CIRAS FINAL CONFERENCE

Slides:



Advertisements
Similar presentations
Real Options: A Tool for Surge Decisions?*
Advertisements

Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
CIRAS PROJECT OVERVIEW
ICS 442 Software Project Management
Chapter 3 Program Management and Project Evaluation Professor Hossein Saiedian McGraw-Hill Education ISBN
Fiscal Year 2008 Urban Areas Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Moving from Analysis to Design
Cleaner Production Assessment (Chapter 4)
PROJECT EVALUATION. Introduction Evaluation  comparing a proposed project with alternatives and deciding whether to proceed with it Normally carried.
Project Detailed Business Case
Cost Analysis of Military Training Marcel C. Smit SAS-095 workshop on Cost-Benefit Analysis of Military Training Amsterdam, The Netherlands 5-6 June 2012.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
University of Sunderland CIFM02 Unit 3 COMM02 Project Evaluation Unit 3.
WLI REGIONAL KNOWLEDGE EXCHANGE WORKSHOP ON DECISION-SUPPORT TOOLS AND MODELS SEPTEMBER, 2013, JERBA, TUNISIA Economic analysis of improved water.
CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Software Project Management
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
Eric Belasco, Suzette Galinato, Tom Marsh, and Srinivasa Ponnaluru June 1 st, 2011.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
Feasibility Analysis for a Software Project Dr. Pedro Mejia Alvarez Seccion de Computacion, CINVESTAV-IPN.
DECISION MAKING TOOLS 1. Elements of Decision Problems 2.
IT Project Management MS Sumayya Ajaz Lecture 9. Programme Management Individual projects as components of a programme within the organization. Programme.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Saving lives, changing minds. INITIATIVE INTEGRATED STEP BY STEP PARTICIPATORY LIVELIHOODS COST BENEFIT ANALYSIS MODEL IFRC.
DICORATO IT Session 4 – Block 1 – Question 3 Barcelona May Set parameters and implement the LM option Market access options Evaluate Economic.
Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.
TEL2813/IS2820 Security Management Cost-Benefit Analysis Net Present Value Model, Internal Rate of Return Model Return on Investment (Based on Book by.
Reports Sources & Documents in CYSM Digital Library Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
CRITICAL INFRASTRUCTURE RISK ASSESSMENT SUPPORT Risk Reduction Assessment (RRA) Manager – presentation of the core tool features 2nd Stakeholders’ Workshop.
The EJTN Training Programme on Countering Terrorism and Radicalisation to Violent Extremism Lessons Learned Training of criminal law judges.
Establishing an Aviation Risk Context APEC TPTWG-27 Aviation Security Experts Sub-Group Meeting Denise Morgan Office of Transport Security May 2006.
Chapter 13: Police Strategies and Tactics Seminar 8.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
1 Capabilities Improvement Toolkit Bill Custer SAIC NDIA 30th Environmental and Energy Symposium.
Cost benefit analysis. Social costs Social costs are the costs of economic activity to society as a whole Social costs = private costs + external costs.
CRITICAL INFRASTRUCTURE RISK ASSESSMENT SUPPORT CIRAS PROJECT OVERVIEW 2nd Stakeholders’ Workshop Aschaffenburg, November, 26th, 2015 Jaime Martín, Project.
Project Evaluation and Programme Management
Project Selection and Portfolio Management (Which project should be supported?) (How can we manage simultaneous projects?)
Analysis Manager Training Module
Programme Initaitive overview / Background information
EPC CONCEPTS and BUSINESS CASES
REFURBISHMENT DYNAMICS FOR SUBSIDY PROGRAMME FINANCING
ILO SPECIALIST ON SOCIAL SECURITY
Banking and the Management of Financial Institutions
EWG Study Tour, Galway, 18/09/2006
Software Project Management
CIRAS FINAL CONFERENCE
Climate change, energy and employment : The Green energyplan for 2030
Why schedules are important
Lecture: 6 Course Code: MBF702
CIRAS final conference Barcelona transport use case
Critical Infrastructure Protection Policy Priorities
دراسة جدوى مشروعات تفريخ الأسماك (دورة تدريبيـــــــــــــــة)
Lecture # 4 Software Development Project Management
TOOLS FOR DECISION MAKING:
Closed Loop Wind Farm Control
Project management tools
Costing and Finance P R Upadhyay.
UPDATE ON THE IMPLEMENTATION DRUG CONTROL, CRIME PREVENTION AND
Final Conference 18 Set 2018.
TSA UPDATE By Colonel Mike Licata.
Project Selection and Portfolio Management
CIRAS FINAL CONFERENCE
Industrial Value Chain: A Bridge Towards a Carbon Neutral Europe
COST-BENEFIT ASSESSMENT (CBA)
INTEGRATED RESULTS 2nd Stakeholders’ Workshop
Industrial Value Chain: A Bridge Towards a Carbon Neutral Europe
Presentation transcript:

CIRAS FINAL CONFERENCE CBA-Cost Benefit Assessment Katowice, June, 8th, 2016 Reinhard Hutter, CESS Centre for European Security Strategies

The CBA Functional Block Cost-Benefit Analysis Main Parameters Only factors which can be expressed in money! (other factors are treated in the other Functional Blocks) Lifetime (years) Discount rate per year Detailed cost structure Benefits structure Numerical and graphical results

The CBA Functional Block Cost-Benefit Analysis Process Life Cycle Cost model input, including cost For planning and procurement For operation and maintenance Monetary benefits caused by the system Set-up of Cost Structure Modify cost structure (if deemed necessary) Input detailed cost data Calculate results Evaluation Session Numerical results Graphical results Comparison of Alternatives Handover of selected results to the RRA tool Results

Use Case 1 Terrorist threat CBA Application Sample Energy Threats and Security Measures & Alternatives Use Case 1 Terrorist threat Bomb in power plant & Bomb in substation Crisis room Intrusion detection sensor system Screening, training, guards Use Case 2 Criminal threat Sabotage Mantrap & cameras Screening, training, four eyes Use Case 3 Cyber attack Sabotage or criminal or terrorist 3 mixtures of control centre, IT measures, intelligence, training

The CBA Cost Structure Detailed data received from energy provider along this structure: Investment Cost (one time or several increments over time) Planning Procurement Set-up Stocks Operational Cost System operation Maintenance End-of-life-removal Monetary Benefits Reduction of casualties Reduction of damages Reduction of operational cost (if not included in “operational cost”) Insurance, profit, market etc. beneficial effects.

CBA Results Input data and result data are usually presented as cost- profiles over a specified lifetime (e.g. 10 years) Tabular reports with Key Numerical Values, including Total investment Total operations cost Discounted numbers over time Net present values (NPV) Graphics (bar charts and cost-over-time profiles) Trade-off/ break-even point(s)

CBA Result Sample Sample Bar Chart

CBA Time Profiles and Trade-Off 2nd Assumed Attack Net Savings Break-Even Renewal Invest Initial Invest

Net Savings of the SM

Time Profiles and Trade-Off Cyber threat use case(continuous)

Thank you for your attention! Reinhard Hutter Technical Director CESS hutter@cess-net.eu www.cirasproject.eu Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme of the European Union (HOME/2013/CIPS/AG/4000005074)