WMD & Emergency Planning Steps Session 12. Emergency Planning Steps Vulnerability Assessment Mitigation Efforts Emergency Response Planning Recovery.

Slides:



Advertisements
Similar presentations
Tehran University of Medical Sciences Institute of Public Health Research Health in Emergency & Disaster Department (HE&DD) D isaster: Basic Terminology.
Advertisements

Museum Presentation Intermuseum Conservation Association.
Hazard and Risk Analysis What are the socio-economic and political trends? Consider recent assessment / reviews / baseline studies / analytical exercises.
Session 81 Comparative Emergency Management Session 8 Slide Deck.
Comparative Emergency Management
OCTAVESM Process 4 Create Threat Profiles
A Brief Overview of Emergency Management Office of Emergency Management April 2006 Prepared By: The Spartanburg County Office of Emergency Management.
Limitations of risk-based disaster reduction Tim Davies University of Canterbury, New Zealand COMMUNITY DISASTER REDUCTION CANNOT BE ACHIEVED USING RISK.
Implications for Caribbean Capital Markets 25 May, 2011 Marlene Murray CFA Society of Trinidad and Tobago.
Introducing Computer and Network Security
COMP8130 and COMP4130 Adrian Marshall Verification and Validation Risk Management Adrian Marshall.
Mitigation Defined Session Name: Mitigation Defined Coastal Hazards Management Course Hazard ….a possible source of danger Slide 16.1 The American Heritage.
Session 141 Vulnerability to a natural hazard can be defined as to the extent to which people will experience harm and property will be damaged from that.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
EQAA 11th Session Jamil Kalat-Malho Jong Ho Lee
DEFINITION OF CONCEPTS Disaster: A serious disruption of society, causing widespread human, material or environmental losses that exceed the capacity of.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
Risk Management for Technology Projects Geography 463 : GIS Workshop May
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Types of Risk Introduction To Business. Today’s Goals Define risk and the different types of economic risk. Determine which risks are controllable and.
Risk analysis workshop Dec Objectives of the workshop: Impact Intervention  Discuss the function of hazard and risk analysis in contingency planning.
Copyright © 2012 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 19: Community Preparedness: Disaster and Terrorism.
THE MITIGATION PHASE OF DISASTER RESPONSE Rev. Dr. Paul Wood, Jr. Greenwood District Disaster Response Coordinator.
US Army Corps of Engineers BUILDING STRONG ® Texoma and Missouri Region JETS Training Symposium Resiliency Planning Through Hazard Vulnerability Analysis.
Session 181 Risk Analysis RISK = LIKELIHOOD X CONSEQUENCE.
THE LOW DOWN ON RISK ASSESSMENT HOW SAFE ARE OUR CITIES?
Chapter 6 – Personal Risk Management Lesson 6
Business Continuity Planning MIKE FAITHFULL MBCI Corporate Continuity Manager Information Management Division.
Risk Management CS5493. Risk Management The process of ● identifying, ● assessing, ● prioritizing, and ● mitigating risks.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
Business Continuity Planning  What is it?  Why do we do it?  How do we do it?
Certified Protection Officer Program. Chapter 1 Unit 1 Concepts and Theories of Asset Protection Pages 3-11.
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
PPA 573 – Emergency Management and Homeland Security Lecture 1a – What Is Emergency Management?
2.2.3 Managing risk in a humanitarian response Learning objectives: At the end of this session, participants will be able to: Define risk List potential.
Key Words in disaster Management Dhammika Mahendre.
Engineering | Architecture | Design-Build | Surveying | Planning | GeoSpatial Solutions November 16, 2015 THE AWWA J100 - WHAT IT IS, WHY IT IS BEING UPDATED,
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Risk assessment and Natural Hazards. Concept of vulnerability (e.g. fatalities in two contrasting societies) Deaths 1 …………………………………………
WMD Operations Unit 1 slide 1 MODULE 2 UNIT 1 Training at the Awareness Level Review.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
RISK & ITS MANAGEMENT. Risk A crisis situation involves : - a threat to resource & people, - a loss of control, - visible and / or invisible effects on.
2007 Office of Risk Management Annual Conference 2007 David M. Shapiro Disaster Planning & Recovery Consultants
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
The process of identifying and controlling the risks is called Risk Management.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Headquarters U.S. Air Force
Threat (or hazard) How many t hings can you think of that threaten you with disaster? Industrial Accident EKTA ? Others? NOAA Cyclone New York Times Epidemic.
Risk Assessment OSHA 21/09/ WHAT IS RISK ASSESMENT? Risk Assessment is the process of determining the possibility of short and long term unfavorable.
Risk management Be aware. Take care.
Risk Assessment.
Risk Assessment.
Risk Management for Technology Projects
Research Project Overview
Partnership risk identification and evaluation
Disaster Management.
Air Carrier Continuing Analysis and Surveillance System (CASS)
SEC 240 Education on your terms/tutorialrank.com.
Security measures Introducing Risk Assessment in GDPR
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
Cybersecurity Threat Assessment
Training at the Awareness Level Review
Disaster Preparedness and Resilience
Information Security Risks; All-in-One Terminology
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Presentation transcript:

WMD & Emergency Planning Steps Session 12

Emergency Planning Steps Vulnerability Assessment Mitigation Efforts Emergency Response Planning Recovery

Emergency “Keep in mind that an emergency is an event that requires the response of a limited number of specified professionals in a single, confined setting. There can be several emergencies that result from a single event, such as a large building fire.”

Disaster “Generally, emergency services agencies view any situation that combines threats to humans, with destruction of property severe enough to warrant the assistance of several different types of emergency services, a disaster.”

Vulnerability Analysis Risk Characterization Assess assets Assign threat level Assign impact level Calculate risk Describe risk

Interchangable? Threat Risk NO!

Threat Threat is something that can be seen (hypothetically – a terrorist for example hides out but can be seen) and has the potential to cause harm, damage, loss of property or death. That potential cannot be measured by just considering threat.

Risk The mathematical or “relative” probability that a threat will actually cause harm, damage, loss of property or death. Is subjective and requires thought and calculation.

Threat

Risk?

Threat

Risk?

Threat?

Risk?

U.S. Government Says Risk is the probability that a substance or situation would produce harm under specified conditions. Risk is a combination of two factors:

Factors The probability that an adverse event will occur. (occurrence probability) The consequences of the adverse event. (consequences)

Formula OP X Impact = Risk You can determine OP by considering the threat and historical perspective and current events.

Examples High Risk 50-69Moderate High Risk 30-49Low Risk 1-29Very Low Risk No Such Thing as Zero

Mitigation Reducing (not removing) risk Lessening likelihood Lessening impact Generally, threats cannot be reduced Only probability of occurrence

Mitigation Methods Legislation (OP & impact) Education (OP & impact) Physical Alterations (OP & impact) Electronic Alterations

Mitigation Implementation Highest Risk Areas Highest Dollar Areas Highest Lives-Lost Areas Combination Theater