FIGHTING SHADOWS Protecting National Security and Critical Infrastructure against the Unknown Katri Liekkilä (KTM), SMVIR/SM5 MPKK / Huoltovarmuuskeskus.

Slides:



Advertisements
Similar presentations
Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
Advertisements

Linking research to policy in Vietnam: how can complexity concepts help?
IRPG Project B Redesigning the HE data and information landscape.
 Definitions & Background  P3 Markets – Global & Canadian  Canada’s Infrastructure Deficit  P3 Policy Debate and Drivers  Why the debate matters 
Federal IT Steering Unit (FITSU) Federal Intelligence Service (FIS) Reporting and Analysis Centre for Information Assurance (IA) MELANI National Strategy.
Understanding effectiveness from the perspective of NGOs working in Cambodia By Rhonda Chapman A paper for the Measuring Effectiveness Conference, “Communities.
CANADA’S PLATFORM FOR DISASTER RISK REDUCTION National Roundtable on Disaster Risk Reduction Fredericton, New Brunswick OCTOBER 26, 2010.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
CICT Policy Conference Implications of Private Equity Ownership of Information Infrastructure: The case of TDC Grit Munk, Danish Consumer Council.
Getting involved in Social Innovation Research – participation and experimentation David Ludlow, Centre for Research in Sustainable Planning and Environments,
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Large-scale land development in Finland and in the Netherlands – comparative case study M. Sc. (Tech.) Eero Valtonen, Aalto University Prof. Erwin van.
15 April Fostering Entrepreneurship among young people through education: a EU perspective Simone Baldassarri Unit “Entrepreneurship” Forum “Delivering.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Forum for Agricultural Risk Management in Development AgRiskManagementForum.org A Forum for Ag-Risk Management Practitioners Orientation & Navigational.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Taking charge – finding a new discourse for understanding the shifting roles of disabled people in dance Kate Marsh.
The National Security Strategy. Vital interests Threats Resilience.
1 CASE STUDIES IN PROJECT MANAGEMENT Lecture 3 Project management methodologies.
EGov Interop'05 - Feb 23-24, Geneva (Switzerland) OBSERVATORY ON INTEROPERABLE eGOVERNMENT SERVICES eGov-Interop'05 Annual Conference February.
Living with Climate Change Systemic investigation of climate change impacts on our society and efficient adaptation / mitigation scenarios to sustain our.
Assurance Case Approach TECNALIA Inspiring Business Novara November, 2013 TRIAL WS.
1 /13 ‘Water and Green Growth’ Project Update Charles-Louis De Maud’Huy, WWC Ick-Hwan KO, K-water World Water Council 42 nd BoG Meeting, Marseille France,
Review on development of SDI as a basis of E-government in Croatia Ivan Landek, assistant director State Geodetic Administration of RoC International Workshop.
Development of a Regional DRM Strategy for the Tourism Sector in the Caribbean Regional Workshop – May 5th, 2009 – Trinidad & Tobago “Mutually Supportive”
Security, Stability & Resiliency of the DNS Review Team (SSR) Interaction with the Community.
Practitioner partnership model delivers transformative student learning experience Chris Cutforth Senior Lecturer, Sport.
Discursive Construction of Internationalisation of Higher Education CHEPS Summer School 2004 Terhi Nokkala, University of Tampere, Finland.
Theme 1: Introduction. Politology. The principal notions of science.
1 ACTORS INTEGRATION AND WATER GOVERNANCE IN NAIROBI’S CITY: CHALLENGES AND ADAPTATION TO CLIMATE CHANGE BY ROMANUS OPIYO Lecturer Department of Urban.
Dr. PARICHART PALANANTANA RATTANA BUNDIT UNIVERSITY Study the Readiness and Characteristics of e-Learning for Students at Private Universities in Bangkok.
Highlights from Sessions Key Messages and Actions from the Round Tables.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Users’ Attitudes towards the Utilization of Online Government and Business Services in Lebanon.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Schema Interoperability Liam Magee Global Cities Institute RMIT University Melbourne, Australia.
ROSKILDE UNIVERSITETSCENTER – Institut for Psykologi og Uddannelsesforskning SERNOC workshop: Learning for and through social entrepreneurship Mid Sweden.
Julie Nurse, Specialist Department of Social and Employment PUENTE IN THE CARIBBEAN: OPERATIONS MANUAL Caribbean Conference on Horizontal Cooperation in.
P1516.4: VV&A Overlay to the FEDEP 20 September 2007 Briefing for the VV&A Summit Simone Youngblood Simone Youngblood M&S CO VV&A Proponency Leader
United Nations Economic Commission for Europe Statistical Division Introduction to Steven Vale UNECE
LEANERSHIPS AND QUALIFICATIONS A presentation by Loffie Naudé.
Developing your Research Plan for FemNorthNet Community Case Studies 1.
NEW ACTORS, NEW MONEY & NEW CONVERSATIONS Mapping The Current Landscape & Potential Resources For Women’s Rights Results & Analysis MAY
4th Quality Conference (4QC) Impact Assessment Study Rui Sousa, PhD Catholic University of Portugal Lisbon, 16 July 2007.
Groundwork Prior to Undertaking A Case Study. What is a Case Study  A body of information  Answer questions about its subject matter.  Inquiry  Processes.
Standards and Guidelines Working Group Status Updates 2005 Jun 09 Washington DC Critical Infrastructure Protection Committee Public Release.
EPOS IP Roadmap Massimo Cocco & PDB. EPOS IP project Timeline Implementation Validation Pre-operation.
Project Portfolio Management Project Portfolio Management for Asean Architects and Engineers presented by: Rahayu S. Arifin Indonesian Society of Project.
Pekka Nurminen (k90673) MSc thesis Research Plan.
SOUTH-EASTERN EUROPEAN DATA SERVICES Institute for Democracy and Mediation 1.
Welcome and Conceptual Overview ATHA Specialized Training on International Humanitarian Law May 31, 2010 Stockholm, Sweden.
Building Capacity on Protected Areas Law & Governance Connectivity– Legal Issues Module 9 Exercise 1 Understanding the Legal Options for Implementing Connectivity.
Globalisation, Culture and Lifestyle Seminar Eight: Roots and Routes of Identity.
CIP Prevention, detection, response and mitigation of the combination of physical and cyber threats to the transport infrastructure of Europe Dr.
MYERS QUALITATIVE RESEARCH IN BUSINESS AND MANAGEMENT Sage Publications Limited © 2008 Michael D. Myers All Rights Reserved RESEARCH DESIGN Chapter 3.
CIRAS FINAL CONFERENCE
Critical Infrastructure Protection Policy Priorities
1Georgia Institute of Technology 2Chicago Booth School of Business
Create stakeholder analysis
Forth International Forum
AMPO Connected and Autonomous Vehicle (CAV) Working Group
Critical Infrastructure Protection Committee
Group Meeting Ming Hong Tsai Date :
Qualitative Research Kirsti Malterud, Qualitative research: Standards, Challenges, and Guidelines.
Moderator Mohamed M. K. Elhaj
A Framework for the Governance of Infrastructure - Getting Infrastructure Right - Jungmin Park, OECD Budgeting & Public Expenditures Division 2019 Annual.
Topic 5: Public-private engagement
Assessing the Relevance of Global and Regional Partnership Programs (GRPPs) Chris Gerrard Global Programs Coordinator, IEG November 13,
Gernot Hutschenreiter
Presentation transcript:

FIGHTING SHADOWS Protecting National Security and Critical Infrastructure against the Unknown Katri Liekkilä (KTM), SMVIR/SM5 MPKK / Huoltovarmuuskeskus M.M.Sc Thesis

In this presentation Research background and motivation Theoretical frame of reference Research design and data Preliminary findings Status of research Framework model under construction

Research background and motivation National security and critical infrastructure tightly knitted in modern societies Ownership of critical infrastructure Disruptions Responsibility over national security = Responsibility over critical infrastructure (protection)?

Research questions (ATM) Does a combination of risk management and resilience offer the best qualifications for nations to protect critical infrastructure under disruption? – If yes, do risk management and resilience exists simultaneously are therefore complimentary? – If not, which one is more important during disruption? – What are the key differences between risk management and resilience? What confirms the existence of resilience in a nation? – Can resilience be fostered? Is PPP related to critical infrastructure protection part of risk management, resilience or both? – What is the relevance of suitable objectives for private actors when deciding their engagement in critical infrastructure protection?

Theoretical frame of reference Uncertainty Risks Resilience Public- private partnerships (PPP) Their relationship with 1) National security and critical infrastructure protection 2) Each other

Research design and data Abductive research logic -Dialogue between phenomenon and theory -Logic of discovery Research rounds -Theory (theoretical propositions) -Thematic mapping -Interviews  case study- like set up Data - Finland, France, Norway, Sweden and Switzerland - National documentation and interviews

Preliminary findings National security strategy = risk management + scenario planning.  Theory: risk management unsuitable for unknown disruptions Uncertainty: Risk management leads to Resilience  Theory: Different methodologies for risk management and resilience, mean-effect relationship not possible Resilience undefined and debated  Suggestion: should be defined by user when used PPP and private sector engagement in CIP mandatory  No established definitions for purpose or objectives Notion of threats

Status of research Theoretical frame of reference Thematic mapping Interviews – in process…

Framework model under construction

Thank You Questions and comments appreciated