The Importance of Information Technology (IT) for Transportation Security
|
|
|
- Leo Todd
- 9 years ago
- Views:
Transcription
1 The Importance of Information Technology (IT) for Transportation Security John C. Falcocchio and Rae Zimmerman WISSP10, Abu Dhabi, October 4, 2010 This presentation is for use at WISSP10, and not for further distribution or electronic posting without the permission of authors.
2 Presentation Outline I. A Brief Overview of the Transportation System II. IT and Transportation III. IT and Transportation Security IV. Conclusions V. Policy Recommendations VI. Recommended Research Directions
3 I. Brief Overview of the Transportation System Four Core Components: Physical Infrastructure Vehicles Operators / Operations Customers
4 Interfaces of Transportation System Components Operators Physical Infrastructure and Vehicles Customers
5 II. IT and Transportation IT has made these interfaces more efficient by leading to the creation of an: Intelligent Infrastructure and Intelligent Vehicles
6 Intelligent Infrastructure Services for Highways Arterial Management Freeway Management Crash Prevention and Safety Road Weather Management Roadway Operations and Management (lighting, signaling; maintenance) Traffic Incident Management Emergency Management Electronic Payment and Pricing Traveler Information Information Management Commercial Vehicles Intermodal Freight Reference:
7 How IT Interfaces with Highways: These services are enabled by traffic surveillance and detection techniques, such as sensors, or cameras monitoring traffic flow The surveillance and detection techniques used to monitor traffic flow in support of ITS applications can also be used to monitor key transportation facilities for security purposes
8 Intelligent Infrastructure Services Include: for Transit Operations and Fleet Management Information Dissemination Transportation Demand Management Safety and Security
9 How IT Interfaces with Transit These services are enabled by automated vehicle location (AVL) systems, computeraided dispatch (CAD) systems, computerized control of heating, ventilating and air conditioning (HVAC) systems, and remote vehicle and facility surveillance cameras Transit management centers can monitor in-vehicle and in-terminal surveillance systems to improve service and improve the safety and security of passengers and operators
10 Intelligent Vehicles Services Accident Prevention/Avoidance Collision Avoidance Collision Notification Driver Assistance Security - Intrusion detection - Monitoring of incidents - Dissemination of warning messages - Deployment of security personnel
11 III. IT and Transportation Security In avoiding, mitigating or coping with security breaches Highways Transit
12 Highways New York City, September 11, 2001: Updated all VMS signs to Avoid Lower Manhattan message Shared video feeds with NYPD Monitored highways and streets for emergency access Implemented outbound traffic signal patterns
13 Example: Advanced Traveler Information
14 Transit New York City, September 11, 2001: Communication averted adverse consequences such as deaths in trains in the area at the time of the attack by allowing train operators time to roll back trains or not have them start on what would have been a perilous journey (U.S. DOT, Volpe Center): Within a minute of the first plane hitting the north tower a train operator alerted the control center of MTA of an explosion and emergency procedures begin Within six minutes PATH begins emergency procedures
15 Transit London Train Bombings, 2005: CCTV enabled the authorities to initially track the perpetrators and finally apprehend them, though it was not able to avoid the attack
16 III. IT and Transportation Security, cont d. Vulnerabilities of the interfaces
17 Interdependency of Interconnected Systems
18 1. IT and Transportation Failures of IT from accidents produce consequences that are similar to those that might be expected from deliberate attacks.
19 IT/Transit Failures On August 20, 2003, the entire CSX transportation system shut down in 23 states due to the shut down of a computer system that monitors train movement and CSX signals; system restoration began with manual overrides (Daniels, August 20, 2003) On May 25, 2006, 112 Amtrak trains and 45 NJ Transit trains were disrupted when a 4 year old computer part failed to relay an order to restore power at one of the six substations providing power to the Amtrak system after electricity had been reduced for maintenance. Amtrak acted to manage such situations, for example, by having substations manned in peak hours, not reducing power capacity for maintenance, and having spare locomotives to move stalled trains (Associated Press, February 23, 2007).
20 2. IT and other Interconnected Systems: Energy for Transportation Oil and Gas Pipelines and IT Electricity and IT
21 Electric Power, IT, and Transportation Transportation is heavily dependent on electric power which in turn is dependent on IT Electric power has also experienced outages from IT failures both from accidents and deliberate attacks
22 Electric Power and IT Failures August 2003 Blackout. First Energy control room operators were unaware visually and audibly that an alarm had gone off, since their computer system was impaired. This delayed the detection of something going wrong with the electrical system. Subsequently, computer control servers became disabled. (U.S.-Canada Power System Outage Task Force April 2004).
23 Electric Power and IT Failures In January 2003, the Slammer worm infected the safety monitoring system at the Davis-Besse nuclear power plant in Oak Harbor, Ohio, and replicated so fast that it disabled the system for nearly five hours. The worm knocked out the plant's central command system for six hours. A report from the North American Electric Reliability Council found that power wasn't disrupted, but the failure stopped commands to other power utilities. (Arnone May 8, 2006) A false oil flow alarm shut an electricity transmission line down, causing a widespread blackout in Southern California affecting 500,000 people (Veiga September 1, 2005).
24 3. Methods to Quantify Dependencies and Interdependencies: Ratio Approaches A ratio was constructed of the time it took for an infrastructure dependent on electric power to recover and the time it took electric power to recover: T(i) / T(e) This was applied to various outages where infrastructure was affected and the recovery times for both electric power and the dependent infrastructure were known Such an approach is valuable given that the duration of outages varies considerably and even a given outage varies in time from place to place. Source: R. Zimmerman and C. Restrepo, The Next Step: Quantifying Infrastructure Interdependencies to Improve Security, International Journal of Critical Infrastructures, Vol. 2, Nos. 2/3, 2006, pp
25 Results for the August 2003 Blackout: Electricity Outage Durations T(e) and Affected Infrastructure Outage Duration T(i) Outage Durations for the August 2003 Blackout (Total Duration = hours) T(i)/T(e) Transit-electrified Rail (NYC) 1.3 Traffic Signals (NYC) 2.6 Source: R. Zimmerman and C. Restrepo, The Next Step: Quantifying Infrastructure Interdependencies to Improve Security, International Journal of Critical Infrastructures, Vol. 2, Nos. 2/3, 2006, pp Summarized from Table 3.
26 IV. Conclusions Transportation security is compromised when a hacked computer will cause a crash, or when an IT system component fails because of poor maintenance or human error Maintenance of IT components at the interfaces of IT, Transportation, and other infrastructure systems (e.g., electric power) is a critical aspect of transportation security
27 V. Policy Recommendations Policies regarding the use of IT in critical infrastructures must take into account the benefits of IT when everything functions as expected, as well as the risks of incorporating IT when one or more of its components fail
28 V. Policy Recommendations, cont d. Such policies should be pervasive in marketing guidelines and regulations, since the risks can be very great
29 VI. Recommended Research Directions Review and assess international practices in maintenance and operations at the interfaces of IT, Transportation, and other Infrastructure systems for high risk locations (e.g., tunnels, bridges, stations where many lines converge)
30 VI. Research Directions, cont d. Review and assess the skills of personnel assigned to maintain and operate critical system components Review and assess the reliability of funding mechanisms needed for preventive maintenance and for the safe operations of IT components
31 VI. Research Directions, cont d. Identify best practices and recommend new policies that improve/assure IT reliability in transportation security Review and assess how maintenance practices are managed (who is in charge?) at the interfaces of IT and other interdependent systems and which agency has lead responsibility
32 VI. Research Directions, cont d. Explore the feasibility of establishing an independent agency with the responsibility and authority to address the critical interconnections at the security interfaces of the transportation system, IT, and other interconnected systems
33 Thank You
34 References Bugliarello, G. A Note on the Interfacial Vulnerabilities of Transportation Systems, Countering Terrorism Biological Agents, Transportation Networks, and Energy Systems, Summary of a US-Russian Workshop, National Research Council of the National Academies, Washington DC, Falcocchio, J.C. Transportation Planning for Evacuations, Countering Terrorism Biological Agents, Transportation Networks, and Energy Systems, Summary of a US-Russian Workshop, National Research Council of the National Academies, Washington DC, FHWA, Publication Number FHWA HRT , Public roads, July- August Research and Innovative Technology Administration, Intelligent Transportation Systems, Zimmerman, R. and C. Restrepo, The Next Step: Quantifying Infrastructure Interdependencies to Improve Security, International Journal of Critical Infrastructures, Vol. 2, Nos. 2/3, 2006, pp
35 Acknowledgements Anecdotes on IT/Transportation failures and successes and interdependencies were drawn from R. Zimmerman s contribution to the following conference presentations and subsequent presentations: March 11, C. E. Restrepo (presenter), R. Zimmerman, and J. S. Simonoff, Risk Communication in Support of Energy, Transportation and Water Services, 2008 Risk Symposium, Santa Fe, NM. November 6, R. Zimmerman, Securing Infrastructure Services in the Digital Age, Hooked on Technology: The Benefits and Dangers of the Digital Age, at the Fall 2008 Speakers on the Square Lecture presented by the NYU Alumni Association. October 14, R. Zimmerman, Infrastructure Dependencies, Interdependencies, and Security: Measuring Anecdotes, Infrastructure Security Workshop, Rutgers University, New Brunswick, NJ. Portions of this work were supported by an NYU-Poly seed grant, Center for Interdisciplinary Studies in Security and Privacy (CRISSP).
Analyzing Cascading Effects within Infrastructure Sectors for Consequence Reduction
Analyzing Cascading Effects within Infrastructure Sectors for Consequence Reduction Rae Zimmerman, Professor of Planning and Public Administration and Director, Institute for Civil Infrastructure Systems,
Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure
Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure Presentation to the U.S. Department of Energy by the IEEE Joint Task Force on QER Trends: Resilience
Impact of Connected Automated Vehicles on Traffic Management Centers (TMCs)
Impact of Connected Automated Vehicles on Traffic Management Centers (TMCs) Automated Vehicles Symposium 2015 Breakout Session Impact of Connected and Automated Vehicles on Traffic Management Systems and
Intelligent Transportation Systems Technical Report Summary
Intelligent Transportation Systems Technical Report Summary Background What is an Intelligent Transportation System? An Intelligent Transportation System (ITS) improves transportation safety and mobility
CHAPTER 8: INTELLIGENT TRANSPORTATION STSTEMS (ITS)
CHAPTER 8: INTELLIGENT TRANSPORTATION STSTEMS (ITS) Intelligent Transportation Systems (ITS) enables people and goods to move more safely and efficiently through a state-of-the-art multi-modal transportation
Tools and Operational Data Available. 15.12.2015 1 st RESOLUTE Workshop, Florence
Tools and Operational Data Available Athens Transport Tools and Operational Data Operations Control Center (OCC): mimic panels, operations modi (full, downgraded, manual) Metro Security Systems: sensors
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
White Paper Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things Connect things. Analyze and act on the data they produce in milliseconds. Then send the right data to the cloud for
OM-13: Transportation Management and Operations
: Transportation and Operations 1-15 points Goal: Maximize the utility of the existing roadway network through use of technology and management of operations strategies. Sustainability Linkage Transportation
INTELLIGENT TRANSPORTATION SYSTEMS IN WHATCOM COUNTY A REGIONAL GUIDE TO ITS TECHNOLOGY
INTELLIGENT TRANSPORTATION SYSTEMS IN WHATCOM COUNTY A REGIONAL GUIDE TO ITS TECHNOLOGY AN INTRODUCTION PREPARED BY THE WHATCOM COUNCIL OF GOVERNMENTS JULY, 2004 Whatcom Council of Governments 314 E. Champion
Hitachi Visualization. Twin Cities Public Safety Presentation
Hitachi Visualization Twin Cities Public Safety Presentation Safer, Smarter, More Efficient Communities INTEGRATED REPORTING AND ANALYTICS: ACTIONABLE INSIGHT ENERGY UTILITY VEHICLE TRANSIT PUBLIC SAFETY
Traffic Incident Management Enhancement (TIME) Blueprint Version 2.0 Executive Summary
Blueprint Version 2.0 Executive Summary Strategic Background The Southeastern Wisconsin region, which encompasses the following eight counties: Fond du Lac, Kenosha, Milwaukee, Ozaukee, Racine, Walworth,
Physical Security Reliability Standard Implementation
Physical Security Reliability Standard Implementation Tobias Whitney, Manager of CIP Compliance (NERC) Carl Herron, Physical Security Leader (NERC) NERC Sub-Committee Meeting New Orleans, Louisiana CIP-014
Security for Railways and Metros
Security for Railways and Metros Security for Railways and Metros Security Management System Railways and Metros worldwide share a set of characteristics that make them very vulnerable to possible attacks,
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Surveillance and Security Technologies for Bridges and Tunnels
Surveillance and Security Technologies for Bridges and Tunnels Sheila Rimal Duwadi, P.E., Team Leader Bridge Safety, Reliability and Security, Federal Highway Administration, 6300 Georgetown Pike, McLean
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
A Framework to Support Healthcare Continuity of Operations in an Information Technology Failure:
A Framework to Support Healthcare Continuity of Operations in an Information Technology Failure: Lessons learned from a novel exercise series Jendy Dunlop, MPH, CHEP Paul Biddinger, MD, FACEP http://001yourtranslationservice.com/computer-tips/protecting-your-computer.htm
I-29 Corridor ITS Architecture and Systems Engineering Analysis
430 IACC Building Fargo, ND 58105 Tel 701-231-8058 Fax 701-231-1945 www.ugpti.org www.atacenter.org I-29 Corridor ITS Architecture and Systems Engineering Analysis Technical Memorandum December 2001 Prepared
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
Section A: Introduction, Definitions and Principles of Infrastructure Resilience
Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose
APPENDIX A Dallas-Fort Worth Region Transportation System Management Strategies and Projects
APPENDIX A Transportation System Management Strategies and Projects Transportation System Transportation System Management Projects Management Strategies Traffic Signalization and Control New Signal Installation
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
MSRC Best Practices. Communications Infrastructure Security, Access & Restoration Working Group
MSRC Best Practices MEDIA SECURITY AND RELIABILITY COUNCIL Adopted Best Practices Recommendations Communications Infrastructure Security, Access & Restoration Working Group National Recommendations Prevention
Solution Overview. Vitria Technology s Cyber Security Solution
Solution Overview > Vitria Technology s Cyber Security Solution 1 Table of Contents 1 Executive Overview 2 Value of Vitria s Real-Time Cyber Security Solution 3 Vitria s Cyber Security Solution Software
Our future depends on intelligent infrastructures. siemens.com/intelligent-infrastructures. Answers for infrastructure and cities.
Our future depends on intelligent infrastructures siemens.com/intelligent-infrastructures Answers for infrastructure and cities. 2 By combining engineering and data expertise, we enable our customers to
Hybrid System for Driver Assistance
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1583-1587 International Research Publications House http://www. irphouse.com Hybrid System
Metropolitan Intelligent Transportation Systems (ITS) Infrastructure 2010 Transportation Management Center
Metropolitan Intelligent Transportation Systems (ITS) Infrastructure 2010 Instructions This questionnaire is designed to obtain data measuring the level of Intelligent Transportation System (ITS) implemented
W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier
W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...
ITS eprimer Module 7: Public Transportation
ITS eprimer Module 7: Public Transportation March 2016 ITS Professional Capacity Building Program ITS Joint Program Office Instructor Add a professional photo of yourself to the left-hand side of the slide.
September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS
September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS September 8th 10:30 AM 12:00 PM AM01: Sustainable Transportation Performance Measures: Best Practices September 8th 10:30 AM
Intelligent Transportation System - I
Chapter 48 Intelligent Transportation System - I 48.1 Overview Intelligent Transportation Systems (ITS) is the application of computer, electronics, and communication technologies and management strategies
Professional Truck Driver Training Course Syllabus
Professional Truck Driver Training Course Syllabus The curriculum standards of this course incorporate the curricular recommendations of the U. S. Department of Transportation s Federal Highway Administration
Setting the Standard for Safe City Projects in the United States
Leading Safe Cities Setting the Standard for Safe City Projects in the United States Edge360 is a provider of Safe City solutions to State & Local governments, helping our clients ensure they have a secure,
University of Prince Edward Island. Emergency Management Plan
Emergency Management Plan March 2012 ON CAMPUS Emergency Dial Security Assistance Dial 566-0384 OFF CAMPUS SUPPORT AGENCIES Fire & Ambulance... 9-1-1 Charlottetown Fire Department... 566-5548 Fire Marshal...
MAJOR PLANNING CONSIDERATIONS CHECKLIST
MAJOR PLANNING CONSIDERATIONS CHECKLIST The following checklist is provided as a guide to assure that relevant considerations are identified in the emergency management planning process. Use the blank
Content of mobile GIS lecture
Mobile GIS 1 Content of mobile GIS lecture What is mobile GIS? Taxonomy of mobile GIS. Examples of mobile GIS solutions. Main challenges. 2 Mobile GIS In what context to GIS? Internet Multimedia Internet
ITS Investment Strategy 10-Year Program, FY07-16
New Jersey Department of Transportation ITS Investment Strategy 10-Year Program, FY07-16 Statewide Traffic Operations ITS Engineering March, 2007 Intelligent Transportation Systems Investment Strategy
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
Olympic Region Traffic Management Center. Olympic Radio
Olympic Region Traffic Management Center Olympic Radio Six Regions - One DOT We work in close partnership with other TMCs 6 WSDOT Regions 6 Regional Traffic Management Centers Tacoma Seattle Vancouver
Introduction. Industry Changes
Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise
A Study on Integrated Security Service Control Solution Development about CRETA Security
A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder,
Security Strategy: A Layered Approach. Anthony Mercogliano Metropolitan Transportation Authority Assistant Director of Security New York, NY
Security Strategy: A Layered Approach Anthony Mercogliano Metropolitan Transportation Authority Assistant Director of Security New York, NY Protecting the System Operating Components System Overview Policing
Improving the Effectiveness of Retail Video Surveillance
Brochure Improving the Effectiveness of Retail Video Surveillance Cisco Video Surveillance for Retail solutions help you boost loss prevention effectiveness and much more. W ha t Y ou Will Lea rn Theft
Best Practices for Building a Security Operations Center
OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,
What is Cyber Liability
What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE
Rhode Island Department of Transportation ITS State Architecture Update
Rhode Island Department of Transportation ITS State Architecture Update By: 2014 1 Table of Contents ITS Architecture Description: 1. Introduction - What is an ITS Architecture?... 3 2. Background ITS
Security in Space: Intelsat Information Assurance
Security in Space: Intelsat Information Assurance 14/03/6997 Intelsat Information Assurance Intelsat maintains the highest standards of Information Assurance by assessing and building the Intelsat infrastructure,
Homeland Security Solutions
Homeland Security Solutions Homeland Security - RAD Solutions Many organizations in the public and private sectors today require Homeland Security (HLS) systems: Defense agencies and defense industries,
FACILITY AND VENUE PROTECTION
FACILITY AND VENUE PROTECTION INTRODUCTION In late 2001, the Department of Homeland Security was created to develop and coordinate the implementation of a comprehensive national strategy to secure the
Policy for the Design and Operation of Closed-Circuit Television (CCTV) in Advanced Traffic Management Systems September 4, 2001
I. Introduction. Traffic Engineering and Highway Safety Division Policy for the Design and Operation of Closed-Circuit Television (CCTV) in Advanced Traffic Management Systems September 4, 2001 The New
New York State Energy Planning Board. Cyber Security and the Energy Infrastructure
New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State Division of Homeland Security and Emergency Services Office of Cyber Security Office of Cyber Security Overview
Intelligent. Buildings: Understanding and managing the security risks
Version 2 IET Sector Insights Intelligent Buildings: Understanding and managing the security risks More efficient and cost-effective use of the built environment is increasingly being driven by economic
Think Remote Monitoring Think Concept Pro Think VXM4B
The VXM4B Range Digital Video Recorder and Remote Monitoring System Think Remote Monitoring Think Concept Pro Think VXM4B Not much more left to Think about Who watches over your business when you re not
Endless possibilities
Endless possibilities ENDLESS POSSIBILITIES 03 Endless possibilities Iskra Sistemi is a developer and provider of process automation, communications and security systems for power distribution, telecommunications
The Emergency Operations Plan provides guidance for managing emergency communications resources.
Emergency Support Function #2 - Communication ESF # 2 Primary Agency Office of Emergency Preparedness Information Technology University Relations 911 Centers Secondary/Support Agencies Law Enforcement
Trapeze Rail System Simulation and Planning
trapeze Rail System English Software for Rail Modelling and Planning Trapeze Rail System Simulation and Planning www.trapezegroup.com Enabling future railway plans Cost reductions through integrated planning
Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are
White Paper Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are What You Will Learn The Internet of Things (IoT) is generating an unprecedented volume and variety of data.
The Internet of Things (IoT) Opportunities and Risks
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response workflow guide. This guide has been created especially for you for use in within your security
Solutions and IT services for Oil-Gas & Energy markets
Solutions and IT services for The context Companies operating in the Oil-Gas & Energy sectors are facing radical changes that have a significant impact on their business processes. In this context, compliance
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
International Working Group on Data Protection in Telecommunications
International Working Group on Data Protection in Telecommunications 675.42.10 4 April 2011 Working Paper Event Data Recorders (EDR) on Vehicles Privacy and data protection issues for governments and manufacturers
The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1
Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4
Hospital Emergency Operations Plan
Hospital Emergency Operations Plan I-1 Emergency Management Plan I PURPOSE The mission of University Hospital of Brooklyn (UHB) is to improve the health of the people of Kings County by providing cost-effective,
Early Fire Detection & Condition Monitoring
Early Fire Detection & Condition Monitoring Thermal Imaging Systems for Monitoring of Industrial Facilities in EX-/Non-EX-Zones Early Fire Detection of Large-Area Installations Thermal Condition Monitoring
The relevance of cyber-security to functional safety of connected and automated vehicles
The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction
Resilient Urban Infrastructure
Resilient Urban Infrastructure Dr. Roland Busch Member of the Managing Board of Siemens AG CEO Infrastructure & Cities Sector siemens.com/answers The city of the future needs smart and sustainable infrastructure
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution
Office of Safety and Compliance
The Federal Railroad Administration (FRA) was created by the Department of Transportation Act of 1966. It is one of ten agencies within the U.S. Department of Transportation concerned with intermodal transportation.
ASTRO 25 SYSTEM FOR MISSION CRITICAL DATA LEVERAGE YOUR ASTRO 25 SYSTEM INVESTMENT FOR MISSION CRITICAL DATA
ASTRO 25 SYSTEM FOR MISSION CRITICAL DATA LEVERAGE YOUR ASTRO 25 SYSTEM INVESTMENT FOR MISSION CRITICAL DATA Today s public safety agencies need more than just voice communications to get the job done.
What You Should Know About Cloud- Based Data Backup
What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: [email protected]
Verizon, 911 Service and the June 29, 2012, Derecho
Verizon, 911 Service and the June 29, 2012, Derecho August 13, 2012 Verizon, 911 Service, and the June 29, 2012 Derecho Late in the evening of Friday June 29, 2012, a severe storm hit the Mid-Atlantic
Integrated Physical Security and Incident Management
IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting
Why build the Silvertown Tunnel?
Why build the Silvertown Tunnel? Over the last 30 years east London has changed with the redevelopment of former industrial areas into major commercial and residential districts. The development of Canary
Securing Remote and Outdoor Assets Using Video Verification
Securing Remote and Outdoor Assets Using Video Verification About CRC 24/7, utility-focused Contact Center and Central Station specializing in: Consumer Call Handling, Line Crew Dispatch, and Alarm Monitoring.
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
Request for Information National Power Transformer Reserve. Contact: Department of Energy Office of Electricity Delivery and Energy Reliability
Request for Information National Power Transformer Reserve Department of Energy Office of Electricity Delivery and Energy Reliability Contact: Mark Olson PEICo President T 302.888.5211 F 302.571.1750 Pooled
National Capital Region: Urban Area Security Initiatives Subgrants as of 02/01/12
National Capital Region: Urban Area Initiatives Subgrants as of 02/01/12 Year Subgrantee Subgrant Name Award American Red Cross of the National Capital Area Mass Care (Maintenance) 146,258 American Red
SEMINAR REPORT 2004 HANDFREE DRIVING FOR AUTOMOBILES
1 SEMINAR REPORT 2004 HANDFREE DRIVING FOR AUTOMOBILES SUBMITED BY ANIL KUMAR.K.P 01 606 Department of Electronics and Communication GOVT. ENGINEERING COLLEGE THRISSUR 2 ABSTRACT This seminar paper is
Smart Energy Consumption and the Smart Grid
Smart Energy Consumption and the Smart Grid Executive Summary The nation s outdated electrical infrastructure is being transformed. Fundamental changes that add intelligence, integrated communications
Video Analytics Applications for the Retail Market
Comprehensive Video Analytics Solutions Customer Traffic In-Store Customer Behavior Operational Efficiency Loss Prevention, Security & Safety Video Analytics Applications for the Retail Market How Agent
SuperNav for Heavy Equipment
SuperNav for Heavy Equipment Supervised Navigation System for Heavy Equipment Supervised Navigation (SuperNav) is an option for Raveon Technology s RavTrack GPS tracking system. RavTrack SuperNav is a
North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)
Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a
Linking Planning and Operations Initiative A Data Driven Approach. Chris Francis Transportation Statistics
Linking Planning and Operations Initiative A Data Driven Approach Chris Francis Transportation Statistics Data Symposium - Traffic Data, Orlando, FL, Oct 23-24, 2014 Outline 2 Emerging Transportation Scene
1 st RESOLUTE Workshop Florence 15.12.2015
1 st RESOLUTE Workshop 15.12.2015 Dr. Alexandros Deloukas, Attiko Metro S.A. Evangelos Karagkounis, Metro Operations Expert Athens Metro System Overview System Description, Practices and Interdependencies
- Monitoring Array: a seismic or infrasound array, including from 1(4) to 20 Remote Elements (RE) and one Central Recording Facility (CRF).
Page 1 of 30 Page 2 of 30 1. Basic terminology - Monitoring Array: a seismic or infrasound array, including from 1(4) to 20 Remote Elements (RE) and one Central Recording Facility (CRF). - Remote Element:
With the large number of. How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning. Virginia A. Jones, CRM, FAI RIM FUNDAMENTALS
How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning The world has experienced a great deal of natural and man-made upheaval and destruction in the past few years, including tornadoes,
