Professionalism and CBRN Security Culture

Slides:



Advertisements
Similar presentations
Albania Good practices and Gaps 13 December 2013.
Advertisements

What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Pakistan Nuclear Regulatory Authority
A Blueprint of CBRN Security Architecture Dr. Igor Khripunov at the seminar “Toward a CBN Security Culture: Developing a Holistic Approach,” 24 April 2012,
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
The Relationship between Nuclear Safety, Security and Safeguards
LLNL-PRES Lawrence Livermore National Laboratory is operated by Lawrence Livermore National Security, LLC, for the U.S. Department of Energy, National.
INSAG DEVELOPMENT OF A DOCUMENT ON HIGH LEVEL SAFETY RECOMMENDATIONS FOR NUCLEAR POWER Milestone Issues: Group C. Nuclear Safety. A. Alonso (INSAG Member)
Introduction: Session on Security and Non-Proliferation
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
1 Regulatory Challenges During and Following a Major Safety or Security Event Muhammad Iqbal Pakistan Nuclear Regulatory Authority Presentation at General.
UK Office for Security & Counter Terrorism Future threats and the potential role of the CBRN Action plan in supporting the BTWC Dr Catherine Terry International.
SAFA- IFAC Regional SMP Forum
CHAPTER 2 – ROLES OF CONSTRUCTION PERSONNEL IN SAFETY AND HEALTH
Gulf of Mexico Challenges with Contractor Verification - Skills and Knowledge.
Control environment and control activities. Day II Session III and IV.
Codex Guidelines for the Application of HACCP
Information Technology Audit
School Leadership Evaluation System Orientation SY13-14 Evaluation Systems Office, HR Dr. Michael Shanahan, CHRO.
Ministry for Foreign Affairs Sweden Government Offices of Sweden Sweden and the Nuclear Security Summit Process Jan A. Lodding Deputy Director Disarmament.
ISO Richard Welford CSR Asia © CSR Asia 2011.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
International Atomic Energy Agency 0 Meeting on Security Culture Embassy of Hungary, Vienna, 24 April 2012 Towards a CBRN Security Culture: Sharing Nuclear.
Technical Meeting on Evaluation Methodology for Nuclear Power Infrastructure Development December, 2008 Nuclear Safety in Infrastructure Building.
DEVELOPING AND MAINTAINING AN ETHICAL CORPORATE CULTURE
BC Injury Prevention Strategy Working Paper for Discussion.
Building nuclear security culture through education and training
Utilizing the NSS to Create a Next Generation Nuclear Material Security Regime Conference on the 2012 Seoul Nuclear Security Summit and Next Generation.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Association for Biblical Higher Education February 13, 2013 Lori Jo Stanfield Evaluator Team Training for Business Officers.
Anita Nilsson Director, Office of Nuclear Security
NIST Special Publication Revision 1
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
1 THE NUCLEAR ENERGY POLICY FOR SOUTH AFRICA ELSIE MONALE ICRP WORKSHOP.
08 October 2015 M. Ammar Mehdi Introduction to Human Resource Management & SSG-16 Actions 4 th Steering Committee on Competence of Human.
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
The Nuclear Security Summit and its Two Side Events Anna Péczeli CBRN Security Seminar in Budapest June 17-18, 2014.
IAEA International Atomic Energy Agency. IAEA Outline Learning Objectives Introduction IRRS review of regulations and guides Relevant safety standards.
Evaluation of Internal control mechanism in Audit of Autonomous Bodies.
RISK MANAGEMENT : JOURNEY OR DESTINATION ?. What is Risk? “ Any uncertain event that could significantly enhance or impede a Company’s ability to achieve.
Nuclear Security Culture William Tobey Workshop on Strengthening the Culture of Nuclear Safety and Security, Sao Paulo, Brazil August 25-26, 2014.
Reclaimed Wastewater Quality Criteria, Standards, and Guidelines
Strategic Approaches to Improving Ethical Behavior
International Atomic Energy Agency Roles and responsibilities for development of disposal facilities Phil Metcalf Workshop on Strategy and Methodologies.
AUDIT OF INTERNAL CONTROL Day V Sessions I & II. Session Overview Periodical audit of existence of internal control in order to examine its effectiveness.
IAEA International Atomic Energy Agency Milestones in the development of a national infrastructure for nuclear power The Nuclear Security dimension Technical.
Milestones for Nuclear Power Infrastructure Development Establishment of A Regulatory Framework Gustavo Caruso, Section Head, Regulatory Activities Section.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
IAEA International Atomic Energy Agency TM/WS TOPICAL ISSUES ON INFRASTRUCTURE DEVELOPMENT: MANAGING THE DEVELOPMENT OF NATIONAL INFRASTRUCTURE FOR NUCLEAR.
Office of Special Projects Issues arising from the Second Review Conference on Safety and Security at Chemical Plants and Relationships with CWC stakeholders.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
By Annick Carnino (former Director of IAEA Division of Nuclear Installations Safety) PIME, February , 2012.
Governance, risk and ethics. 2 Section A: Governance and responsibility Section B: Internal control and review Section C: Identifying and assessing risk.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
International Safety Rating System
School Leadership Evaluation System Orientation SY12-13 Evaluation Systems Office, HR Dr. Michael Shanahan, CHRO.
IAEA International Atomic Energy Agency Computer Security Culture and Capacity Building Overview Presented by: May 2016.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
(3.6) General requirements on resources for the establishment of IMS
MGMT 452 Corporate Social Responsibility
CHAPTER 2 – ROLES OF CONSTRUCTION PERSONNEL IN SAFETY AND HEALTH
Internal and Governmental Financial Auditing and Operational Auditing
USNRC IRRS TRAINING Lecture18
Improving Radiological Security in the Evolving Threat Environment
Cyber security Policy development and implementation
Joseph B. Berger University of Massachusetts Boston
School Leadership Evaluation System Orientation SY12-13
Presentation transcript:

Professionalism and CBRN Security Culture Dr. Igor Khripunov

What is CBRN Security Culture? As its major subset, CBRN security culture derives its strength, or lack thereof, from organizational culture, but in certain circumstances it can have a positive impact on organizational culture. CBRN security culture is important at the level of an organization but the ultimate objective is to make it a society-wide value CBRN security culture is an assembly of beliefs, attitudes, and patterns of behavior which can reinforce or complement operating procedures, rules, regulations and ethical standards in the process of achieving intended WMD nonproliferation and security goals.

Sustainability requires a 2-Tiered Architecture National Macro-Level National leadership Adherence to international legal framework and compliance National strategies and policies Industry commitment Involvement of the public Management System Leadership Behavior Personnel Behavior Principles Beliefs (There is a threat. CBRN security is necessary) Facility Micro-Level

What is CBRN Security Culture? In all four silos, the foundation of security culture includes human support for enforcement of common risk-based elements such as: Deterrence Protection Detection Response to: Theft Sabotage Unauthorized Access Illegal Transfer Other malicious acts involving either materials that can be used for unconventional terrorism purposes or their associated facilities The major assumption that drives this pattern of human behavior is that the risk of CBRN terrorism is real and security is important.

Culture and Professionalism Culture is intrinsic to high standards of professionalism which is embedded in a great respect and sense of responsibility for safety and security For CBRN professionals: The work is skill-based: (Behavior associated with highly practiced actions usually executed from memory without significant conscious thought) The work is rule-based: (Selection of the stored rules derived from one’s recognition of a work situation) The work is knowledge-based: Response to a very unfamiliar situation when, in the absence of skill or rule recognizable to the individual, he or she must rely on the understanding or knowledge of the system, principles, theory, and risks) Culture is a basic driver for professional behavior

Four CBRN Silos The CWC uses “general purpose criteria” to define a weapon. Global supply chains are increasingly vulnerable. A multitude of industrial chemicals could be released in massive quantities inflicting lethal effects despite their low toxicity. Less robust physical protection of sprawling petrochemical plants requires a significant input from security conscious personnel. In its recently launched project, the “OPCW as a Platform for Enhancing Security at Chemical Plants,” one of the objectives is to establish “a chemical security culture.” Chemical

Four CBRN Silos The BWC uses “general purpose criteria” to define a weapon. The rationale for security is much more closely intertwined with safety and material losses rather than terrorist risks. WHO documents refer to “responsible laboratory practices” defined as protection, control, and accountability for valuable biological materials to help prevent their unauthorized access, loss, theft, misuse, diversion, or intentional release. The International Federation of Biosafety Associations (IFBA) has launched a five year strategic plan wherein the mission is defined as “Safe, Secure, and Responsible Work with Biological Materials” but the term “culture” is yet to be prominently displayed in the professional parlance. Biological

Four CBRN Silos Almost all radioactive substances can be used to commit acts of radiological terrorism, including fission products, spent fuel from nuclear reactors, commercial radioactive sources, and relatively low-level waste. Radioactive sources pose a special challenge because they number in the millions worldwide, and are in use in a multitude of diverse operations. The Code of Conduct for the Safety and Security of Radioactive Sources has provisions on safety and security culture but is not a binding legal instrument. Major characteristics of this silo are too unique to merge it with the nuclear silo. Radiological

Four CBRN Silos The Washington and Seoul Nuclear Security Summits elevated the role of nuclear security culture and placed it on par with physical protection and material accountancy. The international legal framework for nuclear security (both binding and nonbinding) has specific references to security culture which may be seen reflected in a series of national laws and regulations. The IAEA adopted the concept of nuclear security culture in 2008, launched a training program, and intends to work toward a new, more diversified security culture which would cover transportation, spent nuclear fuel, and others. Given its current record and advancement in security culture, the IAEA and the nuclear sector can serve as a role model for other silos. Nuclear

Joint Foundation of CBRN Security Culture Only personnel empowered by a security culture that comes as second nature can continually evaluate the risk environment, and stay ahead of the threat. Among the most important shared characteristics of CBRN security culture are: accountability, reliability, compliance, and vigilance. A CBRN security culture will motivate the workforce to meticulously comply with existing security requirements, select the correct course of action when there are options, and improvise effectively in the face of the unknown. “Insider threats” are a common CBRN concern but best practices to deal with them may differ in each silo.

Joint Foundation of CBRN Security Culture The manifestation of CBRN security culture is most important at the organizational and individual levels, but their goals are fully achieved only if there are adequate inputs from higher tiers, i.e. international and national levels. CBRN security culture promotion is more likely to achieve sustainability goals if its underlying standards are embedded in societal values, traditions, and best practices. It is imperative for the leaders of organizations to be driving engines for culture building/improvement and act as the role model for their employees.

Joint Architecture of CBRN Security Culture Safety culture has been an integral part of the emergence and evolution of science and technology, while CBRN security culture is a late-comer. In this sense, security culture often follows the footsteps of safety culture or remains an integral part of it. Jointly developed and mutually acceptable risk assessment, culture evaluation methodologies, and ways of monitoring and improving the culture on an ongoing basis are important building blocks of a common architecture for CBRN security culture.

Final Observations The CBRN threat environment makes it imperative to explore and shape an appropriate culture-based response in support of the global effort against WMD proliferation and terrorism. Security cultures do exist in respective silos to safeguard sensitive materials, protect assets, and prevent acts of sabotage, but their promotion and implementation are largely isolated from each other in the absence of sufficient horizontal communication and best practice sharing. A major goal of developing a common architecture for CBRN culture is to enable countries that are lacking relevant experience to optimize the role of the human factor in dealing with CBRN risks and complying with their international obligations, including those under UNSCR 1540 (2004).