URS Washington Group International, Inc.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Minnesota Port and Waterway Security Working Group Meeting April 12, 2012.
International Course on Development and Disasters with Special Focus on Health February 10 – 21, 2003: St Anns, Jamaica CDERA Experience in Institutional.
New Mexico Infrastructure Finance Conference, October 28, 200.
Hospital Emergency Management
© QinetiQ North America, Inc QinetiQ North America, Inc. 1 Implementing an Enterprise Security Framework – Safeguarding Your Most.
Wade E. Kline, AICP Community Development Planner.
Presented to presented by East Central Florida Corridor Task Force Space Coast TPO 02/16/15 Huiwei Shen Systems Planning Florida Department of Transportation.
DHS, National Cyber Security Division Overview
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Progress in PRS Implementation: The Republic of Serbia Presented by Ivana Aleksić, Team Manager Poverty Reduction Strategy Implementation Focal Point Deputy.
National Disaster Risk Management Program NDRMP Belgrade, March
Asia Pacific Economic Cooperation Transportation Working Group ITS Experts Group Chicago, Illinois September 2002 Walter Kulyk, P.E. Director, Office of.
Critical Infrastructure Protection and Higher Education: University of California Hazard Vulnerability Assessment Kristine Hafner University of California.
Business Continuity and You! The Ohio State University Business & Finance Enterprise Continuity Program Quarterly Update October 2008Business and Finance.
Building Resilient Communities URS Group Inc ASFPM National Conference May 2010 Effectively Adapting to Climate Change.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Unit 1 Community Capabilities
Center for International Climate and Environmental Research-Oslo: Research Priorities and Interest in China Lin Gan SINCIERE Member Workshop October 19,
Maritime Security Risk Analysis Model
Jeffery Graviet Emergency Services Coordinator, Salt Lake County Chairperson, Salt Lake Urban Area Working Group.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
The U. S. National Strategy for Global Supply Chain Security Neema Khatri Office of International Affairs U.S. Department of Homeland Security.
October 27, 2005 Contra Costa Operational Area Homeland Security Strategic and Tactical Planning and Hazardous Materials Response Assessment Project Overview.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
State of the World’s Animal Genetic Resources The Global Strategy for the Management of Farm Animal Genetic Resources.
Investment Policies in Russia: The Northern Dimension by Rainer Geiger Deputy Director, OECD Financial and Enterprise Affairs The Northern Dimension Forum.
Homeland Security Grant Program 2015 Process Michelle Hanneken Illinois Emergency Management Agency.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Business Continuity Program Orientation (insert presentation date) (This presentation is a template that requires adjustments to meet your needs)
Approaches and Mainstreaming of Ecosystem-based Adaptation in Europe International workshop “Mainstreaming an ecosystem based approach to climate change.
State Budget and Election Fall 2010 University Priorities Questions/comments/discussion.
1 Washington State Critical Infrastructure Program “No security, No infrastructure” Infrastructure Protection Office Emergency Management Division Washington.
Kyrgyzstan & UNFCCC. Adaptation to Climate Change: Strategies & Priorities Zukhra Abaikhanova, Center for Climate Change Workshop The 2 nd Meeting of Working.
Business Continuity Disaster Planning
GRC: Aligning Policy, Risk and Compliance
S3.1 session day 3 1 training delivered by Oxfam GB, RedR India and Humanitarian Benchmark; January 2012, Yangon, Myanmar approved by the Advisory.
CounterMeasures™ Risk Analysis and Management May 2005.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Miami and Fort Lauderdale Urban Areas 1 Improvement Planning Conference October 18, 2007 Southeast Florida Urban Area Security Initiative Regional Domestic.
Enterprise Architecture
Physical Security Governance Model
Risk Management.
and Security Management: ISO 28000
Italy in the G7.
WHAT is Project Matrix? An effort designed to:
Progress on LA’s Climate Acting Efforts
Toronto Waterfront Scan and Environmental Improvement Strategy Project - Economic Opportunity in a Sustainable Waterfront Presentation to the Federation.
Identify the Risk of Not Doing BA
California Cybersecurity Integration Center (Cal-CSIC)
The International Plant Protection Convention
AASHTO Special Committee on Transportation Security
Department of Justice and Constitutional Development
Program budgeting in the Kyrgyz Republic
INAC Water and Wastewater: Discussion on Current Policies and Processes Presented at: Circuit Rider Trainer Professional Association’s Annual General Meeting.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH
Indian and Northern Affairs Canada
Continuity Guidance Circular Webinar
The U.S. Department of Homeland Security
A Process View of the Supply Chain
Group Meeting Ming Hong Tsai Date :
Service Array Assessment and Planning Purposes
Capital Improvement Plans
Securing Critical Chemical Assets: The Responsible Care® Security Code
FINANCING NATURA 2000 Agenda item 2.1 CGBN Co-ordination Group
MODULE 11: Creating a TSMO Program Plan
Draft revision of ISPM 6: National surveillance systems ( )
Presentation transcript:

URS Washington Group International, Inc. Infrastructure as a Key Element in Sustaining Economic Growth Critical Infrastructure Protection September 9, 2019

Infrastructure Investment Infrastructure Investment in the United States will exceed US$1 Trillion over the next few years Combined Capital Programs from the main agencies in the New York Metropolitan Region exceed US$50 Billion over the same period Some notable new projects under development for added capacity to Manhattan’s Central Business district include: East Side Access Trans-Hudson Tunnel 2nd Avenue Subway

Critical Infrastructure Energy Resources Agricultural Resources Water Resources Transportation Infrastructure Information Systems Telecommunication Systems Banking and Finance

Risk Analysis

THREAT AND VULNERABILITY ASSESSMENTS

Security Improvements in Unified Methodology - Process Define Asset Review Documentation Site Survey Component #1 Threat Assessment Workshop Develop Comprehensive Threat Assessment Matrix for Workshop Conduct Workshop 1. Brainstorming 2. Threat Development 3. Preliminary Risk Analysis Using Unified Methodology Guidelines Capture all risk items from spreadsheet in database for further development Automatically analyze and prioritizes risks showing results on a graphical interface SecureRisk keeps a comprehensive record of the disposition of risks identified by expert workshop teams Component # 2 SecureRisk Database Risk Documentation Capture All Risk Items From Spreadsheet Analyze and Prioritize Risks Collapse to Global Risks Retire Low Risks or Combined With Others YES NO WATCH SecureRisk tracks all interdependent threats and vulnerabilities/risks allowing for adjustment as other tasks as well as local, regional and national priorities and mitigation developed and/or changed Security Improvements in Component # 3 Develop Schematic SecureRisk Database Brainstorm Security Improvements Coordinate and Shift Appropriate Security Improvements To : 1. Other Tasks (e.g. Surveillance, C3, Hardening etc.) 2. Other Jurisdictions (e.g. Coast Guard, TSA, etc.) Retire Risks When Shifted YES NO WATCH Component # 4 Reduced Risk/Cost Benefit of Security Improvements Develop Schematic Security Improvements Estimate Security Improvements Provide Relative Risk Reduction Compared to Costs of all for the Asset Security Improvements Based on: 1. First Cost 2. Operation & Maintenance Cost 3. Life Cycle Cost Implement Next Phase YES NO SecureRisk cost benefit approach allows trade offs between first cost and operational (CONOPS) strategies SecureRisk tracks all security improvements from conception through design and implementation/construction SecureRisk tracks all interdependent threats and vulnerabilities/risks allowing for adjustment if security priorities and/or budget changes SecureRisk tracks automates the production of reports and risk reduction cost curves Benefits / Analytic Approach Use SAVE international job plan as the best method for multidiscipline workshop team interaction Allows synergistic interaction between cross - disciplinary experts such as: 1. Security/Law Enforce. 2. E/A Trans. Infrastructure 3. Blast Modeler 4. Systems Integrator 5. Operations 6. Emergency Response Analyzes all interdependent threats and vulnerabilities to ensure none fall between the cracks Arrays relative risks on a single spread sheet for complete transparency

Quantitative Evaluation

Quantitative Evaluation Sample Reports

Priority Ranking

ASSET HARDENING

Asset Hardening

WIDE-AREA EARLY WARNING SYSTEMS

Early Warning Systems

Critical Infrastructure Assets

WORLD TRADE CENTER

Lower Manhattan

World Trade Center World Trade Center, New York

LEGISLATION IN THE UNITED STATES THE SAFETY ACT

U.S. Dept. of Homeland Security SAFETY Act The SAFETY Act is the Support Anti-terrorism by Fostering Effective Technologies Act of 2002 (updated in July 2006). It is legislation passed by the United States Congress that makes a promise to providers of QATTs that they will be protected from American plaintiffs' lawyers, who could otherwise introduce liability suits The SAFETY Act applies to a broad range of technologies, including products, services, and software, or combinations thereof, as long as the Secretary, as an exercise of discretion and judgment, determines that a technology merits Designation

URS Washington Group International, Inc. Infrastructure as a Key Element in Sustaining Economic Growth Critical Infrastructure Protection September 9, 2019