Healthcare - Waterways

Download Report

Transcript Healthcare - Waterways

A Secure Frontline
September 25, 2003
R. E. Cunningham, SVP, National Marketing Manager
HDR Security Operations, Inc.
Security:
Freedom from risk or danger.
Measures adopted to prevent the
commission of crime.
Security Words of Wisdom
To paraphrase the ancient
Chinese military historian
Sun Tzu (350 BC)…
“He who tries to defend everything
ends up defending nothing.”
Total Anti-US Attacks, 2001
N. America -4
Eurasia-2
Africa-3
W. Europe-4
Asia-7
M. East-8
L. America-191
Type of Anti-US Attacks, 2001
Bombing-207
Kidnapping-6
Vandalism-3
Armed Attack-1
Firebombing-1
Hijacking-1
Types of Targets Attacked, 2001
Business-204
Other-12
Diplomat-7
Government-3
Military-2
Threat Is Not Only International in Nature
 Domestic
Terrorists/Workplace
Violence can also be a
threat
 23 Hate groups operate
in Missouri and Kansas
alone
 Oklahoma bombing was
Domestic Terrorism
 Anthrax may have been
Domestic
Security Concepts
 Concentric Circles of Security
 Deter
 Detect
Concentric Circles of Security
 Delay
 Or You Just
Document
Defense in Depth
Deter – Detect - Delay
Event Time Measured in Minutes
Detection
begins
Assessment
Detection
Time
Lapse
Response Time
Dispatch
decision
Physical / Mechanical / Electronic Delays
Contact
begins
Deter – Detect - Delay
Event Time Measured in Minutes
Detection
begins
Assessment
Detection
Time
Lapse
Response Time
Dispatch
decision
Contact
begins
Physical / Mechanical / Electronic Delays
The Challenge of “Multiple
Port/Waterway Players”












Port Authority
Terminal Operators
Stevedors
Shipping/Barge
Companies
Logistics Companies
Unions
Coast Guard
MARAD
Customs
State DOTS
MPOs
First Responders







DNRs
USACE
Railroads
Trucking Companies
Utilities
Other Port Tenants
Warehousing
Assessments
Criticality
Vulnerability
Threat
Risk
Responsiveness
Readiness
Holistic Security Planning
•Total Team Effort
•Management - Authority
•Coaches - Executives
•Players – Staff/Tenants
Physical
and
Electronic
Security
Operational
Policies
and
Procedures
Enforcement
and
Security
Awareness
Policies and Procedures
 The Game Plan
 Planning
 Operations
 Monitoring
 Reporting
Policy and
Procedures
Standard Operating Procedures (SOP’s)
Emergency Operating Procedures (EOP’s)
Emergency Response Plans (ERP’s)
Mutual Aid
Media Management
Enforcement and Security Awareness
 The Team – Personnel Who Are……
 Informed - Threat awareness
 Trained - Emergency response
 Empowered – Operations
 Equipped – The Tools
Training
Programs
Command
Operation
Awareness
The Tools
Physical
Security
Blast Protection Glazing Analysis Material
Material Analysis
Structural Analysis
Progressive Collapse
Facility Hardening
Multiple User
Access Control?
Barriers
Passive
Active
Ballistically Resistive Materials
Vault/Safehaven Design
Crime Prevention through Environmental
Design (CPTED)
Illumination Engineering
Key Control/Management
Hardware
Locking Systems
The Tools
Electronic
Security
Situation Annunciation
Closed Circuit Video Equipment (CCVE)
Intrusion Detection
Access Control
Communications
Perimeter Security
Intrusion Protection
Biometric
Cypher
Card
Personal Identification Number (PIN)
Data Communications
Intercommunications
Telecommunications
Radio Frequency
Access Denial Systems
Screening
Chemical
Biological
Nuclear
Radiological
Explosive
Weapons
Heartbeat
Electronic Article Surveillance
The Tools
Data
Security
Employee Data
Access Controls
Data Networks
Telecommunications
CATV/MATV
Infrastructure
Copper
Fiber Optic
Wireless
Firewalls
Document Storage
Backups Data
Power
The Tools
 Exercises are Key




Performance
Penetration (Black Hat)
Real Time Response
Routine System Testing
Q&A
For further questions or discussion on this topic
please contact
R. E. Cunningham
[email protected]