Risk Assessment Biosafety and Biosecurity Awareness Training Event for Afghan Bioscientists January 12 to 14, 2010 SAND No. 2009-5485C Sandia is a multiprogram.

Slides:



Advertisements
Similar presentations
1 of 21 Information Strategy Developing an Information Strategy © FAO 2005 IMARK Investing in Information for Development Information Strategy Developing.
Advertisements

Museum Presentation Intermuseum Conservation Association.
Module N° 4 – ICAO SSP framework
The Department of Energy Enterprise Risk Management Model
EMS Checklist (ISO model)
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
BIOLOGICAL HAZARDS RISK ASSESSMENT
Responsible CarE® Process Safety Code David Sandidge Director, Responsible Care American Chemistry Council June 2010.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
Business Crisis and Continuity Management (BCCM) Class Session
Health Aspect of Disaster Risk Assessment Dr AA Abubakar Department of Community Medicine Ahmadu Bello University Zaria Nigeria.
Risk Assessment and Management Katie Matthews GEOG 350 November 8, 2007.
IS Audit Function Knowledge
The Australian/New Zealand Standard on Risk Management
What is Program Management?
Documentation Management Biosafety and Biosecurity Awareness Training For Afghan and Pakistani Bioscientists January 12-14, 2010 SAND No P Sandia.
Computer Security: Principles and Practice
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
Risk Assessment Frameworks
Developing a Chemical Risk Management Program
Purpose of the Standards
1 Risk Assessment Develop Objectives And Goals Develop and Screen Cleanup Alternatives Select Final Cleanup Alternative Communicate Decisions to the Public.
Information Systems Controls for System Reliability -Information Security-
Network security policy: best practices
Protection Against Occupational Exposure
Personal Protective Equipment Biosafety and Biosecurity Awareness Training For Afghan and Pakistani Bioscientists January 12-14, 2010 SAND No P.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
EHS Management System Elements
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Personnel Management SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United.
Responsible Conduct of Research (RCR) Farida Lada October 16, 2013
Engineering Risk Assessments and Risk Communication Sarah Arulanandam, Hazard and Risk Group RWDI West Inc. DISCLOSURE OF MATERIAL ENVIRONMENTAL EXPOSURES:
Management & Development of Complex Projects Course Code - 706
James Aiello PricewaterhouseCoopers Africa Utility Week 06 International Good Practice in Procurement.
BSAF-BIONET Meeting Robert J. Hashimoto, CBSP University of California, Berkeley October 2, 2009.
Risk Assessment. Risk As defined by Kaplan and Garrick, risk analysis consists of answering three specific questions: what can happen? what is the chance.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Safety organization and training. The biosafety officer and biosafety committee A safety policy, A safety manual, and Supporting programmes for their.
Chapter 6 CRISIS MANAGEMENT. Introduction - Crisis: ◦is a situation that specifically involves a pharmaceutical product, medical device or activity with.
Material Control & Accountability
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Georgia Institute of Technology CS 4320 Fall 2003.
Integrated Risk Management Charles Yoe, PhD Institute for Water Resources 2009.
Hazards Identification and Risk Assessment
Laboratory Acquired Infections (LAIs) Physical Security Personnel Security Material Control & Accountability Transport Security Information Security International.
Material Control and Accountability SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company,
Integrated Risk Management Charles Yoe, PhD Institute for Water Resources 2009.
Risk Assessment* and Zoonotic Implications Yvonne Nadler DVM MPH April 6, 2011 * THE FUN STUFF.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
Environment and Disaster Planning Hari Srinivas, GDRC Rajib Shaw, Kyoto University Contents of the presentation: -What is the problem? -Precautionary Principles.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
The Risk Management Process
Project Risk Management. Risk-Defined A situation involving exposure to danger; “The combination of the probability of an event and its consequences”
International Atomic Energy Agency Regulatory Review of Safety Cases for Radioactive Waste Disposal Facilities David G Bennett 7 April 2014.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Revision N° 11ICAO Safety Management Systems (SMS) Course01/01/08 Module N° 9 – SMS operation.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
OHSAS Occupational health and safety management system.
Improving performance, reducing risk Dr Apostolos Noulis, Lead Assessor, Business Development Mgr Thessaloniki, 02 June 2014 ISO Energy Management.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
Business Continuity Planning 101
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Whose Job Is It? Responsibility for Laboratory Safety and Security
CEng progression through the IOM3
Presentation transcript:

Risk Assessment Biosafety and Biosecurity Awareness Training Event for Afghan Bioscientists January 12 to 14, 2010 SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000.

Risk = F (Likelihood, Consequence)

Risk Assessment Principles Ideally the risk assessment is conducted with a standardized, systematic methodology Results repeatable, comparable Define the problem The problem should drive the choice of method for the assessment The risk assessment method should be as simple as possible Elaborate when needed Those conducting risk assessments should be explicit about uncertainties Risk assessment methods can incorporate one or more approaches

Risk Analysis Process

Stages of Risk Analysis Risk Pre-assessment Early warning and "framing" the risk in order to provide a structured definition of the problem, of how it is framed by different stakeholders, and of how it may best be handled Risk Appraisal Combining a scientific risk assessment (of the hazard and its probability) with a systematic concern assessment (of public concerns and perceptions) to provide the knowledge base for subsequent decisions Characterization and Evaluation In which the scientific data and a thorough understanding of social values affected by the risk are used to evaluate the risk as acceptable, tolerable (requiring mitigation), or intolerable (unacceptable) Risk Management The actions and remedies needed to avoid, reduce transfer or retain the risk Risk Communication How stakeholders and civil society understand the risk and participate in the risk governance process

Risk Appraisal: Risk Assessment Purpose: understand uncertain but possible consequences associated with specific hazards and their potential; scientific assessment of risk Goal: estimation of the risk in terms of a probability distribution of the modeled consequences Components: Hazard identification and estimation Assessment of exposure and/or vulnerability Estimate of risk based on hazards and exposure/vulnerability assessment 6

Risk Appraisal: Concern Assessment Considers social and economic implications of the risks, including Stakeholders’ concerns and questions Financial and legal implications Secondary social and economic consequences Examples The community concerns associated with working on a hemorrhagic fever virus The use of an armed guard at the front of a building 7

Risk Appraisal Discussion Discussion: Current risk assessment methods used for biorisks How are hazards identified and estimated? How are exposures and vulnerabilities assessed? How are the likelihood and severity of consequences determined? Discussion: Biorisks and concern assessment What is the public familiarity and experience with the hazards? What do they understand about the nature of the hazard and its potential impacts? What are the public perceptions of fear and dread for the biorisks? What is the public’s perception of institutional control to manage the risks? How much does the public trust the risk managers?

Evidence-based Risk Characterization 9 Consequences Likelihood LOWMODERATEHIGH LOW MODERATE HIGH

Value-based What is acceptable, tolerable, and intolerable? Risk Evaluation 10 Very High Consequences Likelihood LOWMODERATEHIGH LOW MODERATE HIGH Very Low Low Moderate High Protect against unacceptable risk scenarios Develop incident response plans for acceptable risk scenarios

Communication Two main audiences: Those who are central to risk analysis Others outside the risk analysis Four functions: Education and enlightenment Risk training and inducement of behavioral changes Creation of confidence in institutions responsible for the assessment and management of risk Involvement in risk-related decisions and conflict resolution Strategy for risk management and communication related to type of risk: Simple, complexity, uncertainty, ambiguity 11

BioRisk Assessments

Questions to think about What are the primary reasons/drivers for implementing biosafety and biosecurity? How do these drivers impact the risk appraisal? Are they part of the risk assessment or the concern assessment or both? Whose role is it to conduct a risk assessment? Whose role is it to evaluate the risk? Define the problem; what is the goal of a biosafety or biosecurity risk assessment?

Laboratory Biosafety

Laboratory Biosafety Risk Risk = F (Likelihood, Consequence) Likelihood The likelihood of infection by the agent and the likelihood of exposure through an infectious route based on the procedures and work practices Consequences Of disease from accidental exposure Risks To laboratory workers Researchers Animal care workers Technicians Engineers Risk of accidental exposure to community Risk of accidental exposure to animal community 15

Likelihood of infection Routes of infection of the agent (and infectious dose via that route) Inhalation Ingestion Contact Percutaneous Vector-Borne Stability of the agent Infection mitigation measures (existence of prophylaxis)

Potential of inhalation exposure to laboratory workers and to the community Procedures Mitigation measures Potential of ingestion exposure to laboratory workers and to the community Procedures Mitigation measures Potential of percutaneous exposure to laboratory workers and to the community Procedures Mitigation measures Potential of contact exposure to laboratory workers and to the community Procedures Mitigation measures Likelihood of exposure (based on the routes of infection)

Agent properties Morbidity Mortality Consequence mitigation measures Potential for secondary transmission Communicability (host to host) Transmissibility (route of infection between hosts) Consequence of disease

Questions to think about What factors should be considered when assessing the risk to the human and animal community? What factors should be considered when looking at the risk of secondary exposure? How should the concern assessment be reflected in the technical risk assessment? How should the biosafety risks be evaluated? Likelihood and consequences equally?

Introduction to Design Basis Threat

Biosecurity Illustrative Cases Ft. Detrick attempt Eric Kranz Dr. Mitsuru Suzuki Diane Thompson Rajneesh Cult Aum Shinrikyo Cult Amerithrax perpetrator

23 What is Design Basis Threat? A DBT establishes the objectives of a facility security system Defines the assets to be protected Defines the threats to protect those assets against A DBT is necessary to ensure that security resources are used as efficiently as possible Ensures security system is designed for specific operations Security for biocontainment facilities should be different than an airport or bank Avoids blanket protection – protecting everything equally “Protect pencils like pencils, and diamonds like diamonds” Keeps the security experts in their lane Contractors will inevitably act in their own interest Critical that the DBT be set by policy – by the institution’s owners who are ultimately responsible for all of the institute’s operations and programs Only the institution’s owners can articulate the institution’s level of risk tolerance

24 DBT directly affects resources and operations A DBT that reflects a highly risk averse management position i.e. many assets must be protected from many different threats Security system may be very expensive to install, operate, and maintain Security system may significantly infringe on the institute’s operations A DBT that reflects a highly risk tolerant management position i.e. few assets must be protected from few threats Security system may be relatively inexpensive to install, operate, and maintain Security system may have little impact on the institute’s operations Security system may have many vulnerabilities

25 Internal Pressures on DBT Security inevitably affects the institution’s operations Uses resources that could otherwise be directed elsewhere Increases the cost of operations, costs that you must be able to pass on to your sponsors and customers Will impact daily work of the staff – may make completing research more difficult, more expensive May limit who can work in the institute, and when they can work Security inevitably affects the institution’s operations Institution’s police Emergency responders Maintenance Shipping Procurement Legal

26 External Pressures on DBT What international, national, and/or local regulations specifically apply? BWC/UNSCR 1540 – general call to secure materials that could be used for developing a biological weapon National regulations such as the US Select Agent Rule – it defines “select agents” as assets that must be protected, but it does not define what those agents must be protected against (“risk assessment”) Are there any local regulations that must be incorporated into the DBT? Perhaps the most important external consideration is political Can you defend your security posture to your sponsors, your community? Imagine an interview with the media on this subject… Imagine if something went wrong…can you defend yourself?

27 DBT as Policy DBT attempts to resolve all of these thorny issues DBT should be developed by a select group of all relevant stakeholders Those who work in the labs: scientists, technicians, animal care givers, et al. Those who work in the building: operations, maintenance, management, et al. Those who work on the campus: administrators, Legal, et al. DBT should become policy, signed by the highest authority possible That person who ultimately takes responsibility for all operations and programs at the institute – science, safety, security, etc. That person who ultimately controls the resources for the institute That person who ultimately will be accountable if something goes wrong DBT will be sensitive information, and should be protected accordingly

28 How should the DBT be used? DBT should be given to team responsible for conducting the site security risk assessment or vulnerability assessment Tasking should be for the security risk assessment team to evaluate the institution against the objectives specified in the DBT What is the relative risk of the various defined threats attacking the various defined assets? Does the current security system appropriately focus on the defined security scenarios that are highest risk? Are security resources proportionally allocated to mitigate the highest risks? What vulnerabilities exist that need to be corrected? (unacceptable risk) What vulnerabilities exist that do not need to be corrected? (acceptable risk)

29 Following the site security risk assessment The institution should use the risk assessment results to determine whether or how the existing security system should be modified or improved After any necessary modifications, the institution should have a security system that meets all the objectives of the DBT, and also prioritizes security against the highest risk security scenarios Then, the institution should write a laboratory biosecurity plan that reflects the full operation of the resulting security system The security plan should reference the site risk assessment, and the site risk assessment should reference the DBT Combined, all three documents will help ensure an effective and efficient security system, and should satisfy any external auditors

30 Establishing a DBT – defining assets The easy part…. Define the assets that should be protected at the institution Dangerous pathogens Other pathogens Specific equipment Specific facilities Specific information Etc.

31 Establishing a DBT – defining threats The hard part… Little information about terrorists’ interest in biological weapons, or their methods for acquiring them Few bioscience facilities have been attacked by adversaries Little to no information available about the targeting of bioscience facilities But…it happens Define the threats that the defined assets should be protected against Insiders Scientists/technicians/animal care givers Operations and maintenance personnel/administrative personnel Visitors Etc. Outsiders Individuals Animal rights groups Terrorist groups Etc.

32 Establishing a DBT – defining scenarios Last step is to combine the assets and threats into credible scenarios that the institution’s security system should protect against

Laboratory Biosecurity

Laboratory Biosecurity Risks for Dangerous Pathogens Risk = F (Likelihood, Consequence) Likelihood The likelihood of theft from a facility and the likelihood an agent can be used as a weapon Consequences Of a bioattack with the agent Risks Persons in area of attack Persons in larger community from secondary exposure Animals in area of attack Animal in larger community from secondary exposure 35

Biosecurity Risk Assessment 1. Characterize biological agents and threats a. Evaluate pathogens and toxins at a facility (Asset Assessment) b. Evaluate adversaries who might attempt to steal those pathogens or toxins (Threat Assessment) 2. Characterize the facility a. Evaluate the likelihood the facility will be targeted b. Evaluate the likelihood of a successful theft (Vulnerability Assessment) 3. Characterize the risk a. Evaluate the overall likelihood and consequences of each scenario b. Determine acceptable and unacceptable risks; develop risk statement

Characterize the Biological Agents Agents potential as a biological weapon Biological Agent Properties Transmissibility Stability Awareness of agent’s BW potential Production and dissemination Consequences of a bioattack with agent Disease consequences Socioeconomic consequences Secondary exposure consequences

Characterize the Adversaries Adversary Classes Should be defined in design basis threat Terrorist Extremist Criminal Insiders Authorized access to the facility, dangerous pathogens, and/or restricted information Distinguish Insiders by level of authorized access Site Building Asset Outsiders No authorized access

Characterize the Facility Identify “specific adversaries” Operational Means Opportunity Identify “specific assets” Uniqueness of asset at facility Location of asset State of asset (e.g. in long-term storage, in active research, type of research, quantity, …)

Questions to think about What factors should be considered when assessing the risk to the human and animal community? What factors should be considered when looking at the risk of secondary exposure? How should the concern assessment be reflected in the technical risk assessment? How should the biosecurity risks be evaluated? Likelihood and consequences equally?

Conclusions A systematic, standardized biological risk assessment process enables: The analysis of the risk to identify driving factors and allow better realization of mitigation measures Enables better communication of risk Help to define what is acceptable risk Biorisk can be strengthened by standard risk governance approaches Risk assessment and risk decision are the critical foundations for the design of a laboratory biosafety and biosecurity program