Methods for Assessing Vulnerability of Critical Infrastructure
|
|
|
- Lydia Martin
- 10 years ago
- Views:
Transcription
1 March 2010 Methods for Assessing Vulnerability of Critical Infrastructure Project Leads Eric Solano, PhD, PE, RTI International Statement of Problem Several events in the recent past, including the attacks of 9/11 and Hurricane Katrina, revealed the lack of plans to protect infrastructure from destructive threats and prompted the need to work on preparedness, response, and recovery plans related to infrastructure safety. To work on preparedness, response, and recovery plans, given the scarce resources available, it is necessary to select infrastructures for protection and decide how they will be protected against potential threats. To accomplish these goals, policymakers will benefit from data and information derived from risk, vulnerability, and resilience assessments and scenario simulations. Vulnerability and resilience are related to risk in that reducing vulnerability will reduce risk and increasing resilience may reduce the consequences of a disaster. The research question that motivates this brief is whether an inclusive approach that incorporates physical, social, organizational, economic, and environmental variables in addition to empirical measurements and operationalization of resilience and vulnerability will help to improve the understanding and management of risk associated with threats to complex infrastructure systems. 1
2 This brief reviews recent literature in vulnerability and resilience assessment, summarizes the most important findings, and suggests future directions to advance the field of vulnerability and resilience research. Background An objective of the Department of Homeland Security s Human Factors and Behavioral Sciences Division is to Enhance preparedness and mitigate impacts of catastrophic events by delivering capabilities that incorporate social, psychological and economic aspects of societal resilience. Infrastructure vulnerability and resilience are intricately related with community resilience. Research conducted to enhance methodologies and practical measurements of vulnerability and resilience must try to include (in addition to the physical dimension) the social, organizational, economic, and natural environment dimensions. Cutter et al. (2008) mention important gaps in the research field of vulnerability. There is still progress to make in the identification of standards and metrics for measuring disaster resilience; in the advancement of a theoretical framework and practical applications of vulnerability; in the articulation of the relationship between vulnerability, resilience, and adaptive capacity; and in the explanation of the causal structure of vulnerability. It is not obvious what leads to resilience within coupled human-physical-environment systems or what variables should be utilized to measure it. There have been few attempts to combine all factors that contribute to vulnerability. Conceptual models for hazard vulnerability fail to address the coupled human-environment system associated with the proximity to a hazard, and they fail to include a temporal dimension that shows where vulnerability begins and ends. Advancing the field of vulnerability and resilience assessment will also have important policy implications. Arboleda, Abraham, Richard, and Lubitz (2009) indicate that after the disaster event, infrastructure managers must prioritize the allocation of restoration resources to meet the demand at critical facilities. Baker (2008) helps develop an investment strategy to improve system resilience. His method provides a snapshot of system conditions as a baseline for future improvements. Egan (2007) highlights that large technical systems create challenges for policymakers in the form of negative externalities, the risks of failure and disasters, and problems with management, control, and coordination. He argues that an effective policy would be to establish liability rules based on the notion that organizations should internalize the costs of the risks they produce and that by internalizing them, they will make wiser choices about the technologies they use. This brief summarizes the most important findings about vulnerability and resilience assessment from a few reviewed papers. 2
3 The methodologies reviewed, in general, fail to incorporate the social and organizational components into the analysis of physical infrastructures. This is arguably the most important deficiency found in the current methodological and empirical practices to measure vulnerability and resilience. The interdependencies among physical and human components in infrastructure seem to be very strong and complex. Bea (2009) argues that no matter how much physical science and technology are involved in a complex system; no system is ever solely physical or technical. Their investigative report of a failed offshore oil and gas drilling and production platform in the North Sea noted that the majority of the causes of this failure (80% or more) were firmly rooted in human, organizational, and institutional malfunctions. The remaining causes could reasonably be attributed to malfunctions in the engineered parts of this complex system. Human factors, such as decision making related to infrastructures operations and maintenance, are considered in just some of the reviewed papers (Baker, 2008; Hellstrom, 2007; Egan, 2007). From a methodological point of view, most methods propose mathematical modeling through network theory (Lewis, 2006; Arboleda et al., 2009; Ouyang, Hong, Maoa, Yuia, and Qi, 2009; Eusgeld, Kroger, Sansavini, Schläpfer, & Zio 2009). Graphs are implemented to represent the infrastructures topology and their interdependencies. In addition to network theory, Lewis (2006) uses principles of logic, probability, and cost minimization. Others propose the elicitation of expert judgment (Parks & Rogers, 2009; Ezell, 2007; Egan, 2007; Cooke & Goossens, 2004) and qualitative assessments (Baker, 2008; EPA, 2002; Haimes & Longstaff, 2002). Table 1 summarizes some important features of these selected publications and shows the heterogeneity across these methodologies. Most methods use linear optimization to solve for minimum-cost scenarios and do not include more extensive nonlinear capabilities. Some authors mention analysis of uncertain values for model parameters (Ezell, 2007; Cooke & Goossens, 2004; Lewis, 2006). The importance of assessing and protecting cyberspace is a key aspect in some methods (Baker, 2008; Parks & Rogers, 2009; Hellstrom, 2007; Haimes & Longstaff, 2002; Egan, 2007). Some authors discuss the use of Supervisory Control and Data Acquisition (SCADA) as a control system for critical infrastructures (Baker, 2008; EPA, 2002; Haimes & Longstaff, 2002; Lewis, 2006). The reviewed methodologies are further analyzed and compared using a number of characteristics. Table 2 shows a matrix with values assigned for each characteristic across all reviewed methods. This brief uses a qualitative method to evaluate each characteristic by the level of detail (high, medium, or low) in which it was described. 3
4 Table 1. Evaluated Properties Across Reviewed Publications Reference Mathematical modeling x x x x x x Linear programming x x x x Network theory x x x x Nonlinearity x x x x Human factors x x x Cyberspace x x x x x Static x x x Dynamic x x x Uncertainty x x x Spatial distribution x Expert judgment x x x x x Interdependencies x x x x x x x x Environment x Agent-based x Simulation x x x x Qualitative x x x x x Quantitative x x x x x Definition: vulnerability x x x x x Definition: criticality x x x x x x x x Definition: risk x x x x Definition: complexity x x x x SCADA x x x x Table 2. Evaluated Dimensions Across Reviewed Publications Reference Scope L M H H M M L M M H M H System characterization M H H H H M H Process definition H L H H M H H M H H M H Commonality M L L L L M Extensibility L M L L L L L L Scalability M L M L Comprehensiveness L L L M Strategic and policy implications M M H M L L M M H H Results M M H L L M M L H M Level of detail: H = high, M = medium, L = low. 4
5 An important aspect of these methodologies is system definition and characterization. Lewis (2006) provides a high level of detail to characterize the systems through networks. Networks can be scale-free networks (nonrandom networks around critical nodes) or smallworld networks (around clusters of noncritical nodes). Arboleda et al. (2009) define a graph with demand, trans-shipment, and supply nodes; because some of the nodes are part of two or more infrastructure networks, the connections between the different infrastructure systems create interdependencies. Ouyang et al. (2009) define a graph for the electrical network and for a gas pipeline system. Another important characteristic of these methods is process definition. Lewis (2006) defines the Model-Based Vulnerability Analysis (MBVA) based on principles of logic, probability, and cost minimization. The MBVA process includes a list of assets, a network analysis, a model using fault-tree method, and analysis of the fault tree using an event tree. Given threat probabilities, the objective of this method is to enumerate all possible event combinations and to compute the probability for the infrastructure to fail under each event scenario. Arboleda et al. (2009) include the analysis of external infrastructure systems through optimization techniques (facility operations, post-disaster condition, and restoration) and analysis of internal capabilities through systems dynamics (flow of people). Once the system has been defined in a graph, Ouyang et al. (2009) run optimization models for assessing the functional vulnerability of the electric power and gas pipeline systems. Another important characteristic analyzed was the set of results generated by these methods. Baker (2008) provides a summary of the assessment results for each missioncritical system in the facility. Arboleda et al. (2009) provide results from the proposed models. The basic model results are the flows of commodities that minimize the cost of the operation. The results of a second model consist of a quantification of the supply reduction due to a disaster event. The third model results are the restoration strategies that minimize a weighted sum of the operational cost of the infrastructure systems. Additional characteristics analyzed for these methods include commonality, extensibility, scalability, and comprehensiveness. Examples for each of these characteristics follow. The U.S. Environmental Protection Agency (2002) indicates in its vulnerability assessment factsheet that single points of failure could be common to many facilities. Ouyang et al. (2009) indicate that their method can be extended by adding more complex interdependencies between two infrastructures. Eusgeld et al. (2009) indicate that for the model scenarios to be scaled up, the main issues to overcome are the slow simulation speed and the large number of parameters to be input into the model. Baker (2008) argues that his method is comprehensive, since assessed threats could be both cyber and physical attacks/sabotage and hazards can be natural disasters or normal accidents. Tables 1 and 2 show a range of characteristics and dimensions evaluated across a number of proposed methods to assess vulnerability of critical infrastructures. It is evident from these preliminary evaluations that most methods, if not all of them, are still in their early 5
6 development stages and still lack important properties toward qualifying as more robust tools with realistic representations of complex systems. Synthesis A dozen methodologies to assess vulnerabilities of critical infrastructures were reviewed and evaluated across a number of characteristics. Tables 1 and 2 show that although some of these methodologies show a considerable amount of development for one or two characteristics, they lack the necessary detail in other areas to make them more realistic methods, specifically because they fail to incorporate additional analytical dimensions (i.e., social, organizational, environmental, and economic dimensions). The modeling technologies are also limited to the capabilities of network theory to represent infrastructure topologies. Many of these methods are not appropriate to answer the following research question: Can a holistic, multi-disciplinary, multi-dimensional framework, in addition to methodological and empirical improvements to measure vulnerability and resilience, help to better understand and manage the risks of infrastructures under threats? Future Directions Future work in this area must be motivated by the intellectual quest highlighted above. The inclusion of social, organizational, and environmental variables in addition to the engineering definitions for resilience and vulnerability will help generate more realistic representations of complex infrastructure systems. Mathematical modeling will remain a very important tool for future development in this area although it is important to explore different technologies in conjunction to graph/network theory to overcome many of the limitations related to network topologies. The use of geographic information systems (GIS) could also bring a lot of benefits by representing infrastructures and their interrelationships through more realistic geographic topologies. In addition to better topological representations, future work should also explore using more simulation technologies to incorporate uncertainty analyses. Simulations of human interactions with infrastructures also need to be enhanced. The addition of these technologies will bring more accurate representations of the reality, but will also increase the computational requirements. High performance computing solutions are recommended to be able to more efficiently scale up the representations of problems related to critical infrastructures. 6
7 Contact Information Eric Solano RTI International 3040 Cornwallis Road Research Triangle Park, NC Eric Solano, PhD, PE, is a research engineer/analyst with RTI, where he applies his training as a civil and environmental engineer and his experience with multiple information technology tools to design and develop engineering solutions and to develop computer-based tools for a variety of engineering projects. His primary area of expertise is systems analysis and modeling for environmental and civil engineering. More recently, he has been involved with the use of high-performance computing tools in simulations, modeling, and programming. He develops and analyzes engineering systems that require modeling and uses technologies such as linear programming optimization and decision-support systems. Other technologies included in his interests are genetic algorithms, neural networks, nonlinear optimization, and stochastic optimization. Dr. Solano has a PhD in civil engineering from North Carolina State University and is a registered professional engineer in the state of North Carolina. References Arboleda, C. A., Abraham, D. M., Richard, J. P., & Lubitz, R. (2009). Vulnerability assessment of health care facilities during disaster events. Journal of Infrastructure Systems, 15(3), Baker, G. H. (2005, April). A vulnerability assessment methodology for critical infrastructure sites. Department of Homeland Security symposium: R&D partnerships in homeland security. Boston, Massachusetts. Retrieved from Bea, R., Mitroff, I., Farber, D., Foster, H., & Roberts, K. H. (2009). A new approach to risk: The implications of E3. Risk Management, 11, doi: /rm Cooke, R. M., & Goossens, L. H. J. (2004). Expert judgment elicitation for risk assessments of critical infrastructures. Journal of Risk Research, 7(6), Cutter, S. L., Barnes, L., Berry, M., Burton, C., Evans, E., Tate, E., & Webb, J. (2008). A place-based model for understanding community resilience to natural disasters. Global Environmental Change, 18(4),
8 Egan, M. J. (2007, March). Anticipating future vulnerability: Defining characteristics of increasingly critical infrastructure-like systems. Journal of Contingencies and Crisis Management, 15(1), doi: /j x Eusgeld, I., Kroger, W., Sansavini, G., Schläpfer, M., & Zio, E. (2009). The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures. Reliability Engineering & System Safety, 94(5), Ezell, B. C. (2007). Infrastructure Vulnerability Assessment Model (I-VAM). Risk Analysis, 27(3), Haimes, Y. Y., & Longstaff, T. (2002). The role of risk analysis in the protection of critical infrastructures against terrorism. Risk Analysis, 22(3), Hellstrom, T. (2007). Critical infrastructure and systemic vulnerability: Towards a planning framework. Safety Science, 45(3), Lewis, T. (2006). Critical infrastructure protection in homeland security: Defending a networked nation. John Wiley and Sons, Inc. Ouyang, M., Hong, L., Maoa, Z., Yua, M., & Qi, F. (2009). A methodological approach to analyze vulnerability of interdependent infrastructures. Simulation Modelling Practice and Theory, 17(5), Parks, R. C., & Rogers, E. (2008). Vulnerability assessment for critical infrastructure control systems. IEEE Security & Privacy, 6(6), United States Environmental Protection Agency. (2002, November). Vulnerability assessment factsheet. Office of Water (4601M); EPA 816-F Retrieved from 8
How To Write A Book On Risk Management
National Center for Risk and Economic Analysis of Terrorism Events CREATE FY2015 (Year 11) Call for White Papers CREATE, the DHS-sponsored Center of Excellence at the University of Southern California,
Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach
Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach Executing a Critical Infrastructure Risk Management Approach Risk is defined as the potential for an unwanted outcome resulting
Infrastructure Interdependencies
Infrastructure Interdependencies Terrence K. (Terry) Kelly, Ph.D. Senior National Security Officer White House Office of Science and Technology Policy based in part on an article to appear in IEEE Control
Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com
Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests
Opportunities to Overcome Key Challenges
The Electricity Transmission System Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia
Temple university. Auditing a business continuity management BCM. November, 2015
Temple university Auditing a business continuity management BCM November, 2015 Auditing BCM Agenda 1. Introduction 2. Definitions 3. Standards 4. BCM key elements IT Governance class - IT audit program
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices
A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards
UNLV Programs in Crisis and Emergency Management FALL, 2016 Admissions Information
UNLV Programs in Crisis and Emergency Management FALL, 2016 Admissions Information Overview As a result of recent national, state, and local experiences such as September 11, 2001, and Hurricanes Katrina
AN EVALUATION OF THE UPSTREAM CRUDE OIL INDUSTRY SUPPLY CHAIN RISK
AN EVALUATION OF THE UPSTREAM CRUDE OIL INDUSTRY SUPPLY CHAIN RISK AN EVALUATION OF THE UPSTREAM CRUDE OIL INDUSTRY SUPPLY CHAIN RISK : LEVERAGING ANALYTIC HIERARCHY PROCESS Charles Awoala Briggs Upper
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Business Continuity Position Description
Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary
Threat and Hazard Identification and Risk Assessment
Threat and Hazard Identification and Risk Assessment Background/Overview and Process Briefing Homeland Security Preparedness Technical Assistance Program May 2012 PPD-8 Background A linking together of
The Geospatial Dimensions of Critical Infrastructure and Emergency Response. White Paper Series. No. 1 - Infrastructure Interdependencies
The Geospatial Dimensions of Critical Infrastructure and Emergency Response White Paper Series No. 1 - Infrastructure Interdependencies Infrastructure Interdependencies 1 November 2008 INTRODUCTION In
Business Continuity Planning for Risk Reduction
Business Continuity Planning for Risk Reduction Ion PLUMB [email protected] Andreea ZAMFIR [email protected] Delia TUDOR [email protected] Faculty of Management Academy of Economic Studies
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
Assessment of Interdependent Lifeline Networks Performance in Earthquake Disaster Management
Performance in Earthquake Disaster Management Hüseyin Can Ünen Istanbul Technical University, Turkey [email protected] Muhammed Şahin Istanbul Technical University, Turkey [email protected] Amr S. Elnashai
On the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV [email protected] @ratchevv DCAF/CSDM 1 This presentation
The Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014
The Geospatial Approach to Cybersecurity: An Executive Overview An Esri White Paper January 2014 Copyright 2014 Esri All rights reserved. Printed in the United States of America. The information contained
INFRASTRUCTURE MANAGEMENT AND SECURITY AREA OF STUDY Zachry Department of Civil Engineering Texas A&M University
INFRASTRUCTURE MANAGEMENT AND SECURITY AREA OF STUDY Zachry Department of Civil Engineering Texas A&M University INTRODUCTION Large-scale, distributed infrastructure systems such as communications, power,
Risk Management Fundamentals
Risk Management Fundamentals Homeland Security Risk Management Doctrine April 2011 LETTER FROM THE UNDER SECRETARY NATIONAL PROTECTION AND PROGRAMS DIRECTORATE In May 2010, the Secretary of Homeland Security
BUSINESS CONTINUITY PLANNING
Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,
WMD Terrorism Risk Assessment in the Department of Homeland Security. Why Risk Assessment? Probabilistic Risk Assessment
WMD Terrorism Risk Assessment in the Department of Homeland Security Why Risk Assessment? Joint U.S. EPA and DHS Conference On Real-World Applications and Solutions for Microbial Risk Assessment Steve
PROJECT RISK MANAGEMENT
PROJECT RISK MANAGEMENT http://www.tutorialspoint.com/pmp-exams/project_risk_management.htm Copyright tutorialspoint.com Here is a list of sample questions which would help you to understand the pattern
A New Paradigm in Urban Road Network Seismic Vulnerability: From a Link-by-link Structural Approach to an Integrated Functional Assessment
A New Paradigm in Urban Road Network Seismic Vulnerability: From a Link-by-link Structural Approach to an Integrated Functional Assessment Gonçalo Caiado [email protected] Rosário Macário [email protected]
Audit of the Disaster Recovery Plan
Audit of the Disaster Recovery Plan Report # 11-05 Prepared by Office of Inspector General J. Timothy Beirnes, CPA, Inspector General Kit Robbins, CISA, CISM, CRISC, Lead Information Systems Auditor TABLE
Federal Financial Institutions Examination Council FFIEC BCP. Business Continuity Planning FEBRUARY 2015 IT EXAMINATION H ANDBOOK
Federal Financial Institutions Examination Council FFIEC Business Continuity Planning BCP FEBRUARY 2015 IT EXAMINATION H ANDBOOK Table of Contents Introduction 1 Board and Senior Management Responsibilities
FlyntGroup.com. Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk
Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk 2012 The Flynt Group, Inc., All Rights Reserved FlyntGroup.com Enterprise Risk Management and Business
Disaster Recovery and Business Continuity Plan
Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix
Disaster Risk Assessment:
Disaster Risk Assessment: Disaster Risk Modeling Dr. Jianping Yan Disaster Risk Assessment Specialist Session Outline Overview of Risk Modeling For insurance For public policy Conceptual Model Modeling
v. 03/03/2015 Page ii
The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
Increasing Energy Reliability & Resiliency NGA Policy Institute for Governors' Energy Advisors Denver Colorado, September 11, 2013
+ Increasing Energy Reliability & Resiliency NGA Policy Institute for Governors' Energy Advisors Denver Colorado, September 11, 2013 Jeffrey R. Pillon, Director, Energy Assurance Programs National Association
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing
MASTER EXTREME RISK MANAGEMENT TOOL IN AVIATION SECURITY SYSTEMS
Review of the Air Force Academy No 2 (26) 2014 MASTER EXTREME RISK MANAGEMENT TOOL IN AVIATION SECURITY SYSTEMS Cătălin CIOACĂ Henri Coandă Air Force Academy, Brasov, Romania Abstract: The research is
Cybersecurity Converged Resilience :
Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the
Business Continuity & Disaster Recovery
Business Continuity & Disaster Recovery Safety First Quality Every Time 1 Business Continuity & Disaster Recovery Planning Who here has a formal Business Continuity & Disaster Recovery plan? The purpose
Performs the Federal coordination role for supporting the energy requirements associated with National Special Security Events.
ESF Coordinator: Energy Primary Agency: Energy Support Agencies: Agriculture Commerce Defense Homeland Security the Interior Labor State Transportation Environmental Protection Agency Nuclear Regulatory
Infrastructure Protection Gateway
Infrastructure Protection Gateway Our Nation s critical infrastructure is essential to sustaining our security, the economy, and the American way of life. The Department of Homeland Security (DHS), National
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Homeland Security Presidential Directive/HSPD-9 Subject: Defense of United States Agriculture and Food January 30, 2004
For Immediate Release Office of the Press Secretary February 3, 2004 Homeland Security Presidential Directive/HSPD-9 Subject: Defense of United States Agriculture and Food January 30, 2004 Purpose (1)
Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Business Continuity Management
Business Continuity Management Factsheet To prepare for change, change the way you prepare In an intensely competitive environment, a permanent market presence is essential in order to satisfy customers
Why Should Companies Take a Closer Look at Business Continuity Planning?
whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters
CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool
INL/CON-07-12810 PREPRINT CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool ISA Expo 2007 Kathleen A. Lee January 2008 This is a preprint of a paper intended for publication in a journal
Integrated System Modeling for Handling Big Data in Electric Utility Systems
Integrated System Modeling for Handling Big Data in Electric Utility Systems Stephanie Hamilton Brookhaven National Laboratory Robert Broadwater EDD [email protected] 1 Finding Good Solutions for the Hard
Business Continuity Planning 101. +1 610 768-4120 (800) 634-2016 www.strohlsystems.com [email protected]
Business Continuity Planning 101 Presentation Overview What is business continuity planning Plan Development Plan Testing Plan Maintenance Future advancements in BCP Question & Answer What is a Disaster?
Chapter 1: An Overview of Emergency Preparedness and Business Continuity
Chapter 1: An Overview of Emergency Preparedness and Business Continuity After completing this chapter, students will be able to: Describe organization and facility stakeholder needs during and after emergencies.
Federal Financial Institutions Examination Council FFIEC. Business Continuity Planning BCP MARCH 2003 MARCH 2008 IT EXAMINATION
Federal Financial Institutions Examination Council FFIEC Business Continuity Planning MARCH 2003 MARCH 2008 BCP IT EXAMINATION H ANDBOOK TABLE OF CONTENTS INTRODUCTION... 1 BOARD AND SENIOR MANAGEMENT
New Era in Cyber Security. Technology Development
New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security
School of Public Health. Academic Certificate Student Handbook 2012-2013
School of Public Health Academic Certificate Student Handbook 2012-2013 Revised August 2012 Page 2 TABLE OF CONTENTS ACADEMIC CERTIFICATE PROGRAM OVERVIEW... 3 BASIC COMMUNITY PUBLIC HEALTH PRACTICE...
Towards a New Paradigm for Management of Complex Engineering Projects: A System-of-Systems Framework
2015 System of Systems Engineering Collaborators Information Exchange (SoSECIE) Towards a New Paradigm for Management of Complex Engineering Projects: A System-of-Systems Framework Jin Zhu PhD Candidate
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Project Management. [Student s Name] [Name of Institution]
1 Paper: Assignment Style: Harvard Pages: 10 Sources: 7 Level: Master Project Management [Student s Name] [Name of Institution] 2 Project Management Introduction The project management also known as management
A Framework for Post-Disaster Facility Restoration Management: Needs and Requirements for the Use of Hybrid Simulation
1269 A Framework for Post-Disaster Facility Restoration Management: Needs and Requirements for the Use of Hybrid Simulation Moonseo PARK 1 ; SangHyun LEE 2 ; Hyun-Soo LEE 3 ; Minji CHOI 4 ; Sungjoo HWANG
www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014
www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 Agenda Key Definitions Risks Business Continuity Management Program BCM Capability Assessment Process BCM Value Proposition
ANALYTICS STRATEGY: creating a roadmap for success
ANALYTICS STRATEGY: creating a roadmap for success Companies in the capital and commodity markets are looking at analytics for opportunities to improve revenue and cost savings. Yet, many firms are struggling
Financial Architecture and Banking Systems
Financial Architecture and Banking Systems Financial and Private Sector Development Financial Systems Practice The World Bank Group Our Mission The Financial Architecture and Banking Systems Service Line
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
2015 CEO & Board University Taking Your Business Continuity Plan To The Next Level. Tracy L. Hall, MBCP
2015 CEO & Board University Taking Your Business Continuity Plan To The Next Level Tracy L. Hall, MBCP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C.
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
Chapter 5. Warehousing, Data Acquisition, Data. Visualization
Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization 5-1 Learning Objectives
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM Don Dickinson Phoenix Contact USA P.O. Box 4100 Harrisburg, PA 17111 ABSTRACT Presidential Executive Order 13636 Improving
Beyond disaster recovery: becoming a resilient business.
IBM Global Services October 2005 Beyond disaster recovery: becoming a resilient business. An object-oriented framework and methodology by Richard Cocchiara Chief technology officer for business resilience
How Complex Systems Fail
How Complex Systems Fail (Being a Short Treatise on the Nature of Failure; How Failure is Evaluated; How Failure is Attributed to Proximate Cause; and the Resulting New Understanding of Patient Safety)
Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION
1 Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION Background 2 Technology has become the central component of business operations Businesses have become more vulnerable to risks associated
Desktop Scenario Self Assessment Exercise Page 1
Page 1 Neil Jarvis Head of IT Security & IT Risk DHL Page 2 From reputation to data loss - how important is business continuity? Neil Jarvis Head of IT Security (EMEA) DHL Logistics IT Security Taking
Big Data Engineer Position Description
Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...
Risk Management approach for Cultural Heritage Projects Based on Project Management Body of Knowledge
1 Extreme Heritage, 2007 Australia, 19-21 July 2007, James Cook University, Cairns, Australia Theme 6: Heritage disasters and risk preparedness approach for Cultural Heritage Projects Based on Project
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
Security Vulnerability Assessment
Security Vulnerability Assessment Deter, Detect, Delay, Respond the elements for minimizing your operational risk. A detailed SVA assists you to understand how best to do so. Security Vulnerability Assessment
With the large number of. How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning. Virginia A. Jones, CRM, FAI RIM FUNDAMENTALS
How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning The world has experienced a great deal of natural and man-made upheaval and destruction in the past few years, including tornadoes,
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
Islamic Republic of Afghanistan, Post Disaster Need Assessment (PDNA) Training Manual
Islamic Republic of Afghanistan, Ministry of Rural Rehabilitation and Development (MRRD) Ministry of Rural Rehabilitation & Development Post Disaster Need Assessment (PDNA) Training Manual Social Protection
Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
Cybersecurity Risk Assessment in Smart Grids
Cybersecurity Risk Assessment in Smart Grids Lucie Langer, Paul Smith, Thomas Hecht [email protected] AIT Austrian Institute of Technology ComForEn Symposium 2014 Sept 30, 2014 1 Risk Assessment:
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic
NASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
Electric Energy Systems
Electric Energy Systems Electric Energy Systems seeks to explore methods at the frontier of understanding of the future electric power and energy systems worldwide. The track will focus on the electric
Comprehensive Emergency Management Education 604.528.5800 1.877.528.5591
Bachelor of Emergency & Security Management Studies prepare yourself and your team with the most accessible, customizable emergency management training from Canada s Leading Public Safety Educator Comprehensive
