A brief overview of the IRVS for Schools Assessment Tool and its four major components.

Slides:



Advertisements
Similar presentations
1 IS:01UDM -2 CONCEPTS IN HAZARDS TALK 1 NATURAL PHENOMENA OF LAND, SEA AND ATMOSPHERE. n HAZARD DUE TO RELEASE OF STRESS n TRIGGER EVENTS: NATURAL i.e,
Advertisements

Hazard and Risk Analysis What are the socio-economic and political trends? Consider recent assessment / reviews / baseline studies / analytical exercises.
Department of Homeland Security Site Assistance Visit (SAV)
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
GSA Office of Emergency Response and Recovery Risk Based Continuity Planning Darren J. Blue, Director, Policy and Plans, Office of Emergency Response.
Producer Risk Assessment in Plant Biosecurity Management.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
S5-1 © 2001 Carnegie Mellon University OCTAVE SM Process 5 Identify Key Components Software Engineering Institute Carnegie Mellon University Pittsburgh,
IS 380 OME 1 Fall 2010 Class 1. Administrative Roster Syllabus Review Class overview 10 domains overview.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Critical Infrastructure Protection and Higher Education: University of California Hazard Vulnerability Assessment Kristine Hafner University of California.
THE STATE OF HEALTHCARE SECURITY Past, Present, and Future Jeff Aldridge, CEO Security Assessments International June 16, 2005.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
Foster and sustain the environmental and economic well being of the coast by linking people, information, and technology. Center Mission Coastal Hazards.
Natural Hazards Science: Reducing America’s Risk Hazards are inevitable; disasters are not. Mount St. HelensMount St. Helens 03/08/05 Mount Pinatubo.
1 DHS Bioterrorism Risk Assessment Background, Requirements, and Overview DHS Bioterrorism Risk Assessment Background, Requirements, and Overview Steve.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Security Risk Assessment Applied Risk Management July 2002.
Natural Disasters Arizona Tornadoes Arizona has recorded more than 230 tornadoes since That means the state averages about four reported tornadoes.
Regional Flood Plain Management Council April 15, 2015 H-GAC December 2nd.
WMD & Emergency Planning Steps Session 12. Emergency Planning Steps Vulnerability Assessment Mitigation Efforts Emergency Response Planning Recovery.
© 2001 by Carnegie Mellon University PSM-1 OCTAVE SM : Senior Management Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh,
CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Risk Assessment Farrokh Alemi, Ph.D. Monday, July 07, 2003.
Renewable Energy at Closed Landfills Workshop: Landfill Post Closure Use Permitting Guidelines January 19, 2010 Daniel Hall, Solid Waste Section Chief.
Dr. Benjamin Khoo New York Institute of Technology School of Management.
Pinkerton C&I Eric Davis-Fernald Director.
RISK MANAGEMENT Copyright (c) 2011 FutureSoft ( 1.
Infrastructure Profile Consider strengths and vulnerabilities of the built environment.
Read to Learn Discuss risk and risk management. Describe different types of risk.
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1.
Climate Change Risk Assessment Tool. Weather & Climate.
1 Appendix B Initial Briefing Template. 2 Site X Vulnerability Assessment (VA) Presenter name Presenter organization Presenter phone Presenter phone/ .
Risk Management CS5493. Risk Management The process of ● identifying, ● assessing, ● prioritizing, and ● mitigating risks.
Hazard Mitigation Plan An Overview. What is Hazard Mitigation? Action taken to reduce or eliminate long-term risk Long term impact Different from –Preparedness.
City of Santa Rosa Hazard Mitigation Plan Project Kickoff.
Sustainable/Resilient Communities in Monmouth County September 10, 2008 Sea Level Rise & Coastal Resiliency Jon K. Miller 1 & Thomas O. Herrington 2 1.
RESISTANCE AND RESILIENCE Some basic postulates … Walter G. Green III, Ph.D., FACCP Disaster Theory Series No. 4 Copyright 2008 by Walter G. Green III.
Maximizing the Facility Hazard Vulnerability Assessment
Risk Assessment What is good about the Microsoft approach to threat modeling? What is bad about it? OCTAVE…  Advantage: ___________  Disadvantage: ___________.
Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.
Chapter 2 Incident Response Management Handbook Spring Incident Response & Computer Forensics.
FOR OFFICIAL USE ONLY 1 National Critical Infrastructure Prioritization Program Tier 1 and Tier 2 Program Overview Office of Infrastructure Protection.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
2016 THIRA & State Homeland Security Grant. Threat & Hazard Identification & Risk Assessment (THIRA) National Preparedness Goal driven Annual Assessment.
AJS 562MART Learning for leading/ajs562martdotcom.
Janice Rahman Program Manager Metropolitan King County Council Law, Justice, Health and Human Services Committee May 14 th, 2013 HAZARD MITIGATION A Regional.
Chapter © 2010 South-Western, Cengage Learning Property and Liability Insurance Property Insurance Automobile and Umbrella Insurance.
INMM Nuclear Security and Physical Protection Technical Division.
Hazard Mitigation Plan Update Lancaster County Final Public Meeting April 26, 2013.
The process of identifying and controlling the risks is called Risk Management.
The Local Mitigation Strategy: Your Guide To A Safer Community Mitigation: Actions we can take before a disaster or when we rebuild after a disaster, that.
CJS 250 Week 9 Final Project The Security Plan Check this A+ tutorial guideline at 250-Week-9-Final-Project-The-Security-Plan.
2017 HAMPTON ROADS HAZARD MITIGATION PLAN UPDATE BRIEFING
Headquarters U.S. Air Force
DISASTER VULNERABILITY, RISK AND CAPACITY
Risk Assessment Considerations
CMS Policy & Procedures
Risk Assessment.
HIRA This is the lesson objective.
Figure 3: TSN Analysis Methodology
الوحدة 20 مهارات التواصل مع الآخرين
International Conference “Safeguarding cultural heritage from natural disasters” Pécs, Hungary 12 September 2018 Decision support tool for vulnerability.
Disaster and Climate Change,
Instrument PDR Summary of Objectives
HIRA This is the lesson objective.
Albeado - Enabling Smart Energy
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

A brief overview of the IRVS for Schools Assessment Tool and its four major components

Undesirable Events (UE) Threat assessment based upon geographic and demographic features of a school. Includes all events that can adversely impact security, function and operations of a proposed school. Earthquakes Floods High Winds Seal Level Rise Ice/Snow Storm Hail Wildfire School Shooting Arson Abduction Theft Vandalism Robbery

School Security Level (SSL) An assessment of risk based upon multiple criteria and the consequences of that risk as a result of an Undesirable Event. Casualties Damage Target Density

Level of Protection (LOP) Identifies the critical vulnerabilities of a school based on existing Level of Protection. Vulnerabilities are identified by comparing existing LOP to established baseline States can establish a minimal rating of compliance Lobbies School Doors Playgrounds and Entry Points Classrooms

Compliance The final phase includes the identification of vulnerabilities and how best to move to compliance. Technical References Technical Support Involves design professionals, architects, fire, police etc… Separate from assessment tool, but based upon it’s results.