SlideShare una empresa de Scribd logo
1 de 27
POST “9/11” SECURITY What Does It Mean for Industrial and Wastewater Treatment Plants
Security Wake-Up Call ,[object Object],[object Object],[object Object],[object Object]
Industrial & Wastewater Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Industrial & Wastewater Security ,[object Object],[object Object],[object Object]
Key Infrastructure
Recent Security Legislation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Recent Security Legislation ,[object Object],[object Object],[object Object],[object Object]
Current Legislation ,[object Object],[object Object],[object Object]
Security Vulnerability Assessment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What To Do ,[object Object],[object Object],[object Object],[object Object]
Prudent Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Deterrent Approach ,[object Object],[object Object],[object Object],[object Object]
Factors Affecting Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Delay/Response
Client XXX Security Improvement Cost Estimate Sandia Methodology Approach Summary of Risk Reduction Solutions for Client XXX $3,590,000 TOTAL 1,060,000 Hardening Measures As Above (3C) 300,000 Perimeter Security Improvements & Upgrade As Above (3B) 1,240,000 Perimeter Security Improvements & Upgrade WTP Facility (3A) $190,000 Hardening Measures As Above (2B) $200,000 Perimeter Security Improvements Control # Y & I-XX/C-XX Culverts (2A) $600,000 Perimeter Security Improvements & Upgrades Control # X (1B) $TBD Relocate with New Housing Control # X (1A) ESTIMATED COST DESCRIPTION CRITICAL ASSET RISK REDUCTION SOLUTION
Deterrent Approach ,[object Object],[object Object],[object Object],Successfully utilized within the security industry for many years
Main Features of Deterrent Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Differences in Cost ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sandia Approach Deterrent Approach
Client XXX Security Improvement Cost Estimate Sandia Methodology Approach Summary of Risk Reduction Solutions for Client XXX $3,590,000 TOTAL 1,060,000 Hardening Measures As Above (3C) 300,000 Perimeter Security Improvements & Upgrade As Above (3B) 1,240,000 Perimeter Security Improvements & Upgrade WTP Facility (3A) $190,000 Hardening Measures As Above (2B) $200,000 Perimeter Security Improvements Control # Y & I-XX/C-XX Culverts (2A) $600,000 Perimeter Security Improvements & Upgrades Control # X (1B) $TBD Relocate with New Housing Control # X (1A) ESTIMATED COST DESCRIPTION CRITICAL ASSET RISK REDUCTION SOLUTION
Client XXX Security Improvement Cost Estimate Deterrent Methodology Approach Summary of Risk Reduction Solutions for Client XXX $1,133,900 TOTAL  REDUCTION OF 68.42% $1,060,000 Hardening Measures As Above (3C) $192,000 Perimeter Security Improvements & Upgrade As Above (3B) $560,500 Perimeter Security Improvements & Upgrade WTP Facility (3A) N/A Hardening Measures As Above (2B) $105,400 Perimeter Security Improvements Control # Y & I-XX/C-XX Culverts (2A) $276,000 Perimeter Security Improvements & Upgrades Control # X (1B) $TBD Relocate with New Housing Control # X (1A) ESTIMATED COST DESCRIPTION CRITICAL ASSET RISK REDUCTION SOLUTION
Industry Quotes “ The current approach to facility sites ignores the tremendous value of deterrence that can be achieved at a fraction of the cost proposed for hardening the site.  Except at the highest profile sites, the threat to the site can be reasonably deterred without building a fortress.” James M. Woodruff, PE, CPP CEO American Consulting Engineers
Industry Quotes " The Design Basis Threat for many facilities is ‘Environmental/Social Extremist’ or lower.  This level of threat does not need the levels of protection recommended for ‘domestic terrorist’ or ‘state sponsored foreign terrorist.’  Concentration on deterrence countermeasures can markedly reduce the cost of protecting the site and provide an appropriate measure of security protection consistent with the Design Basis Threat level."   David L. Rockford President, The Wickford Group
Consideration ,[object Object]
Summation of Benefits ,[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions ,[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Eng. Mohamad Itani - when disasters shake global supply chain
Eng. Mohamad Itani - when disasters shake global supply chainEng. Mohamad Itani - when disasters shake global supply chain
Eng. Mohamad Itani - when disasters shake global supply chain
kuwaitsupplychain
 
Common Sense Guide to Mitigating Insider Threats
Common Sense Guide to Mitigating Insider ThreatsCommon Sense Guide to Mitigating Insider Threats
Common Sense Guide to Mitigating Insider Threats
Sammie Gillaspie
 

La actualidad más candente (16)

Eng. Mohamad Itani - when disasters shake global supply chain
Eng. Mohamad Itani - when disasters shake global supply chainEng. Mohamad Itani - when disasters shake global supply chain
Eng. Mohamad Itani - when disasters shake global supply chain
 
Countering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design IssueCountering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design Issue
 
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
 
2016 Resilience Survey for Real Estate and Critical Infrastructure Projects
2016 Resilience Survey for Real Estate and Critical Infrastructure Projects2016 Resilience Survey for Real Estate and Critical Infrastructure Projects
2016 Resilience Survey for Real Estate and Critical Infrastructure Projects
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
FM 1 44 damage limiting construction presentation May 2008
FM 1 44 damage limiting construction presentation May 2008FM 1 44 damage limiting construction presentation May 2008
FM 1 44 damage limiting construction presentation May 2008
 
Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
 
Incident Response: Security's Special Teams
Incident Response: Security's Special TeamsIncident Response: Security's Special Teams
Incident Response: Security's Special Teams
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Management
 
ADGAS Courses
ADGAS CoursesADGAS Courses
ADGAS Courses
 
Pragmatic Device Risk Management
Pragmatic Device Risk Management Pragmatic Device Risk Management
Pragmatic Device Risk Management
 
Common Sense Guide to Mitigating Insider Threats
Common Sense Guide to Mitigating Insider ThreatsCommon Sense Guide to Mitigating Insider Threats
Common Sense Guide to Mitigating Insider Threats
 
IntegratedAirMissileDefense18[593665]
IntegratedAirMissileDefense18[593665]IntegratedAirMissileDefense18[593665]
IntegratedAirMissileDefense18[593665]
 

Destacado (7)

Pomomusings & Beer: Opening up the Conversation for All
Pomomusings & Beer: Opening up the Conversation for AllPomomusings & Beer: Opening up the Conversation for All
Pomomusings & Beer: Opening up the Conversation for All
 
Romania Google Technology User Groups
Romania Google Technology User GroupsRomania Google Technology User Groups
Romania Google Technology User Groups
 
Medical2
Medical2Medical2
Medical2
 
პრეზენტაცია
პრეზენტაციაპრეზენტაცია
პრეზენტაცია
 
First Bucharest GTUG event 02 Mar 2010
First Bucharest GTUG event 02 Mar 2010First Bucharest GTUG event 02 Mar 2010
First Bucharest GTUG event 02 Mar 2010
 
Xabier Laida2
Xabier Laida2Xabier Laida2
Xabier Laida2
 
Bucharest GTUG - Roo and GWT - 01 June 2010
Bucharest GTUG - Roo and GWT - 01 June 2010Bucharest GTUG - Roo and GWT - 01 June 2010
Bucharest GTUG - Roo and GWT - 01 June 2010
 

Similar a Wastewater Workshop Presentation 2007[2 R]

Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment.
TakishaPeck109
 
Bruce avrill
Bruce avrillBruce avrill
Bruce avrill
IPPAI
 

Similar a Wastewater Workshop Presentation 2007[2 R] (20)

The New Security - Post "9/11"
The New Security - Post "9/11"The New Security - Post "9/11"
The New Security - Post "9/11"
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
 
Personal_vs_Process_Safety_v3.pdf
Personal_vs_Process_Safety_v3.pdfPersonal_vs_Process_Safety_v3.pdf
Personal_vs_Process_Safety_v3.pdf
 
Enform oil and gas safety: Process safey vs. personal safety
Enform oil and gas safety: Process safey vs. personal safety Enform oil and gas safety: Process safey vs. personal safety
Enform oil and gas safety: Process safey vs. personal safety
 
Machine guarding
Machine guardingMachine guarding
Machine guarding
 
risk analysis
risk analysisrisk analysis
risk analysis
 
risk analysis
 risk analysis risk analysis
risk analysis
 
Pa awwa2006 presentationrev1fin_feb
Pa awwa2006 presentationrev1fin_febPa awwa2006 presentationrev1fin_feb
Pa awwa2006 presentationrev1fin_feb
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment.
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment.
 
Construction Accident Risk Management
Construction Accident Risk ManagementConstruction Accident Risk Management
Construction Accident Risk Management
 
RISK MANAGEMENT
RISK MANAGEMENTRISK MANAGEMENT
RISK MANAGEMENT
 
Securing the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded SoftwareSecuring the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded Software
 
3 waysecure brochure
3 waysecure brochure3 waysecure brochure
3 waysecure brochure
 
Safety Engineering in Project Supervision.pptx
Safety Engineering in Project Supervision.pptxSafety Engineering in Project Supervision.pptx
Safety Engineering in Project Supervision.pptx
 
Safety Engineering in Project Supervision.pptx
Safety Engineering in Project Supervision.pptxSafety Engineering in Project Supervision.pptx
Safety Engineering in Project Supervision.pptx
 
Risks in cc
Risks in ccRisks in cc
Risks in cc
 
Bruce avrill
Bruce avrillBruce avrill
Bruce avrill
 

Más de Wivenhoe Management Group (7)

Multi elementary school security case study. Preventing a "Newtown"
Multi elementary school security case study. Preventing a "Newtown"Multi elementary school security case study. Preventing a "Newtown"
Multi elementary school security case study. Preventing a "Newtown"
 
AWWA 2012 St Louis Security Presentation
AWWA 2012 St Louis Security PresentationAWWA 2012 St Louis Security Presentation
AWWA 2012 St Louis Security Presentation
 
AWWAWCEnv1102.009
AWWAWCEnv1102.009AWWAWCEnv1102.009
AWWAWCEnv1102.009
 
Security awareness exampletr(rev1)1011.015
Security awareness exampletr(rev1)1011.015Security awareness exampletr(rev1)1011.015
Security awareness exampletr(rev1)1011.015
 
Security vulnerability assessment & liability dsm linkedin
Security vulnerability assessment & liability dsm linkedinSecurity vulnerability assessment & liability dsm linkedin
Security vulnerability assessment & liability dsm linkedin
 
Security vulnerability assessment & liability(li)
Security vulnerability assessment & liability(li)Security vulnerability assessment & liability(li)
Security vulnerability assessment & liability(li)
 
Paawwa2008 Cpted(Version 6)Final
Paawwa2008 Cpted(Version 6)FinalPaawwa2008 Cpted(Version 6)Final
Paawwa2008 Cpted(Version 6)Final
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Wastewater Workshop Presentation 2007[2 R]

  • 1. POST “9/11” SECURITY What Does It Mean for Industrial and Wastewater Treatment Plants
  • 2.
  • 3.
  • 4.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 16. Client XXX Security Improvement Cost Estimate Sandia Methodology Approach Summary of Risk Reduction Solutions for Client XXX $3,590,000 TOTAL 1,060,000 Hardening Measures As Above (3C) 300,000 Perimeter Security Improvements & Upgrade As Above (3B) 1,240,000 Perimeter Security Improvements & Upgrade WTP Facility (3A) $190,000 Hardening Measures As Above (2B) $200,000 Perimeter Security Improvements Control # Y & I-XX/C-XX Culverts (2A) $600,000 Perimeter Security Improvements & Upgrades Control # X (1B) $TBD Relocate with New Housing Control # X (1A) ESTIMATED COST DESCRIPTION CRITICAL ASSET RISK REDUCTION SOLUTION
  • 17.
  • 18.
  • 19.
  • 20. Client XXX Security Improvement Cost Estimate Sandia Methodology Approach Summary of Risk Reduction Solutions for Client XXX $3,590,000 TOTAL 1,060,000 Hardening Measures As Above (3C) 300,000 Perimeter Security Improvements & Upgrade As Above (3B) 1,240,000 Perimeter Security Improvements & Upgrade WTP Facility (3A) $190,000 Hardening Measures As Above (2B) $200,000 Perimeter Security Improvements Control # Y & I-XX/C-XX Culverts (2A) $600,000 Perimeter Security Improvements & Upgrades Control # X (1B) $TBD Relocate with New Housing Control # X (1A) ESTIMATED COST DESCRIPTION CRITICAL ASSET RISK REDUCTION SOLUTION
  • 21. Client XXX Security Improvement Cost Estimate Deterrent Methodology Approach Summary of Risk Reduction Solutions for Client XXX $1,133,900 TOTAL REDUCTION OF 68.42% $1,060,000 Hardening Measures As Above (3C) $192,000 Perimeter Security Improvements & Upgrade As Above (3B) $560,500 Perimeter Security Improvements & Upgrade WTP Facility (3A) N/A Hardening Measures As Above (2B) $105,400 Perimeter Security Improvements Control # Y & I-XX/C-XX Culverts (2A) $276,000 Perimeter Security Improvements & Upgrades Control # X (1B) $TBD Relocate with New Housing Control # X (1A) ESTIMATED COST DESCRIPTION CRITICAL ASSET RISK REDUCTION SOLUTION
  • 22. Industry Quotes “ The current approach to facility sites ignores the tremendous value of deterrence that can be achieved at a fraction of the cost proposed for hardening the site. Except at the highest profile sites, the threat to the site can be reasonably deterred without building a fortress.” James M. Woodruff, PE, CPP CEO American Consulting Engineers
  • 23. Industry Quotes " The Design Basis Threat for many facilities is ‘Environmental/Social Extremist’ or lower.  This level of threat does not need the levels of protection recommended for ‘domestic terrorist’ or ‘state sponsored foreign terrorist.’ Concentration on deterrence countermeasures can markedly reduce the cost of protecting the site and provide an appropriate measure of security protection consistent with the Design Basis Threat level." David L. Rockford President, The Wickford Group
  • 24.
  • 25.
  • 26.
  • 27.