Fundamentals of Laboratory Biosecurity and Biosafety Risk Assessments



Similar documents
Section VI Principles of Laboratory Biosecurity

Performing Effective Risk Assessments Dos and Don ts

Fraud Risk Management

Motivations. spm adolfo villafiorita - introduction to software project management

Policy : Enterprise Risk Management Policy

Risk Management Guide for Information Technology Systems. NIST SP Overview

RISK MANAGEMENT FOR INFRASTRUCTURE

SECURITY RISK MANAGEMENT

Strategic Risk Management for School Board Trustees

ENTERPRISE RISK MANAGEMENT FRAMEWORK

RiskManagement ESIEE 06/03/2012. Aloysius John March 2012

NIST National Institute of Standards and Technology

A Performance Review for Competitive Intelligence

Project Risk Management

PMI Risk Management Professional (PMI-RMP) Exam Content Outline

Risk Assessment and Management. Allen L. Burgenson Manager, Regulatory Affairs Lonza Walkersville Inc.

Risk, Risk Assessments and Risk Management. Christopher Bowler CPA, CISA August 10, 2015

3.0 Risk Assessment and Analysis Techniques and Tools

Information technology Security techniques Information security management systems Overview and vocabulary

ISMS Implementation Guide

Risk-Informed Security: Summary of Three Workshops

Linking Risk Management to Business Strategy, Processes, Operations and Reporting

Occupational safety risk management in Australian mining

IBAT (Integrated Biodiversity Assessment Tool)

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE EADM 220 DISASTER MANAGEMENT AND PREPAREDNESS

BUSINESS CONTINUITY PLANNING

STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices

IT Project Management Methodology. Project Risk Management Guide. Version 0.3

Federal Bureau of Investigation s Integrity and Compliance Program

Aviation Safety Policy. Aviation Safety (AVS) Safety Management System Requirements

English version. Laboratory biorisk management standard

Nova Scotia EMO. Hazard Risk Vulnerability Assessment (HRVA) Model. Guidelines for Use. October, 2010

QUALITY RISK MANAGEMENT (QRM): A REVIEW

TERRITORIAL PLANNING FOR THE MANAGEMENT OF RISK IN EUROPE

COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.

INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS)

Frequently Asked Questions in Project Management

Guidance on Risk Analysis Requirements under the HIPAA Security Rule

Risk Management at Chevron

Analyzing Risks in Healthcare. February 12, 2014

Enterprise Risk Management: Taking the First Steps

Information security risk management using ISO/IEC 27005:2008

Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. Session Objectives. Introduction Tom Walsh

2 Gabi Siboni, 1 Senior Research Fellow and Director,

IEEE Software Engineering Risk Management: Measurement-Based Life Cycle Risk Management PSM 2001 Aspen, Colorado

Security Vulnerability Assessment

A Structured Comparison of Security Standards

PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview

White Paper An Enterprise Security Program and Architecture to Support Business Drivers

A Risk Management Standard

Development of An Analysis Tool For Performing Civil Aviation Security Risk Assessment

Crisis Communication

Continuous Risk Management at NASA

Human mobility and displacement tracking

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

Risk Knowledge Capture in the Riskit Method

INFORMATION SECURITY STRATEGIC PLAN

Project Management. [Student s Name] [Name of Institution]

Controlling Risks Risk Assessment

What is required of a compliant Risk Assessment?

Risk Management approach for Cultural Heritage Projects Based on Project Management Body of Knowledge

COMPARATIVE STUDY BETWEEN TRADITIONAL AND ENTERPRISE RISK MANAGEMENT A THEORETICAL APPROACH

Guidance for Industry: Quality Risk Management

Hazard Analysis and Critical Control Points (HACCP) 1 Overview

Introduction to Information Security Management

Project Risk Management. Presented by Stephen Smith

Risk Management Policy

CORE Security and GLBA

Privacy & Security Crash Course: How Do I Do a Risk Assessment?

When Recognition Matters WHITEPAPER ISO RISK MANAGEMENT PRINCIPLES AND GUIDELINES.

Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches

Army Regulation Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED

Information Security Risk Management

Appendix 3 (normative) High level structure, identical core text, common terms and core definitions

Cornell University PREVENTION AND MITIGATION PLAN

STANDING ADVISORY GROUP MEETING

PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE:

The Project Management Knowledge Areas as defined by PMI (PMBOK, 2004)

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

Designing Closed Quality Control Loops For Stable Production Systems

Internet Reputation Management Guidelines Building a Roadmap for Continued Success

DEVELOPMENT OF A RISK ASSESSMENT PROGRAM AGAINST TERRORISM IN REPUBLIC KOREA

ISO 31000: ISO/IEC & ISO Guide 73: New Standards for the Management of Risk

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

The Johns Hopkins Hospital and The Johns Hopkins University Health, Safety and Environment Manual Biological Safety:

By the end of the MPH program, students in the Health Promotion and Community Health concentration program should be able to:

Terms of Reference PUBLIC PERCEPTION SURVEY. Office of Disaster Preparedness and Emergency Management

Risk Management Strategy EEA & Norway Grants Adopted by the Financial Mechanism Committee on 27 February 2013.

Integrated Risk Management:

CDM Vulnerability Management (VUL) Capability

Transcription:

Fundamentals of Laboratory Biosecurity and Biosafety Risk Assessments Conceptual Considerations ABSA 22 October 2008, Reno Dr. Morten Bremer Mærli, Ronald Barø, Alexander Flesjø Christiansen, Dr. Stephen McAdam

Intentional Unintentional Biorisk Biosecurity Biosafety Slide 2

Biosecurity is different Dealing with actors that will - Explore and exploit opportunities to reach their goals - Potentially try to circumvent risk mitigating measures Proactive risk mitigation ( us ) Proactive risk generation ( them ) Slide 3

Core Questions What are the Implications of this New Paradigm? Does it affect me and my organization? If so, how and why? Slide 4

Outline Biosecurity and Biosafety compared, standard risk assessment Conclusions Slide 5

Risk Assessment Risk assessment is the overall process of - risk identification, - risk analysis, and - risk evaluation Essential part of any risk management processes Slide 6

The Platform: ISO 31000 - Risk Management Risk Management Communication & consultation Establishing context Risk Assessment Risk identification Risk analysis Risk evaluation Risk treatment Monitoring & review ISO 31000: Risk management Guidelines on principles and implementation of risk management (draft June 15, 2007) Slide 7

Risk assessment is always done towards one or more objectives In our setting: - Biosecurity - Biosafety Slide 8

Risk Identification Establishing context Risk assessment Communication & consultation Risk identification Risk analysis Monitoring & review Risk evaluation Risk treatment Slide 9

Risk Identification A process to find, list and characterize elements of risks (ISO 73) Include risks whether or not they are under the control of the organization Slide 10

Risk Identification: Conceptual Risk Traits and Triggers Biosecurity Risk Biosafety Risk Trigger Gain, or desire to harm or threaten Breakages, errors in operation, or system failures Trait Purposeful Accidental Initiator Man Man or nature Origin External, possibly with insider(s) Internal, possibly external Slide 11

Risk Identification: Conceptual Risk Characteristics Biosecurity Risk Biosafety Risk Targeted (time, scope, location) Yes No Tailored Yes No Damage-maximizing Possibly No Discriminatory Possibly No Opportunistic Often Never Slide 12

Risk Analysis Establishing context Risk assessment Communication & consultation Risk identification Risk analysis Monitoring & review Risk evaluation Risk treatment Slide 13

Risk Analysis Systematic use of information to identify sources and to estimate the risk (ISO 73) Information can include historical data, theoretical analysis, informed opinions, and the concern of stakeholders (ISO 73) Involves consideration of the causes and sources of risk, their consequences, and the likelihood that those consequences may occur. Risk analysis may be qualitative, semi-quantitative or quantitative, or a combination of these Slide 14

Biosafety Risk Estimation Slide 15

Biosecurity Risk Estimation Capability Motivation Opportunity Estimation of Consequence Estimation of Likelihood Estimation of security risk Slide 16

Risk Analysis: Risk Probabilities and Consequences Biosecurity Risk Biosafety Risk Probability Consequence Likelihood Optimized Frequency Often predicable, yet arbitrary Slide 17

Risk Combination of the probability of an event and its consequences (ISO 73) Risk = Probability x Consequences Risk (safety) = P ( frequency ) x C ( arbitrary ) Risk (security) = P (Intentions, capabilities) x C ( optimized ) Optimized does not necessary mean maximized Slide 18

Risk Evaluation Establishing context Risk assessment Communication & consultation Risk identification Risk analysis Monitoring & review Risk evaluation Risk treatment Slide 19

Risk Evaluation Determine the significance of the risk Assist in making decisions about treating or accepting risk Slide 20

Risk Evaluation: Information and Competence Biosecurity Risk Biosafety Risk Facility information Competence demands Interest to suppress Understanding of Assets, Threats, Asset-Threat relations Interest to share Understanding Assets Slide 21

Concerns and Competence Core Concern: Biosafety Core Competencies: - Pathogens and toxins - Work processes and procedures - Rules and regulations Biosafety Core Concern: Biosecurity Core Competencies: - Pathogens and toxins - Work processes and procedures threat Biosecurity - Rules and regulations - Potential perpetrators - Site Vulnerabilities - and their interplay.. asset vulnerability Slide 22

Risk Treatment Establishing context Risk assessment Communication & consultation Risk identification Risk analysis Monitoring & review Risk evaluation Risk treatment Slide 23

Risk Treatment Process of selection and measures to modify risks (ISO 73) Measures may include avoiding, optimizing, transferring or retaining risks Slide 24

Risk Treatment: Residual Risk Biosecurity Risk Biosafety Risk Residual risk Dynamic Static Proactive (and continued) risk generation Slide 25

Risk Treatment: Risk Perception We act on perceived risk rather than objective measures of risk Perceptions likely to grow particularly strong when Risk assessments more dependent upon assumptions, than a strong experience- and knowledge-base Strong (excessive) media attention Several factors increasing personal concerned are fulfilled.: Slide 26

Inclinations: Factors Increasing Concern Biosecurity more prone to personal preferences than biosafety!? Biosecurity Biosafety Uncontrollable Fatalities grouped in space and time Effects dreaded Unfamiliar Children at risk Identifiable victims Much media attention Involuntary Caused by human actions or failures ++ + ++ + ++ + +++ + ++ + ++ ++ +++ + +++ +++ +++ +++ Covello V.T., Sandman P.M. and Slovic P. (1988), Risk Communications, Risk Statistics and Risk Comparisons:A manual for plant managers. Washington DC: Chemical Manufactures Association. Legend: more pluses, potentially higher perceptional impact (possible values) Slide 27

Risk Treatment: Other Persistent Challenges Organizational factors - Risk management Resources, prioritizations - Limited funds highly likely - Low-probability/high consequences Synergies and conflicts - Signs, information,, - Learning Updated competence - moving target Slide 28

Conclusions Biosecurity more than an extension of strong Biosafety Intentional acts add important dimensions to Biosecurity risks Biosecurity scenarios entail different actors, triggers and origins Biosecurity risk assessments and responses differ accordingly, - Need for dedicated expertise, tools, and assessments Slide 29

Conclusions, resource-wise A definitive need to understand implications of biosecurity risk responses New demands on the organization, the management, and personnel - Competence: biosecurity risk assessment and risk management - Acceptance: new SOPs and measures beyond personal protection - Awareness: e.g. new considerations on role of perception - Alertness: new set of persistent risk treatment challenges Tools and methodology development Slide 30

Conclusions, finally Biosecurity and Biosafety assessments should be conducted separately, BUT Biosecurity and Biosafety governed under the same Biorisk Management System Slide 31

Slide 32