Counter-Terrorism and the Protection of Crowded Places
|
|
- Patricia Polly Cox
- 5 years ago
- Views:
Transcription
1 Counter-Terrorism and the Protection of Crowded Places Alasdair Booth Supervisors: Dr Lee Bosher and Dr Ksenia Chmutina
2 Background Information on Counter-Terrorism Security in the UK UK Counter-Terrorism Strategy split into four work steams: * Pursue (Trying to reduce the threat of terrorism and stop attacks) * Prevent (Stopping people becoming involved in terrorism) * Protect (Strengthening the protection against a terrorist attack) * Prepare (Intended to mitigate + reduce the impact of an attack)
3 NaCTSO are the national police unit responsible for supporting the UK Governments Protect and Prepare work streams. NaCTSO oversee a network of approx. 170 counter terrorism security advisors (CTSAs) across the UK. CTSAs are responsible delivering protective security advice to business and to crowded places to reduce vulnerability to terrorist threats.
4 What is a crowded place? A crowded place is a location or environment to which members of the public have access that may be considered potentially liable to a terrorist attack by virtue of its crowd density (Home Office 2012) *Shopping Centres *Further & Higher Educations *Cinemas & Theatres *Hotels & Restaurants *Sports Stadiums & Arenas *Commercial Centres *Pubs, Clubs, Bars *Health Sector *Places of Worship *Major Events
5 Research Justification Terrorism threat level in the UK severe for international terrorism substantial from Northern Ireland related Terrorism. Crowded places remain attractive targets. Lack of information on the role of the CTSA and how they provide protective security advice / tasked. Lack of information on how current protective security advice and guidance is meeting the needs to stakeholders.
6 Research Aim To critically assess the effectiveness of the current UK counter-terrorism protective security advice designed to protect crowded places from terrorism threats.
7 Research Objectives 1. To develop an understanding of the current landscape of counterterrorism security advice (advice, initiatives, threats, arrangements) 2. To establish who are the actual and potential stakeholders in relation to protecting crowded places, and to what extend they are being targeted. 3. To identify the range of both structural and non-structural protective security measures that are recommended to protect crowded places. 4. To develop an understanding of the extent to which current security advice and guidance is meeting the needs of stakeholders. 5. Suggest recommendations about how current counter-terrorism protective security advice could be revised and developed further.
8 Research Sample (Participants) *Police Counter-Terrorism Security Advisers (23) *Security Managers (range of crowded places) (26) *Architects (10) *Developers (3) *Planners (6) *Security Consultants (3)
9 Research Locations North East Region North West Region East Midlands Region West Midlands Region London Region
10 Achieving the Aims and Objectives *Literature review has been completed to identify the gaps in the knowledge including reviewing available CT security advice / guidance. *Semi-structured interviews have been utilised to carry out the rest of the data collection. *An exercise / desktop exercise was designed for CTSAs during the interview this enabled the scoping of the different range of protective security measures.
11 CTSA Crowded Place Security Exercise
12 Key Findings Concerning Architects, Planners and Developers Lack of awareness amongst the Architect, Planners and Developers of the role of CTSA and the protective security advice they provide: * 60% (architects), 100% (planners), 67% (developers) unaware of protective security advice booklet * 50% (architects), 17% (planners), 67% (developers) unaware of CTSA role
13 Standout Concerns and Challenges to CT Protective Security.. *Costs 80% (architects) 17% (planners) 67%(developers) *The appearance of the security measures 90% (architects) 100% (planners) 100% (developers) * Lack of legislation, procedure and guidance 50% (architects) * Clients needs 60% (architects) 33% (developers) *Access 10% (architects) 50% (planners)
14 Key Drivers for CT Protective Security Advice Receiving security advice at the design and concept stage 100% (architects) 100% (planners) 100% (developers) New terrorist attacks would encourage them to think more about CT security 30% (architects) 67% (planners) 100% (developers) Adopted into policy and regulation within planning 70% (architects) 50% (planners) 33% (developers) Greater promotion and advertising of CT security 50% (architects) 50% (planners) Project context and location 70% (architects)
15 Thank you for listening
Crowded Places: The Planning System and Counter-Terrorism
Crowded Places: The Planning System and Counter-Terrorism March 2010 Crowded Places: The Planning System and Counter-Terrorism Page 2 Crowded Places: The Planning System and Counter-Terrorism March 2010
More informationadministered by S30: Terrorism sources of guidance and support
administered by S30: Terrorism sources of guidance and support Version 1 Published 2016 IMPORTANT NOTICE This document has been developed through RISCAuthority and published by the Fire Protection Association
More informationRiskTopics. Counter-Terrorism October 2017
RiskTopics Counter-Terrorism October 2017 Terrorist groups use violence and threats of violence to publicise their causes and as a means to achieve their goals. They often aim to influence or exert pressure
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Native American Risk Management Conference 20 July, 2018 Bridging the Gap: Delivering
More informationCybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus
Cybersecurity governance in Europe Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus ska@unipi.gr Elements of a national cybersecurity strategy Set the vision,
More informationAction Plan to enhance preparedness against CBRN security risks
Action Plan to enhance preparedness against CBRN security risks 8 March 2018 Wiktor WOJTAS European Commission DG 2017 Counterterrorism Package - a number of measures to support Member States in fighting
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationSTUDENT AND ACADEMIC SERVICES
PROGRAMME SPECIFICATION Part 1: Information Awarding Institution Teaching Institution Delivery Location Study abroad / Exchange / Credit recognition Faculty responsible for programme Department responsible
More informationSide Events Organized on the Margins of the International Conference on Nuclear Security: Commitments and Actions
Side Events Organized on the Margins of the International Conference on Nuclear Security: Commitments and Actions Monday, 5 December 2016 Nuclear Industry Steering Group on Security: Learn about the global
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Regional Resiliency Assessment Program 2015 State Energy Risk Assessment Workshop April
More informationACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response
ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT ACTIVE SHOOTER RESPONSE Responding to armed assault acts of terrorism and active shooter incidents Acts of terrorism and shootings in public places have become
More informationAutomatic Number Plate Recognition (ANPR) ANPR Strategy Infrastructure Development
Automatic Number Plate Recognition (ANPR) ANPR Strategy 2016-2020 Infrastructure Development Version 1 July 2017 Document Control Change Control Version Date Change Author 0.1 1 June 2016 Initial draft
More informationA comprehensive approach on personal data protection in the European Union
A comprehensive approach on personal data protection in the Justice Date 1 Main legal instruments on EU level Data Protection Directive 95/46/EC Directive 2002/58/EC on privacy and electronic communications
More informationPRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR)
PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR) 1. INTRODUCTION 1.1 Purpose of the Guidelines These guidelines have been developed by TVETA to guide TVET Providers on how to: (i) Prepare, plan, and implement
More informationSTRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government
ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents
More informationMember of the County or municipal emergency management organization
EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,
More informationSpecial Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect
More informationFederal Civilian Executive branch State, Local, Tribal, Territorial government (SLTT) Private Sector (PS) Unclassified / Business Networks
Brownsville Public Utilities Board Cyber Security Initiative A result of the BPUB IT Strategic Plan implemented a Cyber Security Framework (CSF) that utilizes : Security standards Tools and Best practices
More informationkeeping executives safe
keeping executives safe Neil Austin and Lawrence Dando, two career surveillance specialists, established Mint Executive in 2015, having worked on and managed some of the most complex Police operations
More informationSecurity Awareness Training Courses
Security Awareness Training Courses Trusted Advisor for All Your Information Security Needs ZERODAYLAB Security Awareness Training Courses 75% of large organisations were subject to a staff-related security
More informationATHLETICS WORLD CUP PRIVACY NOTICE
ATHLETICS WORLD CUP PRIVACY NOTICE This Privacy Notice explains how Athletics World Cup ("AWC") collects, uses and shares the personal information that you provide to us either when using this website
More informationBHConsulting. Your trusted cybersecurity partner
Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised
More informationGlobal Security Advisor
Global Security Advisor Location: [North America] [United States] Category: Security *Preferred location: USA. Other locations will be considered globally where WVI is registered to operate. PURPOSE OF
More informationEndpoint Security for Wholesale Payments
Endpoint Security for Wholesale Payments 2018 CHICAGO PAYMENTS SYMPOSIUM EMILY CARON MANAGER, FMI RISK & POLICY FEDERAL RESERVE BOARD The views expressed in this presentation are those of the speaker and
More informationPrivacy Policy. England Athletics Limited commitment to Privacy. Introduction. The information we collect about you. The information provided to us
Privacy Policy England Athletics Limited commitment to Privacy Introduction The information we collect about you The information provided to us How we use your information Our legal bases for processing
More informationDigital Health Cyber Security Centre
Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting
More informationOAS Cybersecurity Capacity Building Efforts
OAS Cybersecurity Capacity Building Efforts Are We Ready in Latin America and the Caribbean? 2016 Cybersecurity Report www.cybersecurityobservatory.com The opinions expressed in this publication are of
More informationPlan of action for Implementation of the Sendai Framework for Disaster Risk Reduction in Central Asia and South Caucasus Region
Plan of action for Implementation of the Sendai Framework for Disaster Risk Reduction 2015-2030 in Central Asia and South Caucasus Region I. Background All governments in the Central Asia and South Caucasus
More informationThe APEC Model. Global Partnership through Regional Initiatives
The APEC Model Global Partnership through Regional Initiatives Tony Beard Office of Transport Security (OTS), Department of Transport and Regional Services (DOTARS), Australia Office of Transport Security
More informationCYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response
CYBER INCIDENT REPORTING GUIDANCE Industry Reporting Arrangements for Incident Response DfT Cyber Security Team CYBER@DFT.GSI.GOV.UK Introduction The Department for Transport (DfT) has produced this cyber
More informationNuclear Security. Resolution adopted on 30 September 2016 during the tenth plenary meeting
General Conference GC(60)/RES/10 Date: September 2016 General Distribution Original: English Sixtieth regular session Item 14 of the agenda (GC(60)/20) Nuclear Security Resolution adopted on 30 September
More informationBACKGROUND PAPER. Sub-Regional Platform on Disaster Risk Reduction
BACKGROUND PAPER Sub-Regional Platform on Disaster Risk Reduction Niamey, Niger 11-14 November 2013 1 BACKGROUND The ECOWAS Policy on Disaster Risk Reduction adopted by West African Heads of State and
More informationPROTECT YOUR DATA AND PREPARE FOR THE EUROPEAN GENERAL DATA PROTECTION REGULATION
PROTECT YOUR DATA AND PREPARE FOR THE EUROPEAN GENERAL DATA PROTECTION REGULATION INSIGHTS The EU s new data protection regulation, known as the GDPR (General Data Protection Regulation), can impact your
More informationOverview of the Federal Interagency Operational Plans
Overview of the Federal Interagency Operational Plans July 2014 Table of Contents Introduction... 1 Federal Interagency Operational Plan Overviews... 2 Prevention Federal Interagency Operational Plan...2
More informationStrategic Security Analyst
Strategic Security Analyst Location: [North America] [United States] Town/City: Monrovia Category: Security Job Type: Fixed term, Full-time *Preferred location: USA, UK or Australia where WVI is registered*
More informationNetherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice
Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal
More informationSECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011
American Chemistry Council Responsible Care SECURITY CODE 7 April 2011 Debra Phillips Managing Director, Responsible Care American Chemistry Council Why develop a Separate Security Code? Need for a clearly
More informationPanel 1 National CSIRT Experience
Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency
More informationHer Majesty the Queen in Right of Canada, Cat. No.: PS4-66/2014E-PDF ISBN:
2014-2017 Her Majesty the Queen in Right of Canada, 2014 Cat. No.: PS4-66/2014E-PDF ISBN: 978-1-100-23291-1 ii Table of contents 1. Introduction....3 What we have learned and what has changed...3 2. A
More informationCYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017
CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November
More informationHighway & Motor Carrier Orientation & Modal Overview. June 2018
Highway & Motor Carrier Orientation & Modal Overview June 2018 Highway & Motorcarrier Overview The highway and motor carrier (HMC) industries and its supporting infrastructure are by its very nature open
More informationThe UK s National Cyber Security Strategy
The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016
More informationMax Security Solutions
Max Security Solutions Max Security Solutions Proactive Risk Management What we do Max Security provides comprehensive security and risk management solutions for the business sector, private clients and
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationResilience, Deterrence and Defence: Building strong cybersecurity for the EU
Resilience, Deterrence and Defence: Building strong cybersecurity for the EU 1 Building strong cybersecurity for the EU: Resilience, Deterrence and Defence From reactive to pro-active and cross-policy
More informationNSI. Suspicious Activity Reporting Line Officer Training
Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding
More informationSRM Service Guide. Smart Security. Smart Compliance. Service Guide
SRM Service Guide Smart Security. Smart Compliance. Service Guide Copyright Security Risk Management Limited Smart Security. Smart Compliance. Introduction Security Risk Management s (SRM) specialists
More informationINFORMATION SECURITY NO MORE THE CINDERELLA?
INFORMATION SECURITY NO MORE THE CINDERELLA? Lord Toby Harris THE VIEW FROM THE KITCHEN Information security the Cinderella of technology Information security the Cinderella of security Who are the Ugly
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationQualification Specification. Level 2 Award in Cyber Security Awareness For Business
Qualification Specification Level 2 Award in Cyber Security Awareness For Business ProQual 2015 Contents Page Introduction 3 Qualification profile 3 Centre requirements 4 Support for candidates 4 Assessment
More informationCyber Security of ETCS
1 Addressing the challenges Cyber Security of ETCS Simon Tonks 2 Background The UK rail network is currently being upgraded to use new signalling technology (ERTMS) The ROSCOs are delivering the First
More informationUsers may, however, visit our Site anonymously.
This Privacy Policy governs the manner in which Garden of Edenmore collects, uses, maintains and discloses information collected from users (each, a "User") of the gardenofedenmore.com website ("Site").
More informationCloud First: Policy Not Aspiration. A techuk Paper April 2017
Cloud First: Policy Not Aspiration A techuk Paper April 2017 2 Cloud First: Policy Not Aspiration Introduction As more organisations begin to use cloud computing as part of the evolution of their business
More informationNational Business Crime Partnership Association
National Business Crime Partnership Association A New National Association for Business Crime Reduction Partnerships (BCRPs) It is crucial to have a national representative body to support BCRP s, one
More informationCyber Security Issues and Responses. Andrew Rogoyski Head of Cyber Security Services CGI UK
Cyber Security Issues and Responses Andrew Rogoyski Head of Cyber Security Services CGI UK andrew.rogoyski@cgi.com CGI in cyber security Credentials Clients We have over 35 years of experience working
More informationCYBER RESILIENCE & INCIDENT RESPONSE
CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable
More informationHEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT
HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HCQI Expert Group Meeting 17 May 2013 Jillian.Oderkirk@oecd.org Agenda to improve health information infrastructure» In 2010, health ministers
More informationFlorida Regional Domestic Security Task Forces
Florida Regional Domestic Security Task Forces North Florida North East Florida North West Florida Tampa Bay Citrus, Sumter, Hernando, Pasco, Pinellas, Hillsborough, Polk and Hardee Counties Central Florida
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Hometown Security Overview Minnesota Festivals and Events Association 5 November, 018
More informationEXECUTIVE ORDER Chemical Facility Safety and Security: Providing ProtecFon Reduces Risk
EXECUTIVE ORDER 13650 Chemical Facility Safety and Security: Providing ProtecFon Reduces Risk THE DAILY www.region6gazette.com - Since 2014 Executive Order (EO) 13650 signed August 1, 2013 - Result of
More informationThe need for developing a cyber security ecosystem of professionals
The need for developing a cyber security ecosystem of professionals 24 th March 2017 Shiva Bissessar, BSc (Hons), MBA, MSc Managing & Technical Director shiva@pinaka.co.tt @PinakaTT www.pinaka.co.tt In
More informationResilience in London
Resilience in London A Resilient City The ability of London to detect, prevent and if necessary to withstand, handle and recover from disruptive challenges Objectives London- complexity and risk London
More informationUAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory
UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives
More informationThirteenth Symposium on the ICAO Traveller Identification Programme
Thirteenth Symposium on the ICAO Traveller Identification Programme Counter-Terrorism Committee Executive Directorate (CTED) United Nations ICAO Headquarters, Montreal, 24-26 October 2017 Briefly about
More informationInternational Atomic Energy Agency Meeting the Challenge of the Safety- Security Interface
Meeting the Challenge of the Safety- Security Interface Rhonda Evans Senior Nuclear Security Officer, Division of Nuclear Security Department of Nuclear Safety and Security Outline Introduction Understanding
More informationManaging Jurisdictional Risks for Public Cloud Services
Managing Jurisdictional Risks for Public Cloud Services Version 1.0 July 2017 1 Contents Executive summary 3 Definitions 4 Assessing jurisdictional risk 5 Commonly-used jurisdictions 8 2 Executive summary
More informationBHConsulting. Your trusted cybersecurity partner
Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised
More information1. To provide an update on the development of the SPA Assurance Map.
Meeting SPA Date and Time 9 June 2014 1015hrs Location Britannia Building, Room B024, Glasgow Caledonian University Title of Paper Assurance Map Item Number 8.2 Presented By Graham Stickle For Approval
More informationContact Centre Qualifications Reference Guide for Centres
Contact Centre Qualifications Reference Guide for Centres www.cityandguilds.com March 2008 Version 1.2 City & Guilds is the UK s leading provider of vocational qualifications, offering over 500 awards
More informationGrand Orange Lodge of Ireland Privacy Notice
Grand Orange Lodge of Ireland Privacy Notice Introduction The Grand Orange Lodge of Ireland is registered with the Information Commissioner s Office for the purposes of compliance with the Data Protection
More informationSummary of Conference
Summary of Conference 1. Conference Opening a. Welcoming Remarks by Commissioner, Singapore Civil Defence Force (Commissioner James Tan) b. Opening Address by Guest of Honour, Senior Minister of State
More informationTHE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER
THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationHow to apply for professional membership and registration. 22 October 2018 Terry Winter Membership Manager
How to apply for professional membership and registration 22 October 2018 Terry Winter Membership Manager Contents / Topics 1 About us 2 Benefits of gaining professional recognition 3 Membership journey
More informationShared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay
Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay Assistant Director General Office of State Security and Emergency Coordination Department of the Premier and Cabinet
More informationSAFER PLACES: A COUNTER TERRORISM SUPPLEMENT A CONSULTATION DOCUMENT
SAFER PLACES: A COUNTER TERRORISM SUPPLEMENT A CONSULTATION DOCUMENT SAFER PLACES: A COUNTER TERRORISM SUPPLEMENT A CONSULTATION DOCUMENT Scope of the consultation Topic of this consultation: Section 1
More informationPublic Sector Cyber Security Series
2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September
More informationCybersecurity Package
Cybersecurity Package Highlights of key initiatives Domenico Ferrara Policy officer @ DG CONNECT Brussels, 12 December 2017 1 2013-2017: Evolving threat landscape Proliferation of (poorly secured) IoT
More informationCounter-Terrorism Working Group Proposed Workplan for 2017
2017/SOM1/SCE-COW/002 Agenda Item: 7 Counter-Terrorism Working Group Proposed Workplan for 2017 Purpose: Consideration Submitted by: CTWG Chair Forum Doc. No.: 2017/SOM1/CTWG/004 SOM Steering Committee
More informationPresidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER [13800] - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS
More informationExclusive Fast Track Opportunity for CEng Professionals - Gain a recognised Level 5 Diploma in Management and Leadership Qualification
Exclusive Fast Track Opportunity for CEng Professionals - Gain a recognised Level 5 Diploma in Management and Leadership Qualification Programme Overview The IET has joined with the Chartered Management
More informationTHE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER
FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationDeveloping a Model for Cyber Security Maturity Assessment
Developing a Model for Cyber Security Maturity Assessment Tariq Al-idrissi, Associate Vice President IT, Trent University Ian Thomson, Information Security Officer, Trent University June 20 th, 2018 (8:45am
More informationBusiness Resilience & Incident Response Are You Ready?
HK Financial Services Business Continuity Management Forum 香港金融服務界業務持續管理協會 Business Resilience & Incident Response Are You Ready? April 2015 It is better to be prepared for an incident than to wait until
More informationHomeland Security & All-Hazards Senior Advisory Committee (H-SAC)
Homeland Security & All-Hazards Senior Advisory Committee (H-SAC) Support and Adoption of the H-SAC Strategic Framework Peggy Littleton / Dana Reynolds Presenters Ms. Peggy Littleton, County Commissioner,
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationVirtual Currencies and The Commonwealth. 1 June 2016
1 Virtual Currencies and The Commonwealth 1 June 2016 The Commonwealth Cybercrime Initiative Mission CCI aims to provide coherent, comprehensive and sustainable assistance to member states to build capacity
More informationCybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution
More informationProtecting your data. EY s approach to data privacy and information security
Protecting your data EY s approach to data privacy and information security Digital networks are a key enabler in the globalization of business. They dramatically enhance our ability to communicate, share
More informationIQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification
IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification Regulation No: 600/5528/5 Page 1 of 15 Contents Page Industry Qualifications...
More informationMEETING: RSSB Board Meeting DATE: 03 November 2016 SUBJECT: Rail Industry Cyber Security Strategy SPONSOR: Mark Phillips AUTHOR: Tom Lee
MEETING: RSSB Board Meeting DATE: 03 November 2016 SUBJECT: Rail Industry Cyber Security Strategy SPONSOR: Mark Phillips AUTHOR: Tom Lee 1. Purpose of the paper 1.1 The purpose of this paper is to seek
More informationGeneral Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant
General Data Protection Regulation: Knowing your data Title Prepared by: Paul Barks, Managing Consultant Table of Contents 1. Introduction... 3 2. The challenge... 4 3. Data mapping... 7 4. Conclusion...
More informationTHE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS
THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationChild Online Protection
Click to edit Master title style Child Online Protection What does that mean for Children in the Pacific Region? 1 Click Presentation to edit Master Overview title style Introduction Key areas of the Guidelines
More informationProtecting Canada s Nuclear Industry THE
Protecting Canada s Nuclear Industry THE EVOLUTION OF NUCLEAR SECURITY AND ARMED RESPONSE FORCES AT DESIGNATED NUCLEAR FACILITIES Mr. Terry Jamieson Vice-President Technical Support Branch Canadian Nuclear
More informationInformation Technology Branch Organization of Cyber Security Technical Standard
Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:
More informationHPH SCC CYBERSECURITY WORKING GROUP
HPH SCC A PRIMER 1 What Is It? The cross sector coordinating body representing one of 16 critical infrastructure sectors identified in Presidential Executive Order (PPD 21) A trust community partnership
More information