Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.

Slides:



Advertisements
Similar presentations
FIA Prague Preparation February 6, Scenario planning approach We cannot predict the future We cannot predict the future We do understand the drivers.
Advertisements

National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
S5-1 © 2001 Carnegie Mellon University OCTAVE SM Process 5 Identify Key Components Software Engineering Institute Carnegie Mellon University Pittsburgh,
August 9, 2005UCCSC Converting Policy to Reality Building Campus Security Programs Karl Heins -- Director of IT Audit Services Office of the University.
By: Ashwin Vignesh Madhu
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
RISK ASSESSMENT MATRIX FOR PORT INFRASTRUCTURE CHRIS EDWARDS AECOM Inc.
Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.
Sindhuri Juturu Department of Computer Science Texas Tech University
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
TEAM FOUNDATION SERVER (TFS) By Sunny Niranjana Devi. M.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
Maritime Security Risk Analysis Model
1 Oppliger: Ch. 15 Risk Management. 2 Outline Introduction Formal risk analysis Alternative risk analysis approaches/technologies –Security scanning –Intrusion.
CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)
Assurance Case Approach TECNALIA Inspiring Business Novara November, 2013 TRIAL WS.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
State Homeland Security Assessment and Strategy Program Develop Planning Factors for CBRNE Scenarios.
Critical Infrastructure Protection: Program Overview
U. S. Coast Guard Requirements Maritime Security.
Securing Critical Chemical Assets: The Responsible Care ® Security Code Protection of Hazardous Installations from Intentional Adversary Acts European.
1 st Seminar Session on Risk and Security Issues Center for Risk and Security The George Perkins Marsh Institute Conference Room May 13 th, 2005.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
EPA Homeland Security Strategy  Critical Infrastructure Protection  Preparedness, Response & Recovery  Communication and Information  Protection of.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
U. S. Coast Guard Security Maritime Transportation.
SEC835 Security in Databases and Web applications Presentation.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Title: Applying the Port Security Risk Assessment Tool to Planning Needs Presenter’s Name: Lindsay Dew Economy: ABS Consulting 33rd APEC Transportation.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Swedish Risk Management System Internal management and control Aiming to Transport Administration with reasonable certainty to.
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
COST BENEFITS OF IMPLEMENTING CREDIT CARD DATABASE TOKENIZATION USING FAIR CASE STUDY SHARED COURTESY OF RISKLENS CONFIDENTIAL - FAIR INSTITUTE
Click to edit Master title style Click to edit Master subtitle style 1 [Source: TREX-8656] 1 1 BP Internal Flow Rate EstimatesReported to Coast Guard Internal.
Risk Assessment What is good about the Microsoft approach to threat modeling? What is bad about it? OCTAVE…  Advantage: ___________  Disadvantage: ___________.
Homeland Security UNCLASSIFIED Coast Guard Cyber Strategy Awareness Training.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
Access Account Activation and Electronic Signature Web Application.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
1 Portland Office of Emergency Management (POEM) Urban Areas Security Initiative State Homeland Security Office of Domestic Preparedness - Grant Programs.
SEC 310 Entire Course For more classes visit SEC 310 Week 1 Goals and Objectives For a Security Organization Paper SEC 310 Week 1.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
CYSM RISK ASSESSMENT TOOLKIT PROCEDURES I David Calduch Project Manager Port planning and Development Dept. VALENCIAPORT FOUNDATION.
MGT 311 Week 1 DQ 2 What type of assessments and evaluations might you use to determine the characteristics of your employees? Does the type of tool used.
MGT 350 Week 5 DQ 2 What standards would you set for evaluating the outcomes of a decision? How do these tools and techniques equate to increased organizational.
HCR 230 Week 7 CheckPoint Effective Financial Policies and Procedures To purchase this material click below link
Information Systems Security
Terrorism Risk Assessment and Management (TRAM) Methodology Overview Briefing June 6, 2008.
Figure 1. Critical Infrastructure Organizations Believe that the Cyber-threat Landscape Is Getting Worse From: ESG Brief: Critical Infrastructure Organizations.
Compliance with hardening standards
Apples-to-Apples: LIRA vs. RAMCAP
SEC 400 Competitive Success/snaptutorial.com
SEC 310 Competitive Success/snaptutorial.com
CIS 333 RANK Perfect Education/ cis333rank.com.
SEC 400 Education for Service-- snaptutorial.com.
SEC 310 Education for Service/snaptutorial.com
CIS 333 RANK Education for Service-- cis333rank.com.
Gregory Morton COSC380 February 16, 2011
Chemical Facilities Vulnerability Assessment
TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH
درس تطبيقي مادة التربية الفنية للصف الرابع الابتدائي
FY 2014 SHSP and UASI Risk Formula
Securing Critical Chemical Assets: The Responsible Care® Security Code
Final Conference 18 Set 2018.
Effective Risk Management in Decision Making Process
Шаттық шеңбері.
Security Partner / Customer Engagement Flow
Presentation transcript:

Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States Coast Guard Economy: USA

2 Port Security Risk Assessment Tool (PSRAT): Relative risk ranking tool that enables users to assess infrastructure geographically. How does PSRAT work?  PSRAT converts subjective evaluations into quantitative risk values.  Uses the equation: Risk = Threat x Consequence x Vulnerability  Threats, Consequences, and Vulnerabilities are assessed for specific attack scenarios.

3 The tool is a Microsoft Access 2000 based application. Input screens are used to capture data needed for analysis. All data is stored in the Access database.

4 TargetScenario

5 PSRAT as a risk management tool can help:  Identify critical infrastructure  Estimate the effectiveness of countermeasures  Define risk management strategies  Allocate resources

6 Click on the IPS Program link