SlideShare una empresa de Scribd logo
1 de 21
The Office of Infrastructure Protection
National Protection and Programs Directorate
Department of Homeland Security

Office of Infrastructure Protection and Risk Management Overviews


Re-Energize the Americas 2012 Conference


October 17, 2012
Threats May Come from All Hazards




                                    2
Critical Infrastructure Sectors
   Banking and Finance          Healthcare and Public Health
   Chemical                     Information Technology
   Commercial Facilities        National Monuments and Icons
   Communications               Nuclear Reactors, Materials, and Waste
   Critical Manufacturing       Postal and Shipping
   Dams                         Transportation Systems
   Defense Industrial Base      Water
   Emergency Services
   Energy
   Food and Agriculture
   Government Facilities




                                                                       3
National Infrastructure Protection Plan
 Comprehensive plan and unifying structure
  for the public and private sector to enhance
  the protection and resilience of critical
  infrastructure
    – Partnership model
    – Risk management framework
    – Roles, responsibilities, and authorities
 Drives internal programs and activities, and
  guides those of:
    – Other Federal agencies and departments
    – State, local, tribal, and territorial governments
    – Critical infrastructure owners and operators




                                                          4
Understanding Risk
 RISK = (Threat X Vulnerability X Consequence)




              R = (PA * [1-(PE )] * C)




                                                  5
Risk Mitigation
 Within the context of critical infrastructure, there are a variety of strategies
  and approaches that can be taken to mitigate risk
    –   Risk assumption
    –   Risk avoidance
    –   Risk limitation
    –   Risk transference
    –   Site hardening




                                                                               6
Methodology
 Effective risk management depends on a methodology that identifies what
  is important:




                                                                      7
Purpose of Protection
   Deter
   Detect and annunciate
   Delay
   Facilitate to rapid assessment
   Facilitate to rapid response




                                     8
Defense in Depth




                       Land Area
                        Facility
                   Perimeter Fencing,
                     Interior Room
                        Exterior
                    Gates, & Lights




                                        9
Mitigation Priorities
   Low cost
   Large increase in probability of preventing an aggressor attempt
   Large increase in probability of preventing an aggressor success
   Most attractive assets
   Large consequences
   High benefit-cost ratios




                                                                       10
Security Solution Hierarchy

                                           COST

                      People


                     Electro-
                    mechanical

                Plans, Policies, Pro
                      cedures

                <    Benefits          >

                                                  11
Must Look at Resilience
 Protection, in isolation, is a brittle strategy
 Resilience is the ability of
  systems, infrastructure, government, business, and citizenry to
  resist, absorb, and recover from or adapt to an adverse occurrence that
  may cause harm, destruction, or loss of national significance
 Objectives of resilience:
    – Resistance
    – Absorption
    – Restoration




                                                                        12
Products and Resources
   Protective Security Advisors (PSAs)
   Protected Critical Infrastructure Information (PCII)
   Enhanced Critical Infrastructure Protection (ECIP) initiative
   Federal Bureau of Investigation (FBI) InfraGard
   Homeland Security Information Network (HSIN)
   Bomb-making Materials Awareness Program
   TRIPwire and TRIPwire Community Gateway
   Risk Mitigation Training




                                                                    13
Protective Security Advisors
 93 PSAs and Regional Directors, including 87 field deployed
  personnel, serve as critical infrastructure security specialists
 Deployed to 74 Districts in 50 states and Puerto Rico
 State, local, tribal, territorial, and private sector link to DHS infrastructure
  protection resources
    – Coordinate vulnerability assessments, training, and other DHS products and
      services
    – Provide a vital link for information sharing in steady-state and incident response
    – Assist facility owners and operators with obtaining security clearances
 During contingency events, PSAs support the response, recovery, and
  reconstitution efforts of the States by serving as pre-designated
  Infrastructure Liaisons (IL) and Deputy ILs at the Joint Field Offices




                                                                                  14
Value of the PSA Program
 PSAs:
   – Support comprehensive risk analyses for critical infrastructure
   – Assist in the review and analysis of physical/technical security for critical
     infrastructure
   – Convey local concerns and sensitivities to DHS and other Federal agencies
   – Relay disconnects between local, regional, and National protection activities
   – Communicate requests for Federal training and exercises




                                                                                15
Protected Critical Infrastructure Information
 Established under the Critical
  Infrastructure Information Act of 2002
 Protects voluntarily submitted critical
  infrastructure information from:
    –   Freedom of Information Act
    –   State and local sunshine laws
    –   Civil litigation proceedings
    –   Regulatory usage
 Provides private sector with legal
  protections and “peace of mind”




                                                16
ECIP Initiative
 Establishes/enhances DHS relationship with facility owners and
  operators, and informs owners and operators of the importance of their
  facilities and the need to be vigilant
 ECIP survey
   – Identifies facilities’ physical security, security forces, security
     management, protective measures, information sharing, and dependencies
   – Tracks implementation of new protective measures
 ECIP Dashboard
   – Creates facility protective measures index that can be used to compare against
     similar facilities
   – Tool for informing protective measures planning and resource allocation
 Information is protected under the PCII program
 Information used by DHS for steady-state analysis and incident
  management



                                                                              17
How Can You Help?
 Engage with PSAs and other partners on critical infrastructure protection
  programs and initiatives
 Encourage participation in efforts to identify, assess, and secure critical
  infrastructure in your community
 Communicate local critical infrastructure protection related concerns
 Enhanced protection and resilience depends on developing and
  strengthening partnerships between all entities with a role in critical
  infrastructure protection




                                                                           28
Assessment References
 The Design & Evaluation of Physical Protection Systems – Mary Lynn
  Garcia
 Risk Analysis and the Security Survey – James Broder
 PSP Study Guide – David Patterson




                                                                       29
Summary
 Success will depend in part on the strength of our partnership
 Our approach to addressing the terrorism threat will be a long
  term, ongoing project of the highest priority
 This effort will require the highest degree of vigilance and dedication from
  all of us




                                                                           30
For more information visit:
www.dhs.gov/criticalinfrastructure
CF “Buck” Hamilton
Protective Security Advisor – El Paso, TX
cf.hamilton@dhs.gov

Más contenido relacionado

La actualidad más candente

Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project Proposal
Chris Young
 
It risk assessment_methodology
It risk assessment_methodology It risk assessment_methodology
It risk assessment_methodology
Bruno Mmassy
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITY
Andrew Bichlmeier
 

La actualidad más candente (20)

Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project Proposal
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012
 
Gartner Security &amp; Risk Management Summit Brochure
Gartner Security &amp; Risk Management Summit BrochureGartner Security &amp; Risk Management Summit Brochure
Gartner Security &amp; Risk Management Summit Brochure
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
It risk assessment_methodology
It risk assessment_methodology It risk assessment_methodology
It risk assessment_methodology
 
IANS-2008
IANS-2008IANS-2008
IANS-2008
 
Collaborative Defence
Collaborative DefenceCollaborative Defence
Collaborative Defence
 
Deconstructing the cost of a data breach
Deconstructing the cost of a data breachDeconstructing the cost of a data breach
Deconstructing the cost of a data breach
 
Newsletter: BDPA Washington DC (Oct 2011)
Newsletter: BDPA Washington DC (Oct 2011)Newsletter: BDPA Washington DC (Oct 2011)
Newsletter: BDPA Washington DC (Oct 2011)
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITY
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
CSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUPCSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUP
 
Nastec Corporate Profile
Nastec Corporate ProfileNastec Corporate Profile
Nastec Corporate Profile
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
 
Dod IA Pen Testing Brief
Dod IA Pen Testing BriefDod IA Pen Testing Brief
Dod IA Pen Testing Brief
 

Similar a 2012 Reenergize the Americas 3B: Charles Hamilton

16 Chapter 1. Encompassing Effective CPTED Solution.docx
16   Chapter 1.  Encompassing Effective CPTED Solution.docx16   Chapter 1.  Encompassing Effective CPTED Solution.docx
16 Chapter 1. Encompassing Effective CPTED Solution.docx
herminaprocter
 

Similar a 2012 Reenergize the Americas 3B: Charles Hamilton (20)

Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Countering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design IssueCountering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design Issue
 
Multimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguisMultimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguis
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
 
Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...
 
The Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ ResearchThe Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ Research
 
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
 Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats" Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategies
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber security
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
 
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
 
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
 
16 Chapter 1. Encompassing Effective CPTED Solution.docx
16   Chapter 1.  Encompassing Effective CPTED Solution.docx16   Chapter 1.  Encompassing Effective CPTED Solution.docx
16 Chapter 1. Encompassing Effective CPTED Solution.docx
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirt
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
 
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitThe Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 

Más de Reenergize

2012 Reenergize the Americas 3A: Richard Turner
2012 Reenergize the Americas 3A: Richard Turner2012 Reenergize the Americas 3A: Richard Turner
2012 Reenergize the Americas 3A: Richard Turner
Reenergize
 
2012 Reenergize the Americas 4A: Benjamin Torres-Barron
2012 Reenergize the Americas 4A: Benjamin Torres-Barron2012 Reenergize the Americas 4A: Benjamin Torres-Barron
2012 Reenergize the Americas 4A: Benjamin Torres-Barron
Reenergize
 
2012 Reenergize the Americas 2A: Jesse Thompson
2012 Reenergize the Americas 2A: Jesse Thompson2012 Reenergize the Americas 2A: Jesse Thompson
2012 Reenergize the Americas 2A: Jesse Thompson
Reenergize
 
2012 Reenergize the Americas 1A: Dennis Thomas
2012 Reenergize the Americas 1A: Dennis Thomas2012 Reenergize the Americas 1A: Dennis Thomas
2012 Reenergize the Americas 1A: Dennis Thomas
Reenergize
 
2012 ReEnergize the Americas 6B: Cathy Swain
2012 ReEnergize the Americas 6B: Cathy Swain2012 ReEnergize the Americas 6B: Cathy Swain
2012 ReEnergize the Americas 6B: Cathy Swain
Reenergize
 
2012 Reenergize the Americas 3A: Harry Shulte
2012 Reenergize the Americas 3A: Harry Shulte2012 Reenergize the Americas 3A: Harry Shulte
2012 Reenergize the Americas 3A: Harry Shulte
Reenergize
 
2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez
Reenergize
 
2012 ReEnergize the Americas 2B: Nathanial Robinson
2012 ReEnergize the Americas 2B: Nathanial Robinson2012 ReEnergize the Americas 2B: Nathanial Robinson
2012 ReEnergize the Americas 2B: Nathanial Robinson
Reenergize
 
2012 Reenergize the Americas 4A: Esaúl Ramírez
2012 Reenergize the Americas 4A: Esaúl Ramírez2012 Reenergize the Americas 4A: Esaúl Ramírez
2012 Reenergize the Americas 4A: Esaúl Ramírez
Reenergize
 
2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez
Reenergize
 
2012 Reenergize the Americas 1A: Reinhard Peter
2012 Reenergize the Americas 1A: Reinhard Peter2012 Reenergize the Americas 1A: Reinhard Peter
2012 Reenergize the Americas 1A: Reinhard Peter
Reenergize
 
2012 Reenergize the Americas 5A: Luis Perez
2012 Reenergize the Americas 5A: Luis Perez2012 Reenergize the Americas 5A: Luis Perez
2012 Reenergize the Americas 5A: Luis Perez
Reenergize
 
2012 Reenergize the Americas 4A: Alejando Peraza Garcia
2012 Reenergize the Americas 4A: Alejando Peraza Garcia2012 Reenergize the Americas 4A: Alejando Peraza Garcia
2012 Reenergize the Americas 4A: Alejando Peraza Garcia
Reenergize
 
2012 Reenergize the Americas 1B: John Peichel
2012 Reenergize the Americas  1B: John Peichel2012 Reenergize the Americas  1B: John Peichel
2012 Reenergize the Americas 1B: John Peichel
Reenergize
 
2012 Reenergize the Americas 4B: Jim Peach
2012 Reenergize the Americas 4B: Jim Peach2012 Reenergize the Americas 4B: Jim Peach
2012 Reenergize the Americas 4B: Jim Peach
Reenergize
 
2012 Reenergize the Americas 5B: Allan Oliver
2012 Reenergize the Americas 5B: Allan Oliver2012 Reenergize the Americas 5B: Allan Oliver
2012 Reenergize the Americas 5B: Allan Oliver
Reenergize
 
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
Reenergize
 
2012 Reenergize the Americas 2A: David Mendoza
2012 Reenergize the Americas 2A: David Mendoza2012 Reenergize the Americas 2A: David Mendoza
2012 Reenergize the Americas 2A: David Mendoza
Reenergize
 

Más de Reenergize (20)

2012 Reenergize the Americas 4B: Duncan Wood
2012 Reenergize the Americas 4B: Duncan Wood2012 Reenergize the Americas 4B: Duncan Wood
2012 Reenergize the Americas 4B: Duncan Wood
 
2012 Reenergize the Americas 2B: Miguel Velez-Reyes
2012 Reenergize the Americas 2B: Miguel Velez-Reyes2012 Reenergize the Americas 2B: Miguel Velez-Reyes
2012 Reenergize the Americas 2B: Miguel Velez-Reyes
 
2012 Reenergize the Americas 3A: Richard Turner
2012 Reenergize the Americas 3A: Richard Turner2012 Reenergize the Americas 3A: Richard Turner
2012 Reenergize the Americas 3A: Richard Turner
 
2012 Reenergize the Americas 4A: Benjamin Torres-Barron
2012 Reenergize the Americas 4A: Benjamin Torres-Barron2012 Reenergize the Americas 4A: Benjamin Torres-Barron
2012 Reenergize the Americas 4A: Benjamin Torres-Barron
 
2012 Reenergize the Americas 2A: Jesse Thompson
2012 Reenergize the Americas 2A: Jesse Thompson2012 Reenergize the Americas 2A: Jesse Thompson
2012 Reenergize the Americas 2A: Jesse Thompson
 
2012 Reenergize the Americas 1A: Dennis Thomas
2012 Reenergize the Americas 1A: Dennis Thomas2012 Reenergize the Americas 1A: Dennis Thomas
2012 Reenergize the Americas 1A: Dennis Thomas
 
2012 ReEnergize the Americas 6B: Cathy Swain
2012 ReEnergize the Americas 6B: Cathy Swain2012 ReEnergize the Americas 6B: Cathy Swain
2012 ReEnergize the Americas 6B: Cathy Swain
 
2012 Reenergize the Americas 3A: Harry Shulte
2012 Reenergize the Americas 3A: Harry Shulte2012 Reenergize the Americas 3A: Harry Shulte
2012 Reenergize the Americas 3A: Harry Shulte
 
2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez
 
2012 ReEnergize the Americas 2B: Nathanial Robinson
2012 ReEnergize the Americas 2B: Nathanial Robinson2012 ReEnergize the Americas 2B: Nathanial Robinson
2012 ReEnergize the Americas 2B: Nathanial Robinson
 
2012 Reenergize the Americas 4A: Esaúl Ramírez
2012 Reenergize the Americas 4A: Esaúl Ramírez2012 Reenergize the Americas 4A: Esaúl Ramírez
2012 Reenergize the Americas 4A: Esaúl Ramírez
 
2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez
 
2012 Reenergize the Americas 1A: Reinhard Peter
2012 Reenergize the Americas 1A: Reinhard Peter2012 Reenergize the Americas 1A: Reinhard Peter
2012 Reenergize the Americas 1A: Reinhard Peter
 
2012 Reenergize the Americas 5A: Luis Perez
2012 Reenergize the Americas 5A: Luis Perez2012 Reenergize the Americas 5A: Luis Perez
2012 Reenergize the Americas 5A: Luis Perez
 
2012 Reenergize the Americas 4A: Alejando Peraza Garcia
2012 Reenergize the Americas 4A: Alejando Peraza Garcia2012 Reenergize the Americas 4A: Alejando Peraza Garcia
2012 Reenergize the Americas 4A: Alejando Peraza Garcia
 
2012 Reenergize the Americas 1B: John Peichel
2012 Reenergize the Americas  1B: John Peichel2012 Reenergize the Americas  1B: John Peichel
2012 Reenergize the Americas 1B: John Peichel
 
2012 Reenergize the Americas 4B: Jim Peach
2012 Reenergize the Americas 4B: Jim Peach2012 Reenergize the Americas 4B: Jim Peach
2012 Reenergize the Americas 4B: Jim Peach
 
2012 Reenergize the Americas 5B: Allan Oliver
2012 Reenergize the Americas 5B: Allan Oliver2012 Reenergize the Americas 5B: Allan Oliver
2012 Reenergize the Americas 5B: Allan Oliver
 
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
 
2012 Reenergize the Americas 2A: David Mendoza
2012 Reenergize the Americas 2A: David Mendoza2012 Reenergize the Americas 2A: David Mendoza
2012 Reenergize the Americas 2A: David Mendoza
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Último (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

2012 Reenergize the Americas 3B: Charles Hamilton

  • 1. The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Office of Infrastructure Protection and Risk Management Overviews Re-Energize the Americas 2012 Conference October 17, 2012
  • 2. Threats May Come from All Hazards 2
  • 3. Critical Infrastructure Sectors  Banking and Finance  Healthcare and Public Health  Chemical  Information Technology  Commercial Facilities  National Monuments and Icons  Communications  Nuclear Reactors, Materials, and Waste  Critical Manufacturing  Postal and Shipping  Dams  Transportation Systems  Defense Industrial Base  Water  Emergency Services  Energy  Food and Agriculture  Government Facilities 3
  • 4. National Infrastructure Protection Plan  Comprehensive plan and unifying structure for the public and private sector to enhance the protection and resilience of critical infrastructure – Partnership model – Risk management framework – Roles, responsibilities, and authorities  Drives internal programs and activities, and guides those of: – Other Federal agencies and departments – State, local, tribal, and territorial governments – Critical infrastructure owners and operators 4
  • 5. Understanding Risk  RISK = (Threat X Vulnerability X Consequence) R = (PA * [1-(PE )] * C) 5
  • 6. Risk Mitigation  Within the context of critical infrastructure, there are a variety of strategies and approaches that can be taken to mitigate risk – Risk assumption – Risk avoidance – Risk limitation – Risk transference – Site hardening 6
  • 7. Methodology  Effective risk management depends on a methodology that identifies what is important: 7
  • 8. Purpose of Protection  Deter  Detect and annunciate  Delay  Facilitate to rapid assessment  Facilitate to rapid response 8
  • 9. Defense in Depth Land Area Facility Perimeter Fencing, Interior Room Exterior Gates, & Lights 9
  • 10. Mitigation Priorities  Low cost  Large increase in probability of preventing an aggressor attempt  Large increase in probability of preventing an aggressor success  Most attractive assets  Large consequences  High benefit-cost ratios 10
  • 11. Security Solution Hierarchy COST People Electro- mechanical Plans, Policies, Pro cedures < Benefits > 11
  • 12. Must Look at Resilience  Protection, in isolation, is a brittle strategy  Resilience is the ability of systems, infrastructure, government, business, and citizenry to resist, absorb, and recover from or adapt to an adverse occurrence that may cause harm, destruction, or loss of national significance  Objectives of resilience: – Resistance – Absorption – Restoration 12
  • 13. Products and Resources  Protective Security Advisors (PSAs)  Protected Critical Infrastructure Information (PCII)  Enhanced Critical Infrastructure Protection (ECIP) initiative  Federal Bureau of Investigation (FBI) InfraGard  Homeland Security Information Network (HSIN)  Bomb-making Materials Awareness Program  TRIPwire and TRIPwire Community Gateway  Risk Mitigation Training 13
  • 14. Protective Security Advisors  93 PSAs and Regional Directors, including 87 field deployed personnel, serve as critical infrastructure security specialists  Deployed to 74 Districts in 50 states and Puerto Rico  State, local, tribal, territorial, and private sector link to DHS infrastructure protection resources – Coordinate vulnerability assessments, training, and other DHS products and services – Provide a vital link for information sharing in steady-state and incident response – Assist facility owners and operators with obtaining security clearances  During contingency events, PSAs support the response, recovery, and reconstitution efforts of the States by serving as pre-designated Infrastructure Liaisons (IL) and Deputy ILs at the Joint Field Offices 14
  • 15. Value of the PSA Program  PSAs: – Support comprehensive risk analyses for critical infrastructure – Assist in the review and analysis of physical/technical security for critical infrastructure – Convey local concerns and sensitivities to DHS and other Federal agencies – Relay disconnects between local, regional, and National protection activities – Communicate requests for Federal training and exercises 15
  • 16. Protected Critical Infrastructure Information  Established under the Critical Infrastructure Information Act of 2002  Protects voluntarily submitted critical infrastructure information from: – Freedom of Information Act – State and local sunshine laws – Civil litigation proceedings – Regulatory usage  Provides private sector with legal protections and “peace of mind” 16
  • 17. ECIP Initiative  Establishes/enhances DHS relationship with facility owners and operators, and informs owners and operators of the importance of their facilities and the need to be vigilant  ECIP survey – Identifies facilities’ physical security, security forces, security management, protective measures, information sharing, and dependencies – Tracks implementation of new protective measures  ECIP Dashboard – Creates facility protective measures index that can be used to compare against similar facilities – Tool for informing protective measures planning and resource allocation  Information is protected under the PCII program  Information used by DHS for steady-state analysis and incident management 17
  • 18. How Can You Help?  Engage with PSAs and other partners on critical infrastructure protection programs and initiatives  Encourage participation in efforts to identify, assess, and secure critical infrastructure in your community  Communicate local critical infrastructure protection related concerns  Enhanced protection and resilience depends on developing and strengthening partnerships between all entities with a role in critical infrastructure protection 28
  • 19. Assessment References  The Design & Evaluation of Physical Protection Systems – Mary Lynn Garcia  Risk Analysis and the Security Survey – James Broder  PSP Study Guide – David Patterson 29
  • 20. Summary  Success will depend in part on the strength of our partnership  Our approach to addressing the terrorism threat will be a long term, ongoing project of the highest priority  This effort will require the highest degree of vigilance and dedication from all of us 30
  • 21. For more information visit: www.dhs.gov/criticalinfrastructure CF “Buck” Hamilton Protective Security Advisor – El Paso, TX cf.hamilton@dhs.gov

Notas del editor

  1. (Photos: DHS-FEMA)1. New York, N.Y., September 13, 2001 -- Urban Search and Rescue teams inspect the wreckage at the World Trade Center. Photo by Andrea Booher/ FEMA News Photo, http://www.fema.gov/photolibrary/photo_details.do?id=38862. Binghamton, N.Y., September 8, 2011 -- A floodwall, built with hazard mitigation funds from the Federal Emergency Management Agency and New York State protected this vital property from flood waters that devastated other parts of the city, even as rising water from the Susquehanna River engulfed the hospital’s parking lot during Tropical Storm Lee. http://www.fema.gov/photolibrary/photo_details.do?id=52954 3. Washington, D.C., November 30, 2004 -- This NOAA map illustrates the active 2004 Hurricane season in Florida NOAA graphic, http://www.fema.gov/photolibrary/photo_details.do?id=12110
  2. (Photos: DHS)1. DHS – Nuclear Reactors, Materials, and Waste Sector: Critical Infrastructure and Key Resources, http://www.dhs.gov/files/programs/gc_1188475350325.shtm2. DHS – Chemical Sector Training and Resources, http://www.dhs.gov/files/programs/gc_1276534935062.shtm
  3. Source: DHS
  4. Photo: DHS – NIPP Risk Management Framework, http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf
  5. Photo: PSA created
  6. Photo: PSA created
  7. Source: DHS
  8. Source: DHS