SlideShare una empresa de Scribd logo
1 de 34
Cohorts LLP
Security Risk Management




                      Presentation to
                      Network Rail

                     June 2011
Cohorts LLP
Security Risk Management




                           The Team
          • Chenaga
          • Cohorts
          • Vigie
Cohorts LLP


                                                         Scope
Security Risk Management




          •        Project Justification
          •        Network Rail is the subject of endemic metal theft, affecting operational delivery to the public
                   costing hundreds of thousands of pounds per calendar month to shareholders.

                   Project Product
          •        Fixed wing Aerial Surveillance Platform,
          •        Project Management
          •        Intelligence fusion and lead operations through resource integration

          •        Project Deliverables
          •        Reduction in metal theft - to be agreed in SLAs and KPIs
          •        Ferrous Watch will contribute to an increase percentage in apprehension rates to be agreed in
                   SLAs and KPIs
          •        Increased graphical software interface for intelligence analysis and planning
          •        Increased situational awareness
          •        Increased theft deterrence through media controlled released coverage
          •        Increase the risk of discovery of malicious operatives

                   Project Objective
          •        To harness, develop and integrate all relevant agency resources focused on the prevention and/or
                   reduction of metal theft from Network Rail, in order to maximize corps operations and revenue in a
                   sustainable and flexible manner.

                   Assumptions/Limitations
          •        Compliance with applicable laws, rules and regulations
          •        Cooperation with government, non-government and other third parties endorsed by Network Rail
          •        Intelligence flow between agencies, assured by Information sharing agreements.
Cohorts LLP
Security Risk Management




                           Presentation Agenda
                    Introduction
                    Threats to
                    The Requirement
                    The Solution
                    Benefits
                    Way Forward
                    Summary
                    Conclusion
Cohorts LLP
Security Risk Management




                    1. Introduction
Cohorts LLP
Security Risk Management




                           Introduction
Cohorts LLP
Security Risk Management




                    2. Threat
Cohorts LLP
Security Risk Management




                            Threat
          • Metal theft
          • Cable theft
          • Line safety
          • Full / part
           cancelations
          Profit – 2009 direct losses schedule 8 circa
            >£ 200,000 plus secondary losses
Cohorts LLP
Security Risk Management




                                Impact
          •        Delay
          •        Cost
          •        Commuter discontent
          •        Injury
          •        Reputation
Cohorts LLP
Security Risk Management




                    3. The Requirement
Cohorts LLP
Security Risk Management




                           The Requirement
            Information Gathering – Air System
            Information Dissemination – Ground System
            Intelligence support –Intervention, Evidence & Apprehension
Cohorts LLP
Security Risk Management




                    4. The Solution
Cohorts LLP
Security Risk Management




                           Risk Manage
          Prevent
                               Reduce
                               Threat
          Pursue
                                             Reduce
                                              Risk
           Protect
                               Reduce
                             Vulnerability
           Prepare
Cohorts LLP
Security Risk Management




                              The Solution
                    A fully integrated system comprising:

                    Air Platform
                    Surveillance Suite
                    Ground Control Station
                    Law enforcement or Private Security
                    Response Capabilities
Cohorts LLP
Security Risk Management




      1 Surveillance
                                       Process
      2 Acquisition
      3 Data Transmission
      4 Onward transmission to Ground Control Station
      5 Alternative communications SATCOM
      6 Investigate / Intervene




                                         Response Capability
Cohorts LLP

                           Sensor Pod
Security Risk Management




             Advanced FLIR Systems fully digital camera
              suite
                         High definition infra red,
                             colour and low-light cameras
                         Day/night operation
                         All weather capability
                         120 times zoom - long range
                             viewing
                         Fully stabilised camera pod
Cohorts LLP
Security Risk Management


                               Air-platform
         All composite-made hi Tech component, cost
          effective low maintenance airframe
         Twin diesel engines. Quiet, low-fuel
          consumption
                            High endurance - up to 8 hours - long
                             loiter time
                            Low IR and Radar signatures
                            188 knot airspeed - rapid deployment.
                            Can be converted to a UAV
Cohorts LLP
Security Risk Management




                            Video Data
             Real-time video downloads from aircraft to
              ground station
             Immediate onwards distribution of video via
              internet
             Access to video using passwords or encrypted
              data
             Locations, times and details of contacts provided
              in as separate files
             Video linked to rail information service.
             Positional data files supported by Google Earth
              software
Cohorts LLP
Security Risk Management




                           Platform Capabilities




                                                   19
Cohorts LLP
Security Risk Management




                           Night Time Capability
                    Thermal Imager
                    Low-light Camera




                                        Displays & Recorders
                                        Digital IMU/GPS
                                        Moving Map Systems

                                                            20
                                                                 20
Cohorts LLP
Security Risk Management




                           Post Flight Analysis

          Requirements:
          • Google Earth
          • Data from RIS
          • Down link to ground
            station for integration
          Process
          • Flight & RIS data is filed
          • Files are identified and then dropped
            into Goggle Earth
          • Aircraft track is highlighted and ship
            details are click-on for analysis
Cohorts LLP
Security Risk Management




                             Post Flight Analysis

                           Flight plan
Cohorts LLP
Security Risk Management




                      5. The Benefits
Cohorts LLP
Security Risk Management




                           Operational Benefits
                     High definition images
                     Day and night operations
                     Virtual real time data
                     Plug and Play
                     Easy and secure data access
                     Low cost and long endurance
                     Cost effective – running costs, 20% of a
                      UAV, 50% of a Helicopter
Cohorts LLP
Security Risk Management




                           Other Benefits

            Communication liaison capability
            Reduced reaction time
            Investigatory capability
            Manned platform –
            extra set of eyes
Cohorts LLP
Security Risk Management




                           Strategic Benefits
                     Loss into profit
                     Safer and more secure network
                     Intelligence lead
                     Reinforce Network Rail brand
Cohorts LLP
Security Risk Management




                    6. The Way Forward
Cohorts LLP
Security Risk Management




                                       The Plan
                           Deliver a complete and timely surveillance
                            capability for NETWORK RAIL, in order to
                           increase the chance of discovery and deter
                                      the opportunity of theft.

                     PHASE 1 – Demonstration
                     PHASE 2 – Contract period (1-3 year(s)
                     renewable)
Cohorts LLP
Security Risk Management




                    7. Summary
Cohorts LLP
Security Risk Management




                                Key Driver Summary
                           The right people and resource capability
                           Understanding of the threat
                           Clear identification of the requirement
                           A working integrated aerial solution
                           Vision of the benefits it will bring
                           A plan on how it will be delivered
Cohorts LLP
Security Risk Management




                    8. Conclusion
Cohorts LLP
Security Risk Management




                            Conclusion
             This is the system that can deliver what you require
              in order to address the threat
             Highly responsive to meet customer time
              requirements
             Scalable to meet the technical needs
             Reliable and integrated network centric solution
             Cost effective and aligne for operational budget
Cohorts LLP
Security Risk Management




                                   Questions
                           Sleepers … what sleepers ?
Cohorts LLP
Security Risk Management

Más contenido relacionado

La actualidad más candente

Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
9th Annual Maritime Reconnaissance and Surveillance
9th Annual Maritime Reconnaissance and Surveillance9th Annual Maritime Reconnaissance and Surveillance
9th Annual Maritime Reconnaissance and SurveillanceDefenceIQ
 
Maritime Cyber Security Education
Maritime Cyber Security EducationMaritime Cyber Security Education
Maritime Cyber Security EducationValentin Bañaco
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42DroneSec
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
Making your Asterisk System Secure
Making your Asterisk System SecureMaking your Asterisk System Secure
Making your Asterisk System SecureDigium
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIfEngel
 

La actualidad más candente (12)

Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
9th Annual Maritime Reconnaissance and Surveillance
9th Annual Maritime Reconnaissance and Surveillance9th Annual Maritime Reconnaissance and Surveillance
9th Annual Maritime Reconnaissance and Surveillance
 
Maritime Cyber Security Education
Maritime Cyber Security EducationMaritime Cyber Security Education
Maritime Cyber Security Education
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
 
Making your Asterisk System Secure
Making your Asterisk System SecureMaking your Asterisk System Secure
Making your Asterisk System Secure
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNI
 

Destacado

Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)
Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)
Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)MedicalWeb.gr
 
Dr. Graphx Case Study
Dr. Graphx Case StudyDr. Graphx Case Study
Dr. Graphx Case Studystevenmfisher
 
Proyecto sobre una_idea_de_negocio
Proyecto sobre una_idea_de_negocioProyecto sobre una_idea_de_negocio
Proyecto sobre una_idea_de_negocioGLORIA GUIZA
 

Destacado (7)

Jiew jan iphone
Jiew jan iphoneJiew jan iphone
Jiew jan iphone
 
Guia uno
Guia unoGuia uno
Guia uno
 
Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)
Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)
Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)
 
11+carta espagnol
11+carta espagnol11+carta espagnol
11+carta espagnol
 
Dr. Graphx Case Study
Dr. Graphx Case StudyDr. Graphx Case Study
Dr. Graphx Case Study
 
Portada
PortadaPortada
Portada
 
Proyecto sobre una_idea_de_negocio
Proyecto sobre una_idea_de_negocioProyecto sobre una_idea_de_negocio
Proyecto sobre una_idea_de_negocio
 

Similar a Network rail counter metal theft aerial platform 20111111

DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSiQHub
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSiQHub
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaAngeloluca Barba
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...Andris Soroka
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Adding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf codeAdding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf codeAFCOM
 
An Introduction to South Seas Corporation
An Introduction to South Seas CorporationAn Introduction to South Seas Corporation
An Introduction to South Seas CorporationEd Mohr
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...cVidya Networks
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Reddy Marri
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
 
RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsAdaCore
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015Paul F. Roberts
 

Similar a Network rail counter metal theft aerial platform 20111111 (20)

DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Adding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf codeAdding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf code
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
An Introduction to South Seas Corporation
An Introduction to South Seas CorporationAn Introduction to South Seas Corporation
An Introduction to South Seas Corporation
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
C2MS
C2MSC2MS
C2MS
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
 

Último

Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseribangash
 

Último (20)

Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 

Network rail counter metal theft aerial platform 20111111

  • 1. Cohorts LLP Security Risk Management Presentation to Network Rail June 2011
  • 2. Cohorts LLP Security Risk Management The Team • Chenaga • Cohorts • Vigie
  • 3. Cohorts LLP Scope Security Risk Management • Project Justification • Network Rail is the subject of endemic metal theft, affecting operational delivery to the public costing hundreds of thousands of pounds per calendar month to shareholders. Project Product • Fixed wing Aerial Surveillance Platform, • Project Management • Intelligence fusion and lead operations through resource integration • Project Deliverables • Reduction in metal theft - to be agreed in SLAs and KPIs • Ferrous Watch will contribute to an increase percentage in apprehension rates to be agreed in SLAs and KPIs • Increased graphical software interface for intelligence analysis and planning • Increased situational awareness • Increased theft deterrence through media controlled released coverage • Increase the risk of discovery of malicious operatives Project Objective • To harness, develop and integrate all relevant agency resources focused on the prevention and/or reduction of metal theft from Network Rail, in order to maximize corps operations and revenue in a sustainable and flexible manner. Assumptions/Limitations • Compliance with applicable laws, rules and regulations • Cooperation with government, non-government and other third parties endorsed by Network Rail • Intelligence flow between agencies, assured by Information sharing agreements.
  • 4. Cohorts LLP Security Risk Management Presentation Agenda Introduction Threats to The Requirement The Solution Benefits Way Forward Summary Conclusion
  • 5. Cohorts LLP Security Risk Management 1. Introduction
  • 6. Cohorts LLP Security Risk Management Introduction
  • 7. Cohorts LLP Security Risk Management 2. Threat
  • 8. Cohorts LLP Security Risk Management Threat • Metal theft • Cable theft • Line safety • Full / part cancelations Profit – 2009 direct losses schedule 8 circa >£ 200,000 plus secondary losses
  • 9. Cohorts LLP Security Risk Management Impact • Delay • Cost • Commuter discontent • Injury • Reputation
  • 10. Cohorts LLP Security Risk Management 3. The Requirement
  • 11. Cohorts LLP Security Risk Management The Requirement Information Gathering – Air System Information Dissemination – Ground System Intelligence support –Intervention, Evidence & Apprehension
  • 12. Cohorts LLP Security Risk Management 4. The Solution
  • 13. Cohorts LLP Security Risk Management Risk Manage Prevent Reduce Threat Pursue Reduce Risk Protect Reduce Vulnerability Prepare
  • 14. Cohorts LLP Security Risk Management The Solution A fully integrated system comprising: Air Platform Surveillance Suite Ground Control Station Law enforcement or Private Security Response Capabilities
  • 15. Cohorts LLP Security Risk Management 1 Surveillance Process 2 Acquisition 3 Data Transmission 4 Onward transmission to Ground Control Station 5 Alternative communications SATCOM 6 Investigate / Intervene Response Capability
  • 16. Cohorts LLP Sensor Pod Security Risk Management  Advanced FLIR Systems fully digital camera suite  High definition infra red, colour and low-light cameras  Day/night operation  All weather capability  120 times zoom - long range viewing  Fully stabilised camera pod
  • 17. Cohorts LLP Security Risk Management Air-platform  All composite-made hi Tech component, cost effective low maintenance airframe  Twin diesel engines. Quiet, low-fuel consumption  High endurance - up to 8 hours - long loiter time  Low IR and Radar signatures  188 knot airspeed - rapid deployment.  Can be converted to a UAV
  • 18. Cohorts LLP Security Risk Management Video Data  Real-time video downloads from aircraft to ground station  Immediate onwards distribution of video via internet  Access to video using passwords or encrypted data  Locations, times and details of contacts provided in as separate files  Video linked to rail information service.  Positional data files supported by Google Earth software
  • 19. Cohorts LLP Security Risk Management Platform Capabilities 19
  • 20. Cohorts LLP Security Risk Management Night Time Capability Thermal Imager Low-light Camera Displays & Recorders Digital IMU/GPS Moving Map Systems 20 20
  • 21. Cohorts LLP Security Risk Management Post Flight Analysis Requirements: • Google Earth • Data from RIS • Down link to ground station for integration Process • Flight & RIS data is filed • Files are identified and then dropped into Goggle Earth • Aircraft track is highlighted and ship details are click-on for analysis
  • 22. Cohorts LLP Security Risk Management Post Flight Analysis Flight plan
  • 23. Cohorts LLP Security Risk Management 5. The Benefits
  • 24. Cohorts LLP Security Risk Management Operational Benefits  High definition images  Day and night operations  Virtual real time data  Plug and Play  Easy and secure data access  Low cost and long endurance  Cost effective – running costs, 20% of a UAV, 50% of a Helicopter
  • 25. Cohorts LLP Security Risk Management Other Benefits Communication liaison capability Reduced reaction time Investigatory capability Manned platform – extra set of eyes
  • 26. Cohorts LLP Security Risk Management Strategic Benefits  Loss into profit  Safer and more secure network  Intelligence lead  Reinforce Network Rail brand
  • 27. Cohorts LLP Security Risk Management 6. The Way Forward
  • 28. Cohorts LLP Security Risk Management The Plan Deliver a complete and timely surveillance capability for NETWORK RAIL, in order to increase the chance of discovery and deter the opportunity of theft. PHASE 1 – Demonstration PHASE 2 – Contract period (1-3 year(s) renewable)
  • 29. Cohorts LLP Security Risk Management 7. Summary
  • 30. Cohorts LLP Security Risk Management Key Driver Summary The right people and resource capability Understanding of the threat Clear identification of the requirement A working integrated aerial solution Vision of the benefits it will bring A plan on how it will be delivered
  • 31. Cohorts LLP Security Risk Management 8. Conclusion
  • 32. Cohorts LLP Security Risk Management Conclusion  This is the system that can deliver what you require in order to address the threat  Highly responsive to meet customer time requirements  Scalable to meet the technical needs  Reliable and integrated network centric solution  Cost effective and aligne for operational budget
  • 33. Cohorts LLP Security Risk Management Questions Sleepers … what sleepers ?