CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)

Slides:



Advertisements
Similar presentations
Elements for Integrating Early Warning into Disaster Preparedness and Management Policies A Contribution of the EWC-II Advisory Group to the High level.
Advertisements

Prioritizing Species and Actions Protocol Rita Dixon Idaho Department of Fish and Game.
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Overview of Key Rule Features
Session 301 Factors in Assessing Risk Mitigation Actions Impact reducing the identified risks and vulnerabilities in the community Probability that each.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Managing Risk in Information Systems Strategies for Mitigating Risk
Risk Assessment Frameworks
Security Risk Management Paula Kiernan Ward Solutions.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
CERN IT Department CH-1211 Genève 23 Switzerland t ITIL and Business Continuity (Service Perspective) Hepix 2012 Conference Prague,
Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.
PRM 702 Project Risk Management Lecture #28
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Security Risk Assessment Applied Risk Management July 2002.
Regional Flood Plain Management Council April 15, 2015 H-GAC December 2nd.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
WMD & Emergency Planning Steps Session 12. Emergency Planning Steps Vulnerability Assessment Mitigation Efforts Emergency Response Planning Recovery.
California’s Flood Future Recommendations for Managing the State’s Flood Risk National Association of Flood & Stormwater Management Agencies December 10,
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
NIST Special Publication Revision 1
Risk Assessment Farrokh Alemi, Ph.D. Monday, July 07, 2003.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Dr. Benjamin Khoo New York Institute of Technology School of Management.
Chapter 7 Managing risk and quality. Learning objectives discuss the importance of risk in a project and how it can be managed explain the processes of.
Proposed Supply Chain Risk Management Process Flow Supply Chain Risk Leadership Council 20 April 2009 DRAFT.
OPERATIONAL RISK MANAGEMENT
US Army Corps of Engineers BUILDING STRONG ® Texoma and Missouri Region JETS Training Symposium Resiliency Planning Through Hazard Vulnerability Analysis.
Climate Adaptation Policy & Practice in the United States A Presentation for the Environmental Evaluation Network Forum June 24, 2011 Steve Adams Managing.
“Integrating Property Management with Emergency Recovery” Ivonne Bachar, CPPM CF Director, Property Management Office Stanford University
1 Figure 11-3: Risk Analysis Financially Sensible Protections  Risk analysis: Balance risks and countermeasture costs Enumeration of Assets  Assets:
Environment and Disaster Planning Hari Srinivas, GDRC Rajib Shaw, Kyoto University Contents of the presentation: -What is the problem? -Precautionary Principles.
Sustainable/Resilient Communities in Monmouth County September 10, 2008 Sea Level Rise & Coastal Resiliency Jon K. Miller 1 & Thomas O. Herrington 2 1.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Climate Mitigation and Adaptation Plan (CMAP) Port of San Diego Maritime Business and Technology Summit November 29, 2011 Michelle White Port of San Diego.
Engineering | Architecture | Design-Build | Surveying | Planning | GeoSpatial Solutions November 16, 2015 THE AWWA J100 - WHAT IT IS, WHY IT IS BEING UPDATED,
Draft Recommendations from the NH Coastal Risks and Hazards Commission Sherry Godlewski Department of Environmental Services Coastal Adaptation Workgroup.
Capital Improvements & Infrastructure: Hazards Profile #1 - Current Hazards Risks & Impacts Looking at the hazards maps and data, what locations, impacts.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
OCTAVE By Matt White. OCTAVE  OCTAVE® (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a risk-based strategic assessment and planning.
Improving performance, reducing risk Dr Apostolos Noulis, Lead Assessor, Business Development Mgr Thessaloniki, 02 June 2014 ISO Energy Management.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
SEC 480 assist Expect Success/sec480assistdotcom FOR MORE CLASSES VISIT
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Headquarters U.S. Air Force
Terrorism Risk Assessment and Management (TRAM) Methodology Overview Briefing June 6, 2008.
Camera PDR/CD1 Planning 19 September 2008
Headquarters U.S. Air Force
Risk management.
OH&S Plant Obligations make
and Security Management: ISO 28000
OSG Computer Security Plans
Critical Infrastructure Protection Policy Priorities
TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
The U.S. Department of Homeland Security
IS4680 Security Auditing for Compliance
Emergency Management and Utilities
Securing Critical Chemical Assets: The Responsible Care® Security Code
Final Conference 18 Set 2018.
Effective Risk Management in Decision Making Process
Information Security Risks; All-in-One Terminology
Presentation transcript:

CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water) supporting an organization’s inhabited facilities and uninhabited structures. The protection of personnel by reducing the effects of a terrorist act and criminal activity against the asset and its people was the key premise for the development of ABRA. By using ABRA, decision makers can allocate funds on countermeasures that are actually effective in providing the biggest reduction of risk to the greatest number of personnel first. Critical Asset and Infrastructure Risk Analysis (CAIRA) Fact Sheet ENERGY SYSTEMS: Electrical Natural Gas Steam (environmental control) Water Ventura, CA (805) The Purpose The primary purpose of CAIRA is to quantitatively measure threats, assets, vulnerabilities, and risks associated with energy systems supporting large and/or small government or private facilities. It establishes a security baseline, explores upgrades, recalculates vulnerabilities and risks, and recommends optimized features or improvements for facilities. In essence, CAIRA identifies current levels of vulnerability and risk and then identifies improved levels with the implementation of specified countermeasures. Basically, a snapshot of where the organization is today and where it could be after countermeasures are implemented. In addition, CAIRA identifies the associated cost and impact of the improvements. Analysis is divided into five sub- sets: Hazards Assessment Physical Protection Risk Reduction Functional Area Analysis Cost Benefit Analysis Analysis is divided into five sub- sets: Hazards Assessment Physical Protection Risk Reduction Functional Area Analysis Cost Benefit Analysis

Capabilities Calculates threat likelihood (probability of attack) Calculates effectiveness of attack (probability of success) Final threat likelihood can be adjusted, if necessary Compares baseline vulnerability level (current state) with Optimized vulnerability level (after countermeasures have been implemented) Recommends mitigation strategies based on risk reduction and costs Capabilities Calculates threat likelihood (probability of attack) Calculates effectiveness of attack (probability of success) Final threat likelihood can be adjusted, if necessary Compares baseline vulnerability level (current state) with Optimized vulnerability level (after countermeasures have been implemented) Recommends mitigation strategies based on risk reduction and costs Life-time training & support Life-time training & support Ventura, CA (805) Unlike standard compliance based assessments, CAIRA; Predicts likelihood of occurrence Quantifies vulnerabilities and risks Determines the cost effectiveness of specific improvements and helps prioritize countermeasures Unlike standard compliance based assessments, CAIRA; Predicts likelihood of occurrence Quantifies vulnerabilities and risks Determines the cost effectiveness of specific improvements and helps prioritize countermeasures