Engineering | Architecture | Design-Build | Surveying | Planning | GeoSpatial Solutions November 16, 2015 THE AWWA J100 - WHAT IT IS, WHY IT IS BEING UPDATED,

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Hazard and Risk Analysis What are the socio-economic and political trends? Consider recent assessment / reviews / baseline studies / analytical exercises.
Risk Analysis Fundamentals and Application Robert L. Griffin International Plant Protection Convention Food and Agriculture Organization of the UN.
FEMA Approval of Local Hazard Mitigation Plans
Minnesota Port and Waterway Security Working Group Meeting April 12, 2012.
Department of Homeland Security Site Assistance Visit (SAV)
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
GEORGE MASON UNIVERSITY Center for Infrastructure Protection and Homeland Security Integrating Critical Infrastructure into Emergency Management Programs.
Using Mitigation Planning to Reduce Disaster Losses Karen Helbrecht and Kathleen W. Smith United States: Federal Emergency Management Agency (FEMA) May.
TMS-RA04-A-01-02Page 1 of 20 The Risk Assessment Process.
National Infrastructure Protection Plan
Preservation and Disaster Management. Federal Emergency Management Agency FEMA’s mission is to support our citizens and first responders to ensure that.
1 What do we call Ourselves? Hazards Risk Managers of Course Greg Shaw GWU ICDRM The George Washington University Institute for Crisis, Disaster, and Risk.
Risk and Emergency Management Division Southside Hampton Roads Hazard Mitigation Plan.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
WMD & Emergency Planning Steps Session 12. Emergency Planning Steps Vulnerability Assessment Mitigation Efforts Emergency Response Planning Recovery.
CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
Dam Hazard Consequences Assessment
Pacific Island Countries GIS/RS User Conference Suva, Fiji November 2010 Tools for Disaster Risk Management and Climate Change Adaptation Abigail Baca.
Mitigation can include structural and nonstructural efforts.
Hazards Risk Management Course Revision Project Update George Haddow June 2012.
OPERATIONAL RISK MANAGEMENT. The Benefits of Risk Management Reduction in Material and Property Damage. Effective Mission Accomplishment. Reduction in.
Association of Defense Communities June 23, 2015
BUILDING RESILIENT COMMUNITIES Dr. Barbara Carby The Cayman Islands LEADERS 2006, Jamaica.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Risk Assessment Public Safety Geoscience Program – Earth Sciences Sector Centre for Natural Hazards Research Nicky Hastings, Bert Struik, Murray Journeay,
Studying the Asymmetric Threat “NPS provides high-quality, relevant and unique advanced education and research programs that increase the combat effectiveness.
Integrated Risk Management Charles Yoe, PhD Institute for Water Resources 2009.
OPERATIONAL RISK MANAGEMENT
Risk management and disaster preparedness
THE COUNTY OF YUBA OFFICE OF EMERGENCY SERVICES The Disaster Mitigation Act of 2000.
Introduction to Information Security
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
Environment and Disaster Planning Hari Srinivas, GDRC Rajib Shaw, Kyoto University Contents of the presentation: -What is the problem? -Precautionary Principles.
Key Words in disaster Management Dhammika Mahendre.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Prepared By: Razif Razali 1 TMK 264: COMPUTER SECURITY CHAPTER SIX : ADMINISTERING SECURITY.
Key Terms in Disaster Risk Reduction
1 Certification and Accreditation CS Unit 4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah.
Facing Tomorrow’s Challenges USGS Natural Hazards Science in the Coming Decade Facing Tomorrow’s Challenges USGS Natural Hazards Science in the Coming.
Maximizing the Facility Hazard Vulnerability Assessment
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Chapter 13 Risk Management. Chapter Objectives 1.Define risk and risk management 2.Outline key risk issues and types of risk 3.Identify concrete methods.
CYSM Risk Assessment Methodology Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme.
2007 Office of Risk Management Annual Conference 2007 David M. Shapiro Disaster Planning & Recovery Consultants
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Risk Assessment: A Practical Guide to Assessing Operational Risk
Module 18 National Preparedness. Postmaster, Levels Module 18Slide - 2 Facility, Personal & Vehicle Security Workroom Floor Access Keys Arrow Keys.
Module 8 Risk Management. Manager, Customer Services Module 8Slide - 2 Objective The learner will be able to: –Develop an understanding of Security Responsibility.
Terrorism Risk Assessment and Management (TRAM) Methodology Overview Briefing June 6, 2008.
Community Health Centers of Arkansas Hazard Vulnerability Assessment Workshop August 11, 2017 Mark Fuller.
DISASTER VULNERABILITY, RISK AND CAPACITY
THE COUNTY OF YUBA OFFICE OF EMERGENCY SERVICES
and Security Management: ISO 28000
HIRA This is the lesson objective.
Overview of Climate Resilience in Transportation Planning October, 2017 Savannah, GA Jill Stark, FHWA, Office of Planning.
MERRICK & COMPANY CHARLOTTE WATER INSTITUTE
Hazards Planning and Risk Management Risk Analysis and Assessment
Disaster Site Worker Safety
HIRA This is the lesson objective.
Disaster Site Worker Safety
A New Concept for Laboratory Quality Management Systems
Unit 14 Emergency Planning IS 235
Presentation transcript:

Engineering | Architecture | Design-Build | Surveying | Planning | GeoSpatial Solutions November 16, 2015 THE AWWA J100 - WHAT IT IS, WHY IT IS BEING UPDATED, AND WHY IT MATTERS TO YOU NC AWWA-WEA 95 th Annual Conference Raleigh, North Carolina John W. McLaughlin, P.E. MERRICK & COMPANY

Introduction What is the J100? J100 and All Hazards Purpose Seven steps Why is it being updated? The “Why” Some potential updates Timeline Why does it matter to you? Why should it matter to you? Benefits?

All Hazards 1998 NE & Canada Ice Storm 1999 Hurricane Floyd 2011 Alabama Tornadoes

All Hazards San Diego Wildfires 2011 Virginia Earthquake 2010 NE Blizzards 2003 NE Blackout

Purpose of the Standard Purpose Guide analysis of risk and resilience of water and wastewater systems across multiple threats, including man-made, natural disasters, interdependencies and proximity Direct the design and evaluation of options to reduce risk and enhance resilience Support resource allocation decisions to risk-reduction and resilience- enhancement options Ultimately, reduce risk and enhance resilience of water and wastewater utilities

Seven Steps Seven Steps of the J100 Process and Risk Components We will cover each at a high level

Seven Steps 1. Asset Characterization What assets do I have that are critical to my operations? Utility Mission, Facility Screening, and Prioritize the critical assets using the estimated consequences Review, Analyze, Document, Record 2. Threat Characterization What worst reasonable case man-made threat, natural hazard & interdependency scenarios should I consider? Utilizes the most severe but reasonable and credible consequences for a specific hazard But does not combine unlikely coincidences Review, Analyze, Document, Record

Seven Steps 3. Consequence Analysis The immediate, short and long-term effects of a malevolent attack, natural hazard or dependency/proximity hazard They include human and property losses, environmental damages and lifeline interruptions Review, Analyze, Document, Record 4. Vulnerability Analysis Analyzes the ability of each critical asset and its protective systems to withstand each specified threat Review, Analyze, Document, Record

Seven Steps 5. Threat Likelihood Analysis Estimates the likelihood of malevolent event, dependency/location hazard, or natural hazard Malevolent, by one of three methods: Proxy measure, Best estimate, or Conditional probability assignment Review, Analyze, Document, Record 6. Risk/Resilience Analysis Combines the results from the previous five elements into estimates of: Risk = f (C, V, T) and Resilience = f (Service Denial, V, T) Review, Analyze, Document, Record

Seven Steps 7. Risk/Resilience Management Risk Management is the deliberate, cyclical process of: Understanding risk based on a risk analysis, and Deciding upon, implementing, and managing action, e.g., security countermeasures or consequence mitigation features, To achieve an acceptable level of risk at an acceptable cost Resilience Management is the deliberate process of understanding resilience both as: A function of loss of infrastructure components, and The ability of the community to cope with the loss and recover in the shortest practical time Review, Analyze, Document, Record

Why is the J100 Being Updated? (and what are the Updates?) Why is the J100 Being Updated? (and what are they?) Caveat – Nothing is final, only items being considered. Consider expanding upon and better clarifying the various Appendices where guidance on determining threat likelihood is described. Consider new threats being considered for incorporation into the standard, including Wildfires, Ice Storms and Condition Based threats. Consider addition of “Items Under Consideration” for: Climate change Cybersecurity New tendencies in terrorism Interdependencies Unknown contaminants Others?

Why is the J100 Being Updated? (and what are the Updates?) Elimination of the option to use “Conditional” risk. In Conditional risk, the likelihood of a threat occurring, such as a terrorist attack, e.g., is set at 1.0, meaning that you are presuming there will be an attack. Removal of the use of “Bins” for Consequence or Vulnerability value determination. With Bins, there is a range of values to be used versus defining a single, point value. Focus on overall utility and community resilience versus resilience at the threat-asset level. Use net benefits versus gross benefits when considering cost- benefit ratios for decisions on risk reduction measures.

Why Does it Matter to you? (Why should it Matter?) Why does it matter to you, or more to the point, why should it matter to you? J100 is the most current and comprehensive means to manage risk and resilience in the water sector (the water sector includes both water and wastewater systems). J100 analyzes “All Hazards” risk and resilience, i.e. sabotage, terrorists, earthquake, tornados, hurricanes, interdependencies, proximity, etc. with probabilities of occurrence. J100 is the only risk and resilience standard for the water sector.

Why Does it Matter to you? (Why should it Matter?) Do you really understand the greatest risk(s) your utility faces? Are you prepared to manage them properly? J100, used properly, allows comparison of risk values from any infrastructure in any part of the US to any other infrastructure in any other part of the US. J100 is an AWWA and ANSI recognized standard, i.e. it implies a standard of care, or best practice. J100 Has Been Awarded the Support Anti-terrorism by Fostering Effective Technologies Act of 2002 (SAFETY Act) Designation by DHS.

Questions? Question and Answer John W. McLaughlin, P.E. Merrick & Company