Border Security Risk Model Murray E. Jennex, Ph.D., P.E., CISSP, CSSLP.

Slides:



Advertisements
Similar presentations
Rob Kella - Chief Risk Officer
Advertisements

Tenace FRAMEWORK and NIST Cybersecurity Framework Block IDENTIFY.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Primary Benefit Types Value Discipline Benefits – Operating Excellence Reduce Cost Reduce Risk – Product Leadership Increase Revenue – Customer Intimacy.
Discovery – The Next Generation!: Business Context of Risk Presentation to the North London Branch British Computer Society 19 March, 2008 Dr. Victoria.
Recognising the Risks of Cyber Threats Across the Organisation John Thornton Secretary to the Digital Government Security Forum.
© MIT 2002 Supply Chain Response to Global Terrorism: Synthesis of Feedback Potential MIT Roles December 6, 2002.
Page 1 All Hazards Preparation: Information and Strategic Planning Tom Conaway, Managing Partner Homeland Security November 20, 2006.
Business Transformation Health Check
Global Business Transformation Master (GBTM) Certification
Investment Management Concepts Portfolio Management | Segment Architecture March 25, 2009 Adrienne Walker and Kshemendra Paul
Paradise Valley Community College Ways to Fit Security Risk Management to Your Environment Using the OCTAVE Methodology Tailoring OCTAVE at Maricopa Community.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Information Technology Audit
Nicosia, May 15th, th International Conference Challenges facing aviation safety - An airlines’ perspective.
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
RISK MANAGEMENT PRESENTATION ASQ- GREATER HOUSTON SECTION 1405 Lila Carden, Ph.D., MBA, PMP University of Houston Instructional Associate Professor
1 Enterprise Risk Management (ERM) Program PNM Resources, Inc. March 29, 2007 Presentation to American Public Power Association March 2007 Austin, Texas.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.
Preliminary Results from a State- of-the-Practice Survey on Risk Management in Off-The-Shelf Component-Based Development Jingyue Li 23 Nov
Jay F. Nunamaker, Jr. – Director Elyse Golob – Executive Director Challenges and Solutions at the Northern Border Thursday, February 26, 2009 Meydenbauer.
1 The National Research Center for Border Security and Immigration (BSI)
Jean-François Lennon Director Global Business Development & PMO
Copyright 2010, The World Bank Group. All Rights Reserved. Planning and programming Planning and prioritizing Part 1 Strengthening Statistics Produced.
Challenges in Infosecurity Practices at IT Organizations
WORKSHOP PERSPECTIVES: NORTH / SOUTH RESEARCH PARTNERSHIPS ICT IN EDUCATION GeSCI’s thematic focus areas and meta-review of ICT in education research Patti.
PhD Proposal Texas A&M University 05/11/10 JAMES HALIBURTON AIA LEED AP CONTENTS Building Information Modeling and Small Architectural Firms: An Analysis.
Joel Predd and Henry Willis February 26, 2009 Toward Adaptive, Risk-Informed Allocation of Border Security Assets.
+ risk management 101 measuring, managing & monitoring risk: a km approach kmworld09
Monitoring and Evaluation (M&E) and Adaptive Management for complex integrated conflict-sensitive programming Presenter: Diane Russell Treasure, Turf and.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Wildlife Program Amendments CBFWA Members Meeting – Sept
Microsoft Office Project 2003: Selling EPM in your Organization Matt Wilson Business Solutions Specialist LMR Solutions.
Subcommittee on Design New Strategies for Cost Estimating Research on Cost Estimating and Management NCHRP Project 8-49 Annual Meeting Orlando, Florida.
The Canada Border Services Agency and Coordinated Border Management Regional Conference of Customs Directors General, April 22-25, 2012.
Info-Tech Research Group1 Requirements Gathering World Class Operations - Impact Workshop.
Systems Analysis and Design in a Changing World, Fourth Edition
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
Randy Beavers CS 585 – Computer Security February 19, 2009.
ENISA efforts for securing European Internet Infrastructure
Facilitating UFE step-by-step: a process guide for evaluators Joaquín Navas & Ricardo Ramírez December, 2009 Module 1: Steps 1-3 of UFE checklist.
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
Project Portfolio Management Business Priorities Presentation.
IT Controls Global Technology Auditing Guide 1.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
Kathy Corbiere Service Delivery and Performance Commission
Procurement Risk Assessment Management System P-RAMS: Overview March 2010.
John Weigelt, MEng, PEng, CISSP, CISM National Technology Officer Microsoft Canada November 2005 Fighting Fraud Through Data Governance.
PPBS Planning Programming Budgeting Systems. PPBS The Department of Defense is the only Agency to use this type of budget.budget.
1 RAND October 30, 2003 Border Security Issues After 9/11 November 5, 2003.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
PowerPoint Presentation to Accompany Chapter 8 of Management Fundamentals Canadian Edition Schermerhorn  Wright Prepared by:Michael K. McCuddy Adapted.
CounterMeasures™ Risk Analysis and Management May 2005.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
SAM Baseline Review Engagement
Development of Predictive analytics for HELP Truck Deployment
Identify the Risk of Not Doing BA
CHAPTER11 Project Risk Management
Air Force Airborne SIGINT Architecture & Analysis
Successful Information Security Governance
Information Security Risk Management
Infrastructure Governance at the OECD
Succession/Replacement Planning
Cyber security Policy development and implementation
Understanding the current Public Sector landscape from an risk management point of view Applying the ethical responsibility to the Triple Bottom-line:
Safety / Performance Criteria Agreeing on Assumptions
Final Conference 18 Set 2018.
Effective Risk Management in Decision Making Process
Presentation transcript:

Border Security Risk Model Murray E. Jennex, Ph.D., P.E., CISSP, CSSLP

Risk Assessment, Mitigation, & Alignment Project This project is focusing on border risk –Risk from bringing in new technologies –Risk from border security threats –Risk from changes in the organizations managing border security

Risk Assessment, Mitigation, & Alignment Project Project Goals are: –Quantify Threats, Risks, and Security Levels –Simulation and Modeling of Countermeasures –Inventory of Current Technologies Used in Border Security & Risk Management –Prioritize Needed Technologies & Systems –Identify, Test, & Evaluate Easily Deployed, Commercially Available Technologies –Identify Technology Gaps that Require Further Development –Creation of a Border Security Risk Monitor

Risk Assessment, Mitigation, & Alignment Project Project Outputs are: –Risk Assessment and Mitigation Decision Framework –BSI Readiness and Maturity Model –Prototype Border Security Risk Monitor –Adaptive, Risk-Informed Resource Allocation Each output leads to the next

Risk Assessment, Mitigation, & Alignment Project Challenges –Greatest challenge is in getting data for constructing risk models for different areas of the border: North vs south Ports vs airports External vs internal –Will leverage efforts from other projects, in particular the case studies that are being done

Risk Assessment, Mitigation, & Alignment Project Challenges –Risk model challenges include variable and rule identification –Risk monitor prototype challenges include: Choosing a technology platform Complexity of risk models

Risk Assessment, Mitigation, & Alignment Project Benefits include: –Provides framework for assessing border risks (more than immigration and terrorism) Provide a system for determining risk level Provide a system for determining contingency actions –Provide methodology to support evaluation and deployment of new technologies within an integrated framework of layered protection Assess organizational needs for supporting new technologies Identify dependencies between technologies

Risk Assessment, Mitigation, & Alignment Project Year One Deliverables: –Survey of Risk Literature –DHS Data Needs/Assessment –Decision Framework –Survey of Readiness Models

Risk Assessment, Mitigation, & Alignment Project Investigators: –University of Arizona Larry Head Ferenc Szidarovszky Jian Liu –San Diego State University Murray Jennex Eric Frost Robert Judge –Arizona State University Rick Van Schoik –RAND Corporation Henry Willis Joel Predd