A Secure Frontline September 25, 2003

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

WMD Crime Scene Management
Protecting the Public, Astronauts and Pilots, the NASA Workforce, and High-Value Equipment and Property Mission Success Starts With Safety “September 11th.
Ethics, Privacy and Information Security
Structural Vulnerability, Risk Assessment and Land Use Issues for Transportation Infrastructure May 18, 2005 Shay K. Burrows, P.E. Senior Structural Engineer.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
OVERCOMING CHALLENGES IN EMERGENCY MANAGEMENT NAWIC May 2013.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Advanced Transportation Technologies in the Global War Against Terrorism Eva Lerner-Lam, President Eva Lerner-Lam, President Palisades Group USA 8th International.
Alexander Brandl ERHS 561 Emergency Response Environmental and Radiological Health Sciences.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
LTC Steven D. Hart, Ph.D., P.E. Civil Design Group Director Department of Civil and Mechanical Engineering West Point.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
1 Telstra in Confidence Managing Security for our Mobile Technology.
MAINSTAY ENTERPRISES, INC. “We Support Your Security Needs” Information System Security Services In today’s competitive marketplace, facilitating electronic.
Security Controls – What Works
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lecture 11 Reliability and Security in IT infrastructure.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
NVIC VESSEL SECURITY PLAN OUTLINE
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Factors to be taken into account when designing ICT Security Policies
Stephen S. Yau CSE , Fall Security Strategies.
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
NETWORK SECURITY.
Introduction to Network Defense
Protecting your Employees and Securing your Mail Center.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
INTRODUCTION TO LAW, PUBLIC SAFETY, CORRECTIONS AND SECURITY.
Issues in Transportation Security FHWA’s Strategic Approach A Presentation for the Talking Freight Seminar Series September 15, 2004 John Gerner Program.
Occupational Safety and Health 6 th Edition Lecture Notes By: Dr. David Goetsch.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
State Homeland Security Assessment and Strategy Program Develop Planning Factors for CBRNE Scenarios.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
0 Peter F. Verga U.S. Department of Defense 2 Definitions Homeland Security – A concerted national effort to prevent terrorist attacks within the United.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
Cyber Terrorism Shawn Carpenter Computer Security Analyst
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Transportation Security: The Threat, The Challenges and Our Next Steps Eva Lerner-Lam Chair, ASCE Transportation Security Committee American Society of.
2008 UASI Grants Regional Preparedness via I/O Technology and Geospatial Data.
Physical (Environmental) Security
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Module 11: Designing Security for Network Perimeters.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
The Need for Access Control & Perimeter Protection
1 GSA Public Buildings Service GSA Western Regions Client Enrichment Series Welcome to today’s presentation on: Security Charges the presentation will.
DHS S&T Investment in Chemical and Biological Incident Response Technology Erik M. Lucas, Ph.D. Science and Engineering Technical Assistant to Chemical.
Writing an Emergency Operations Plan Why do we need to plan? Spring 2008.
IS3220 Information Technology Infrastructure Security
Access Control for Security Management BY: CONNOR TYGER.
10. Security and Physical Protection Basic Concepts
INMM Nuclear Security and Physical Protection Technical Division.
DHS/ODP OVERVIEW The Department of Homeland Security (DHS), Office for Domestic Preparedness (ODP) implements programs designed to enhance the preparedness.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Module 5: Designing Physical Security for Network Resources
Physical Security Market to Global Analysis and Forecasts by Application, Services No of Pages: 150 Publishing Date: Jan 2017 Single User PDF: US$
Terrorism Risk Assessment and Management (TRAM) Methodology Overview Briefing June 6, 2008.
TWIC Training & Maritime Security Awareness
Objectives Telecommunications and Network Physical and Personnel
Cyber Security For Civil Engineering
FACILITY TARGET HARDENING
Cloud Computing for Wireless Networks
Presentation transcript:

A Secure Frontline September 25, 2003 R. E. Cunningham, SVP, National Marketing Manager HDR Security Operations, Inc.

Security: Freedom from risk or danger. Measures adopted to prevent the commission of crime.

Security Words of Wisdom To paraphrase the ancient Chinese military historian Sun Tzu (350 BC)… “He who tries to defend everything ends up defending nothing.”

Total Anti-US Attacks, 2001

Type of Anti-US Attacks, 2001

Types of Targets Attacked, 2001

Threat Is Not Only International in Nature Domestic Terrorists/Workplace Violence can also be a threat 23 Hate groups operate in Missouri and Kansas alone Oklahoma bombing was Domestic Terrorism Anthrax may have been Domestic

Concentric Circles of Security Security Concepts Concentric Circles of Security Deter Detect Delay Or You Just Document Defense in Depth Concentric Circles of Security

Deter – Detect - Delay Event Time Measured in Minutes Detection Time Lapse Assessment Response Time Detection begins Dispatchdecision Contact begins Physical / Mechanical / Electronic Delays

Deter – Detect - Delay Event Time Measured in Minutes Detection Time Lapse Assessment Response Time Detection begins Dispatch decision Contact begins Physical / Mechanical / Electronic Delays

The Challenge of “Multiple Port/Waterway Players” Port Authority Terminal Operators Stevedors Shipping/Barge Companies Logistics Companies Unions Coast Guard MARAD Customs State DOTS MPOs First Responders DNRs USACE Railroads Trucking Companies Utilities Other Port Tenants Warehousing Assessments Criticality Vulnerability Threat Risk Responsiveness Readiness

Holistic Security Planning Operational Policies and Procedures Physical Electronic Security Enforcement Security Awareness Total Team Effort Management - Authority Coaches - Executives Players – Staff/Tenants

Policies and Procedures The Game Plan Planning Operations Monitoring Reporting Policy and Procedures Standard Operating Procedures (SOP’s) Emergency Operating Procedures (EOP’s) Emergency Response Plans (ERP’s) Mutual Aid Media Management

Enforcement and Security Awareness The Team – Personnel Who Are…… Informed - Threat awareness Trained - Emergency response Empowered – Operations Equipped – The Tools Training Programs Command Operation Awareness

The Tools Physical Security Blast Protection Barriers Glazing Analysis Material Material Analysis Structural Analysis Progressive Collapse Facility Hardening Barriers Passive Active Ballistically Resistive Materials Vault/Safehaven Design Crime Prevention through Environmental Design (CPTED) Illumination Engineering Hardware Key Control/Management Locking Systems Physical Security Multiple User Access Control?

The Tools Electronic Security Intrusion Detection Access Control Situation Annunciation Closed Circuit Video Equipment (CCVE) Intrusion Detection Perimeter Security Intrusion Protection Access Control Biometric Cypher Card Personal Identification Number (PIN) Communications Data Communications Intercommunications Telecommunications Radio Frequency Access Denial Systems Screening Chemical Biological Nuclear Radiological Explosive Weapons Heartbeat Electronic Article Surveillance

The Tools Data Security Employee Data Access Controls Data Networks Telecommunications CATV/MATV Infrastructure Copper Fiber Optic Wireless Firewalls Document Storage Backups Data Power

The Tools Exercises are Key Performance Penetration (Black Hat) Real Time Response Routine System Testing

For further questions or discussion on this topic please contact Q&A For further questions or discussion on this topic please contact R. E. Cunningham rcunning@hdrinc.com