City of Leesburg Electric Department City of Leesburg Electric Department CIP-001 Sabotage Reporting.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Protective Security Advisors Securing the Nations critical infrastructure one community at a time.
DEVELOPMENT OF TRANSMISSION & DISTRIBUTION NETWORKS & VANDALISM PRESENTATION BY DR C. E. IFESIE HEAD TRANSMISSION TRANSMISSION COMPANY OF NIGERIA.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
National Infrastructure Protection Plan
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
Lecture 11 Reliability and Security in IT infrastructure.
Jeffery J. Gust IOWA INDUSTRIAL ENERGY GROUP FALL CONFERENCE Tuesday, October 14, 2014 MidAmerican Energy Company.
An Introduction to Renter’s Insurance Presented by INSERT NAME: Financial Education Program on Insurance Nationwide and the Nationwide frame are federally.
Session 141 Vulnerability to a natural hazard can be defined as to the extent to which people will experience harm and property will be damaged from that.
Alberta Emergency Management Agency ‘Alberta - A Province Prepared’
Workplace Violence Research has identified factors that may increase the risk of violence at worksites. Such factors include working with the public or.
Homeland Security Conference Symposium on Homeland Security & Defense Christopher Newport University May 18,
PRESENTING A PROTOCOL AN IRB INFOSHORT FEBRUARY 2013.
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
FTA Transport Manager Introduction The Highways Agency and the Strategic Road Network Risks to resilience Ensuring resilience during all types of.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Emergency Procedures at the Workplace Practicum in Human Services.
IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.
Applying the Distribution System in Grid Restoration/NERC CIP-014 Risk Assessment Srijib Mukherjee, Ph.D., P.E. UC Synergetic.
Safety at Work Copyright © Texas Education Agency, All rights reserved.
WMD & Emergency Planning Steps Session 12. Emergency Planning Steps Vulnerability Assessment Mitigation Efforts Emergency Response Planning Recovery.
A Major Business Disruption A Strategy for Minimising the Downtime Anthony Hegarty Mitigating Risks.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Copyright © 2011 The McGraw-Hill Companies All Rights ReservedMcGraw-Hill/Irwin Chapter 1 Strategic Planning and the Marketing Management Process.
Smart Grid - Developments and Implementations Prof. Gady Golan – HIT, Israel Dr. Yuval Beck – HIT, Israel , Electricity 2012, Eilat.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Phoenix Convention Center Phoenix, Arizona When Prevention and Preparation May Not be Enough: Resilience and Recovery for the Electricity Sub-Sector Operational.
Role for Electric Sector in Critical Infrastructure Protection R&D Presented to NERC CIPC Washington D.C. June 9, 2005 Bill Muston Public Release.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
Generation assets important to the reliable operation of the Bulk Electric System What does this mean?
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
On the Definition of Survivability J. C. Knight and K. J. Sullivan, Department of Computer Science, University of Virginia, December 2000.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Developing a Security Program. Exercise Plan Develop/Update Plan Review/Revisit Plan.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Business Continuity Planning  What is it?  Why do we do it?  How do we do it?
Infrastructure Protection
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
North American Energy Infrastructure Policy Philip Gonda Steven Mays Robert Floyd Josh Kapp.
Compliance Monitoring and Enforcement Audit Program - The Audit Process.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Crisis Management Crisis: any situation that has the potential to affect long-term confidence in an organisation or product and may interfere with its.
Copyright © 2015 Scott Borg/U.S. Cyber Consequences Unit. All rights reserved. Making Economics a Cyber-Security Weapon Scott Borg Director (CEO) and Chief.
Alex Adamec.  Any physical or virtual information system that controls, processes, transmits, receives, or stores electronic information in any form.
1 DRAFT DO NOT CITE OR QUOTE For NPC Resource Study Discussion Only Definition of “Prudent” for Use in “PRUDENT DEVELOPMENT”
Procedures to followNumbers you need Information to know Your Farm Name Here Public Relations Plan Communicate to all (employees and press) that only a.
Maximizing the Facility Hazard Vulnerability Assessment
Risk assessment and Natural Hazards. Concept of vulnerability (e.g. fatalities in two contrasting societies) Deaths 1 …………………………………………
1 SUBMISSION TO THE PARLIAMENTARY PORTFOLIO COMMITTEE ON POLICE “THE PRIVATE SECURITY INDUSTRY REGULATION AMENDMENT BILL, 2012” PRESENTED BY: C LOUW 1.
CYSM Risk Assessment Methodology Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme.
Risk Assessment: A Practical Guide to Assessing Operational Risk
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
Disaster and Emergency Management
Disaster Preparedness
Research Project Overview
ESSENTIALS OF A PHYSICAL SECURITY SYSTEMS RISK ASSESSMENT
Role for Electric Sector in Critical Infrastructure Protection R&D
Factors to Consider when Designing a Reliable Power Grid
NERC Cyber Security Standard
Factors to Consider when Designing a Reliable Power Grid
SOUTH AFRICAN INSURANCE ASSOCIATION
IS Risk Management Framework Overview
Training at the Awareness Level Review
Presentation transcript:

City of Leesburg Electric Department City of Leesburg Electric Department CIP-001 Sabotage Reporting

Sabotage Reporting  Vandalism vs Sabotage  Reportable Events  Physical Security  What are we asking you to do? 2

3 General Definitions  Vandalism is the willful or malicious destruction or defacement of public or private property.  Sabotage is a deliberate action aimed at weakening another entity through subversion, obstruction, disruption, and/or destruction. In a workplace setting, sabotage is the conscious withdrawal of efficiency generally directed at causing some change in workplace conditions.

Vandalism vs. Sabotage  Sabotage is a form of vandalism but needs to be treated separately because vandalism can be deterred by making your assets a riskier option for a vandal than other potential targets. On the other hand, the target for sabotage has already been chosen and is largely independent of risk. Sabotage may result from events such as a labor dispute, a competitor, or more general political demonstrations, such as protests against deforestation. 4

Vandalism vs. Sabotage 5  Vandalism is, however, not entirely random. Whether it is graffiti or physical damage, the likelihood of vandalism is greater in certain areas (high crime, low visibility) and at certain times of day (nights, particularly weekends).

Vandalism vs. Sabotage  No long-term blackouts have been caused in the United States by sabotage. However, this observation is less reassuring than it sounds. Electric power system components have been targets of numerous isolated acts of sabotage in this country. Several incidents have resulted in multimillion-dollar repair bills. In several other countries, sabotage has led to extensive blackouts and considerable economic damage in addition to the cost of repair. 6

Vandalism vs. Sabotage 7  Some terrorist groups hostile to the United States clearly have the capability of causing massive damage. The loss of several generation, transmission, or distribution facilities could affect major metropolitan areas or even multi-state regions. Thus causing severe long-term power shortages. The absence of such attacks has as much to do with how terrorists view their opportunities as with their ability.

Vandalism vs. Sabotage  U.S. electric power systems are only one target out of many ways of striking at America, and not necessarily the most attractive. 8

Sample of Reportable Events  Substation break-in with the intent to disrupt electric service  Generation station break-in with the intent to disrupt electric service  Intentional destruction of poles, conductors and other electrical components with the intent to disrupt electric service 9

10 Sample of Reportable Events  Actual or suspected physical attacks that could impact electric power system adequacy or reliability, or vandalism, which target components of any security system  Actual or suspected cyber or communications attacks that could impact electric power system adequacy or vulnerability

Sample of Vandalism 11

Sample of Reportable Events 12

Sample of Reportable Events 13

Sample of Reportable Events 14

Physical Security 15  The City of Leesburg Electric Department does not currently have any Critical Assets or any Critical Cyber Assets.

What are we asking you to do? 16  “If You See Something Say Something”  After contacting the appropriate agency to handle the immediate Emergency, contact The City of Leesburg Electric Department to report an act of suspected sabotage as soon as safely possible

Revision History 17 REV. No. DateDescriptionByApproval 0 9/8/11Initial CreationChris AdkinsPhil Janik