERSECURITY WORKING GROUP HPH SCC A PRIMER 1 What Is It? The cross sector coordinating body representing one of 16 critical infrastructure sectors identified in Presidential Executive Order (PPD 21) A trust community partnership

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

The Federal Council s Basic Strategy. for Critical Infrastructure Protection

The Federal Council s Basic Strategy. for Critical Infrastructure Protection The Federal Council The Federal Council s Basic Strategy for Critical Infrastructure Protection Basis for the national critical infrastructure protection strategy 18 May 2009 Table of Contents 1 Introduction...

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical

More information

Alternative Fuel Vehicles in State Energy Assurance Planning

Alternative Fuel Vehicles in State Energy Assurance Planning + Alternative Fuel Vehicles in State Energy Assurance Planning July 17, 2014 Webinar hosted by the National Association of State Energy Officials (NASEO), with support from the U.S. Department of Energy

More information

Modelling & Simulation for National Security

Modelling & Simulation for National Security To provide a national focus for science and technology to enhance Australia s counter-terrorism capabilities 1 Modelling & Simulation for National Security Dr Richard Davis National Security Science &

More information

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the

More information

Big data privacy in Australia

Big data privacy in Australia Five-article series Big data privacy in Australia Three actions you can take towards compliance Article 5 Big data and privacy Three actions you can take towards compliance There are three actions that

More information

Hazard Management Cayman Islands

Hazard Management Cayman Islands Hazard Management Cayman Islands Strategic Plan 2012 2016 Executive Summary HMCI strategic plan outlines the agency s outlook in the next five years and illustrates the main strategies as goals that will

More information

Data ownership within governance: getting it right

Data ownership within governance: getting it right Data ownership within governance: getting it right Control your data An Experian white paper Data Ownership within Governance : Getting it right - 1 Table of contents 1. Introduction 03 2. Why is data

More information

The National Fire Chiefs Council. Roy Wilsher Chair National Fire Chiefs Council

The National Fire Chiefs Council. Roy Wilsher Chair National Fire Chiefs Council The National Fire Chiefs Council Roy Wilsher Chair National Fire Chiefs Council NFCC Drivers for Change NFCC important contribution to supporting FRAs and the UK Fire Sector; Capacity at a leadership level

More information

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company Written Statement of Timothy J. Scott Chief Security Officer The Dow Chemical Company Representing The Dow Chemical Company and the American Chemistry Council To the United States Senate Committee on Homeland

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

Connected & Automated Vehicle Activities

Connected & Automated Vehicle Activities MDOT State Highway Administration Connected & Automated Vehicle Activities National Rural ITS Conference October 2018 MDOT s CAV Working Group MDOT s CAV Working Group Open discussions on CAV with TBUs,

More information

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives SECURING THE UK S DIGITAL PROSPERITY Enabling the joint delivery of the National Cyber Security Strategy's objectives 02 November 2016 2 SECURING THE UK S DIGITAL PROSPERITY SECURING THE UK S DIGITAL PROSPERITY

More information

Level 2 Security for IT users (ITS ) ITQ (QCF) Assignment guide for Candidates Assignment A. March 2010 Version 1.

Level 2 Security for IT users (ITS ) ITQ (QCF) Assignment guide for Candidates Assignment A.  March 2010 Version 1. Level 2 Security for IT users (ITS 7574-205) ITQ (QCF) Assignment guide for Candidates Assignment A www.cityandguilds.com March 2010 Version 1.0 About City & Guilds City & Guilds is the UK s leading provider

More information

GLAZING, DOORS AND LOCKS

GLAZING, DOORS AND LOCKS GLAZING, DOORS AND LOCKS DELIVERING SPECIALIST SERVICES FOR EMERGENCY AND PROJECT WORK www.vpsgroup.com 0345 145 0130 HOW WE WORK VPS Glazing, Doors & Locks is the UK s leading provider of emergency, responsive

More information