PR O M W RISK ASSESSMENTS: A Pillar in Security Planning. by ITG Consultants, Inc All rights reserved.

Size: px
Start display at page:

Download "PR O M W RISK ASSESSMENTS: A Pillar in Security Planning. by ITG Consultants, Inc. 2014. All rights reserved."

Transcription

1 M LIS DE DI M W G TE A TY RI N PR O FE SS NA TIO CA IO OR K IN TE RISK ASSESSMENTS: A Pillar in Security Planning by ITG Consultants, Inc All rights reserved.

2 CONTENTS INTRODUCTION 2 HISTORY OF RISKS 2 BEST PRACTICES 5 RESULTS 7 CONCLUSION 7 ABOUT ITG CONSULTANTS, INC. 8 INTRODUCTION Avoiding and minimizing risk is something all organizations seek to accomplish with good reason. Natural or man-made hazards can adversely impact facilities, assets and people, which in turn impact the organization s ability to continue to operate successfully, if at all. Without a definitive timeline associated with potential risks, many entities fail to position themselves to address those risks, leaving themselves exposed unnecessarily. Identifying the risks and the associated potential effect, well in advance of the occurrence, is vital to weathering such events when they happen. A careful, methodical risk assessment is a cost-effective, yet essential component in developing a comprehensive security program. HISTORY OF RISKS Risks are defined as anything that can potentially impact an organization in a harmful or negative way. Some risks are inherent to the environment or geography, such as earthquakes or tornadoes; others are man-made, as in the case of data theft. Fortunately, risks, once identified, can be defended against through a planned response, thereby mitigating the negative impact. Risks are distinct from two other concerns in security planning: vulnerabilities and threats. Vulnerabilities are weaknesses or an inability to withstand the effects of a hostile environment and involve issues that a perpetrator can exploit when targeting an entity. Threats are more closely related to risks. Risks can evolve into threats when they manifest themselves and the impact is no longer merely potential. Threats are imminent and have a defined timeline associated with them, whereas risks do not. Risk has existed since the beginning of history, keeping pace with the evolution of society and culture over the course of time. Natural risks have undergone less change, while man-made risks experience iterations with every new development in technology, not to mention social and geo-political conditions. For example, before the advent of the computer, no person or organization was at risk of losing information as a result of hacking while volcanic eruptions still pose the same risk they always have. ISSUES AND MAIN POINTS Purpose and process of risk assessments: Avoiding and minimizing the potential adverse impact of risks requires organizations to identify risks as a key component when developing a comprehensive security plan. A methodical risk assessment is the initial step in that process in which the risks are identified. Simply delineating the risks, however, is insufficient for the purpose of defending against them. Two further steps in the 2

3 assessment process are vital to the planning process: evaluating the impact of the risks and assigning probability to them. Two further steps in the assessment process are vital to the planning process: evaluating the impact of the risks and assigning probability to them. 1. Assessing potential impact. In order to formulate a plan to address the risk, defining the specific impact of that risk s occurrence is critical. Without approximating the depth and nature of the impact, determining an appropriate response is impossible. Will the occurrence of an anticipated risk result in the loss of an asset or human life? In the case of an asset, is that asset critical to business operations? To illustrate, the loss of a table saw to a carpenter is fundamentally more profound because of its significance to doing business than the loss is to an educational institution s shop class. The merited response to the loss of a saw will vary according to the entity facing the risk. Ascribing a numerical value from a pre-determined scale will weigh the depth of impact of each risk relative to the other risks on the list. 2. Assigning probability of occurrence to identified risks. Determining the likelihood of each identified risk materializing aids in prioritizing them for the purpose of bolstering defenses against their occurrence. Assigning each hazard a ranking of probability on a scale, ranging from unlikely to highly likely, will yield a betterdefined list with which to determine which risks to address first. In many cases, the probability projection is a subjective matter, approximated by the assessor based on existing knowledge and experience. Occasionally, empirical data exists and can be used to assign probability as in the case of area crime trends for the risk of burglary. While assigning probability to each risk is often subjective, it is imperative for the evaluation to be realistic. Common sense is an excellent tool with which to gauge the likelihood of each risk. For example, a business needn t be concerned over erosion when its plant is located on the midwestern plains away from water flow. Conversely, a drug company that tests products on animals is wisely aware of the potential to be targeted by activists. Utilizing a matrix to objectively organize the accumulated information is an effective means to generate a prioritized list of risks to address. The first column should list the hazards that have been identified; subsequent columns note the word-defined impact and numerical probability of occurrence. The Federal Emergency Management Agency (FEMA) produced a Guide for Developing High-Quality School Emergency Operations Plans 1 that steers users through a similar process. 1 U.S. Department of Education, Office of Elementary and Secondary Education, Office of Safe and Healthy Students, Guide for Developing High-Quality School Emergency Operations Plans, Washington, DC,

4 calculating risk HAZARD PROBABILITY MAGNITUDE WARNING DURATION RISK PRIORITY FIRE 4 HIGHLY LIKELY 4 CATASTROPHIC 4 MINIMAL HOURS HIGH 3 LIKELY 3 CRITICAL HOURS HOURS MEDIUM 2 POSSIBLE 2 LIMITED HOURS HOURS LOW 1 UNLIKELY 1 NEGLIGIBLE HOURS 1 < 3 HOURS HAZMAT SPILL OUTSIDE 4 HIGHLY LIKELY 4 CATASTROPHIC 4 MINIMAL HOURS HIGH 3 LIKELY 3 CRITICAL HOURS HOURS MEDIUM 2 POSSIBLE 2 LIMITED HOURS HOURS LOW 1 UNLIKELY 1 NEGLIGIBLE HOURS 1 < 3 HOURS The FEMA guide suggests columns to also note the amount of time a risk would afford responders to warn those affected and the duration of time over which the risk would sustain itself. ITG recommends additional columns to (1) account for the amount of stakeholder concern (such as employees worry over poorly lit parking garages giving rise to attacks) and (2) a conclusive column assigning numerical priority to each risk based on a mathematical average of the preceding columns. weighing emotional & objective considerations 4

5 Weighing the emotional concerns may indicate one risk factor should be valued higher than another. Calculating totals may help you prioritize the risk factors and help you plan for budgetary expenditures better. This process is depicted in the following table: calculating risk with emotional and objective factors HAZARD PROBABILITY MAGNITUDE WARNING DURATION STAKEHOLDER RISK LEVEL CONCERN RATING FIRE 4 HIGHLY LIKELY 4 CATASTROPHIC 4 MINIMAL HOURS 4 VERY HIGH 12 3 LIKELY 3 CRITICAL HOURS HOURS 3 HIGH 2 POSSIBLE 2 LIMITED HOURS HOURS 2 MODERATE 1 UNLIKELY 1 NEGLIGIBLE HOURS 1 < 3 HOURS 0 NEGILIBLE HAZMAT SPILL OUTSIDE 4 HIGHLY LIKELY 4 CATASTROPHIC 4 MINIMAL HOURS 4 VERY HIGH 10 3 LIKELY 3 CRITICAL HOURS HOURS 3 HIGH 2 POSSIBLE 2 LIMITED HOURS HOURS 2 MODERATE 1 UNLIKELY 1 NEGLIGIBLE HOURS 1 < 3 HOURS 1 NEGILIBLE ACTIVE SHOOTER INCIDENT 4 HIGHLY LIKELY 4 CATASTROPHIC 4 MINIMAL HOURS 4 VERY HIGH 14 3 LIKELY 3 CRITICAL HOURS HOURS 3 HIGH 2 POSSIBLE 2 LIMITED HOURS HOURS 2 MODERATE 1 UNLIKELY 1 NEGLIGIBLE HOURS 1 < 3 HOURS 1 NEGILIBLE Sometimes a less-likely event will be elevated to a higher priority as a result of the magnitude of damage it could inflict. Only after a comprehensive assessment has been completed are the priorities sufficiently clear to predicate action upon them. With a prioritized list in hand, organizations can begin the process of developing and implementing strategies with which to mitigate and defend themselves against those risks. Available funding will never match the cost to defend against all possible risks, which makes prioritization of risks the operative lens with which to determine how to allocate the existing fiscal resources. BEST PRACTICES Who should assess? All entities whether academic, governmental, non-profit or for-profit benefit from assessing for risks because all entities face risks as a result of existing and operating. Although each type of entity could arguably endure the same risks (as in the case of an earthquake), the adverse impact on their respective operations could be vastly different based on the purpose of their existence and the assets held in association with operating. In 2011, FEMA issued a national preparedness goal 2 encouraging all types of organizations and 2 U.S. Department of Homeland Security, Federal Emergency Management Agency, National Preparedness Goal, Washington DC,

6 individuals to be poised to respond to and endure calamities of any variety: natural disasters, disease pandemics, manmade hazards, and attacks of terrorism. FEMA s goal is that the United States would be A secure and resilient nation with the capabilities required across the whole community to prevent, protect against, mitigate, respond to, and recover from the threats and hazards that pose the greatest risk. Limited resource pools necessitate wise deployment of finances to mitigate risks, making the task of assessing them critical to all types of entities. Risk assessments can largely be self-conducted due to a wide array of free resources and rubrics available. County emergency management and chamber of commerce resources or industry associations have a wealth of information to tap. However, professional insight is highly beneficial in ensuring full scope of the process has been completed. Often, law enforcement professionals are unable to assist in the assessment process for the private sector due to a lack of staffing required to sustain the workload, making private security professionals the most available, economical and skilled resource available to conduct the assessments. What is assessed? Risk, defined as anything that can adversely impact an organization, can be approximated by assessing three main areas. First, the physical structures and surroundings in which the organization operates. Consider the terrain (for risks such as erosion) and neighboring tenants (for risks that could arise from adjacency to nuclear plants, for example). Second, the geographic hazards associated with the area. Is it prone to a particular type of natural disaster because it sits on a fault line? Finally, look at the industry practices that could incite human-caused risks, such as being targeted by activism. Obstacles to assessing: Most obstacles to conducting a risk assessment are not substantial in nature. Budget constraints are commonly cited as of primary concern. Yet with the ready availability of free, preliminary resources, the initial steps can be completed with nominal cost, if any. Obtaining area crime reports or census information costs measure in merely hundreds of dollars. Concern over the amount of time allocated to conducting an assessment needn t be a large impediment either. Relative to the time investment made in threat and vulnerability assessments, this pillar in the process of developing a security plan is the least time consuming. However, conducting a risk assessment is worth the time for the simple but supreme reason that it enables the organization to operate from a proactive, instead of reactive, posture in the event that the risk materializes. Knowledge limitations are the most significant obstacle to conducting an assessment. Online tools and publicly available resources are readily available for the asking. While law enforcement s role is limited to only those entities that are pertinent to national infrastructure, such as power stations, private security firms are poised with pertinent expertise to complete the assessments in a thorough and timely fashion. 6

7 Completing a risk assessment process will help achieve FEMA s goal of creating a secure and resilient nation. RESULTS Together with vulnerability and threat assessments, risk assessments shape the safety and security plan that no organization, regardless of type, should be without. The cost of conducting a risk assessment is relatively low, especially when compared the dramatic cost of interrupted operations if and when the risk materializes and becomes, by definition, a threat with a defined timeline. When a previously identified risk occurs, the overall cost to the organization in the long run will be lower, due to a more expedient recovery resulting from the proactive planning. The cost of hardening defenses against identified risks, by remediating structures or modifying policies, can be staged over the course of time. This allows the cost of implementing the plan to be budgeted for within the annual fiscal constraints. Having a comprehensive list of risks, prioritized according to the severity and probability, ensures the right risks are addressed in the right order, making the money invested in a risk assessment highly effective. CONCLUSION Organizations of all types and sizes face risks that can adversely impact their operations. Yet risks can and should be identified in advance of their occurrence. Risk assessments empower organizations to prioritize risks and proactively plan to defend against them thereby minimizing the physical and fiscal damages when and if the risk materializes. Remember, the assessment process needn t be lengthy or costly, making it both an essential and achievable pillar in the organization s overall security program. 7

8 ABOUT ITG CONSULTANTS ITG Consultants, Inc., is a Veteran-owned small business based in Pennsylvania providing training, consulting and security management services. David L. Johnson, president of ITG, is certified in Homeland Security Level V, by the American Board for Certification in Homeland Security, previously served on its Executive Advisory Board and also serves as Chairman of The American Board for Certification in Dignitary and Executive Protection. Gale R. Ericksen, vice-president of ITG, is a Certified Protection Professional by the American Society of Industrial Security and is certified in Homeland Security Level III. Together, the leadership team of ITG Consultants has nearly 6 decades of experience in international law enforcement, executive and dignitary protection and training. For more information or a no-obligation discussion, visit our website at or call (866) 904-4ITG. PROFESSIONALISM DEDICATION INTEGRITY TEAMWORK BBB RATING: A+ 8

PR O M W THREAT ASSESSMENTS: The Final Pillar of a Tailored Security Program. by ITG Consultants, Inc. 2014. All rights reserved.

PR O M W THREAT ASSESSMENTS: The Final Pillar of a Tailored Security Program. by ITG Consultants, Inc. 2014. All rights reserved. M LIS DE DI M W G TE A TY RI N PR O FE SS NA TIO CA IO OR K IN TE THREAT ASSESSMENTS: The Final Pillar of a Tailored Security Program by ITG Consultants, Inc. 2014. All rights reserved. CONTENTS INTRODUCTION

More information

DEVELOPING ACTIONABLE

DEVELOPING ACTIONABLE M LIS DE DI M W G TE A TY RI N PR O FE SS NA TIO CA IO OR K DEVELOPING ACTIONABLE AND EFFECTIVE CONTINGENCY PLANS: THINK IT THROUGH! by ITG Consultants, Inc. 2015. All rights reserved. IN TE CONTENTS INTRODUCTION

More information

A Guide to Hazard Identification and Risk Assessment for Public Health Units. Public Health Emergency Preparedness Protocol

A Guide to Hazard Identification and Risk Assessment for Public Health Units. Public Health Emergency Preparedness Protocol A Guide to Hazard Identification and Risk Assessment for Public Health Units Public Health Emergency Preparedness Protocol Emergency Management Unit Public Health Division Ministry of Health and Long-Term

More information

Threat and Hazard Identification and Risk Assessment

Threat and Hazard Identification and Risk Assessment Threat and Hazard Identification and Risk Assessment Background/Overview and Process Briefing Homeland Security Preparedness Technical Assistance Program May 2012 PPD-8 Background A linking together of

More information

INFORMATION SECURITY STRATEGIC PLAN

INFORMATION SECURITY STRATEGIC PLAN INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information

More information

BUSINESS CONTINUITY PLANNING

BUSINESS CONTINUITY PLANNING Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,

More information

Emergency Preparedness Guidelines

Emergency Preparedness Guidelines DM-PH&SD-P7-TG6 رقم النموذج : I. Introduction This Guideline on supports the national platform for disaster risk reduction. It specifies requirements to enable both the public and private sector to develop

More information

NIMS ICS 100.HCb. Instructions

NIMS ICS 100.HCb. Instructions NIMS ICS 100.HCb Instructions This packet contains the NIMS 100 Study Guide and the Test Questions for the NIMS 100 final exam. Please review the Study Guide. Next, take the paper test - record your answers

More information

Office of Homeland Security

Office of Homeland Security Office of Homeland Security City Council City Manager OFFICE OF HOMELAND SECURITY Mitigation Program Preparedness Program Recovery Program Response Program Mission Statement To establish and maintain a

More information

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic

More information

Flood Hazard Mitigation

Flood Hazard Mitigation District of Columbia Homeland Security and Emergency Management Agency Flood Hazard Mitigation DC Homeland Security and Emergency Management Agency 2720 Martin Luther King Jr., Avenue, SE Washington, DC

More information

Western Washington University Basic Plan 2013. A part of Western s Comprehensive Emergency Management Plan

Western Washington University Basic Plan 2013. A part of Western s Comprehensive Emergency Management Plan 2013 A part of Western s Record of Changes Change # Date Entered Description and Location of Change(s) Person making changes 2 1. PURPOSE, SCOPE, SITUATION OVERVIEW, ASSUMPTIONS AND LIMITATIONS A. PURPOSE

More information

Arizona Department of Homeland Security

Arizona Department of Homeland Security Arizona Department of Homeland Security Arizona Integrated Planning System (AZIPS) Five-Year Strategic Plan 2013-2018 SEPTEMBER 2012 MISSION STATEMENT The mission of the Arizona Department of Homeland

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

All-Hazard Continuity of Operations Plan. [Department/College Name] [Date]

All-Hazard Continuity of Operations Plan. [Department/College Name] [Date] d All-Hazard Continuity of Operations Plan [Department/College Name] [Date] TABLE OF CONTENTS SECTION I: INTRODUCTION... 3 Executive Summary... 3 Introduction... 3 Goal... 4 Purpose... 4 Objectives...

More information

Threat and Hazard Identification and Risk Assessment Guide. Comprehensive Preparedness Guide (CPG) 201

Threat and Hazard Identification and Risk Assessment Guide. Comprehensive Preparedness Guide (CPG) 201 Threat and Hazard Identification and Risk Assessment Guide Comprehensive Preparedness Guide (CPG) 201 First Edition April 2012 Table of Contents Overview... 1 Basic Elements of the THIRA Process... 3

More information

Develop hazard mitigation policies and programs designed to reduce the impact of natural and human-caused hazards on people and property.

Develop hazard mitigation policies and programs designed to reduce the impact of natural and human-caused hazards on people and property. 6.0 Mitigation Strategy Introduction A mitigation strategy provides participating counties and municipalities in the H-GAC planning area with the basis for action. Based on the findings of the Risk Assessment

More information

for Human Service Providers Scott Ellis Scott Elliott Erin Sember-Chase 1

for Human Service Providers Scott Ellis Scott Elliott Erin Sember-Chase 1 for Human Service Providers Scott Ellis Scott Elliott Erin Sember-Chase 1 Goal The purpose of this webinar is to increase awareness and knowledge about the need for disaster/emergency continuity planning

More information

DISASTER RECOVERY PLANNING GUIDE

DISASTER RECOVERY PLANNING GUIDE DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide

More information

Notice of Funding Opportunity (NOFO):

Notice of Funding Opportunity (NOFO): Federal Program: State Homeland Security Program (SHSP): SHSP supports the implementation of risk driven, capabilities-based State Homeland Security Strategies to address capability targets set in State

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

U.S. Fire Administration. The Critical Infrastructure Protection Process Job Aid

U.S. Fire Administration. The Critical Infrastructure Protection Process Job Aid U.S. Fire Administration The Critical Infrastructure Protection Process Job Aid Emergency Management and Response- Information Sharing and Analysis Center FA-313 2nd Edition: August 2007 Table of Contents

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

Disaster Ready. By: Katie Tucker, Sales Representative, Rolyn Companies, Inc

Disaster Ready. By: Katie Tucker, Sales Representative, Rolyn Companies, Inc By: Katie Tucker, Sales Representative, Rolyn Companies, Inc Are you and your facility disaster ready? As reported by the Red Cross, as many as 40 percent of small businesses do not reopen after a major

More information

Preparedness in the Southwest

Preparedness in the Southwest Preparedness in the Southwest Risk Assessment and Hazard Vulnerability Developed by The Arizona Center for Public Health Preparedness Cover Art www.azcphp.publichealth.arizona.edu Chapter 1 Importance

More information

Emergency Management Certification and Training (EMC & T) Refresher Terry Hastings, DHSES Senior Policy Advisor

Emergency Management Certification and Training (EMC & T) Refresher Terry Hastings, DHSES Senior Policy Advisor Emergency Management Certification and Training (EMC & T) Refresher Terry Hastings, DHSES Senior Policy Advisor 2015 NYSEMA Conference 2 Please sign in to ensure that you receive credit for the refresher

More information

BUSINESS CONTINUITY PLAN OVERVIEW

BUSINESS CONTINUITY PLAN OVERVIEW BUSINESS CONTINUITY PLAN OVERVIEW INTRODUCTION The purpose of this document is to provide Loomis customers with an overview of the company s Business Continuity Plan (BCP). Because of the specific and

More information

Emergency Support Function 14 Long-Term Community Recovery and Mitigation

Emergency Support Function 14 Long-Term Community Recovery and Mitigation ESF Coordinator: Grant County Emergency Management Primary Agencies: Grant County Emergency Management Grant County Assessor s Office Grant County Public Works Grant County Building Department Support

More information

MONTGOMERY COUNTY, KANSAS EMERGENCY OPERATIONS PLAN. ESF14-Long Term Community Recovery

MONTGOMERY COUNTY, KANSAS EMERGENCY OPERATIONS PLAN. ESF14-Long Term Community Recovery MONTGOMERY COUNTY, KANSAS EMERGENCY OPERATIONS PLAN ESF14-Long Term Community Recovery Planning Team Support Agency Coffeyville Public Works Independence Public Works Montgomery County Public Works 1/15/2009

More information

RISK MITIGATION SERVICES. Take-and-Use Guidelines for Chubb Crime Insurance Customers

RISK MITIGATION SERVICES. Take-and-Use Guidelines for Chubb Crime Insurance Customers RISK MITIGATION SERVICES Take-and-Use Guidelines for Chubb Crime Insurance Customers RISK MITIGATION SERVICES Take-and-Use Guidelines For Chubb Crime Insurance Customers Prepared by Stephen Yesko, ARM

More information

Statement of. before the. Committee on Homeland Security Subcommittee on Oversight and Management Efficiency U.S. House of Representatives

Statement of. before the. Committee on Homeland Security Subcommittee on Oversight and Management Efficiency U.S. House of Representatives Statement of Judson M. Freed Director, Emergency Management and Homeland Security Ramsey County, Minnesota on behalf of the National Association of Counties before the Committee on Homeland Security Subcommittee

More information

Business Continuity Template

Business Continuity Template Emergency Management Business Continuity Template The Regional Municipality of Wood Buffalo would like to give credit to the Calgary Emergency Management Agency (CEMA) and the Calgary Chamber of Commerce

More information

Intel Business Continuity Practices

Intel Business Continuity Practices Intel Business Continuity Practices As a global corporation with locations and suppliers all over the world, Intel requires every designated Intel organization to embed business continuity as a core business

More information

Post-Sandy Municipal Needs Assessment for Long-Term Recovery and Resiliency Planning EXECUTIVE SUMMARY

Post-Sandy Municipal Needs Assessment for Long-Term Recovery and Resiliency Planning EXECUTIVE SUMMARY Post-Sandy Municipal Needs Assessment for Long-Term Recovery and Resiliency Planning EXECUTIVE SUMMARY Prepared by Nathaly Agosto Filión, Resiliency Manager for the New Jersey Resiliency Network, a program

More information

Guide to Developing Risk Management Plans for Sport & Active Recreation Clubs

Guide to Developing Risk Management Plans for Sport & Active Recreation Clubs Guide to Developing Risk Management Plans for Sport & Active Recreation Clubs No single risk management model fits every organisation. Different governance and administrative structures, and varying activities

More information

GUIDE FOR DEVELOPING HIGH-QUALITY EMERGENCY OPERATIONS PLANS FOR INSTITUTIONS OF HIGHER EDUCATION

GUIDE FOR DEVELOPING HIGH-QUALITY EMERGENCY OPERATIONS PLANS FOR INSTITUTIONS OF HIGHER EDUCATION GUIDE FOR DEVELOPING HIGH-QUALITY EMERGENCY OPERATIONS PLANS FOR INSTITUTIONS OF HIGHER EDUCATION U.S. Department of Education U.S. Department of Health and Human Services U.S. Department of Homeland Security

More information

BUSINESS CONTINUITY POLICY

BUSINESS CONTINUITY POLICY BUSINESS CONTINUITY POLICY Last Review Date Approving Body n/a Audit Committee Date of Approval 9 th January 2014 Date of Implementation 1 st February 2014 Next Review Date February 2017 Review Responsibility

More information

Emergency Preparedness: Learning Objectives. Minimizing and Controlling Future Disasters. SHRM Disaster Preparedness Survey 3.

Emergency Preparedness: Learning Objectives. Minimizing and Controlling Future Disasters. SHRM Disaster Preparedness Survey 3. Emergency Preparedness: 1 Minimizing and Controlling Future Disasters October 7-8, 2013 Presenter: Marna Hayden, SPHR Hayden Resources Inc. www.haydenhr.com Learning Objectives How to develop emergency

More information

Federal Financial Institutions Examination Council FFIEC BCP. Business Continuity Planning FEBRUARY 2015 IT EXAMINATION H ANDBOOK

Federal Financial Institutions Examination Council FFIEC BCP. Business Continuity Planning FEBRUARY 2015 IT EXAMINATION H ANDBOOK Federal Financial Institutions Examination Council FFIEC Business Continuity Planning BCP FEBRUARY 2015 IT EXAMINATION H ANDBOOK Table of Contents Introduction 1 Board and Senior Management Responsibilities

More information

CONTINUITY OF OPERATIONS PLANNING

CONTINUITY OF OPERATIONS PLANNING University of North Carolina Wilmington CONTINUITY OF OPERATIONS PLANNING November 9, 2010 Lumina Theater, Fisher Student Center Development of Continuity Planning University of North Carolina Wilmington

More information

GUIDE FOR DEVELOPING HIGH-QUALITY SCHOOL EMERGENCY OPERATIONS PLANS

GUIDE FOR DEVELOPING HIGH-QUALITY SCHOOL EMERGENCY OPERATIONS PLANS GUIDE FOR DEVELOPING HIGH-QUALITY SCHOOL EMERGENCY OPERATIONS PLANS U.S. Department of Education U.S. Department of Health and Human Services U.S. Department of Homeland Security U.S. Department of Justice

More information

Business Impact Analysis (BIA) and Risk Mitigation

Business Impact Analysis (BIA) and Risk Mitigation Texas Emergency Management Conference 2015 Business Impact Analysis (BIA) and Risk Mitigation Alan Sowell, COOP Unit Supervisor Paul Morado, COOP Unit Planner BIA Implementation Process BIA Private Sector

More information

Federal Continuity Directive 1 (FCD 1)

Federal Continuity Directive 1 (FCD 1) Federal Continuity Directive 1 (FCD 1) November 6, 2007 Federal Continuity Directive 1 (FCD 1) 6, 2007 Federal Continuity Directive 1 Federal Executive Branch National Continuity Program and Requirements

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

More information

During the Clinton administration, the

During the Clinton administration, the 8 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129, PAGES 8-12, OCTOBER 2004 Assessing the Vulnerabilities of U.S. Drinking Water Systems Jeffrey J. Danneels and Ray E. Finley Sandia National Laboratories

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

GUIDE FOR DEVELOPING HIGH-QUALITY SCHOOL EMERGENCY OPERATIONS PLANS

GUIDE FOR DEVELOPING HIGH-QUALITY SCHOOL EMERGENCY OPERATIONS PLANS GUIDE FOR DEVELOPING HIGH-QUALITY SCHOOL EMERGENCY OPERATIONS PLANS U.S. Department of Education U.S. Department of Health and Human Services U.S. Department of Homeland Security U.S. Department of Justice

More information

HAZARD VULNERABILITY & RISK ASSESSMENT

HAZARD VULNERABILITY & RISK ASSESSMENT Hazard Vulnerability Analysis Purpose and Scope A Hazard Vulnerability Analysis (HVA) evaluates risk associated with a specific hazard. During this analysis, the hazard is evaluated for its probability

More information

Disaster and Pandemic Planning for Nonprofits. Continuity and Recovery Plan Template

Disaster and Pandemic Planning for Nonprofits. Continuity and Recovery Plan Template Disaster and Pandemic Planning for Nonprofits Continuity and Recovery Plan Template This publication was supported by Grant Cooperative Agreement number 5U90TP917012-08 from the U.S. Centers for Disease

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

Creating a Business Continuity Plan for your Health Center

Creating a Business Continuity Plan for your Health Center Creating a Business Continuity Plan for your Health Center 1 Page Left Intentionally Blank 2 About This Manual This tool is the result of collaboration between the Primary Care Development Corporation

More information

Relationship to National Response Plan Emergency Support Function (ESF)/Annex

Relationship to National Response Plan Emergency Support Function (ESF)/Annex RISK MANAGEMENT Capability Definition Risk Management is defined by the Government Accountability Office (GAO) as A continuous process of managing through a series of mitigating actions that permeate an

More information

Department of Homeland Security Campus Resilience Pilot Program Opportunity Overview and Proposal Instructions OVERVIEW INFORMATION

Department of Homeland Security Campus Resilience Pilot Program Opportunity Overview and Proposal Instructions OVERVIEW INFORMATION U.S. Department of Homeland Security Washington, DC 20528 Department of Homeland Security Campus Resilience Pilot Program Opportunity Overview and Proposal Instructions OVERVIEW INFORMATION Issued By U.S.

More information

NEBRASKA STATE HOMELAND SECURITY STRATEGY

NEBRASKA STATE HOMELAND SECURITY STRATEGY NEBRASKA STATE HOMELAND SECURITY STRATEGY 2014-2016 Nebraska Homeland Security Policy Group/Senior Advisory Council This document provides an overall framework for what the State of Nebraska hopes to achieve

More information

BUSINESS CONTINUITY PLANNING GUIDELINES

BUSINESS CONTINUITY PLANNING GUIDELINES BUSINESS CONTINUITY PLANNING GUIDELINES Washington University in St. Louis The purpose of this guide is to serve as a tool to all departments, divisions, and labs across the University in building a Business

More information

Rhode Island Emergency Management Agency

Rhode Island Emergency Management Agency Rhode Island Emergency Management Agency Notice of Funding Opportunity (NOFO) FY 2015 EMPG Emergency Management Performance Grant $500,000 Date Issued: April 16, 2015 Application Due: May 15, 2015 Notice

More information

Cornell University PREVENTION AND MITIGATION PLAN

Cornell University PREVENTION AND MITIGATION PLAN Cornell University PREVENTION AND MITIGATION PLAN Table of Contents Table of Contents Section 1 Prevention-Mitigation Introduction...2 Section 2 Risk Assessment...2 2.1 Risk Assessment Components...2 2.2

More information

Business Continuity and Disaster Planning

Business Continuity and Disaster Planning WHITE PAPER Business Continuity and Disaster Planning A guide to preparing for the unexpected Robert Drewniak Director, Strategic & Advisory Services Disasters are not always the result of high winds and

More information

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions

More information

Testimony of. Edward L. Yingling. On Behalf of the AMERICAN BANKERS ASSOCIATION. Before the. Subcommittee on Oversight and Investigations.

Testimony of. Edward L. Yingling. On Behalf of the AMERICAN BANKERS ASSOCIATION. Before the. Subcommittee on Oversight and Investigations. Testimony of Edward L. Yingling On Behalf of the AMERICAN BANKERS ASSOCIATION Before the Subcommittee on Oversight and Investigations Of the Committee on Financial Services United States House of Representatives

More information

Business Continuity Management

Business Continuity Management Business Continuity Management cliftonlarsonallen.com Introductions Brian Pye CliftonLarsonAllen Senior Manager Business Risk Services group 15 years of experience with Business Continuity Megan Moore

More information

ready? are you [ ] An Elected Official s Guide to Emergency Management

ready? are you [ ] An Elected Official s Guide to Emergency Management ready? are you An Elected Official s Guide to Emergency Management [ ] The emergency management system was created in the 1950s and evolved over decades through the periods of détente in the 70s to the

More information

our enterprise security Empowering business

our enterprise security Empowering business our enterprise security Empowering business Introduction Communication is changing the way we live and work. Ericsson plays a key role in this evolution, using innovation to empower people, business and

More information

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350 3000

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350 3000 DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350 3000 MCO 3030.1 POC MARINE CORPS ORDER 3030.1 From : To: Commandant of the Marine Corps Distribution

More information

2010 Update to the State of Montana Multi-Hazard Mitigation Plan and Statewide Hazard Assessment 4.0 RISK ASSESSMENT

2010 Update to the State of Montana Multi-Hazard Mitigation Plan and Statewide Hazard Assessment 4.0 RISK ASSESSMENT 4.0 RISK ASSESSMENT The Risk Assessment portion of this document provides a detailed description of the hazards in Montana, an assessment of the State s vulnerability to those hazards, and a basis for

More information

TO AN EFFECTIVE BUSINESS CONTINUITY PLAN

TO AN EFFECTIVE BUSINESS CONTINUITY PLAN 5 STEPS TO AN EFFECTIVE BUSINESS CONTINUITY PLAN Introduction The Snowpocalypse of 2015 brought one winter storm after another, paralyzing the eastern half of the United States. It knocked out power for

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

Homeland Security Plan for Iowa State University Extension Field Offices

Homeland Security Plan for Iowa State University Extension Field Offices Homeland Security Plan for Iowa State University Extension Field Offices Homeland security covers natural disaster events such as a flood, drought, or winter storm, as well as terrorist events from a physical,

More information

Page Administrative Summary...3 Introduction Comprehensive Approach Conclusion

Page Administrative Summary...3 Introduction Comprehensive Approach Conclusion TABLE OF CONTENTS Page Administrative Summary...3 Introduction Comprehensive Approach Conclusion PART 1: PLANNING General Considerations and Planning Guidelines... 4 Policy Group Oversight Committee Extended

More information

Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach

Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach Executing a Critical Infrastructure Risk Management Approach Risk is defined as the potential for an unwanted outcome resulting

More information

Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper

Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper Success or Failure? Your Keys to Business Continuity Planning An Ingenuity Whitepaper May 2006 Overview With the level of uncertainty in our world regarding events that can disrupt the operation of an

More information

National Infrastructure Protection Center

National Infrastructure Protection Center National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities

More information

Managing business risk

Managing business risk Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success

More information

NCUA LETTER TO CREDIT UNIONS

NCUA LETTER TO CREDIT UNIONS NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: August 2001 LETTER NO.: 01-CU-11 TO: SUBJ: ENCL: Federally Insured Credit Unions Electronic Data

More information

Guide for Developing High- Quality Emergency Operations Plans for Houses of Worship

Guide for Developing High- Quality Emergency Operations Plans for Houses of Worship Guide for Developing High- Quality Emergency Operations Plans for Houses of Worship June 2013 Table of Contents Introduction and Purpose... 1 Planning Principles... 3 The Planning Process... 4 Step 1:

More information

Insurance management policy and guidelines. for general government sector, September 2007

Insurance management policy and guidelines. for general government sector, September 2007 Insurance management policy and guidelines for general government sector September 2007 i Contents 1. Introduction... 2 2. Identifying risk is the first step... 2 3. What is risk?... 2 4. Insurance is

More information

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE 1 CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE Gavin McLintock P.Eng. CISSP PCIP 2 METCALFE POWER STATION 16 April 2013 Sophisticated physical attack 27 Days outage $15.4 million

More information

Oregon Pre-Disaster Mitigation Program Plan Update Training Manual

Oregon Pre-Disaster Mitigation Program Plan Update Training Manual FEMA Oregon Pre-Disaster Mitigation Program Plan Update Training Manual Prepared by: Oregon Partnership for Disaster Resilience OPDR FEMA OPDR FEMA OPDR 2010, University of Oregon s Community Service Center

More information

Essential Building Blocks of a Comprehensive Emergency Management Program. April 28, 2015

Essential Building Blocks of a Comprehensive Emergency Management Program. April 28, 2015 Essential Building Blocks of a Comprehensive Emergency Management Program April 28, 2015 Objectives 1. Overview of Planning Process and Requirements 2. Components of a comprehensive Emergency Management

More information

Disaster Preparedness & Response

Disaster Preparedness & Response 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 A B C E INTRODUCTION AND PURPOSE REVIEW ELEMENTS ABBREVIATIONS NCUA REFERENCES EXTERNAL REFERENCES Planning - Ensuring

More information

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Roberta Stempfley Acting Assistant Secretary for Cybersecurity and Communications

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

Technology Infrastructure Services

Technology Infrastructure Services LOB #303: DISASTER RECOVERY Technology Infrastructure Services Purpose Disaster Recovery (DR) for IT is a capability to restore enterprise-wide technology infrastructure, applications and data that are

More information

Texas Department of Public Safety Texas Division of Emergency Management. Local Emergency Management Planning Guide. TDEM-10 Revision 4

Texas Department of Public Safety Texas Division of Emergency Management. Local Emergency Management Planning Guide. TDEM-10 Revision 4 Texas Department of Public Safety Texas Division of Emergency Management Local Emergency Management Planning Guide TDEM-10 Revision 4 January 2008 FOR ADDITIONAL INFORMATION Requests for additional copies

More information

SALVE REGINA UNIVERSITY. Emergency. Office of Safety & Security

SALVE REGINA UNIVERSITY. Emergency. Office of Safety & Security SALVE REGINA UNIVERSITY Emergency Response Plan Office of Safety & Security Original: October 2000 Updated & Revised: February 2006 Updated & Revised: March 2010 Table of Contents Section I: Overview

More information

Overview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements

Overview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements Overview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements Jim Weldin Delaware League of Local Governments 1 Homeland Security Grant Funding

More information

Business continuity plan

Business continuity plan Business continuity plan CONTENTS INTRODUCTION 2 - Scope - Components BUSINESS IMPACT ANALYSIS 3 - Business Affairs - Information Technology RISK ASSESSMENT 5 - Broad Categories of Hazards - Hazard Table

More information

Assessment of natural hazards, man made hazards, technical and societal related risks and associated impact.

Assessment of natural hazards, man made hazards, technical and societal related risks and associated impact. Aon Business Continuity Planning The Aon Business Continuity Planning practice provides consulting services that allow Aon clients to measure and manage their strategic and tactical risks through Crisis

More information

Risk Assessment Annex September 2011, Zoo Animal Health Network www.zooanimalhealthnetwork.org

Risk Assessment Annex September 2011, Zoo Animal Health Network www.zooanimalhealthnetwork.org September 2011, Zoo Animal Health Network www.zooanimalhealthnetwork.org This Annex provides the Facility Contingency Planners (FCP) guidance for conducting a risk assessment of the facility. A thorough

More information

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information

More information

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information

ICS for LAUSD EOC and DOC Operation

ICS for LAUSD EOC and DOC Operation ICS for LAUSD EOC and DOC Operation Below is some background information on the Incident Command System (used at our schools and in other field operations) and how it applies in an EOC environment. From

More information

MEMA Strategic Plan 2012-2016

MEMA Strategic Plan 2012-2016 MEMA Strategic Plan 2012-2016 A Prepared Marylander Creates a Resilient Maryland March 2013 A CENTER FOR PREPAREDNESS EXCELLENCE Message from the Director I am pleased to present the (MEMA) Strategic Plan.

More information

Conference Proceedings

Conference Proceedings Evaluating Risk The HIRA Approach Presented by Wilderness Matt Risk Cruchet Management Direct Bearing Incorporated Oct 27-29, 2006 Conference Workshop Presentation Killington Vermont, USA Risk-based Management

More information

Table of Contents. Acknowledgments. developed by the Critical Infrastructure Partnership. Acknowledgements...1

Table of Contents. Acknowledgments. developed by the Critical Infrastructure Partnership. Acknowledgements...1 Table of Contents Acknowledgements...1 Top Priorities...3 Implementation...7 Appendix A. Roadmapping Process...9 Appendix B. Summary of Water Sector. Risks & CIPAC Priorities...11 Acknowledgments The Roadmap

More information

The Strategic National Risk Assessment in Support of PPD 8: A Comprehensive Risk-Based Approach toward a Secure and Resilient Nation

The Strategic National Risk Assessment in Support of PPD 8: A Comprehensive Risk-Based Approach toward a Secure and Resilient Nation The Strategic National Risk Assessment in Support of PPD 8: A Comprehensive Risk-Based Approach toward a Secure and Resilient Nation Overview The Strategic National Risk Assessment (SNRA) was executed

More information