Urban Transport Security presented by Patrick Dillenseger RATP



Similar documents
2 Gabi Siboni, 1 Senior Research Fellow and Director,

THE STRATEGIC POLICING REQUIREMENT. July 2012

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

How To Write An Article On The European Cyberspace Policy And Security Strategy

Police use of Firearms

Prepared for tomorrow s challenges with your global full service partner

ADVOCATING PUBLIC TRANSPORT IN THE EUROPEAN UNION

Measure 9: Updating the interoperability directives on high-speed and conventional railway networks First page:

DRAFT PLANNING THE OPENING OF A ROAD PROJECT GUIDELINE 1

D Overall Approach To Security Management And Emergency Preparedness

An Open and Safe Europe What s next?

Executive Protection Facility Security Convoy Escort

EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS No. 2199

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Prof. Udo Helmbrecht

Security for Railways and Metros

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development

Actions and Recommendations (A/R) Summary

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

U.S. DoD Physical Security Market

OPERATIONAL PROJECT MANAGEMENT (USING MS PROJECT)

Release 1. BSBPMG410A Apply project time-management techniques

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY

Business Continuity for Cyber Threat

to Asset Management Policy and Guidance Draft Version July 2015

Master of Science in Cyber Security and Management

On the European experience in critical infrastructure protection

International Conference on "Criminal Threats and International Answers in the Global Sports Industry" Milan, 13 December 2014

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours

SMART CITY. The interconnected city: improving the quality of life of citizens

AIPM PROFESSIONAL COMPETENCY STANDARDS FOR PROJECT MANAGEMENT PART B CERTIFIED PRACTISING PROJECT PRACTITIONER (CPPP)

TfL Corporate Archives Research Guides

How To Help The European Single Market With Data And Information Technology

How To Write A Book On Risk Management

Security Management Systems (SEMS) for Air Transport Operators. Executive Summary

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach.

This page intentionally left blank.

1.0 Policy Statement / Intentions (FOIA - Open)

Addressing Cyber Risk Building robust cyber governance

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

ESKISP Direct security testing

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Bus incident management planning: Guidelines

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments

Company Security Officer (CSO) Training course brochure

Security Info Day, FP7-SEC , 9 September 2010

Honourable members of the National Parliaments of the EU member states and candidate countries,

EU policy on Network and Information Security and Critical Information Infrastructure Protection

Achieving Global Cyber Security Through Collaboration

TARGET. Toolkit. Training Augmented Reality Generalised Environment

Chapter 1 Introduction

A GOOD PRACTICE GUIDE FOR EMPLOYERS

Dr. Raheem Beyah Georgia Tech. Cyber-Physical Modeling & Simulation for Situational Awareness (CYMSA)

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Global framework. Safety, health and security for work-related international travel and assignments

Release 1. BSBPMG412A Apply project cost-management techniques

Business Continuity Management Systems. Protecting for tomorrow by building resilience today

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Project Plan (Statement of Work) Data Management Framework PJSM1009

EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Module 1 Diploma of Project Management

EXECUTIVE SUMMARY. EU Multi Stakeholder Forum on Corporate Social Responsibility 3-4 February, 2015 Brussels, Belgium

National Surface Transport Security Strategy. September Transport and Infrastructure Senior Officials Committee. Transport Security Committee

State Homeland Security Strategy (2012)

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Integrated Platforms. Includes: - Environmental monitoring system - Integrated Traffic Management - Network Monitoring. Index. Purpose.

EPN CONSULTING AS YOUR CONSULTANTS

Introduction. Industry Changes

NATO UNCLASSIFIED. 27 February 2012 DOCUMENT C-M(2012)0014 Silence Procedure ends: 16 Mar :00

Cyber Security in EU: ENISA approach

ESKITP5022 Software Development Level 2 Role

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

Education & Training Plan Homeland Security Specialist Certificate Program with Externship

LaSorsa & Associates

Demonstrate and apply knowledge of project management in

In which new or innovative ways do you think RPAS will be used in the future?

Transcription:

Modular Urban Transport Safety and Security Analysis Final Conference 25 26 June 2012, Cologne Urban Transport Security presented by Patrick Dillenseger RATP 1

Table of Contents Urban Transport Security (UTS) output overview Approach Contents Focus areas Baseline products UTS Recommendations Conclusion Highlights Forward strategy? 2

The approach to UTS EC MS Operator Strategic assessment & trends European drive for UTS transformation European UTS standardization or other technical harmonization European research & innovation in UTS MS legislation Threat evaluation & characterisation Critical infrastructure protection Operational considerations Organisational considerations Doctrinal considerations Corporate security concerns 3

Contents Part 1: UTS strategies Title Review of existing means & measures for security systems Regulations in force and technologies in service Security strategies in UGT systems Contents UTS conceptual concentric breakdown A models for UTS operations A model for UTS countermeasures Legal framework considerations at the EU level and from 4 MS (France, Germany, Spain, and the UK) A reviewed model per UGT subsystem for UTS countermeasures & supporting technologies Terms & abbreviations related to UTS strategies UTS focus areas Potential areas for UTS standards, EU R&D focus areas A potential generic illustration of zoning UTS considerations at the MS & corporate levels A typology of threats & related crime or offence 47 recommendations supporting UTS strategies 4

Contents Part 2: UTS Means & Measures Title Threats to UGT systems Threats scenarios in UGT systems Security means & measures in UGT systems Contents Conceptual breakdown of threats Threat characterisation A model for the ranking of targets of opportunity A model for threats & related offences Models for threat-related scenarios A model to extrapolate critical infrastructure components 4 recommendations Terms & abbreviations Operational considerations & Countermeasures UTS specifications A typology of threats & related crime or offence Information security management standards A typology of UGT targets UTS technologies UTS sector concerns 41 recommendations 5

UTS focus areas Glossary of UTS terms & abbreviations 11 strategic focus areas From Certification to Training 21 potential areas for UTS standards or technical harmonisation 5 potential UTS terminology concerns Potential UTS educational concerns 1 potential generic illustration of UTS zoning R&I focus areas UTS sector concerns 6

Baseline products UTS concentric breakdown UTS operations cycle UTS countermeasures Lessons learned process Potential areas for standardisation or harmonisation UTS terminology UTS zoning 92 UTSR A sample of 5 UTSR 7

The concentric breakdown of UTS Recruiting Health & Education Awareness Threat Assessment Risk Managing Assessing Evaluation Exercises Prevent H R Ops Respond Training Lessons learned Risk Analysis Planning Procurement Intelligence Management UTS Support Operating procedures Logistics Budget Simulating Recover Access Control Surveillance Early warning Command Control Force Protection Information management Smart cards Barriers C C T V Detectors Ops centre Weapons Comms Cyber Sy Info systems GPS 8

The operational cycle of UTS 9

UTS countermeasures Security field of activity UTS countermeasure UTS Task H Technology SOP PREVENT RESPOND RECOVER Learn, prepare Survey, patrol Control, sweep Detect, report Protect, defend Pre-empt Mitigate Review, etc. See DEL9.3 4.2 CCTV Smart cards Detectors Command centre Firewalls Body armour Weapons Coms, etc. See DEL9.3 4.4 10

Lessons Learned Process Step LLP task Comment 1 2 Immediately after an event, review performance and invite criticism (hotwash, debrief). Analyse: sort the plusses and minuses. Investigate: question protagonists. Translate the results into tasks. 3 Present the tasks in categories. Collect positive and negative feedback (oral, print) in the wake of an exercise, a crisis, or a significant event. Each task consists in a simple & single to-do item. Word the tasks carefully. Categories like Command & Control, Communications, Equipment, Information management, PR, Training, Weapons, etc. 4 5 Generate a Plan of Action & Milestones (POAM). Monitor the progress regularly until finalisation. Report results to all concerned. In this work plan and for each task, appoint a task leader, a controller or supervisor, and adopt specify the timeline. Draft a final report of the corrective actions based on the findings and progress made. Postpone the items at idle. 11

Potential areas for possible UTS standards or technical harmonisation Field Potential area Sub area Prevention Information management Design Education Training Security Dogs Plans CCTV, Cyber security, Data protection Disclosure policy, Integrated control & security centre System interfaces data protocols and metadata Terminology including procurement language Specifications (stations, hubs, zoning, rolling stock) Aggression management programmes Awareness programmes Risk analysis, Staff training Charting UTS excellence Exercises, Technological impact Security dogs Security risk assessment K9 potential & tactics: Defence, Deterrence, Detection Contingency plans 12

Potential UTS terminology concerns Publication UTS English dictionary UTS multilingual glossary UTS procurement language Typology of targets Typology of threats & related crime or offence Comment The MODSafe project glossary of UTS terms & definitions is a much needed document. Could it evolve into a unique and complete UTS English dictionary? A multilingual UTS glossary of terms and abbreviations is an on-going and open-ended project managed by the UITP Security Commission. Could the transport community adopt a common multilingual document pertaining to UTS terminology? The existing procurement language developed by the US DHS is used within the UK. The adoption of this standard would invite operators to include security requirements when going out to tender, ensuring that security is built in from inception. The presentation divides transport assets into 2 categories: -Transport-related assets directly enabling transport and involving passengers (i.e. Metros, buses, stations, concourses, etc.) - Support-related assets (all other assets). The model distinguishes between 2 categories of threats: -Unconventional threats inclusive of hyper terrorism or CBRN threats, and of statesponsored large scale cyber at-tacks; -Conventional threats concerning all other threats than those mentioned above, subdivided in turn into 2 sub groups to distinguish between external versus internal threats to a system. 13

UTS zoning Potential generic illustration of UTS zoning Safe & secure by design What UTS specifications? 14

Urban transport security recommendations 92 UTSR covering 19 policy areas Certification Communication, Cooperation Critical Infrastructure Protection Crisis Management, Cyber security Design, Education Explosives, Information Management, Methodology Operations, Organisation, Plans Public Relations, Research & Innovation Standing operating procedures Standardisation Training 15

A sample of 5 UTSR UTS policy area Cooperation Crisis management Cyber security Design Education Concern The contractual limits of MODSafe did not allow the involvement of all key stakeholders. A more professional, comprehensive and holistic approach to transport security. Ensuring a proportionate response to a terrorist threat, including avoiding political over-reaction such as ordering all metropolitan traffics to stop. Properly addressing cyber security in relation to UGT. Incorporating security specifications into the design of UGT systems or subsystems, taking into account possible contradictions between different security objectives Current deficit of qualified UTS staffs and managers. UTS Recommendation (UTSR) Promote additional EU research (e.g. the SECUR-ED project, 7th Framework Programme) building on MODSafe findings. Ensure that participants are chosen based on their recognized scholarly competence and with due consideration for the balance of disciplines appropriate to the project. Promote a survey & debate on metropolitan traffic suspension policies worldwide. Challenge the MS that have opted to stop all traffics in case of an attack. Provide guidance on responding to a terrorist attack or to the threat of an imminent attack. Analyse existing information security management standards in view of their potential application or adaptation to UGT. Promote the practice of incorporating security specifications in UGT design. Promote education in UTS concepts, doctrine, databases, semantics, procedures, and support relevant research and innovation. 16

Highlights A unique & unprecedented attempt to shape and present UTS Sound fundamentals highlighting the H factor & showcasing various UTS models including 3 gems A UTS concentric breakdown A UTS operational cycle A Process to achieve AAA-Governance The way forward through transformation based on 92 UTS recommendations 17

Forward strategy 5 key questions What transformation? Which organisations? Which institutions? European Institute for Transport Security? Which expert groups? Which certified professionals, talented engineers? 18

Innovation is disobedience that succeeds Patrick DILLENSEGER Defense & security RATP, Paris Thank you for your attention 19