TEFMA 2008 Sudhish Nayyar. AGENDA CRISIS –What is the worst thing that could happen? –Where? –When? Steps in effective Crisis Management Aon’s capabilities.

Slides:



Advertisements
Similar presentations
SAFE AND WELL Angela McKinnon Feb What is Safe and Well? A document building on previous guidance - part of the SE reform programme Supplement.
Advertisements

Protecting the Public, Astronauts and Pilots, the NASA Workforce, and High-Value Equipment and Property Mission Success Starts With Safety “September 11th.
Implementation of the Seveso II Directive 96/82/EC Institutional Strengthening of the Slovak Environmental Agency Emergency Response Principles and Practice.
OVERCOMING CHALLENGES IN EMERGENCY MANAGEMENT NAWIC May 2013.
Steps to Prevent School Violence Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates Bradley, IL.
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
Responsible CarE® Process Safety Code David Sandidge Director, Responsible Care American Chemistry Council June 2010.
Health and Safety - an update Ian Gillett Safety Director.
Visual 3.1 Unified Command Unit 3: Unified Command.
Alexander Brandl ERHS 561 Emergency Response Environmental and Radiological Health Sciences.
Tara international Humanitarian Staff Security Training.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Emergency Plan GENERAL AWARENESS TRAINING. Aim To provide staff with an overview of the school emergency plan.
“Who’s In Charge?” “THE COMMAND SECTION”. The Incident/Unified Commander Incident/Unified Commander(s) provides direction and guidance through:  Key.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Hull and East Yorkshire Hospitals NHS Trust Membership Event: 7 October 2014 Emergency Preparedness: How would HEY respond to a major incident?
Stephen S. Yau CSE , Fall Security Strategies.
Event Management “The Special Edition”. Stay Safe Instructional Programs – CSIS 2008 – Seminar Topics Structure to Event Planning. Role of.
Session 3 – Information Security Policies
Business Continuity Check List PageOne. - Why Does Your Business Need A Continuity Checklist? Should the unexpected occur, your business will be able.
Crisis Management Planning Employee Health Safety and Security Expertise Panel · Presenter Name · 2008.
Safety procedures in sport
Hazardous Waste and Emergency Response
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Risk Management and NSQHS Standards, Standard 3 – Preventing and Controlling Healthcare Associated Infections Sue Greig Senior Project Officer National.
EMERGENCY RESPONSE PLANNING 2005 ARIPPA Technical Symposium David B. Binder Tanner Industries, Inc
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
A Major Business Disruption A Strategy for Minimising the Downtime Anthony Hegarty Mitigating Risks.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
A Masterclass in Crisis Management Presented by Alba 17 th June 2011.
SCHOOL SECURITY AND SAFETY PLAN STAFF TRAINING DEERFIELD COMMUNITY SCHOOL DISTRICT.
Effectively Managing Transit Emergencies. Nature of Emergencies and Disasters Overview What Is an Emergency? What Is a Disaster? Differences What Is Emergency.
ADM 677 Crisis Management in Educational Settings Karen McCuiston Kentucky Center For School Safety.
Chapter 3 Applying Risk Management Types 3-1. Introduction Dynamic changes can occur during an emergency Constant stress on emergency responders at an.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Note1 (Admi1) Overview of administering security.
International Labour OrganizationInternational Maritime Organization Summary of the ILO-IMO Code of Practice on Security in Ports.
Nuclear Security Culture William Tobey Workshop on Strengthening the Culture of Nuclear Safety and Security, Sao Paulo, Brazil August 25-26, 2014.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Supplier Forum 2007 Corporate Security 14/11/2007.
International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson THE LINK BETWEEN.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Incident Response… Be prepared for “not if” but “when” it happens.
Principles of I-4 Risk Management. 2 Prevention of Serious Incidents is The Highest Priority.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
© Plan Plan’s Security Framework – A Refresher. © Plan Understanding Ourselves Values - Child Rights, Impartial, Neutral, Sensitive Mandate - Child Centred,
Tom Lenart & John Field CT DEMHS Region 2.  Department of Emergency Services and Public Protection (DESPP)  Commission on Fire Prevention and Control.
School Safety and Security Proposed Projects and Upgrades.
Business Continuity Disaster Planning
Florida Operations Level Hazardous Materials Training Unit 3.2 Command and Safety.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Thinking the Unthinkable Effective Crisis Planning in International Schools Simon O’Grady Principal The British International School, Cairo.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Strategic Communications Training Crisis Communications X State MDA 1.
Threat into Risk: A Challenge for Security Guidance AusRAIL 2006 Tony Beard Office of Transport Security Department of Transport and Regional Services.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Information Security Program
Cybersecurity - What’s Next? June 2017
Disaster and Emergency Planning
Risks & Reality Cyber Security Risks & Reality
ROB PROW MIPI/MCMI ALTERNATIVE SOLUTIONS LIMITED
IS-700.A: National Incident Management System, An Introduction
Unit 1 Emergency Procedures.
Cyber Security in a Risk Management Framework
Unit Terminal Objective
Presentation transcript:

TEFMA 2008 Sudhish Nayyar

AGENDA CRISIS –What is the worst thing that could happen? –Where? –When? Steps in effective Crisis Management Aon’s capabilities

WHAT IS THE WORST THING THAT COULD HAPPEN, WHERE…WHEN Major Fire Hostage Taking Pandemic Terrorism Explosion Sabotage

OVERVIEW OF CRISIS MANAGEMENT Crisis Prevention Objectives Incident Management Framework Post-Incident Analysis

CRISIS PREVENTION OBJECTIVES Assess –Structure –Vulnerability analysis –Measure exposure and develop a gap analysis Design –Crisis management plans –Training & simulations Implement –On-site and Off-site command centre –Test readiness of response teams Improve –Network to leverage tools and resources –Regime of continuos improvement

STRUCTURE In the midst of a crisis the greatest need is for “Direction” Level of Board/Executive involvement in crisis management –Risk culture of the organisation –Sponsorship at the highest level –Policies and codes

INTELLIGENCE Continuos intelligence building –Regular environment scan –Available networks –On site reporting Screening process for employees / students / contractors –Established (Legal) process & protocols –Communication flows

INTELLIGENCE Size of “Backyard” Resources Using the intelligence network to prioritise and focus

SECURITY INFRASTRUCTURE In-house or Outsourced –Brief –Turnover –Competency checks –Background checks Training regime –Regularity –Focussed

Technology Interface with information network SECURITY INFRASTRUCTURE

THREAT ASSESSMENT US Secret Service study found that in nearly 75% of incidents of serious violence at schools, other students were aware that attacks had been planned before they actually occurred In more than half of all cases, more than one person had expressed concern to others prior to the attack

THREAT ASSESSMENT Staff training in recognising signs –Mechanisms for reporting –Protocols to assess and respond –Developing scenarios/patterns based on knowledge

CRISIS MANAGEMENT TEAM Roles and responsibilities Strategic and tactical Intelligence interfaces Communication flows

INCIDENT MANAGEMENT FRAMEWORK Crisis Management Plan –Infrastructure requirements for command centre –Affected area Accurate and up-to-date site plans Population count Isolation procedures Public address system Evacuation plans Safe haven areas

RESPONSE OBJECTIVES Be on the scene Acting swiftly and decisively Preservation of life and assets Preservation of Forensic Evidence Restoration of normality as soon as possible

CONSIDERATIONS All major school shootings over the last ten years have occurred in schools located in small towns not large inner city schools Have you ever heard what a gunshot sounds like inside of your school ? If not, how would you know what it really was if it happened in your school? Have you ever seen a pipe bomb, or any other type of improvised explosive device ? If you haven’t ever seen one before, than how do you know what to look for during a bomb threat?

RESPONSE ACTIONS What to look for –that which should not be there –that which can not be accounted for –that which is out of place Search priorities –Evacuation routes & ‘safe’ areas –Public areas/assembly locations –Car parks, outside areas & perimeter –Office areas + ‘back of house’

CRISIS COMMUNICATIONS Crisis communication plan Be straightforward Provide facts Communicate proactively with the media, including the internet Managing cultural issues

POST INCIDENT ANALYSIS Review causes and effects Assess performance Capture lessons learned Update plans

IN SUMMARY 1.What did you know? 2.When did you know it? 3.What did you do about it? 4.What are you going to do to ensure that it never happens again?

AON SPECIALITY DIVISIONS Experts in specialist areas. Worldwide initiative. Enterprise risk management