Electric Facility Threats and Violence
|
|
- Jemimah Sherman
- 5 years ago
- Views:
Transcription
1 Electric Facility Threats and Violence Louis Dabdoub Entergy Services, Inc. October 20, 2011
2 COMPANY FACTS Entergy Corporation is an integrated energy company engaged primarily in electric power production and retail distribution operations. Entergy owns and operates power plants with approximately 30,000 megawatts of electric generating capacity, and it is the second-largest nuclear generator in the United States. Entergy delivers electricity to 2.7 million utility customers in Arkansas, Louisiana, Mississippi and Texas. Entergy has annual revenues of more than $11 billion and has approximately 15,000 employees. 2 RELIABILITY ACCOUNTABILITY
3 SERVICE TERRITORY 3 RELIABILITY ACCOUNTABILITY
4 NEWS REPORT August 18, Associated Press (National) Energy Dept. says copper thefts on rise. With copper prices at a near record, thieves across the country have been stealing copper wiring from power lines, construction sites, and warehouses. Now federal officials said thieves are targeting power substations and even a locked recycling yard at a nuclear lab. The Energy Department s (DOE) inspector general (IG) reports a troubling increase in copper thefts from federal sites, including national research labs, generating stations, and a plant where nuclear weapons are dismantled and stored. An estimated total of $500,000 to $750,000 worth of copper has been stolen from DOE sites in the past 3 years, the IG said. Thefts have ranged from small amounts to about 30,000 pounds of copper stolen from the Los Alamos National Laboratory in New Mexico. In Texas, hundreds of pounds of copper were stolen from the Pantex plant near Amarillo, where nuclear weapons are stored and dismantled. The IG said DOE officials must improve security, especially at recycling facilities and remote substations. In many cases, stolen copper had not been secured in any way, the IG wrote in a 3-page letter August 18. Some DOE sites had only minimal access controls to areas where copper is stored, he said. In the Los Alamos case, about 30,000 pounds of copper worth an estimated $120,000 was stolen from a fenced facility that is locked after hours. Four contractor employees were convicted in the case. Copper was selling for nearly $4 a pound August 17, more than double the price in early RELIABILITY ACCOUNTABILITY
5 Facts and responses Reported copper thefts from critical infrastructure and key resources (CIKR) sectors in the US have risen at least 50% in 2010, compared to the previous year. Today, we are going to talk about some suggested protective measures and avoidance techniques, including: Increasing awareness Training Security Working with local law enforcement and scrap dealers Using alternatives to copper metal Copper History 5 RELIABILITY ACCOUNTABILITY
6 COST OF WIRE THEFT Copper theft is a widespread problem closely linked to economic circumstances. Theft of copper wire not only poses a potential financial loss to the company, but service to customers in specific geographical areas serviced by that substation. In addition, theft of grounding wire causes safety concerns. As a result of copper wire theft, there may be Customers Power outages and reliability to the Electric Grid. Employee Safety Danger to employees who may surprise a theft in progress. System Reliability and Integrity Productivity lost due to implementation of additional security measures. Replacement Scheduling Problems getting replacement material due to high demand. Crew down time while stolen materials are replaced. Death 6 RELIABILITY ACCOUNTABILITY
7 s. During certain types of thefts of copper (commonly called grounding wire) causes extreme physical risk to the criminals taking the copper, responding personnel, and the general public, including first responders. Grounding wire provides safeguards to personnel at site and any type of disruption to these grounds could turn the substation structures (including perimeter fence line) into energized structures. This poses a threat to responding personnel and first responders, but also nearby neighbors, children, pets, who may come into contact with the structure. As the value of copper has risen, thieves are risking their lives and lives of innocent people to steal materials that contain copper. 7 RELIABILITY ACCOUNTABILITY
8 Consequences 8 RELIABILITY ACCOUNTABILITY
9 Simple theft ground wires cut and pulled from the ground 9 RELIABILITY ACCOUNTABILITY
10 FORTIFYING THE SITE Fencing Gates CCTV Video Motion P.I.R. s Trailers vs. Vaults Locks Lighting Security Officer Police Under Cover Hawthorne 10 RELIABILITY ACCOUNTABILITY
11 11 RELIABILITY ACCOUNTABILITY
12 12 RELIABILITY ACCOUNTABILITY
13 Mesh Fencing 13 RELIABILITY ACCOUNTABILITY
14 Images received remotely Day Time Photo Night Time Photo 14 RELIABILITY ACCOUNTABILITY
15 What have we done or considered Fencing Good Neighbor Rewards Educating Law Enforcement Tracking Devices Enforcer Locks Metal Theft Taskforce Participation Marking Wire Micro Dots 15 RELIABILITY ACCOUNTABILITY
16 Enhanced Station Security Electric Fence/Gates/Electronic Access 16 RELIABILITY ACCOUNTABILITY
17 Perimeter Razor Wire Installation 17 RELIABILITY ACCOUNTABILITY
18 Tracking Devices 18 RELIABILITY ACCOUNTABILITY
19 Hard to prove it belongs to us 19 RELIABILITY ACCOUNTABILITY
20 US Dept. of Energy devises security system to thwart rampant copper thefts By Layer 8 Created Sep :54pm The US Department of Energy and its Oak Ridge National Laboratory have built a security system that is aimed at thwarting at least some of the copper thefts that plague utilities and other large facilities. Specifically, "ORNL, DOE, the utility and several subcontractors installed a comprehensive perimeter security system consisting of energy efficient lighting, surveillance cameras that operate in a high voltage environment and an anti-cut, anti-climb fence system with integral intrusion detection cable. The complete system protects a perimeter area of 3600 linear feet." More on energy: 10 hot energy projects that could electrify the world [1] "This security system will deter future vandalism attempts, allow security officers to conduct surveillance remotely and will automatically alert security officers of an attempt to breach the perimeter so the officers can enact a proper response," said project manager Brigham Thomas of ORNL's Global Nuclear Security Technology Division in a release. The security system installation, calibration and performance testing were completed in early Since the implementation, the substation has not reported any security issues. 20 RELIABILITY ACCOUNTABILITY
21 CONCEPTAUL IDEAS/ISSUES FOR DEALING WITH WIRE-THEFT Scrap-metal dealers How to control Federal, state, local laws why or why not? o Is it ever a Federal issue? Taking the profit out of the deal Controlling the transaction o Delay in payment o Identification of seller o Record keeping it s a joke! Electronic Record? Paper Storage Storage-time requirements Enforcement Getting someone interested Identification of company property Costs company vs. customer? Authenticity Identification of methods One-size fits all vs. individual company logos, chemicals, Destruction by thieves (fire, peeling, etc.) 21 RELIABILITY ACCOUNTABILITY
22 CONCEPTAUL IDEAS/ISSUES FOR DEALING WITH WIRE-THEFT (CONT D) Reliability issues or economic who s right? Real vs. imaginary Cost vs. value Critical Life-safety issues Workers Customers By-standers Hospitals Nursing homes Defense agencies Water treatment plants Communication interruptions Past issues that may have relevancy we should consider DHS vs. DOE What s the issue? Theft Property Damage Reliability Issue is over-blown No one has gotten hurt yet? 22 RELIABILITY ACCOUNTABILITY
23 QUESTIONS? 23 RELIABILITY ACCOUNTABILITY
(U//FOUO) Copper Thefts Disrupting Homeland Infrastructure
(U//FOUO) Copper Thefts Disrupting Homeland Infrastructure 19 July 2011 (U) Prepared by the Office of Intelligence and Analysis (I&A), Cyber, Infrastructure, and Science Division, Strategic Infrastructure
More informationPresented by Joe Burns Kentucky Rural Water Association July 19, 2005
Infrastructure Security for Public Water and Wastewater Utilities Presented by Joe Burns Kentucky Rural Water Association July 19, 2005 Public Health Security and Bioterrorism Preparedness and Response
More informationThe Engineering Department recommends that Council: 1. Receive this Corporate Report for information purposes.
Corporate NO: R038 Report COUNCIL DATE: MARCH 12, 2007 REGULAR COUNCIL TO: Mayor & Council DATE: March 8, 2007 FROM: General Manager, Engineering FILE: 5420-00 SUBJECT: Street Lighting Copper Wire Theft
More informationELECTRIC UTILITY SECTOR PHYSICAL THREATS (DBT) & RESPONSE PLANNING
ELECTRIC UTILITY SECTOR PHYSICAL THREATS (DBT) & RESPONSE PLANNING Helping to keep the lights on, businesses running and communities strong 1 Objectives The Utility Business has Changed Methodology Program
More informationAirport Security & Safety Thales, Your Trusted Hub Partner
Airport Security & Safety Thales, Your Trusted Hub Partner www.thalesgroup.com/shield Securing People Ensuring Business Continuity Protecting Assets Thales Credentials Thales is a leading international
More informationChemical Facility Anti-Terrorism Standards. T. Ted Cromwell Sr. Director, Security and
Chemical Facility Anti-Terrorism Standards T. Ted Cromwell Sr. Director, Security and NJ ELG Operations Meeting Today s Presentation ACC Action Major Rule Components Select Risk-Based Performance Standards
More informationManagement. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,
Port Security Management Second Edition KENNETH CHRISTOPHER CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Preface
More informationPhysical Security. Introduction. Brian LeBlanc
Physical Security Introduction 1 Physical Security Provides for the protection of property, personnel, facilities, and material against unauthorized entry, trespass, damage, sabotage, theft, or other criminal
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Chemical Facility Anti-Terrorism Standards (CFATS) Update for Roof Coatings Manufacturers
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Chemical Facility Anti-Terrorism Standards (CFATS) and Ammonium Nitrate Security Program
More informationCIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra
CIP-014 JEA Compliance Approach FRCC Fall Compliance Workshop Presenter Daniel Mishra Acronyms & Terminologies DHS Department of Homeland Security JEA It s not an acronym JSO Jacksonville Sheriff's Office
More informationContinuous Monitoring
Continuous Monitoring A New Approach To Secure Critical Infrastructure Jasvir Gill Founder & CEO, AlertEnterprise, Inc. October 20, 2011 Security Incidents Keep Growing Combination of Cyber And Physical
More informationBest Practices for Incident Communications: Simplifying the Mass Notification Process for Government
Best Practices for Incident Communications: Simplifying the Mass Notification Process for Government Introduction State and local governments and their supporting agencies encounter emergency situations
More informationInfrastructure Theft Presentation
Infrastructure Theft Presentation Presentation to the Select Committee on Economic Development Ayanda Noah: Group Executive Distribution February 2012 Topics covered in the presentation Orientation on
More informationCyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations. Arkansas Joint Committee on Energy March 16, 2016
Cyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations Arkansas Joint Committee on Energy March 16, 2016 CenterPoint Energy, Inc. (NYSE: CNP) Regulated Electric and Natural Gas Utility
More informationCritical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division
Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal
More informationSTANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season
STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season IBERIA PARISH STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Critical Infrastructure Owners/Operators
More informationThe Terrorism Threat to Physical Assets
The Terrorism Threat to Physical Assets S U B S T A T I O N A T T A C K A N D C O U N T E R M E A S U R E S Howard J. Somers, P.E. Vice President Loss Control / Division Head AEGIS Insurance Services,
More informationWhy you MUST protect your customer data
Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationSecurity Guideline for the Electricity Sector: Physical Security
Security Guideline for the Electricity Sector: Physical Security Preamble: It is in the public interest for NERC to develop guidelines that are useful for improving the reliability of the bulk electric
More informationLive Webinar: Best Practices in Substation Security November 17, 2014
Live Webinar: Best Practices in Substation Security November 17, 2014 1 Agenda & Panelists Welcome & Introduction - Allan Wick, CFE, CPP, PSP, PCI, CBCP Enterprise Security Manager-CSO Tri-State Generation
More informationThe McGill University Health Centre (MUHC)
The McGill University Health Centre (MUHC) Strengthening its security posture with in- depth global intelligence Overview The need MUHC security staff wanted to more quickly identify and assess potential
More informationMetal Theft Focus Group
Metal Theft Focus Group 28 th February 2013 2011. UK Power Networks. All rights reserved Safety and Housekeeping No planned fire alarms Emergency exits Fire assembly points Toilets Mobile phones Disclosure
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Overview of the Chemical Facility Anti-Terrorism Standards (CFATS) November 2012 Why
More informationThe Engineering Department recommends that Council receive this report as information.
CORPORATE REPORT NO: R134 COUNCIL DATE: June 25, 2012 REGULAR COUNCIL TO: Mayor & Council DATE: June 21, 2012 FROM: General Manager, Engineering FILE: 3807-001/11 SUBJECT: Street Light System Copper Wire
More informationHow AlienVault ICS SIEM Supports Compliance with CFATS
How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal
More informationSAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department
SAND No. 2012-1606C S 0 606C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationSUNY - BUFFALO. 10 Years Going and SUNYBuffalo Still Expanding. Campus-wide Security with Milestone Software. The Challenge.
Customer Story 10 Years Going and SUNYBuffalo Still Expanding Campus-wide Security with Milestone Software The Challenge After successfully implementing Milestone IP video as a security solution in the
More informationSmart Cities and Security. Security - 1
Smart Cities and Security Security - 1 Where are we in 2013? Security - 2 Where are we in 2050? Security - 3 Our Topics Who is concerned? Security of the electric grid Security of the water supply Security
More informationCincinnati/Northern Kentucky International Airport. Partnership for Nuclear Security Insider Threat Summit September, 2015
Cincinnati/Northern Kentucky International Airport Partnership for Nuclear Security Insider Threat Summit September, 2015 Cincinnati USA Story 2 28 th largest metropolitan area in the USA with 2.1M population
More informationIncreasing Distribution Demands: 5 Benefits of Modular Substations
Increasing Distribution Demands: 5 Benefits of Modular Substations ACHILA JAYASURIYA, SUBSTATION ENGINEER Substations play a critical role in the power industry. They support the transmission grid in moving
More informationTSA/FTA Security and Emergency Management Action Items for Transit Agencies
TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:
More informationIS-906: Workplace Security Awareness. Visual 1 IS-906: Workplace Security Awareness
IS-906: Workplace Security Awareness Visual 1 Course Administration Sign-in sheet Course evaluation forms Site logistics Emergency procedures Breaks Restrooms Cell phones/blackberrys Visual 2 Course Objectives
More informationINFORMATION TECHNOLOGY POLICY
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF HUMAN SERVICES, INSURANCE AND AGING INFORMATION TECHNOLOGY POLICY Name Of Policy: Physical and Environmental Security Policy Domain: Security Date Issued: 06/09/11
More informationAMI Overview Don Perio Manager - Meter Reading & Operations Entergy Louisiana, USA. Metering, Billing/CIS America 2008, San Diego, CA
AMI Overview Don Perio Manager - Meter Reading & Operations Entergy Louisiana, USA 1 Outline Who is Entergy? Why AMI? AMI Pilot Development & Process AMI Technology Selection Network Overview Demand Response
More informationIS Today: Managing in a Digital World 9/17/12
IS Today: Managing in a Digital World Chapter 10 Securing Information Systems Worldwide losses due to software piracy in 2005 exceeded $34 billion. Business Software Alliance, 2006 Accessories for war
More informationAmerican Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED
American Association of Port Authorities Navigating the Cyber Domain Captain James Cash Deputy Director U.S. Coast Guard Cyber Command Vision & Mission VISION A safe, secure and resilient cyber operating
More informationTWIC or TWEAK The Transportation Worker Identification Credential:
TWIC or TWEAK The Transportation Worker Identification Credential: Issues and Challenges for MTSA-Regulated Facility Owner/Operators THE USUAL DISCLAIMER By: Presentation at AAPA Administrative & Legal
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Chemical Facility Anti-Terrorism Standards (CFATS) Mystic REPC October 23, 2018 The
More informationCritical Infrastructure
Critical Infrastructure 1 Critical Infrastructure Can be defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and
More informationHIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012
HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice
More informationPerformance- Based Approach to the Security of Radioactive Sealed Sources: A Canadian Perspective
Performance- Based Approach to the Security of Radioactive Sealed Sources: A Canadian Perspective Abstract Raphaël Duguay, M.Sc., PSP Nuclear Security Division Canadian Nuclear Safety Commission, Canada
More informationCritical Information Infrastructure Protection Law
Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.
More informationCenteris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information
Section 01 Document Information Creation Date: 12/1/2016 Centeris Data Centers - Security Procedure Revision Date: 2/28/2018 Effective Date: 2/28/2018 Section 02 Site Information Site Information Document
More informationGramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.
Gramm Leach Bliley Act 15 U.S.C. 6801-6809 GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 11/30/2016 1 Objectives for GLBA Training GLBA Overview Safeguards Rule
More informationThe French WEEE system. Cécile des Abbayes Research Manager Eco-systèmes
The French WEEE system Research Manager Eco-systèmes I. The French WEEE system 1. Focus on two specific strengths of the organisation Collaboration between collective schemes and local authorities The
More informationThe emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe
The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe Copyright 2017 Protocol 46, Inc. All Rights Reserved Copyright 2017 Protocol 46, Inc.
More informationCompliance with ISPS and The Maritime Transportation Security Act of 2002
Mr. Melchor Becena Security Administrator Port Everglades SecurePort Conference Miami, Florida 25-27 27 February, 2004 Compliance with ISPS and The Maritime Transportation Security Act of 2002 Overview
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More informationBCP At Bangkok Bank, Thailand
BCP At Bangkok Bank, Thailand Bhakorn Vanuptikul, BCCE Executive Vice President Bangkok Bank Public Company Limited 10 May 2012 1 Agenda Business Continuity Management at Bangkok Bank Success Factors in
More informationWHO PROTECTS YOUR MAIL? MAILERS TECHNICAL ADVISORY COMMITTEE Guy Cottrell, Chief Postal Inspector
WHO PROTECTS YOUR MAIL? MAILERS TECHNICAL ADVISORY COMMITTEE Guy Cottrell, Chief Postal Inspector OUR MAILERS YOUR MAIL From the people who move it to the customers who use it. PROTECTING YOUR BUSINESS
More informationRed Flag Regulations
Red Flag Regulations Identity Theft Put In Context Overview of Topics Red Flag Regulations Overview How UM Protects Information What is the Student Workers role in identity theft prevention? What s this
More informationWhy the Threat of Downtime Should Be Keeping You Up at Night
Why the Threat of Downtime Should Be Keeping You Up at Night White Paper 2 Your Plan B Just Isn t Good Enough. Learn Why and What to Do About It. Server downtime is an issue that many organizations struggle
More informationuanacia 1+1 MARINE SECURITY OPERATIONS BULLETIN No:
1+1 MARINE SECURITY OPERATIONS BULLETIN No: 2014-001 CLARIFICATION OF TRANSPORT CANADA (TC) MARINE SECURITY MANDATORY THREAT, BREACH AND INCIDENT REPORTING REOUIREMENTS THIS MARINE SECURITY OPERATIONS
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Working Together How Federal Agencies Coordinate Security Across All Disciplines: The
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationDefense in Depth Security in the Enterprise
Defense in Depth Security in the Enterprise Mike Mulville SAIC Cyber Chief Technology Officer MulvilleM@saic.com Agenda The enterprise challenge - threat; vectors; and risk Traditional data protection
More informationKeys to a more secure data environment
Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting
More informationCritical Infrastructure Assessment
Critical Infrastructure Assessment Everyday the products and services that support our standard of living flow, almost seamlessly, to and from our homes, communities, and government. Making this possible
More informationCommunity-Based Water Resiliency
Community-Based Water Resiliency Helping Water Utilities Build Stronger Communities Presentation to the Mid-Atlantic APWA Chapter Conference Virginia Beach, VA May 10, 2013 What is Community-Based Water
More informationKentucky Wireless Information Network Service (Ky-WINS)
2006 NASCIO Recognition Awards Nomination Category: Information Communications Technology (ICT) Innovations Kentucky Wireless Information Network Service (Ky-WINS) Kentucky State Police Kentucky has implemented
More informationHealth Facilities and Utility Providers
Health Facilities and Utility Providers Strengthening the Partnership Ann Steeves, CEO HC-EMI November 2017 National Healthcare Coalition Preparedness Conference 2017 HC-EMI. All rights reserved. 1 Learning
More informationLa gestione di Security e Safety con un singolo sistema di supporto alle decisioni Baltimore/Washington Airport - USA
La gestione di Security e Safety con un singolo sistema di supporto alle decisioni Baltimore/Washington Airport - USA Filippo Silvestri Sales Manager PS&S Intergraph Italia Security Government & Infrastructure
More informationASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER
ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER IT Audit, Information Security & Risk Insight Africa 2014 Johnson Falana CISA,MIT,CEH,Cobit5 proverb814@yahoo.com Overview Information technology
More informationSecurity Awareness. Creating a Culture of Security within the Federal Judiciary. Thomas Garrity Chief, Court Security Division
Security Awareness Creating a Culture of Security within the Federal Judiciary Presented by: Thomas Garrity Chief, Court Security Division Mark Hartz, Security Specialist, Court Security Division Safety
More informationJérôme Kerviel. Dang Thanh Binh
Dang Thanh Binh Jérôme Kerviel Rogue trader, lost 4.9 billion Largest fraud in banking history at that time Worked in the compliance department of a French bank Defeated security at his bank by concealing
More informationActions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650
Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650 President Obama issued Executive Order (EO) 13650 - Improving Chemical
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationIdentity Theft Prevention Program. Effective beginning August 1, 2009
Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Christian Brothers University developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission's
More informationUNC Campus Security Initiatives Update. Business Affairs Committee May 9, 2017
UNC Campus Security Initiatives Update Business Affairs Committee May 9, 2017 UNC Campus Security Initiative In August 2013, President Ross asked for a review of current security practices, an assessment
More informationOregon Department of Justice
Oregon Department of Justice Created in response to the 9/11 Commission Report Currently 78 Fusion Centers in the US Fusion Centers are unique in design, but the operation mission is the same nationally
More informationCNSC Presentation to the Federal Agency for Nuclear Control
CNSC Presentation to the Federal Agency for Nuclear Control Canadian Experience in the Development and Implementation of Regulatory Requirements for the Security of Radioactive Sources Raphael Duguay,
More informationEMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY
EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale
More informationGallagher Critical Infrastructure Solutions
Gallagher Critical Infrastructure Solutions Gallagher secures from the perimeter including gates, through to the facility access points and interior areas security.gallagher.co 2 Introducing Gallagher
More informationSecurity Guideline for the Electricity Sub-sector: Physical Security Response
Security Guideline for the Electricity Sub-sector: Physical Security Response Preamble: This guideline addresses potential risks that can apply to some electricity sub-sector organizations and provides
More informationUtility Brand Studio THE STATE OF PHYSICAL GRID
Utility Brand Studio THE STATE OF PHYSICAL GRID 2015 DEMOGRAPHICS Every utility is different, so we asked those surveyed to provide information about the type of utility they work for, the grid operations
More informationISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015
ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters
More informationLADWP Critical Infrastructure Protection
d ---- w. ^ - ** : _ mwm FEB 0 2 2016 B... gi r.* *«r 3br»t*> it-i > \ S fr-% LU Threat and Vulnerability Assessments Water and Power Facilities / * LADWP Critical Infrastructure Protection Control
More informationIdentity Theft Prevention Policy
Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening
More informationDesignated Cyber Security Protection Solution for Medical Devices
Designated Cyber Security Protection Solution for Medical s The Challenge Types of Cyber Attacks Against In recent years, cyber threats have become Medical s increasingly sophisticated in terms of attack
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal
More informationCRITICAL INFRASTRUCTURE AND KEY RESOURCES
AGRICULTURE AND FOOD SECTOR The Agriculture and Food Sector has the capacity to feed and clothe people well beyond the boundaries of the nation. The sector is almost entirely under private ownership and
More information2017 RIMS CYBER SURVEY
2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the
More informationNorfolk & Suffolk Crime Prevention Guidance Note Building Site Security
Norfolk & Suffolk Crime Prevention Guidance Note Building Site Security. The construction industry loses an estimated 43m a year through theft or vandalism, that s almost 1m per week (source: Home Office).
More informationU.S. State of Cybercrime
EXCLUSIVE RESEARCH FROM EXECUTIVE SUMMARY 2017 U.S. State of Cybercrime IDG Communications, Inc. 2017 U.S. State of Cybercrime TODAY S CYBERCRIMES ARE BECOMING MORE TARGETED AND BUILT FOR MAXIMUM IMPACT,
More informationThe Cost of Denial-of-Services Attacks
The Cost of Denial-of-Services Attacks Sponsored by Akamai Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report The Cost of Denial-of-Service
More informationChapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS
Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power
More informationCritical Energy Infrastructure Protection. LLNL CEIP Approach
Critical Energy Infrastructure Protection LLNL CEIP Approach LLNL-PRES-654239 This work was performed under the auspices of the U.S. Department of Energy by under Contract DE-AC52-07NA27344. Lawrence Livermore
More informationIntelligent Building and Cybersecurity 2016
Intelligent Building and Cybersecurity 2016 Landmark Research Executive Summary 2016, Continental Automated Buildings Association Presentation Contents 1. About CABA, Compass Intelligence & This Research
More information2015 VORMETRIC INSIDER THREAT REPORT
Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationCOMPLETING THE PAYMENT SECURITY PUZZLE
COMPLETING THE PAYMENT SECURITY PUZZLE An NCR white paper INTRODUCTION With the threat of credit card breaches and the overwhelming options of new payment technology, finding the right payment gateway
More informationSeattle University Identity Theft Prevention Program. Purpose. Definitions
Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection
More informationSecurity Guideline for the Electricity Sector: Physical Security
1 Security Guideline for the Electricity Sector: Physical Security Preamble: It is in the public interest for NERC to develop guidelines that are useful for improving the reliability of the bulk electric
More informationSecurity Standards for Electric Market Participants
Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system
More informationThe Office of Infrastructure Protection. Background. Purpose 6/13/2016. National Protection and Programs Directorate Department of Homeland Security
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Measures for Public Gatherings Western Region Healthcare Emergency Preparedness
More informationEBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS
EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS HOW SECURE IS YOUR VPN ACCESS? Remote access gateways such as VPNs and firewalls provide critical anywhere-anytime connections to the networks
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference
More information