Presentation is loading. Please wait.

Presentation is loading. Please wait.

and Security Management: ISO 28000

Similar presentations


Presentation on theme: "and Security Management: ISO 28000"— Presentation transcript:

1 and Security Management: ISO 28000
Standards for Supply Chain Risk Assessment and Security Management: ISO 28000 Assuring Safety, Security, and Sustainability using supply chain analysis, planning, and integrated Quality Management Systems 2012 Transportation Research Board Annual Meeting Washington DC January 25th, 2012 Michael J. Penders, Esq. Environmental Security International L3C

2 Identifying Vulnerabilities and Reducing Risk with Integrated Management Systems: Performance Measures, Accountability, and Deterrence Integrated Security Management requires the capacity to detect, prevent, and limit consequences of deliberate or negligent acts across the supply and distribution chains. Focused on acts that would use hazardous materials, wastes, supply chain, or infrastructure as a weapon or means of delivering an attack. An All Hazards Approach to Risk Assessment

3 Process for Integrated Risk Assessment, Management and Systems
Planning for many release and attack scenarios that pose threats to critical assets; not just worst case. Dynamic paradigms for risk assessment and planning. Benefits of Integrating Environmental, Health, Safety, Emergency Response, Disaster Recovery, Business Continuity, Information and Physical Security systems. Organizational Resiliency Enterprise Risk Management

4 Homeland Defense, Integrated Management Systems, and National Security
Nationally, Internationally, at Ports, and at Facilities: “We don’t know what we know.” Stove piping of agencies and information Speed and synthesis: keys to comprehension and security. Integrating environmental, energy, and security monitoring into operational controls, with defenses for IT systems

5 Integrating Elements of Security into Operational Management Systems
Access to Reliable Information by Decision Makers, Emergency Responders, Security Data Mining, Operational Controls, Remote Sensing Planning, Communications, Training Standards for Incident Command Demonstrated Performance at Military Bases

6 Critical Elements of Vulnerability, Risk Assessment and Systems Review
Facility and Treatment Review Physical Security: Perimeter; access controls; vehicles and materials delivery management; hazardous materials management; facilities design; critical infrastructure; personnel; subcontractors SCADA, Information, and Cyber Security Critical Control Points along Supply Chain

7 Strategic Security Management
Blue Plains D.C. Waste Water Treatment Facility Pollution Prevention and Strategic Sustainability Co-Generation, Redundancy, Defenses Management Controls and Real Time Monitoring Towards an Integrated Systems Approach Assuming worst case scenarios and that the enemy knows; design systems accordingly

8 New Standard and Incentives for Integrated Security Management
New International Standards for Security Management System (SMS) ISO 28000; ISO 27000 Performance Measures for Integrated Systems: Speed, Synthesis, Risk Reduction E-Commerce and Supply Chain Management Insurance/Financial/Regulatory Consideration

9 Security Planning Model
Continuous Vigilance Model Change Security Management System Incident SVA Audit

10 Security Management System Model Elements
Leadership commitment Security vulnerability assessment Legal and other requirements Threat and hazard deterrence and mitigation Implementation and operation Resources, roles, responsibility and authority Competence, training and awareness Continuous improvement Monitoring and measurement System evaluation Nonconformity, corrective action and preventive action Control of record Internal audit Management review Communications and warning Documentation Control of documents Operations and procedure Emergency preparedness and response

11 SVA Methodology Step 1: Asset Characterization
Step 2: Threat Assessment Step 3: Vulnerability Analysis Step 4: Risk Assessment Step 5: Countermeasures Analysis

12

13 Security Management System
Value to external Stakeholders: Customers; Government; Financial Institutions, Public Integrated Security Management System Innovative Technologies Enterprise Risk Management Business Continuity Deterrence

14 For more information or questions:
Michael Penders (703)


Download ppt "and Security Management: ISO 28000"

Similar presentations


Ads by Google