ELECTRICAL ENGINEERING & INSTRUMENTATION MECHANICAL ENGINEERING BIOLOGICAL & INDUSTRIAL ENGINEERING NUCLEAR ENGINEERING STRUCTURAL & CIVIL

Similar documents
Lanier Environmental Consultants

EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1,

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Threat and Vulnerability Assessment Tool

Chapter 1. Chapter 2. Chapter 3

GLOBAL THREAT REDUCTION INITIATIVE DOMESTIC SOURCE SECURITY OVERVIEW

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

National Response Plan & Nuclear/Radiological Incident Annex. OSC Readiness Training November 17, 2004

QUIACLE TECHNOLOGY SOLUTIONS, INC. CLOUD SERVICES MANAGED SECURITY SERVICES

Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA?

Standard Development Timeline

Emergency Support Function #12 Energy Annex. ESF Coordinator: Support Agencies:

Joint ICTP-IAEA School of Nuclear Energy Management November 2012

Countermeasures Assessment & Security Experts, LLC. 110 Quigley Boulevard Airport Park New Castle, DE

DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK

CAPABILITIES BRIEF Focus. Experience. Results.

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS

Courses. X E - Verify that system acquisitions policies and procedures include assessment of risk management policies X X

SRS Overview. Dave Hepner. Looking toward the future of the Savannah River Site

Information Technology Branch Organization of Cyber Security Technical Standard

Chemical Facility Anti- Terrorism Standards

International Atomic Energy Agency Meeting the Challenge of the Safety- Security Interface

Canadian Chemical Engineering Conference Edmonton, Alberta October 30, 2007

Security and Privacy Governance Program Guidelines

1. Significant Changes

locuz.com SOC Services

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Appendix 3 Disaster Recovery Plan

SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department

Integrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting

Nuclear Weapon Complex Transformation

TRIAEM LLC Corporate Capabilities Briefing

National Policy and Guiding Principles

DHS Overview of Sustainability and Environmental Programs. Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs

Cyber Security Program

IAEA Action Plan on Nuclear Safety

Physical Security Reliability Standard Implementation

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015

Status of Cyber Security Implementation at Canadian NPPs

EPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS

Compliance Program Design Lessons learned from a COSO framework

CIP Cyber Security Configuration Management and Vulnerability Assessments

Business continuity management and cyber resiliency

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

SEAWALL EARTHQUAKE SAFETY & DISASTER PREVENTION PROGRAM

INFORMATION ASSURANCE DIRECTORATE

Internal Audit Report. Electronic Bidding and Contract Letting TxDOT Office of Internal Audit

April Appendix 3. IA System Security. Sida 1 (8)

CYBER SECURITY POLICY REVISION: 12

DFARS Cyber Rule Considerations For Contractors In 2018

1. Significant Changes

Critical Infrastructure Security Vulnerability Assessment. A New Approach. Norman Bird - Senior Technical Lead - Nuclear Security

CNSS Advisory Memorandum Information Assurance December 2010 Advisory Memorandum

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

UAE Nuclear Energy Program Overview

NW NATURAL CYBER SECURITY 2016.JUNE.16

Advanced Concepts & Technologies International, LLC

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Statement for the Record

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

Cybersecurity Overview

Expert support and Reach back activities

1. SAR posted for comment on January 15, Standard Drafting Team appointed on January 29, 2014

EXAM PREPARATION GUIDE

Standard CIP 007 4a Cyber Security Systems Security Management

Cyber Security Incident Report

Law Enforcement Commercial Price List ManTech International Corporation August 2017

FDIC InTREx What Documentation Are You Expected to Have?

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015

This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective.

Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM

SAC PA Security Frameworks - FISMA and NIST

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company

INFORMATION ASSURANCE DIRECTORATE

The U.S. Government s Role in Standards and Conformity Assessment

Standard Development Timeline

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

Presented by Joe Burns Kentucky Rural Water Association July 19, 2005

Critical Cyber Asset Identification Security Management Controls

CIP Cyber Security Security Management Controls. Standard Development Timeline

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Mayra D. Portalatin, RS, SFP, LEED AP O+M Senior Professional

Defence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology

A CHECKLIST FOR SUBMITTING YOUR RISK MANAGEMENT PLAN (RMP) FOR CHEMICAL ACCIDENT PREVENTION

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

GUIDANCE ON THE SECURITY ASSESSMENT OF GENERIC NEW NUCLEAR REACTOR DESIGNS

Business Continuity Management Standards A Side-by-Side Comparison

Streamlined FISMA Compliance For Hosted Information Systems

RISK MANAGEMENT FRAMEWORK COURSE

National Certificate in Civil Defence (Response) (Level 3)

FEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014

CIS 444: Computer. Networking. Courses X X X X X X X X X

THE TRIPWIRE NERC SOLUTION SUITE

Standard CIP Cyber Security Critical Cyber Asset Identification

Security Management Seminar

DFARS Defense Industrial Base Compliance Information

Transcription:

ELECTRICAL ENGINEERING & INSTRUMENTATION MECHANICAL ENGINEERING BIOLOGICAL & INDUSTRIAL ENGINEERING NUCLEAR ENGINEERING STRUCTURAL & CIVIL ENGINEERING SYSTEMS INTEGRATION ELECTRONIC DATA MANAGEMENT PROJECT CONTROL & COST ESTIMATING CHEMICAL ENGINEERING

HEALTH & SAFETY ENVIRONMENTAL PLANNING, REGULATORY COMPLIANCE, & PERMITTING SERVICES ENGINEERING SITE REMEDIATION SITE CHARACTERIZATION SOLID, HAZARDOUS, & MIXED WASTE MANAGEMENT MULTI-MEDIA SAMPLING, SAMPLE MANAGEMENT, & QUALITY CONTROL

ADMINISTRATION & PROJECT MANAGEMENT MANAGEMENT & PROGRAM ANALYSIS PROGRAM MANAGEMENT SUPPORT SECURITY SUPPORT SERVICES PHYSICAL SECURITY & ACCESS CONTROL SERVICES TRAINING SERVICES COUNTERINTELLIGENCE/WEAPONS OF MASS DESTRUCTION ANALYSIS

SAFEGUARDS & SECURITY SECURITY POLICY DEVELOPMENT & IMPLEMENTATION VULNERABILITY & RISK ASSESSMENTS PROTECTION OF CLASSIFIED & SENSITIVE INFORMATION PROTECTIVE FORCE MANAGEMENT/OPERATIONS TECHNICAL SECURITY PROTECTIVE FORCES MATERIAL CONTROL & ACCOUNTABILITY INTERNATIONAL NUCLEAR SAFEGUARDS CYBERSECURITY SELF-ASSESSMENTS, AUDITS & APPRAISALS PHYSICAL SECURITY INTEGRATED SAFEGUARDS & SECURITY MANAGEMENT OUR GOALS ARE TO HELP YOU Maintain the continuity and effectiveness of your site/facility security Ensure the integrity of safeguards and security at a manageable and realistic cost Create program architecture that aids adjustment to new technologies, staffing requirements, security missions and continuous improvement of processes

DESIGN BASIS THREAT The DBT provides a basis for confidence that the protection systems developed is appropriate and effective. It provides both a basis for system design and a consistent criterion for assessing the adequacy of a physical protection system. It also provides a baseline standard against which the need for changes in physical protection can be evaluated. The DBT can permit the customization of the physical protection systems to address unique features of the materials or facilities. GEM Technology International, Corp. (GEM) has served DOE and NNSA for over 20 years performing Vulnerability Assessments for many of the DOE, EM and NNSA Sites. In anticipation of the new DOE Order 470.3C, Design Basis Threat (DBT) dated November 23, 2016, GEM has assembled a team of program managers, SME s and security specialists to provide programmatic technical support for its implementation. www.gemtechnology.com V 305-447-1344 F 305-447-3830

DESIGN BASIS THREAT GEM Security experts have extensive experience in the authoring, derivative classification of, handling, and protection of high quality site level classified documentation for submission to DOE and NRC. Our staff have an extensive knowledge base of safeguards and security programs across a broad spectrum of security disciplines. GEM can apply this extensive background with DOE and NRC to other Federal agencies and their contractors utilizing the Interagency Security Committee Standards to determine the facility security level, associated risk, and identify countermeasures to achieve the desired level of protection. GEM Security Specialists have extensive experience in conducting security reviews and analysis at electrical power plants to meet NERC/ FERC security requirements and the implementation of Interagency Security Committee Standards at other Federal Facilities. GEM provides the following specialized support for the DBT implementation: IDENTIFICATION AND CHARACTERIZATION OF ASSETS AND ASSIGNMENT OF APPROPRIATE PROTECTION LEVELS (PL) APPLYING A GRADED PROTECTION OF THESE ASSETS. PERFORM OR ASSIST IN THE IDENTIFICATION, SCREENING, AND ANALYSIS OF SITE CHEMICAL ASSETS. PERFORM OR ASSIST IN THE IDENTIFICATION, SCREENING, AND ANALYSIS OF RADIOLOGICAL SABOTAGE DISPERSAL TARGETS. ASSIST WITH CONDUCTING OF VULNERABILITY ASSESSMENTS (VAS) FOR HIGH CONSEQUENCE NUCLEAR ASSETS WHICH ARE IDENTIFIED AS PROTECTION LEVEL (PL) 1 THROUGH PL-4. DEVELOP SECURITY RISK ASSESSMENTS FOR THE ASSETS THAT ARE CATEGORIZED AS PL-5 THROUGH PL-8. DEVELOP ORDER EQUIVALENCIES OR EXEMPTIONS THAT MAY BE REQUIRED INCLUDING ASSOCIATED SECURITY RISK ASSESSMENTS. CONDUCT SPECIAL NUCLEAR MATERIAL (SNM) ROLL-UP ANALYSIS. ASSIST WITH THE DEVELOPMENT OF SECURITY FORCE DEPLOYMENT/TACTICAL RESPONSE PLANS AND AN OVERALL PROTECTION STRATEGY IN RESPONSE TO THE DBT IMPLEMENTATION. EVALUATE THE SITE PERFORMANCE ASSURANCE PROGRAM TO ENSURE IT MEETS THE INTENT AND IS IN COMPLIANCE WITH THE NEW GUIDANCE. DEVELOP A COST EFFECTIVE MITIGATION PACKAGE AND IMPLEMENTATION SCHEDULE. ASSIST IN THE DEVELOPMENT AND/OR UPDATE OF SITE PLANS AND PROCEDURES TO DOCUMENT DBT IMPLEMENTATION. PROVIDE A COST BENEFIT ANALYSIS FOR IDENTIFIED MITIGATION ASSOCIATED WITH DBT IMPLEMENTATION. DEVELOP DOCUMENTATION FOR SUBMISSION FOR APPROVAL OF THE SITE SAFEGUARDS AND SECURITY PROGRAM DBT IMPLEMENTATION. COORDINATION WITH APPROPRIATE AGENCIES TO DETERMINE LOCAL THREATS AND WITH OFF-SITE EMERGENCY RESPONSE ORGANIZATIONS.

Suite M103-6 gemtechnology

SAFEGUARDS & SECURITY ENVIRONMENTAL ENGINEERING PERSONNEL SECURITY NAICS CODES 541110 Office of Lawyers 541330 Engineering Services 541511 Custom Computer Programming Services 541512 Computer Systems Design Services 541513 Computer Facilities Management Services 541611 Administrative Management and General Consulting Services 541613 Marketing Consulting Services 541612 Human Resources and Executive Search Consulting Services 541614 Process, Physical Distribution and Logistical Consulting Services 541618 Other Management Consulting Services 541620 Environmental Consulting Services 541690 Other Scientific, Nuclear Energy and Technical Consulting Services 541990 Scientific & Technical Services 561110 Office Administrative and Executive Services 561210 Facilities Support Services 561320 Temporary Help Services 561611 Investigative Services 561612 Security Guards & Patrol Services 562211 Hazardous Waster Treatment and Disposal 562910 Remediation Services 488510 Freight Transportation Arrangement

GEM Technology is an award-winning minority woman-owned small disadvantaged business (WOSB, SDB, SB Certified). Over 20 years of expertise in Federal government contracting. High-quality support & exceptional value at very low competitive rates. AWARDS & ACHIEVEMENTS December 2014 GEM was awarded a $50 million Task under the Task Order FBI SOAPS BOA to provide professional security support services 2013 - Present Member of the National Women Business Owners Corporate (NWBOC), and certified by the Women s Business Enterprise National Council (WBENC) July 2005 Fifty Influential Minorities in Business Minority Business & Professional Network May 2010 SBA Administrator s National Award of Excellence April 2000 & May 2002 DOE Small Business Contractor of the Year US Department of Energy June 2008 & July 2012 Mentor/Protégé Program Award DOE/DM Petroleum Operations at SPR FEDERAL CONTRACTS DOE/NNSA Management, Organizational and Administrative Support Services (MOA) DOE/NNSA Technical, Engineering and Support Services (TEPS) NNSA Global Threat Reduction Initiative (GTRI) DOE Fluor (SPR) DOE Hanford (CH2M Plateau Remediation Contract) NNSA Office of Nonproliferation (NA-2 and NA-25) DOJ/FBI Solutions for Admin and Program Services (SOAPS) NNSA Lawrence Livermore National Laboratory (LLNL) NNSA Sandia National Laboratories (SNL) DOE CNS, LLC (Operating Y-12 and Pantex) GSA SCHEDULES & CONTRACTING VEHICLES FBI/DOJ Solutions for Administrative and Program Services (SOAPS) DOE/NNSA Technical, Engineering and Programmatic Services (TEPS) DOE/NNSA Management, Organizational, and Administrative Services (MOA) DOE/ORAU Blanket Agreement (Environmental Services) GSA Mission Oriented Business Integrated Services (MOBIS) GSA Professional Engineering Services (PES) GSA Environmental Services (GSA Advantage) www.gemtechnology.com Joe Easton, President jeaston@gemtechnology.com 305-447-1344 GEM Nationwide FL, NM, TX, NV, TN, LA, DC