Physical Security. Introduction. Brian LeBlanc

Size: px
Start display at page:

Download "Physical Security. Introduction. Brian LeBlanc"

Transcription

1 Physical Security Introduction 1

2 Physical Security Provides for the protection of property, personnel, facilities, and material against unauthorized entry, trespass, damage, sabotage, theft, or other criminal acts. 2

3 Basic Concepts Layered Security two or more security components protect the asset. 3

4 Layered Security or Defense in Depth 4

5 Outer-Perimeter Definition of Zones or Perimeters Work Outside - In Inner-Perimeter 5

6 Security Systems Collection of Various Components: Fences Lighting IDS CCTV Access Controls Arranged to be mutually supportive 6

7 Security Components Not limited to hardware: Policies and Procedures Training Programs Employees Security Staff 7

8 Security Tasks Components and procedures must be mutually supportive. Performing one or more of the three principle security tasks: 8

9 Delay The security component causes the potential aggressor to spend time trying to defeat the security system. 9

10 Delay Achieved by each component The more time spent by the Aggressor the more likely they will be DETECTED 10

11 Detect The awareness that a potential intrusion is taking place. IDS CCTV Security Officers 11

12 Response Without a response, delay and detection are meaningless. May involve: Police or Security dispatch Initiation of investigation or increase in surveillance Changes to policies and procedures 12

13 Mutual Support Without a DELAY capability, the chances of detection diminish significantly. Without a DETECTION capability, potential aggressors know they are unlikely to encounter any opposition. Without a RESPONSE capability, potential aggressors have little to fear and all the time in the world to complete their activities. 13

14 Fundamental Components Threat Assessment Security Survey Barriers Lighting Access Control Locks and Key Control Intrusion Detection Systems (IDS) Security Containers CCTV 14

15 Threat Assessment Flow Chart and Goals 15

16 Threat Assessment Involves identifying threats and assessing the risks associated with the threat if it were to occur in the target environment. Identifying threats and assessing risks are dependant on the characteristics of the target environment. 16

17 Threat Assessment Threat is an impending or potential danger. Risk = Probability - 1. The likelihood of a threat + occurring Criticality - 2.The degree of damage that can occur if the threat materializes. 17

18 List of Threats Arson Burglary Theft (Internal/External) Fire Explosion Medical Emergency Loss of power Sabotage Severe weather Assaults Violence Terrorism 18

19 Threat Assessment Probability determined by examining the history of events in/around the target: 911 Calls Crime data Internal reports Employee interviews Threats to similar businesses 19

20 Threat Assessment Criticality Specific Undesirable Consequences Loss of human life Loss of revenue Loss of vital equipment Loss of vital resources 20

21 Risk Assessment Matrix THREA Threat T Threat 1 Threat 2 3 Probabilit y Criticalit y Total 1 = unknown or minimal threat little loss 10= high likely hood of threat very high loss potential 21

22 Threat Assessment Goal: Identify the threats and associated risks, so that risk levels can be mitigated, or reduced, by employing security countermeasures. 22

23 Threat Assessment What is the terrorist threat in my community? Are there known terrorist or radical groups operating within my community? What are the ideologies of these groups? i.e. left-wing, right-wing, special interest etc. What are their grievances? 23

24 Threat Assessment What are the targets or events that may draw these groups to my community? Political rallies, sporting events etc. Identify potential targets by conducting a Target Analysis 24

25 Threat Assessment What is the intelligence saying? Terrorist and radical groups often disseminate edicts and manifestos, via their own websites, writings or news services. For some groups this noise is nothing more than proselytizing, but for others these messages may be operational directives or initiators for an operation. 25

26 Threat Assessment Have any unusual injuries or illnesses been reported? Many would be terrorists have been injured during the bomb making process. Terrorists may also become ill from handling biological or chemical weapons or radioactive materials. 26

27 Threat Assessment Have any unusual occurrences been reported? Terrorist groups may test their weapons or tactics. Prior to their attack on the Tokyo subway system the Aum Shirinko tested their Sarin gas in an apartment complex, but this event and the subsequent illnesses went unnoticed. 27

28 Threat Assessment Is there a rise in bomb threats, or false fire or burglar alarms? Terrorist groups and other criminal elements have been known to call in bomb threats or create false alarms in order to gather intelligence about response time and procedures of emergency personnel. Erick Rudolph studied the emergency response in the bombing of the abortion clinics, and then used this information to strategically place secondary devices intended for emergency response personnel. 28

29 Target Analysis Target analysis involves the identification of potential terrorist targets. With an understanding of the various terrorist ideologies and tactics potential targets can be identified. 29

30 Community Threat Assessment Goals Identifies high risk targets/assets and associated consequence values Opportunities to create community awareness Prioritizes security countermeasure expenditures 30

31 Target Analysis Governmental facilities such as: Utilities and critical infrastructure, particularly those whose disruption would have a dramatic impact on the public. Police stations Government buildings such a legislative or personnel offices Courts 31

32 Target Analysis Public and private companies involved such as: Companies heavily involved in the militaryindustrial complex, particularly those involved in the research and development of weapons systems and aircraft. Forest product companies Oil and natural gas companies Real estate developers Automobile manufactures and dealers Researchers who use live animals in their testing process 32

33 Target Analysis In examining potential targets it is important to ask such questions as: Has the company, organization or location ever been the target of a terrorist attack? Prior attacks at the particular location identified or at other company or organizational assets are the best indicator of future attacks. Has the company, organization or location been mentioned in a derogatory manner in any radical speeches, literature, or websites? Have similar companies, organizations or locations been targeted recently? 33

34 Security Survey A critical on-location evaluation of a business, home, or other facility. Anticipated threats determine the specific focus of each physical security survey. Goals: The goal of this evaluation is to determine the present security posture, identify possible shortfalls and vulnerabilities, and make recommendations. Other wise known as the Vulnerability Assessment. 34

35 Access Control Can be defined in any number of ways and can consist of many security procedures. Manual or Electronic Access Card Keys & Combinations Biometrics An access control system consists of multiple, integrated procedures that restrict the movement of personnel and materials into and out of facilities. 35

36 Intrusion Detection Systems Intrusion-detection systems (IDS) are designed to detect actual or attempted unauthorized entry, identify its location and signal a response with an alarm. IDS can: provide continuous surveillance over secure areas extend coverage into areas not usually accessible to guards. 36

37 IDS Objectives Allow only authorized individuals to enter and exit the facility. Prohibit the entry of contraband and other hazardous materials. Provide an organizational response to a wide variety of situations. 37

38 Barriers The perimeter is the front line of your security program. It may consist of a high fence topped with barbed wire or be little more than an imaginary line separating your property from a neighbor. Ideally, a perimeter should present both a psychological and a physical deterrent to potential aggressors. 38

39 Vehicle Barriers Road Blocker devices provide a very high degree of security for government or military installations when a vehicle must be stopped at an access point. These can have electrical or hydraulic operation, and numerous special features including a "fan-fold" unit that does not require excavation of the road surface. 39

40 Bollards Vehicle Barriers Can be operated manually, electrically, pneumatically, or hydraulically. Respond to a wide range of security specifications and design requirements 40

41 Bollards 41

42 Vehicle Barriers High Security Cable Crash Beams U.S. Navy test 10,000 pounds at 30 miles per hour Department of State test 15,000 pounds at 30 miles per hour. Standard unit up to 19 feet wide at opening Custom sizes available Designed for medium security facilities. Low maintenance, long term durability 42

43 High Security Cable Crash Beams 43

44 High Security Cable Crash Beams 44

45 Vehicle Barriers High Security Wedge Barriers Department of State certified 15,000 pounds at 40 miles per hour Barrier width of 9 feet covers standard road width Custom sizes available Response time is 3 seconds with 8 cycles per minute May be manually operated Shallow mount and portable unit available 45

46 Closed Circuit Television Loss of assets, criminal activity, and fear are a continuing cancer in modern society. Lawsuits often bloom under the label of "negligent security." 46

47 Integrated Systems A well-planned CCTV system can prevent vandalism and deter other crimes. CCTV can be used with other sensing systems to view remote locations. For instance, when integrated with smoke or temperature sensors, CCTV cameras can provide visual confirmation of a potential fire at a distant location. An intrusion alarm at a remote facility can now activate and "call up" a nearby camera. 47

SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department

SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department SAND No. 2012-1606C S 0 606C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration

More information

Electronic Security Systems Process Overview

Electronic Security Systems Process Overview US Army Corps Infrastructure Systems Conference Electronic Security Systems Process Overview Electronic Security Center 4 August 2005 Outline About the Electronic Security Center Physical Security System

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER

ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER IT Audit, Information Security & Risk Insight Africa 2014 Johnson Falana CISA,MIT,CEH,Cobit5 proverb814@yahoo.com Overview Information technology

More information

Presented by Joe Burns Kentucky Rural Water Association July 19, 2005

Presented by Joe Burns Kentucky Rural Water Association July 19, 2005 Infrastructure Security for Public Water and Wastewater Utilities Presented by Joe Burns Kentucky Rural Water Association July 19, 2005 Public Health Security and Bioterrorism Preparedness and Response

More information

BEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME. Brian Michael Jenkins Research Associate

BEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME. Brian Michael Jenkins Research Associate BEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME Brian Michael Jenkins Research Associate Mineta Transportation Institute January 14, 2002 Contemporary

More information

Security in Depth Webinar

Security in Depth Webinar Security in Depth 050213 Webinar Welcome and thank you for standing by. All parties will be in a listen-only mode for the duration of today s conference call. Today s call is being recorded; if anyone

More information

Railroad Infrastructure Security

Railroad Infrastructure Security TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John

More information

Electric Facility Threats and Violence

Electric Facility Threats and Violence Electric Facility Threats and Violence Louis Dabdoub Entergy Services, Inc. October 20, 2011 COMPANY FACTS Entergy Corporation is an integrated energy company engaged primarily in electric power production

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group, Port Security Management Second Edition KENNETH CHRISTOPHER CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Preface

More information

Science & Technology Directorate: R&D Overview

Science & Technology Directorate: R&D Overview Science & Technology Directorate: R&D Overview August 6 th, 2012 UNCLASSIFIED//FOUO DHS S&T Mission Strengthen America s security and resiliency by providing knowledge products and innovative technology

More information

Chemical Facility Anti-Terrorism Standards. T. Ted Cromwell Sr. Director, Security and

Chemical Facility Anti-Terrorism Standards. T. Ted Cromwell Sr. Director, Security and Chemical Facility Anti-Terrorism Standards T. Ted Cromwell Sr. Director, Security and NJ ELG Operations Meeting Today s Presentation ACC Action Major Rule Components Select Risk-Based Performance Standards

More information

2015 Risk Element: Extreme Physical Events

2015 Risk Element: Extreme Physical Events 2015 Risk Element: Extreme Physical Events Industry Webinar October 15, 2015 Administrative Items NERC Antitrust Guidelines It is NERC s policy and practice to obey the antitrust laws fully and to avoid

More information

SM05: Risk Analysis: A Comparison in Quantifying Asset Values, Threats, Vulnerabilities and Risk. Doug Haines Haines Security Solutions 9 April 2013

SM05: Risk Analysis: A Comparison in Quantifying Asset Values, Threats, Vulnerabilities and Risk. Doug Haines Haines Security Solutions 9 April 2013 SM05: Risk Analysis: A Comparison in Quantifying Asset Values, Threats, Vulnerabilities and Risk Doug Haines Haines Security Solutions 9 April 2013 The Broad Picture Learning Objectives Know the differences

More information

Critical Energy Infrastructure Protection. LLNL CEIP Approach

Critical Energy Infrastructure Protection. LLNL CEIP Approach Critical Energy Infrastructure Protection LLNL CEIP Approach LLNL-PRES-654239 This work was performed under the auspices of the U.S. Department of Energy by under Contract DE-AC52-07NA27344. Lawrence Livermore

More information

Port Facility Cyber Security

Port Facility Cyber Security International Port Security Program Port Facility Cyber Security Cyber Risk in the Marine Transportation System MAR'01 1 Objectives IDENTIFY motivations behind a cyber attack. IDENTIFY various types of

More information

Best Practices for Campus Security. January 26, 2017

Best Practices for Campus Security. January 26, 2017 Best Practices for Campus Security January 26, 2017 Welcome to Safe University (Safe U ) Protecting People, Property, and Tradition: The Safe University (Safe U SM ) Program By G. Michael Verden, Owner

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

Airport Security & Safety Thales, Your Trusted Hub Partner

Airport Security & Safety Thales, Your Trusted Hub Partner Airport Security & Safety Thales, Your Trusted Hub Partner www.thalesgroup.com/shield Securing People Ensuring Business Continuity Protecting Assets Thales Credentials Thales is a leading international

More information

Joint ICTP-IAEA School of Nuclear Energy Management November 2012

Joint ICTP-IAEA School of Nuclear Energy Management November 2012 2374-20 Joint ICTP- School of Nuclear Energy Management 5-23 November 2012 Establishing National Nuclear Security Infrastructure (Module 9 Topics 3 & 4) EVANS Rhonda International Atomic Energy Agency,

More information

Critical Information Infrastructure Protection Law

Critical Information Infrastructure Protection Law Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.

More information

The Office of Infrastructure Protection. Background. Purpose 6/13/2016. National Protection and Programs Directorate Department of Homeland Security

The Office of Infrastructure Protection. Background. Purpose 6/13/2016. National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Measures for Public Gatherings Western Region Healthcare Emergency Preparedness

More information

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY

More information

PASS Your HMA / HMO Exam Incident Management

PASS Your HMA / HMO Exam Incident Management 1) Who assumes command at a haz mat incident? A) The driver of the first-arriving squad truck B) The first person on the scene or the ranking individual of the first company on the scene C) The first-arriving

More information

Nuclear Power Plant Security

Nuclear Power Plant Security Nuclear Power Plant Security Plant Security s Primary Mission Nuclear Plant Safety and Security All plants have comprehensive measures for safety and security Comprehensive emergency and security plans

More information

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale

More information

The Terrorism Threat to Physical Assets

The Terrorism Threat to Physical Assets The Terrorism Threat to Physical Assets S U B S T A T I O N A T T A C K A N D C O U N T E R M E A S U R E S Howard J. Somers, P.E. Vice President Loss Control / Division Head AEGIS Insurance Services,

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Science & Technology Directorate Emergency Preparedness & Response Christopher Doyle Deputy Program Director A Roadmap for Integrated Modeling & Simulation for Emergency

More information

Perspectives on Threat

Perspectives on Threat Commerce Threats Perspectives on Threat Higher level approach Define and characterize the threat rather list the what if scenarios Where to find accurate information on information Part I: Business Traditional

More information

Critical Infrastructure

Critical Infrastructure Critical Infrastructure 1 Critical Infrastructure Can be defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and

More information

Advanced IT Risk, Security management and Cybercrime Prevention

Advanced IT Risk, Security management and Cybercrime Prevention Advanced IT Risk, Security management and Cybercrime Prevention Course Goal and Objectives Information technology has created a new category of criminality, as cybercrime offers hackers and other tech-savvy

More information

Securing Data Centers: The Human Element

Securing Data Centers: The Human Element Securing Data Centers: The Human Element Michael Rozin Zvi Kremer April 12, 2018 Perpetrators, Threat Actors Security Personnel Targets, Enablers Securing Data Centers: The Threat Verizon London, Dec 6,

More information

Vulnerability of U.S. Chemical Facilities to Terrorist Attack

Vulnerability of U.S. Chemical Facilities to Terrorist Attack PDHonline Course K106 (2 PDH) Vulnerability of U.S. Chemical Facilities to Terrorist Attack Instructor: Robert B. Coulter, PE 2012 PDH Online PDH Center 5272 Meadow Estates Drive Fairfax, VA 22030-6658

More information

Pipeline Security Guidelines. April Transportation Security Administration

Pipeline Security Guidelines. April Transportation Security Administration Pipeline Security Guidelines April 2011 Transportation Security Administration i This page intentionally left blank. Table of Contents 1 Introduction... 1 1.1 Purpose... 1 1.2 Scope... 1 2 Corporate Security

More information

Security Guideline for the Electricity Sub-sector: Physical Security Response

Security Guideline for the Electricity Sub-sector: Physical Security Response Security Guideline for the Electricity Sub-sector: Physical Security Response Preamble: This guideline addresses potential risks that can apply to some electricity sub-sector organizations and provides

More information

Live Webinar: Best Practices in Substation Security November 17, 2014

Live Webinar: Best Practices in Substation Security November 17, 2014 Live Webinar: Best Practices in Substation Security November 17, 2014 1 Agenda & Panelists Welcome & Introduction - Allan Wick, CFE, CPP, PSP, PCI, CBCP Enterprise Security Manager-CSO Tri-State Generation

More information

The Age of Heightened Security

The Age of Heightened Security The Age of Heightened Security Critical Asset Inventory and Protection Plan Electronic Intrusion and Attack Prevention Iowa Homeland Security Initiative 1 The Age of Heightened Security Intelligence Gathering

More information

CHAPTER 15 SECURITY MEASURES FOR A METRO SYSTEM

CHAPTER 15 SECURITY MEASURES FOR A METRO SYSTEM CHAPTER 15 SECURITY MEASURES FOR A METRO SYSTEM 15.1 INTRODUCTION 15.2 NECESSSITY OF SECURITY 15.3 THREE PILLARS OF SECURITY 15.4 PHASES OF SECURITY 15.5 RESPONSIBILITIES AND PARTNERSHIPS 15.6 PROPOSED

More information

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being

More information

THE OPEN & SHUT CASE FOR ENHANCING SECURITY IN HAZARDOUS AREAS SECURITY IN HAZARDOUS AREAS. By Doug Woodbridge PRODUCT PHOTO

THE OPEN & SHUT CASE FOR ENHANCING SECURITY IN HAZARDOUS AREAS SECURITY IN HAZARDOUS AREAS. By Doug Woodbridge PRODUCT PHOTO SECURITY IN AREAS PRODUCT PHOTO THE OPEN & SHUT CASE FOR ENHANCING SECURITY IN AREAS By Doug Woodbridge Securex Technology Ltd Pump House Station Road Wath-Upon-Dearne ROTHERHAM S63 7DQ T: +44 (0) 1709

More information

CIP Physical Security What to Expect

CIP Physical Security What to Expect CIP-014-2 Physical Security What to Expect March 28, 2017 Kevin Perry Director, Critical Infrastructure Protection Jeff Rooker Lead Compliance Engineer 1 Purpose To identify and protect Transmission stations

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

Security Awareness. Creating a Culture of Security within the Federal Judiciary. Thomas Garrity Chief, Court Security Division

Security Awareness. Creating a Culture of Security within the Federal Judiciary. Thomas Garrity Chief, Court Security Division Security Awareness Creating a Culture of Security within the Federal Judiciary Presented by: Thomas Garrity Chief, Court Security Division Mark Hartz, Security Specialist, Court Security Division Safety

More information

TRANSPORTATION SECURITY ADMINISTRATION. Insider Threat Awareness ICAO Global Aviation Security Symposium 2018

TRANSPORTATION SECURITY ADMINISTRATION. Insider Threat Awareness ICAO Global Aviation Security Symposium 2018 TRANSPORTATION SECURITY ADMINISTRATION Insider Threat Awareness ICAO Global Aviation Security Symposium 2018 Overview Discuss the key elements of insider risk and how to mitigate the unique security risks

More information

Inter-American Port Security Cooperation Plan

Inter-American Port Security Cooperation Plan Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation

More information

IT Service Delivery And Support Week Eight - Data Center

IT Service Delivery And Support Week Eight - Data Center IT Service Delivery And Support Week Eight - Data Center IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 Data Center 101 Facility-Based Controls Physical security HVAC Fire Suppression

More information

PIONEER TRAINING INSTITUTE

PIONEER TRAINING INSTITUTE PIONEER TRAINING INSTITUTE CENTRE FOR DISTANCE & ONLINE LEARNING DIPLOMA IN SECURITY MANAGEMENT OUTLINE SECURITY MANAGEMENT STUDIES Pioneer Training Institute has specifically identified security management

More information

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT) ASEAN REGIONAL FORUM INTER-SESSIONAL SUPPORT GROUP MEETING ON CONFIDENCE BUILDING MEASURES (ISG on CBMs) Beijing, 20-22 November 2003 THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

Washington Metropolitan Area Transit Authority Board Action/Information Summary

Washington Metropolitan Area Transit Authority Board Action/Information Summary Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: 200972 Resolution: Yes No TITLE: MTPD 2014 Part I Crime Report, January - June PRESENTATION

More information

CRITICAL INFRASTRUCTURE AND KEY RESOURCES

CRITICAL INFRASTRUCTURE AND KEY RESOURCES AGRICULTURE AND FOOD SECTOR The Agriculture and Food Sector has the capacity to feed and clothe people well beyond the boundaries of the nation. The sector is almost entirely under private ownership and

More information

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC Draft Version incorporating Management Review [MR] Edits and Comments Document Date: July 2013 Goal One: Ensure Interoperable

More information

STORAGE OF SSAN. Security Risk Assessment and SECURITY PLAN. (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date)

STORAGE OF SSAN. Security Risk Assessment and SECURITY PLAN. (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date) STORAGE OF SSAN Security Risk Assessment and SECURITY PLAN (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date) IMPLEMENTED: (insert date) LICENCE DETAILS: No: Issue date: (Note: You

More information

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates Corporate Security & Emergency Management Summary of Submitted 2015 From Rates Service Expense 2014 2015 Revised Non Tax Revenue Net Tax Supported Expense Draft Non Tax Revenue Net Tax Supported Increase

More information

DATA SECURITY THE PROTECTION OF YOUR INFORMATION IS OUR PRIME DIRECTIVE

DATA SECURITY THE PROTECTION OF YOUR INFORMATION IS OUR PRIME DIRECTIVE DATA SECURITY THE PROTECTION OF YOUR INFORMATION IS OUR PRIME DIRECTIVE OVERVIEW building security theft alarms point of entry interior & exterior closed-circuit camera monitoring impact-resistant windows

More information

Boundary Security. Innovative Planning Solutions. Analysis Planning Design. criterra Technology

Boundary Security. Innovative Planning Solutions. Analysis Planning Design. criterra Technology Boundary Security Analysis Planning Design Innovative Planning Solutions criterra Technology Setting the new standard DEFENSOFT - A Global Leader in Boundary Security Planning Threats, illegal immigration

More information

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED

More information

Laguna Honda Hospital and Rehabilitation Center. Security Management Plan

Laguna Honda Hospital and Rehabilitation Center. Security Management Plan Laguna Honda Hospital and Rehabilitation Center Security Management Plan 2018-2019 REFERENCES California Code of Regulations, Title 8, Sections 8 CCR 3203 et seq. California Code of Regulations, Title

More information

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra CIP-014 JEA Compliance Approach FRCC Fall Compliance Workshop Presenter Daniel Mishra Acronyms & Terminologies DHS Department of Homeland Security JEA It s not an acronym JSO Jacksonville Sheriff's Office

More information

Max Security Solutions

Max Security Solutions Max Security Solutions Max Security Solutions Proactive Risk Management What we do Max Security provides comprehensive security and risk management solutions for the business sector, private clients and

More information

HUMANITARIAN COORDINATION TRAINING. Safety & Security in Humanitarian Coordination

HUMANITARIAN COORDINATION TRAINING. Safety & Security in Humanitarian Coordination HUMANITARIAN COORDINATION TRAINING Safety & Security in Humanitarian Coordination Pre-Departure Security Considerations Make appointment for pre-departure security briefing with your organization Research

More information

Physical Security Enhancement in Higher Institution

Physical Security Enhancement in Higher Institution Physical Security Enhancement in Higher Institution Siti Riniy Fariza binti Mohd Borham, Hafiza Abas, Azizul Azizan and Sya Azmeela Syariff a Advanced Informatics School, University Technology Malaysia,

More information

MIS5206-Section Protecting Information Assets-Exam 1

MIS5206-Section Protecting Information Assets-Exam 1 Your Name Date 1. Which of the following contains general approaches that also provide the necessary flexibility in the event of unforeseen circumstances? a. Policies b. Standards c. Procedures d. Guidelines

More information

INHERENT SECURITY: PROTECTING PROCESS PLANTS AGAINST THREATS

INHERENT SECURITY: PROTECTING PROCESS PLANTS AGAINST THREATS INHERENT SEURITY: PROTETING PROESS PLANTS AGAINST THREATS by Paul Baybutt Primatech Inc., 50 Northwoods Blvd., olumbus, OH 43235 paulb@primatech.com This paper has been accepted for publication in hemical

More information

ipcgrid 2015 March 26, 2015 David Roop Director Electric Transmission Operations Dominion Virginia Power

ipcgrid 2015 March 26, 2015 David Roop Director Electric Transmission Operations Dominion Virginia Power Substation Security and Resiliency Update on Accomplishments thus far ipcgrid 2015 March 26, 2015 David Roop Director Electric Transmission Operations Dominion Virginia Power Dominion Profile Leading provider

More information

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance. Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV

More information

Office of Infrastructure Protection Overview

Office of Infrastructure Protection Overview Office of Infrastructure Protection Overview Harvey Perriott Protective Security Advisor North Texas District U.S. Department of Homeland Security Vision and Mission Vision A safe, secure, and resilient

More information

Green Treatment Center

Green Treatment Center Green Treatment Center IT Strategic Goals and Objectives: 2017-2019 Technology Plan The Department s IT strategies for the next four years are grounded in legislative and regulatory drivers that inform

More information

Port Facility Cyber Security

Port Facility Cyber Security International Port Security Program Port Facility Cyber Security Cyber Security Assessment MAR'01 1 Lesson Topics ISPS Code Requirement The Assessment Process ISPS Code Requirements What is the purpose

More information

Aviation Law Enforcement Officer Security Training Kansas City International Airport May 21 & 22, 2014

Aviation Law Enforcement Officer Security Training Kansas City International Airport May 21 & 22, 2014 0900-1200 Welcome and Introductions Wednesday, May 21 Discussion of prerequisite online LEO modules DHS/Transportation Security Administration (TSA) Organization and Operations o Headquarters o Responsibilities

More information

NIBS Building Innovation 2014

NIBS Building Innovation 2014 NIBS Building Innovation 2014 Integrated Rapid Visual Screening Process to Assess and Design Safe Schools Mila Kennett Department of Homeland Security Science and Technology Resilient Systems Division

More information

Introduction to Business continuity Planning

Introduction to Business continuity Planning Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources

More information

Process Security Management: Protecting Plants Against Threats of Terrorism and Criminal Acts

Process Security Management: Protecting Plants Against Threats of Terrorism and Criminal Acts Process Security Management: Protecting Plants Against Threats of Terrorism and Criminal Acts 2 For additional copies of this booklet, please contact: Primatech Inc. 50 Northwoods Blvd. Columbus, OH 43235

More information

People Assets Reputation

People Assets Reputation Welcome to Spearpoint International LLC The risks faced by global business are greater now than ever, the increasing danger from terrorism and the ever present threat from organized and opportunistic crime

More information

5.9 MULTI-MODAL SECURITY

5.9 MULTI-MODAL SECURITY 5.9 MULTI-MODAL SECURITY INTRODUCTION The federal government in 1998, called for states and MPOs to address transportation security issues. In 2005, a new transportation act strengthened the requirement,

More information

Gallagher Critical Infrastructure Solutions

Gallagher Critical Infrastructure Solutions Gallagher Critical Infrastructure Solutions Gallagher secures from the perimeter including gates, through to the facility access points and interior areas security.gallagher.co 2 Introducing Gallagher

More information

Transportation Security Risk Assessment

Transportation Security Risk Assessment Transportation Security Risk Assessment Presented to: Nuclear Waste Technical Review Board Presented by: Nancy Slater Thompson Office of National Transportation October 13, 2004 Salt Lake City, Utah Introduction

More information

Emergency Management BCERMS Orientation

Emergency Management BCERMS Orientation Emergency Management BCERMS Orientation May 2008 Orientation Objectives Describe the primary responsibilities of emergency management programs for all levels of government in BC Explain BCERMS British

More information

Physical Protection of Nuclear Material and Facilities

Physical Protection of Nuclear Material and Facilities BNSR, OAP Physical Protection of Nuclear Material and Facilities ISCN/JAEA Regional Training Course, Tokai, Japan (October 19-31, 2015) Miss Jarunee Kraikaew, Senior Professional Nuclear Chemist 11/30/2015

More information

Professional in Critical Infrastructure Protection

Professional in Critical Infrastructure Protection Professional in Critical Infrastructure Protection The world is rapidly changing. Our critical infrastructure is at risk on many fronts. Key services that were once taken for granted are now being affected

More information

Continuous Monitoring

Continuous Monitoring Continuous Monitoring A New Approach To Secure Critical Infrastructure Jasvir Gill Founder & CEO, AlertEnterprise, Inc. October 20, 2011 Security Incidents Keep Growing Combination of Cyber And Physical

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Hometown Security Overview Minnesota Festivals and Events Association 5 November, 018

More information

Chapter 1. Chapter 2. Chapter 3

Chapter 1. Chapter 2. Chapter 3 Contents Preface ix Chapter 1 Terrorism 1 Terrorism in General 2 Definition of Terrorism 3 Why Choose Terrorism 4 Goals of Terrorists 5 Selection of Targets and Timing of Attacks 6 Perpetrators 7 Weapons

More information

ACI-NA 2018 Risk Management Conference SAFETY Act. Washington, D.C

ACI-NA 2018 Risk Management Conference SAFETY Act.  Washington, D.C ACI-NA 2018 Risk Management Conference SAFETY Act Akmal Ali, J.D. akmal.ali@catalystdc.com Principal, Catalyst Partners 1250 Connecticut Ave. NW www.catalystdc.com Washington, D.C. 20036 Following the

More information

Confronting the Threat

Confronting the Threat Confronting the Threat The Tragic Events of 9/11 demonstrated the need to deal with terrorism through mitigation, preparedness, response, and recovery at venues of mass gatherings. Stadium Convention Center

More information

Countermeasures Assessment & Security Experts, LLC. 110 Quigley Boulevard Airport Park New Castle, DE

Countermeasures Assessment & Security Experts, LLC. 110 Quigley Boulevard Airport Park New Castle, DE Countermeasures Assessment & Security Experts, LLC 110 Quigley Boulevard Airport Park New Castle, DE 19720 302-322-9600 9/9/2010 1 20-59(28) IS AN INTRODUCTORY REFERENCE DOCUMENT 2 3 CHAPTER 1: FIGURE

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Security Management Seminar

Security Management Seminar SSID PSAV_Event_Solutions Passcode NERC0001 Security Management Seminar Ross Johnson, CPP Capital Power Edmonton, Alberta Security Management Programs Agenda Security Risk Management Design Basis Threat

More information

Defence, Safety and Security

Defence, Safety and Security Defence, Safety and Security 2 The mission of TNO TNO connects people and knowledge to create innovations that boost the sustainable competitive strength of industry and well-being of society. 3 TNO facts

More information

13th Florence Rail Forum: Cyber Security in Railways Systems. Immacolata Lamberti Andrea Pepato

13th Florence Rail Forum: Cyber Security in Railways Systems. Immacolata Lamberti Andrea Pepato 13th Florence Rail Forum: Cyber Security in Railways Systems Immacolata Lamberti Andrea Pepato November 25, 2016 Cyber Security context and Cyber Attacks trend Critical Infrastructures (CIs) are both physical

More information

Thailand Initiatives and Challenges in Cyber Terrorism

Thailand Initiatives and Challenges in Cyber Terrorism Thailand Initiatives and Challenges in Cyber Terrorism Agenda Cyber-Terrorism weapons & tactics MICT Cyber Inspector Group IT Laws Development Challenges Cyber-Terrorism weapons & tactics What is Cyber-Terrorism?

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

Cliff Maynard 4/12/12 3:42 PM Comment: Marina Security Considerations. APP/PCC Conference April Marina Security

Cliff Maynard 4/12/12 3:42 PM Comment: Marina Security Considerations. APP/PCC Conference April Marina Security Cliff Maynard 4/12/12 3:42 PM Comment: Considerations APP/PCC Conference April 2012 Considerations By: Alex Francis, ALX Technology www.alxtechnology.com Introduction: Video What is security? Security

More information

Illinois Cyber Navigator Program

Illinois Cyber Navigator Program Illinois Cyber Navigator Program Illinois State Board of Elections PA 100-0587 (10 ILCS 5/1A-55) Sec. 1A-55. Cyber security efforts. The State Board of Elections shall provide by rule, after at least 2

More information

Alternative Fuel Vehicles in State Energy Assurance Planning

Alternative Fuel Vehicles in State Energy Assurance Planning + Alternative Fuel Vehicles in State Energy Assurance Planning July 17, 2014 Webinar hosted by the National Association of State Energy Officials (NASEO), with support from the U.S. Department of Energy

More information

Successful Security Consulting

Successful Security Consulting Successful Security Consulting Preparing a Responsive, High-Impact Consultant s Report Presenter John M. White CPP, CHPA Principal Consultant, Protection Management, LLC 1 Authoritative (Def) Someone or

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,

More information