SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
Power Production Protection
         Agency
Our Mission
 Congress and citizens are demanding an
  immediate response to PA’s nuclear
  attacks

 PPPA Stand-Up Leadership Council was
  created and is focusing on the nuclear
  sector

 Mason Consulting Team 4 was hired to
  provide guidance to the PPPA
Areas of Focus
 Stakeholder analysis & segmentation


 Information needs


 Key threats/incidents


 Key messages


 Information channels


 Management and communication strategy


 Implementation approach
Stakeholder Makers
                       Decision Mapping
                   1. 5.Community
                    2.FirstEnforcers
                        3. Industry
                         4. Responders
                        6. Terrorists
High                 Keep                                    Manage
                    Satisfied                                Closely
                                                                       DOE
                                                                       Presiden
                                                                       t
                                                                       Congres
                                                Terrorists             s
                                                                       Nuclear
                                                                       Plants
                                                Special
P                                               Agencies
o
w
e      Media            Security              State Gov.
                                                                Emergency
r      Press            Companies            National Guard     Mgmt
                            General
       Academic
                            Public           Hospitals          Non Nuclear Plants
       Institutions
                Foreign          Military
                                                                 Suppliers
                Administratio
         Private                 Customer                       Workers
                n
         Businesses
         Activists               s                              Neighbors

Low                Monitor                                    Keep                High
                                        Interest
Stakeholder Segments
 Criteria used for the segmentation:
  Similar information needs
  Functional responsibilities


 First Responders   • First on the scene

 Decision Makers    • Leadership and strategic vision

    Enforcers       • Preventative taskforce

     Industry       • Direct stake in Energy sector

   Community        • Individuals/entities with indirect interests

    Terrorists      • Opposition
Information Needs
 Regulatory                            X                         X
     PR                                                                      X           X
Financial Job                          X                         X           X
                1st Responders   Decision Makers   Enforcers   Industry   Community   Terrorists


 Educational                                                     X           X
 Preventive           X                X              X          X           X
 Actionable           X                X              X          X           X
Health/Safety         X                               X          X           X
•Dashboard
                       Decision   •Direct lines
                       Makers     •ENS                        •Conference
                                                              Calls
                                                  Enforcers
                                                              •ENS
   Fluid Information



                                                     1st      •Advanced
                       PPP                        Responde
                                                     rs
                                                              website
                                                              access
                       A
                                                               •Press
                                                   Communit    •Website
Flow




                                                      y        (Normal
                       Industry   •Newsletters                 Access)
                                  •Conference
                                  s
Key Threats
Physical Threats                 Cyber Security
• Bomb attacks                   • Loss of data
• Raw materials disruption       • Access security of the control
• Transportation attacks           system


                              Key
                             Threats
Technological Risks              Budget Constraints
• Communication disruption       • Future cuts
• Longer time-frame required     • Increased cost of security
• Training needs of employees
Impact on Stakeholders
             Physical Threats           Cyber             Technologica      Budget
                                        Security          l Risks
1st        • Enforce safety
Responders • Jump-to-action                               • Inadequate
                                                          information       • Limited
Decision     • Coordinate relief                          sharing           resources
Makers       efforts                    • Loss of
             • Preventive               confidentiality   • Misaligned
             measures                                     strategies        • Security is
             • Policy formulation                         between power     compromised
Enforcers    • Investigate                                plants
             • Secure                   • Increased
             • Employee’s safety        risk of mishap    • Constricted
Industry
             • Financial difficulties                     information
                                                          exchange

Community    • Fear of attacks                                              Increased cost of
             • Electricity shortage                                         electricity
Terrorists                              • Advanced        • Easier access
                                        intelligence      to systems
Key Messages
1st Responders: Importance of role in
 protecting national security

Decision Makers: Need to develop
 executable strategies that protect national
 nuclear energy

Enforcers: Backbone of the mission; 1st line
 of defense
Key Messages
Industry: PPPA will support & protect
  industry interests

Community: Safety for the family and loved
 ones

Terrorists: Nuclear energy will be
 PROTECTED against attacks
Strategy: 3 Keys to Success

1)   Cross Functional Team

2)   Color Coded Alert Levels

3)   Fluid Information Flow
Strategy: Cross-Functional Team
 Represent various stakeholders
 Collaborate preventive measures
 Meet quarterly; “town hall” input



                           DOE



                                   First
     Communit
                Industry         Responder   Enforcers
        y
                                     s
Strategy: Color Coded Alert
Levels
 In conjunction with Department of
  Homeland Security
 4 factors of threat evaluation
   a) Credible?
   b) Corroborated?
   c) Imminent?
   d) Grave consequences?



     Low    Guarded   Elevated   High   Severe
Strategy: Fluid Information Flow

 Inter-agency
 collaboration
 Cross-segment
 delivery of
 relevant
 information
 Use enabling
 technologies to
 coordinate
 preventive and
Critical Barriers

 1. Reluctance from industry / other
 agencies
 2. Lack of forward thinking
 3. Different internal procedures in case of
 incident
Implementation Approach

                                                                                                                 Implementation



                                                                                          Inform the segments
          Create the CF team                    Identify and select
                                                   the vendors
     Form              Develop Project Plan                           Implementation of               Continuous
mission, vision &                                                     software systems              internal training
     goals




                                                 Appoint
                    Define roles &            communications                       Training plan for
                    responsibilities             director                            preventative
                                                                                      measures
                                                   Assign procedures for
                                                     each threat level
   Finalize detailed
    requirements
                            Establish procedures                                                  Cross Functional Team
                                                                                                   Coding System
                                                                                                  Technological Processes
Thank You!
Questions?
Appendix :Value Chain Analysis
Sourcing                    Production
•   Buy raw materials(RM)   •   Process RM
•   Transport RM            •   Follow procedures
•   Store RM                •   Manual interaction
•   Use RM                  •   Monitor production




Post Production             Distribution
• Dispose Nuclear Wastes    • Substation power
• Transmit the power          transmission
• Step-up transformers      • Distribution lines
                            • Step-down transformers
Appendix :Modes of
Communication

                  Dashboard
                 Direct Phone
                Response Center
             Radio            Portals
             Bridge
       Emergency Notification System


   Website            Press      Newsletters
Appendix: Enabling Technology



           4.9Ghz Band

        Security Technology

             Database

       Content Management
Appendix: Slide Sorter



 Key
Threats

Más contenido relacionado

Similar a Deloitte Presentation Team4 Final1

Jeff helm atlantic advisers norwell presentation 2013
Jeff helm atlantic advisers norwell presentation 2013Jeff helm atlantic advisers norwell presentation 2013
Jeff helm atlantic advisers norwell presentation 2013mhz4016
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oramsegughana
 
Security and Business Continuity Working Together
Security and Business Continuity Working TogetherSecurity and Business Continuity Working Together
Security and Business Continuity Working Togethercharliemb2
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security TechnologyFlaskdata.io
 
Fns Incident Management Powered By En Case
Fns Incident Management Powered By En CaseFns Incident Management Powered By En Case
Fns Incident Management Powered By En Casetbeckwith
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksResilient Systems
 
Information Architecture of Emergency Response
Information Architecture of Emergency ResponseInformation Architecture of Emergency Response
Information Architecture of Emergency ResponseNoreen Whysel
 
BizDay: The Path to The Risk Singularity, RiskStream
BizDay: The Path to The Risk Singularity, RiskStreamBizDay: The Path to The Risk Singularity, RiskStream
BizDay: The Path to The Risk Singularity, RiskStreamR3
 
360-Degree Approach to DR / BC
360-Degree Approach to DR / BC360-Degree Approach to DR / BC
360-Degree Approach to DR / BCAISDC
 
A Game Plan for Making Decisions Before, During, and After a Crisis Hits Your...
A Game Plan for Making Decisions Before, During, and After a Crisis Hits Your...A Game Plan for Making Decisions Before, During, and After a Crisis Hits Your...
A Game Plan for Making Decisions Before, During, and After a Crisis Hits Your...4Good.org
 
2012 04 23_masas
2012 04 23_masas2012 04 23_masas
2012 04 23_masasiscram2012
 
TSB_IoT_Presentations_27June2012
TSB_IoT_Presentations_27June2012TSB_IoT_Presentations_27June2012
TSB_IoT_Presentations_27June2012100%Open
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
The State of Endpoint Security Today
The State of Endpoint Security Today The State of Endpoint Security Today
The State of Endpoint Security Today Justine Shaffer
 

Similar a Deloitte Presentation Team4 Final1 (20)

Jeff helm atlantic advisers norwell presentation 2013
Jeff helm atlantic advisers norwell presentation 2013Jeff helm atlantic advisers norwell presentation 2013
Jeff helm atlantic advisers norwell presentation 2013
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oram
 
Security and Business Continuity Working Together
Security and Business Continuity Working TogetherSecurity and Business Continuity Working Together
Security and Business Continuity Working Together
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security Technology
 
Stream 2 - Don't Risk IT
Stream 2 - Don't Risk ITStream 2 - Don't Risk IT
Stream 2 - Don't Risk IT
 
Fns Incident Management Powered By En Case
Fns Incident Management Powered By En CaseFns Incident Management Powered By En Case
Fns Incident Management Powered By En Case
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
Information Architecture of Emergency Response
Information Architecture of Emergency ResponseInformation Architecture of Emergency Response
Information Architecture of Emergency Response
 
Communities for Innovation
Communities for Innovation Communities for Innovation
Communities for Innovation
 
BizDay: The Path to The Risk Singularity, RiskStream
BizDay: The Path to The Risk Singularity, RiskStreamBizDay: The Path to The Risk Singularity, RiskStream
BizDay: The Path to The Risk Singularity, RiskStream
 
360-Degree Approach to DR / BC
360-Degree Approach to DR / BC360-Degree Approach to DR / BC
360-Degree Approach to DR / BC
 
Introduction to Business Continuity Management
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
 
A Game Plan for Making Decisions Before, During, and After a Crisis Hits Your...
A Game Plan for Making Decisions Before, During, and After a Crisis Hits Your...A Game Plan for Making Decisions Before, During, and After a Crisis Hits Your...
A Game Plan for Making Decisions Before, During, and After a Crisis Hits Your...
 
2012 04 23_masas
2012 04 23_masas2012 04 23_masas
2012 04 23_masas
 
TSB_IoT_Presentations_27June2012
TSB_IoT_Presentations_27June2012TSB_IoT_Presentations_27June2012
TSB_IoT_Presentations_27June2012
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
The State of Endpoint Security Today
The State of Endpoint Security Today The State of Endpoint Security Today
The State of Endpoint Security Today
 
Intelligence-led Cybersecurity
Intelligence-led Cybersecurity Intelligence-led Cybersecurity
Intelligence-led Cybersecurity
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 

Deloitte Presentation Team4 Final1

  • 2. Our Mission  Congress and citizens are demanding an immediate response to PA’s nuclear attacks  PPPA Stand-Up Leadership Council was created and is focusing on the nuclear sector  Mason Consulting Team 4 was hired to provide guidance to the PPPA
  • 3. Areas of Focus  Stakeholder analysis & segmentation  Information needs  Key threats/incidents  Key messages  Information channels  Management and communication strategy  Implementation approach
  • 4. Stakeholder Makers Decision Mapping 1. 5.Community 2.FirstEnforcers 3. Industry 4. Responders 6. Terrorists High Keep Manage Satisfied Closely DOE Presiden t Congres Terrorists s Nuclear Plants Special P Agencies o w e Media Security State Gov. Emergency r Press Companies National Guard Mgmt General Academic Public Hospitals Non Nuclear Plants Institutions Foreign Military Suppliers Administratio Private Customer Workers n Businesses Activists s Neighbors Low Monitor Keep High Interest
  • 5. Stakeholder Segments Criteria used for the segmentation:  Similar information needs  Functional responsibilities First Responders • First on the scene Decision Makers • Leadership and strategic vision Enforcers • Preventative taskforce Industry • Direct stake in Energy sector Community • Individuals/entities with indirect interests Terrorists • Opposition
  • 6. Information Needs Regulatory X X PR X X Financial Job X X X 1st Responders Decision Makers Enforcers Industry Community Terrorists Educational X X Preventive X X X X X Actionable X X X X X Health/Safety X X X X
  • 7. •Dashboard Decision •Direct lines Makers •ENS •Conference Calls Enforcers •ENS Fluid Information 1st •Advanced PPP Responde rs website access A •Press Communit •Website Flow y (Normal Industry •Newsletters Access) •Conference s
  • 8. Key Threats Physical Threats Cyber Security • Bomb attacks • Loss of data • Raw materials disruption • Access security of the control • Transportation attacks system Key Threats Technological Risks Budget Constraints • Communication disruption • Future cuts • Longer time-frame required • Increased cost of security • Training needs of employees
  • 9. Impact on Stakeholders Physical Threats Cyber Technologica Budget Security l Risks 1st • Enforce safety Responders • Jump-to-action • Inadequate information • Limited Decision • Coordinate relief sharing resources Makers efforts • Loss of • Preventive confidentiality • Misaligned measures strategies • Security is • Policy formulation between power compromised Enforcers • Investigate plants • Secure • Increased • Employee’s safety risk of mishap • Constricted Industry • Financial difficulties information exchange Community • Fear of attacks Increased cost of • Electricity shortage electricity Terrorists • Advanced • Easier access intelligence to systems
  • 10. Key Messages 1st Responders: Importance of role in protecting national security Decision Makers: Need to develop executable strategies that protect national nuclear energy Enforcers: Backbone of the mission; 1st line of defense
  • 11. Key Messages Industry: PPPA will support & protect industry interests Community: Safety for the family and loved ones Terrorists: Nuclear energy will be PROTECTED against attacks
  • 12. Strategy: 3 Keys to Success 1) Cross Functional Team 2) Color Coded Alert Levels 3) Fluid Information Flow
  • 13. Strategy: Cross-Functional Team  Represent various stakeholders  Collaborate preventive measures  Meet quarterly; “town hall” input DOE First Communit Industry Responder Enforcers y s
  • 14. Strategy: Color Coded Alert Levels  In conjunction with Department of Homeland Security  4 factors of threat evaluation a) Credible? b) Corroborated? c) Imminent? d) Grave consequences? Low Guarded Elevated High Severe
  • 15. Strategy: Fluid Information Flow  Inter-agency collaboration  Cross-segment delivery of relevant information  Use enabling technologies to coordinate preventive and
  • 16. Critical Barriers 1. Reluctance from industry / other agencies 2. Lack of forward thinking 3. Different internal procedures in case of incident
  • 17. Implementation Approach Implementation Inform the segments Create the CF team Identify and select the vendors Form Develop Project Plan Implementation of Continuous mission, vision & software systems internal training goals Appoint Define roles & communications Training plan for responsibilities director preventative measures Assign procedures for each threat level Finalize detailed requirements Establish procedures Cross Functional Team Coding System Technological Processes
  • 20. Appendix :Value Chain Analysis Sourcing Production • Buy raw materials(RM) • Process RM • Transport RM • Follow procedures • Store RM • Manual interaction • Use RM • Monitor production Post Production Distribution • Dispose Nuclear Wastes • Substation power • Transmit the power transmission • Step-up transformers • Distribution lines • Step-down transformers
  • 21. Appendix :Modes of Communication Dashboard Direct Phone Response Center Radio Portals Bridge Emergency Notification System Website Press Newsletters
  • 22. Appendix: Enabling Technology 4.9Ghz Band Security Technology Database Content Management
  • 23. Appendix: Slide Sorter Key Threats

Notas del editor

  1. Mention the technologies that we would like to implement