The Engineering Vulnerability Assessment Protocol - principles and application David Lapp, P.Eng. Manager, Professional Practice Engineers Canada

Size: px
Start display at page:

Download "The Engineering Vulnerability Assessment Protocol - principles and application David Lapp, P.Eng. Manager, Professional Practice Engineers Canada"

Transcription

1 The Engineering Vulnerability Assessment Protocol - principles and application David Lapp, P.Eng. Manager, Professional Practice Engineers Canada City of Toronto Briefing on Public Infrastructure Engineering Vulnerability Committee November 25, 2008

2 Engineering Vulnerability to Climate Change The shortfall in the ability of public infrastructure to absorb the negative effects, and benefit from the positive effects, of changes in the climate conditions used to design and operate infrastructure.

3 Protocol Principles The Protocol is a step by step risk assessment process to assess impacts of climate change on infrastructure Goal: Assist infrastructure owners and operators to effectively incorporate climate change adaptation into design, development and decisionmaking

4 Infrastructure Component Performance Criteria Structural Serviceability Serviceability Functionality Operations & Maintenance Emergency Response Risks Insurance Considerations Policies and Procedures Economics Public Health & Safety Environmental Effects

5 Engineering Vulnerability Assessment Protocol Five steps Critical decisions required after qualitative assessment Quantification MAY be completed if qualitative analysis demonstrates the need Data quality and availability assessed throughout

6 A Five Step Process

7 Step 1- Define Baseline Infrastructure Details Design Load Site Setting Impact on local population Impact on other important infrastructure Climate Data Traditional design considerations Historic data

8 Step 1 - Define Baseline

9 Step 2 - Gather Data Key sub-units of the infrastructure Stats and data regarding climate change in the region Other projected changes that may affect infrastructure Infrastructure: Use Load Operation Etc.

10 Step 2 - Gather Data

11 Step 3 - Qualitative Assessment Prioritize important infrastructure and climate related information Link Data regarding key elements of the infrastructure; and Data regarding climate change. Professional judgement Multidisciplinary Need the right mix of professionals on the team Need to trust the insight of owners and operators

12 Step 3 - Qualitative Assessment Assess need for more detailed analysis Cost considerations Potential severity of impact on infrastructure Potential severity of impact on related infrastructure As appropriate draw conclusions and make recommendations The Protocol allows the user to proceed directly to Step 5 based on professional judgement, policy and other considerations

13 Step 3 - Qualitative Assessment

14 Step 4 - Quantitative Analysis Professional judgement Optional unless need dictates Requires very specific data Identifies data gaps May require additional iterations of earlier steps in the Protocol Quantifies vulnerability Establishes a value for adaptive capacity Identifies required increases in capacity

15 Step 4 - Quantitative Analysis

16 Step 5 - Recommendations A range of possible recommendations and conclusions Data gaps constitute vulnerability» Further research required Current or future lack of capacity» Remedial action» Management action Identified resiliency» No further action at this time

17 Step 5 - Recommendations

18 Applying the Protocol From a practitioner's perspective the Protocol works Requires application of professional judgement throughout Allows the user to identify who needs to be at the table Qualitative analysis (Step 3) is the most important step of the Protocol Allows user to make key management and cost control decisions It may be difficult to gather all of the data necessary for quantification (Step 4) Do Step 4 where necessary and cost-effective

19 Applying the Protocol A very powerful tool derived from standard risk management methodologies tailored to climate change vulnerability Should be familiar to most engineering professionals Lack of input data for Step 4 need not deter the user from making professionally-based judgments and expressing opinions leading to recommendations The protocol can be a useful tool in the hands of a qualified professional

20 When Resources are Limited Not every application of the Protocol has all an ideal set of resources Data Computer models Technical expertise This need not deter infrastructure owners from completing an assessment The Protocol identifies which questions to ask Does not dictate the method that practitioners should use to answer those questions

21 Resources are Always Limited There are usually gaps Models may not cover the region being assessed Meteorological data may not have been collected Operational records may not exist Staff turnover Experience gap

22 Filling the Gaps Engineering Vulnerability Assessment is a multidisciplinary activity Team structure is a critical element of filling the gaps Must have: Expertise in risk/vulnerability assessment Directly relevant engineering knowledge of the infrastructure Climatic and meteorological expertise relevant to the region Operational experience Hands-on management knowledge of the infrastructure Local knowledge

23 Conclusion Local knowledge, filtered through the expertise of the assessment team, can often compensate for data gaps and provide a basis for professional judgment of the vulnerability of the infrastructure.

24 Questions David Lapp, P.Eng. Manager, Professional Practice PIEVC Secretariat Engineers Canada Ottawa, Ontario CANADA (613) ext 240

infrastructure. 2. Relevant operational framework(s)

infrastructure. 2. Relevant operational framework(s) Inputs provided by: World Federation of Engineering Organizations Committee on Engineering and the Environment 1. General description of mandates and objective(s) of your organization / associated network

More information

Information Technology Branch Organization of Cyber Security Technical Standard

Information Technology Branch Organization of Cyber Security Technical Standard Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:

More information

For providing decision support on climate stressors to infrastructure and assets for federal, state, local, and private clients...

For providing decision support on climate stressors to infrastructure and assets for federal, state, local, and private clients... Resilience Resilience is the ability of a community to maintain its functions in the face of dramatically changed circumstances, including climate change, natural disasters, and aging infrastructure. Recent

More information

Request For Proposals. Information Technology (IT) Services. General: The City of Bishop requests proposals from consultants to provide IT services.

Request For Proposals. Information Technology (IT) Services. General: The City of Bishop requests proposals from consultants to provide IT services. Release: 10 June 2014 Closes: 27 June 2014 CITY OF BISHOP 377 West Line Street - Bishop, California 93514 Post Office Box 1236 - Bishop, California 93515 760-873-8458 publicworks@ca-bishop.us www.ca-bishop.us

More information

Business continuity management and cyber resiliency

Business continuity management and cyber resiliency Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,

More information

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin Internet of Things Internet of Everything Presented By: Louis McNeil Tom Costin Agenda Session Topics What is the IoT (Internet of Things) Key characteristics & components of the IoT Top 10 IoT Risks OWASP

More information

Improving the Resilience of Critical Infrastructure from Natural Hazards

Improving the Resilience of Critical Infrastructure from Natural Hazards Improving the Resilience of Critical Infrastructure from Natural Hazards David Murphy Assistant Director Natural Hazards Team Civil Contingencies Secretariat Outline Civil Contingencies Secretariat Vulnerability

More information

HPE Energy Efficiency Certification Service

HPE Energy Efficiency Certification Service Data sheet HPE Energy Efficiency Certification Service HPE Technology Consulting As power consumption and heat generation in the data center increase due to information explosion, big data, e-commerce,

More information

The Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction

The Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction 29 February 2016 The Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction 2015-2030 The Sendai Framework for Disaster Risk Reduction 2015-2030

More information

Presentation on the Community Resilience Program

Presentation on the Community Resilience Program CIB Meeting Delft, The Netherlands May 21, 2015 Presentation on the Community Resilience Program Dr. Therese McAllister Engineering Laboratory National Institute of Standards and Technology U.S. Department

More information

Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012

Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012 Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012 Christine Campbell Team Leader, Drinking Water Emergency Planning Ministry of the

More information

Toronto Hydro Response to December 2013 Ice Storm Independent Review Panel Report

Toronto Hydro Response to December 2013 Ice Storm Independent Review Panel Report Toronto Hydro Response to December 2013 Ice Storm Independent Review Panel Report Media Briefing Toronto, ON June 18, 2014 Part 1: Introduction David McFadden Chair, Independent Review Panel 3 Independent

More information

Canada Green Building Council - Greater Toronto Chapter 3-Year Strategic Plan, BUILDING MOMENTUM 3-YEAR STRATEGIC PLAN ( )

Canada Green Building Council - Greater Toronto Chapter 3-Year Strategic Plan, BUILDING MOMENTUM 3-YEAR STRATEGIC PLAN ( ) Canada Green Building Council - Greater Toronto Chapter BUILDING MOMENTUM 3-YEAR STRATEGIC PLAN (2017-2019) Canada Green Building Council - Greater Toronto Chapter Preface About the Canada Green Building

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

USER-CENTERED DESIGN KRANACK / DESIGN 4

USER-CENTERED DESIGN KRANACK / DESIGN 4 USER-CENTERED DESIGN WHAT IS USER-CENTERED DESIGN? User-centered design (UCD) is an approach to design that grounds the process in information about the people who will use the product. UCD processes focus

More information

Information Security Continuous Monitoring (ISCM) Program Evaluation

Information Security Continuous Monitoring (ISCM) Program Evaluation Information Security Continuous Monitoring (ISCM) Program Evaluation Cybersecurity Assurance Branch Federal Network Resilience Division Chad J. Baer FNR Program Manager Chief Operational Assurance Agenda

More information

Ontario Weather and Water Information Gateway

Ontario Weather and Water Information Gateway Ontario Weather and Water Information Gateway Project Background, Overview and Results A.D. Latornell Conservation Symposium November, 2012 Presentation Overview Introduction & Background Natural Resources

More information

IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives

IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives June 2018 1 Executive Summary This research finds that large enterprise customers and employees endure a substantial

More information

DISASTER RISK MANAGEMENT (DRM/DRR) TEAM

DISASTER RISK MANAGEMENT (DRM/DRR) TEAM SPARC LABORATORY DISASTER RISK MANAGEMENT (DRM/DRR) TEAM Summary of Research Directions Presented by Sayanti Mukhopadhyay, PhD Candidate Date: 12/14/2016 Director: Makarand (Mark) Hastak, Ph.D., PE, CCP

More information

PROFESSIONAL SERVICES (Solution Brief)

PROFESSIONAL SERVICES (Solution Brief) (Solution Brief) The most effective way for organizations to reduce the cost of maintaining enterprise security and improve security postures is to automate and optimize information security. Vanguard

More information

Critical Infrastructure Assessment

Critical Infrastructure Assessment Critical Infrastructure Assessment Everyday the products and services that support our standard of living flow, almost seamlessly, to and from our homes, communities, and government. Making this possible

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved. EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT An Insight Cyber White Paper Copyright Insight Cyber 2018. All rights reserved. The Need for Expert Monitoring Digitization and external connectivity

More information

SOLUTION BRIEF Virtual CISO

SOLUTION BRIEF Virtual CISO SOLUTION BRIEF Virtual CISO programs that prepare you for tomorrow s threats today Organizations often find themselves in a vise between ever-evolving cyber threats and regulatory requirements that tighten

More information

A Whirlwind Tour of Project Management To certify or not to certify? NNCA Construction Workshop v

A Whirlwind Tour of Project Management To certify or not to certify? NNCA Construction Workshop v A Whirlwind Tour of Project Management To certify or not to certify? NNCA Construction Workshop v 2015.1 Presented by Darya Duma, PEng, PMP, PRINCE2 www.procept.com 4DPM 2015 Outline Modern PM PM credentials

More information

OWASP RFP CRITERIA v 1.1

OWASP RFP CRITERIA v 1.1 OWASP RFP CRITERIA v 1.1 Project Sponsored by : ProactiveRisk. Table of Contents. 1. Introduction.3 2. Recommended Information the Client should provide to Service Providers/Vendors.4 2.1 Lines of Code..4

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

Chartered Membership: Professional Standards Framework

Chartered Membership: Professional Standards Framework Chartered Membership: Professional Standards Framework Foreword The Chartered Institute of Architectural Technologists (CIAT) is the lead professional body for Architectural Technology and the UK Competent

More information

DISCUSSION PAPER. Board of Certification Oral Examination Consistency

DISCUSSION PAPER. Board of Certification Oral Examination Consistency DISCUSSION PAPER Issue : Prepared for: Board of Certification Oral Examination istency CIPHI - Board of Certification Date: June 20, 2003 BACKGROUND The Certificate in Public Health Inspection (Canada),

More information

PREPARING FOR SOC CHANGES. AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice

PREPARING FOR SOC CHANGES. AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice PREPARING FOR SOC CHANGES AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice On May 1, 2017, SSAE 18 went into effect and superseded SSAE 16. The following information is here

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

SEAWALL EARTHQUAKE SAFETY & DISASTER PREVENTION PROGRAM

SEAWALL EARTHQUAKE SAFETY & DISASTER PREVENTION PROGRAM SEAWALL EARTHQUAKE SAFETY & DISASTER PREVENTION PROGRAM Port Jurisdiction Historic shoreline Presentation to the Port Commission March 13, 2018 Photo Michael Macor SEAWALL EARTHQUAKE SAFETY & DISASTER

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

HOTEL RESILIENT Plan ahead stay ahead. With support from the German Government through

HOTEL RESILIENT Plan ahead stay ahead. With support from the German Government through HOTEL RESILIENT Plan ahead stay ahead With support from the German Government through WHAT CAN GO WRONG WILL GO WRONG Murphy s Law More than 40% of hotels do not reopen after large disasters FEMA 2010

More information

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose: STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security

More information

Information Security Risk Strategies. By

Information Security Risk Strategies. By Information Security Risk Strategies By Larry.Boettger@Berbee.com Meeting Agenda Challenges Faced By IT Importance of ISO-17799 & NIST The Security Pyramid Benefits of Identifying Risks Dealing or Not

More information

Moving Beyond the Heat Map: Making Better Decisions with Cyber Risk Quantification

Moving Beyond the Heat Map: Making Better Decisions with Cyber Risk Quantification A CLOSER LOOK Moving Beyond the Heat Map: Making Better Decisions with Cyber Risk Quantification A major cybersecurity event can dissolve millions of dollars in assets and tarnish even the strongest company

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

RiskSense Attack Surface Validation for Web Applications

RiskSense Attack Surface Validation for Web Applications RiskSense Attack Surface Validation for Web Applications 2018 RiskSense, Inc. Keeping Pace with Digital Business No Excuses for Not Finding Risk Exposure We needed a faster way of getting a risk assessment

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY : THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

The World s Leading Organization for Electrical Power Systems Professionals and Industry Leaders

The World s Leading Organization for Electrical Power Systems Professionals and Industry Leaders The World s Leading Organization for Electrical Power Systems Professionals and Industry Leaders IMPROVING THE POWER SYSTEMS OF TODAY AND TOMORROW THROUGH INTERNATIONAL COLLABORATION CIGRÉ, the International

More information

COBIT 5 With COSO 2013

COBIT 5 With COSO 2013 Integrating COBIT 5 With COSO 2013 Stephen Head Senior Manager, IT Risk Advisory Services 1 Our Time This Evening Importance of Governance COBIT 5 Overview COSO Overview Mapping These Frameworks Stakeholder

More information

IMPROVING NETWORK SECURITY

IMPROVING NETWORK SECURITY IMPROVING NETWORK SECURITY How AN Information Assurance Professional Assessment HELPED THE The City of Stow, Ohio is a community of just under 35,000 people, located 35 miles south of Cleveland and part

More information

Ervia Risk Management. Elaine O Donoghue IPA Governance Forum Briefing 10 th November 2017

Ervia Risk Management. Elaine O Donoghue IPA Governance Forum Briefing 10 th November 2017 Ervia Risk Management Elaine O Donoghue IPA Governance Forum Briefing 10 th November 2017 Ervia Overview - Our Structure Our customer facing businesses, Gas Networks Ireland and Irish Water, are supported

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

John Snare Chair Standards Australia Committee IT/12/4

John Snare Chair Standards Australia Committee IT/12/4 John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC

More information

Six Sigma in the datacenter drives a zero-defects culture

Six Sigma in the datacenter drives a zero-defects culture Six Sigma in the datacenter drives a zero-defects culture Situation Like many IT organizations, Microsoft IT wants to keep its global infrastructure available at all times. Scope, scale, and an environment

More information

Changing the way companies run their data centers

Changing the way companies run their data centers Infrastructure Management & Monitoring for Business-Critical Continuity TM Changing the way companies run their data centers The Aperture TM Suite Optimize performance of your data center without COmpromising

More information

CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS. Overview of CIP in Australia

CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS. Overview of CIP in Australia CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS Overview of CIP in Australia Greg Scott Leader, Critical Infrastructure Project Risk & Impact Analysis Group Geoscience Australia Greg.Scott@ga.gov.au

More information

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts SAP Cybersecurity Solution Brief Objectives Solution Benefits Quick Facts Secure your SAP landscapes from cyber attack Identify and remove cyber risks in SAP landscapes Perform gap analysis against compliance

More information

Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA?

Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA? Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA? A brief overview of security requirements for Federal government agencies applicable to contracted IT services,

More information

ISDR National Platforms for DRR - Guidelines

ISDR National Platforms for DRR - Guidelines 1 ISDR National Platforms for DRR - Guidelines Multi-stakeholder meeting on Disaster Risk Reduction Bishkek 27 July 2009 Lars Bernd, Programme Officer National Platforms, UNISDR secretariat Geneva, bernd@un.org

More information

Developing a Model for Cyber Security Maturity Assessment

Developing a Model for Cyber Security Maturity Assessment Developing a Model for Cyber Security Maturity Assessment Tariq Al-idrissi, Associate Vice President IT, Trent University Ian Thomson, Information Security Officer, Trent University June 20 th, 2018 (8:45am

More information

Comments Resolution 3/29/2011

Comments Resolution 3/29/2011 General comment: Suggest adding more implementation-specific text. There are many different Federal organization types central, non- There's a lot of general text on why continuous monitoring is good,

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

BACKGROUND PAPER. Sub-Regional Platform on Disaster Risk Reduction

BACKGROUND PAPER. Sub-Regional Platform on Disaster Risk Reduction BACKGROUND PAPER Sub-Regional Platform on Disaster Risk Reduction Niamey, Niger 11-14 November 2013 1 BACKGROUND The ECOWAS Policy on Disaster Risk Reduction adopted by West African Heads of State and

More information

IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment

IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment Chad Huston Ali Zaidi THIS IDC MARKETSCAPE EXCERPT FEATURES: WIPRO IDC

More information

Predstavenie štandardu ISO/IEC 27005

Predstavenie štandardu ISO/IEC 27005 PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,

More information

The Integrated Research on Disaster Risk Programme (IRDR)

The Integrated Research on Disaster Risk Programme (IRDR) The Integrated Research on Disaster Risk Programme (IRDR) What is integrated research? Integrated disaster risk research engages multiple disciplines and researchers, scales (local to global), methodological

More information

fibre loop extensions to help mitigate the impact of accidental fibre cuts in rural and remote areas.

fibre loop extensions to help mitigate the impact of accidental fibre cuts in rural and remote areas. 1 2 3 Eligible recipients under the program include entities or groups of entities that are incorporated in Canada, that operate Internet infrastructure, and that meet the assessment criteria. Entities

More information

Climate change and health Building resilience through ehealth

Climate change and health Building resilience through ehealth Climate change and health Building resilience through ehealth Helsinki, 31 August 2012 Dr. Åsa Holmner Rocklöv Dept. of Biomedical Engineering & Informatics University Hospital of Northern Sweden & Umeå

More information

MERU WIRELESS NETWORK DESIGN SERVICE

MERU WIRELESS NETWORK DESIGN SERVICE MERU WIRELESS NETWORK DESIGN SERVICE INTRODUCTION. It is worth investing a little in the design phase to ensure that the Meru network infrastructure technical design meets or exceeds the specification

More information

Cyber Resilience. Think18. Felicity March IBM Corporation

Cyber Resilience. Think18. Felicity March IBM Corporation Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack

More information

Weather and climate Information SERvices for Africa (WISER) Joseph D. Intsiful, WISER Pan-African Lead, ACPC, UNECA

Weather and climate Information SERvices for Africa (WISER) Joseph D. Intsiful, WISER Pan-African Lead, ACPC, UNECA Weather and climate Information SERvices for Africa (WISER) Joseph D. Intsiful, WISER Pan-African Lead, ACPC, UNECA Background and focus Expected results Implementation Summary and conclusion Contents

More information

Modern Database Architectures Demand Modern Data Security Measures

Modern Database Architectures Demand Modern Data Security Measures Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing

More information

ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response

ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT ACTIVE SHOOTER RESPONSE Responding to armed assault acts of terrorism and active shooter incidents Acts of terrorism and shootings in public places have become

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

iinview Research First Click Analysis & Other User Metrics

iinview Research First Click Analysis & Other User Metrics iinview Research First Click Analysis & Other User Metrics July 2014 research iinview Research 2 Testing Methodology Task Based A/B Testing and Subjective Questionnaires The purpose of this test is to

More information

Infrastructure PA Stephen Lecce

Infrastructure PA Stephen Lecce PA Stephen Lecce Ministry of Stephen Lecce, Parliamentary Assistant Meeting: Topics: Topics: PA Stephen Lecce, MPP Monday, August 20, 2018 9:15 am 9:45 am Shaw Centre, Room 107, Level 1 National Centre

More information

ArcGIS Solutions for Community Resilience. Matthew S Deal

ArcGIS Solutions for Community Resilience. Matthew S Deal ArcGIS Solutions for Community Resilience Matthew S Deal Solutions Overview Leverage hundreds of ready-to-use maps, apps, and platform configurations to meet your needs, delivering innovation and best

More information

The Federal Council s Basic Strategy. for Critical Infrastructure Protection

The Federal Council s Basic Strategy. for Critical Infrastructure Protection The Federal Council The Federal Council s Basic Strategy for Critical Infrastructure Protection Basis for the national critical infrastructure protection strategy 18 May 2009 Table of Contents 1 Introduction...

More information

Overview of support provided by the LEG

Overview of support provided by the LEG Overview of support provided by the LEG Meeting between members of the Adaptation Committee s National Adaptation Plan Task Force (NAP TF) and representatives from UN agencies, relevant multi- and bilateral

More information

Strategic Transport Research and Innovation Agenda - STRIA

Strategic Transport Research and Innovation Agenda - STRIA Strategic Transport Research and Innovation Agenda - STRIA Brussels, 15 September 2016 Cristina Marolda DG Mobility & Transport European Commission Mobility & Transport Why do we need a new transport R&I

More information

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 I. Vision A highly reliable and secure bulk power system in the Electric Reliability Council of Texas

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

City of Kingston Report to Council Report Number

City of Kingston Report to Council Report Number To: From: Resource Staff: City of Kingston Report to Council Report Number 15-171 Mayor and Members of Council Denis Leger, Commissioner, Transportation, Facilities and Emergency Services Desiree Kennedy,

More information

CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC

CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION Alan Stuart, Managing Director National Science Foundation s New Headquarters in Alexandria, Virginia 1. Introduction to the National

More information

Cyber Risk Metrics Survey, Assessment, and Implementation Plan May 11, 2018

Cyber Risk Metrics Survey, Assessment, and Implementation Plan May 11, 2018 Cyber Risk Metrics Survey, Assessment, and Implementation Plan May 11, 2018 The Homeland Security Systems Engineering and Development Institute (HSSEDI ) is a trademark of the U.S. Department of Homeland

More information

The J100 RAMCAP Method

The J100 RAMCAP Method The J100 RAMCAP Method 2012 ORWARN Conference Kevin M. Morley, PhD Security & Preparedness Program Manager AWWA--Washington, DC Water is Key to Daily Life Potable drinking water Sanitation Public Health

More information

Impact of Enterprise Security Risk Assessments on Integrators & Manufacturers. J. Kelly Stewart Steve Oplinger James Marcella

Impact of Enterprise Security Risk Assessments on Integrators & Manufacturers. J. Kelly Stewart Steve Oplinger James Marcella Impact of Enterprise Security Risk Assessments on Integrators & Manufacturers J. Kelly Stewart Steve Oplinger James Marcella 1 Session Description What exactly does a risk assessment mean to the integrator

More information

Independent Assurance Statement

Independent Assurance Statement Independent Assurance Statement Scope and Objectives DNV GL Business Assurance USA, Inc. (DNV GL) was commissioned by Lockheed Martin Corporation (Lockheed Martin) to conduct independent assurance of its

More information

Unit Compliance to the HIPAA Security Rule

Unit Compliance to the HIPAA Security Rule HIPAA Risk Analysis Unit Compliance to the HIPAA Security Rule OIT Security Risk and Compliance PURPOSE The purpose of this document is to provide guidance for units on how to perform a Risk Analysis of

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Introducing Cyber Observer

Introducing Cyber Observer "Organizations are failing at early breach detection, with more than 92% of breaches undetected by the breached organization. The situation can be improved with stronger threat intelligence, the addition

More information

TABLE OF CONTENTS ONLY IT Resiliency Benchmarking Report

TABLE OF CONTENTS ONLY IT Resiliency Benchmarking Report TABLE OF CONTENTS ONLY IT Resiliency Benchmarking Report Prepared by BC Management, Inc. October 2016 Benchmarking. Plan Ahead. Be Ahead. Data collected between July September 2016 Table of Contents Reporting

More information

Critical Infrastructure Security Vulnerability Assessment. A New Approach. Norman Bird - Senior Technical Lead - Nuclear Security

Critical Infrastructure Security Vulnerability Assessment. A New Approach. Norman Bird - Senior Technical Lead - Nuclear Security Critical Infrastructure Security Vulnerability Assessment A New Approach Norman Bird - Senior Technical Lead - Nuclear Security Critical Infrastructure Protection and Resilience Europe (CIPRE) Securing

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

September 2010 Version 0.9

September 2010 Version 0.9 TERMS OF REFERENCE September 2010 Version 0.9 Table of Contents Section 1. Purpose... 1 Section 2. Background... 1 Section 3. Scope... 2 Goals and Objectives... 2 Project Deliverables... 3 Deliverables

More information

Information for entity management. April 2018

Information for entity management. April 2018 Information for entity management April 2018 Note to readers: The purpose of this document is to assist management with understanding the cybersecurity risk management examination that can be performed

More information

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE

More information

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day

More information

Avanade s Approach to Client Data Protection

Avanade s Approach to Client Data Protection White Paper Avanade s Approach to Client Data Protection White Paper The Threat Landscape Businesses today face many risks and emerging threats to their IT systems and data. To achieve sustainable success

More information

Enhancing the cyber security &

Enhancing the cyber security & Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities

More information

POST DISASTER NEEDS ASSESSMENT. A way of Mainstreaming Disaster Risk Reduction into Development

POST DISASTER NEEDS ASSESSMENT. A way of Mainstreaming Disaster Risk Reduction into Development POST DISASTER NEEDS ASSESSMENT A way of Mainstreaming Disaster Risk Reduction into Development West Africa Sub Regional Training Workshop on Disaster Management November 25-27, 2009 DAKAR Isabelle Forge

More information

June 5, 2018 Independence, Ohio

June 5, 2018 Independence, Ohio June 5, 2018 Independence, Ohio The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Securing the Nation at the Community Level 2018 Cuyahoga

More information

Building Information Modeling

Building Information Modeling Chapter Building Information Modeling 1 Building information modeling (BIM) is an integrated workflow built on coordinated, reliable information about a project from design through construction and into

More information

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing

More information