The Elements of Water Security<br />with Whitewater Security<br />
The Team<br /><ul><li>Leader in solutions for protecting people, assets and infrastructure
Acquired Orsus in 2009
Market leaders in Situation Management
Over 24,000 customers in more than 150 countries (Dozens of Situator customers)
Established in 2003 in Australia
Represent Whitewater and NICE/Orsus solutions for water security in APAC
Certified sales and support staff
Provide local integration, consulting and support
NICE Integration Partner
Part of the Whitewater Group
World leader in comprehensive water security solutions
Over 70 years experience in water management
Industry experts in water security & quality systems
Nice Technology Partner</li></li></ul><li>NICE and Whitewater Security Reference Clients<br />Jerusalem City<br />Florida ...
Holistic Approach<br />Security Guards<br />Infrastructure<br />Procedures<br />QA<br />Physical Security<br />Command & C...
Whitewater Management Team<br />
Main Threats to Drinking Water<br />Unintentional<br /><ul><li>Accidents
Natural Disasters
Operational Faults
Contamination
Leakage</li></ul>Intentional<br /><ul><li>Sabotage
Chemical/Biological/Radioactive Warfare Materials
Terror
Cyber Attacks</li></ul>Water Utilities Must Ensure Continued Quality Water Supply<br />
Upcoming SlideShare
Loading in...5
×

The Elements of Water Security with Whitewater Security And Darlot Consulting Group

350

Published on

Water Security technologies and strategies are growing in importance today in the face of increasing disasters, contaminants and attacks. Whitewater Security, in partnership with Darlot Consulting and NICE, presents the critical elements of a water security solution

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
350
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

The Elements of Water Security with Whitewater Security And Darlot Consulting Group

  1. 1. The Elements of Water Security<br />with Whitewater Security<br />
  2. 2. The Team<br /><ul><li>Leader in solutions for protecting people, assets and infrastructure
  3. 3. Acquired Orsus in 2009
  4. 4. Market leaders in Situation Management
  5. 5. Over 24,000 customers in more than 150 countries (Dozens of Situator customers)
  6. 6. Established in 2003 in Australia
  7. 7. Represent Whitewater and NICE/Orsus solutions for water security in APAC
  8. 8. Certified sales and support staff
  9. 9. Provide local integration, consulting and support
  10. 10. NICE Integration Partner
  11. 11. Part of the Whitewater Group
  12. 12. World leader in comprehensive water security solutions
  13. 13. Over 70 years experience in water management
  14. 14. Industry experts in water security & quality systems
  15. 15. Nice Technology Partner</li></li></ul><li>NICE and Whitewater Security Reference Clients<br />Jerusalem City<br />Florida USA<br />Global Chemical Company<br />Beer Sheba City<br />Confidential. Copyrights Whitewater, All rights reserved_June09<br />
  16. 16. Holistic Approach<br />Security Guards<br />Infrastructure<br />Procedures<br />QA<br />Physical Security<br />Command & Control<br />
  17. 17. Whitewater Management Team<br />
  18. 18. Main Threats to Drinking Water<br />Unintentional<br /><ul><li>Accidents
  19. 19. Natural Disasters
  20. 20. Operational Faults
  21. 21. Contamination
  22. 22. Leakage</li></ul>Intentional<br /><ul><li>Sabotage
  23. 23. Chemical/Biological/Radioactive Warfare Materials
  24. 24. Terror
  25. 25. Cyber Attacks</li></ul>Water Utilities Must Ensure Continued Quality Water Supply<br />
  26. 26. Water Utilities Needs Pyramid<br />Control Water Crisis<br />Identify Intentional or Unintentional Threat (e.g. Leakage/Contamination)<br />Minimise Water Supply<br /> Infrastructure Vulnerabilities<br />Ensure Continued Water Quality<br />
  27. 27. Water Security Methodology<br />CRISISMANAGEMENT<br />PREVENTION<br />PROTECTION<br />DETECTION<br />RECOVERY<br /><ul><li>RiskAssessment
  28. 28. IntelligenceAnalysis
  29. 29. Training
  30. 30. PhysicalSecurity
  31. 31. SecurityValves
  32. 32. HydrantLocks
  33. 33. BlueBoxTMEarly Warning System
  34. 34. Real-time</li></ul> Contamination Detection System<br /><ul><li>Bio Sensors
  35. 35. EmergencyProcedures
  36. 36. Contamination Spread Simulator
  37. 37. ControlRoom
  38. 38. MobilePurificationSystems
  39. 39. PortableFresh WaterSystems</li></ul>WaterWallTMWater Security Situation Management System<br />
  40. 40. System Architecture<br />WaterwallTM<br />WaterMonitoring Devices<br />EarlyWarning<br />Confirmation<br />EventsManager<br />Data<br />Collection<br />Physical SecuritySystems<br />CommunicationsLayer<br />Events & Procedures Log<br />Rule Engine<br />ERP<br />Display<br />Distribution System<br />SCADA<br />Public Health<br />Contamination Spread Simulator<br />Other ExternalSystems<br />BlueBoxTM<br />
  41. 41. WaterWallTM<br />Revolutionary end-to-end water security management system<br />How it works:<br /><ul><li>Integrates all data from relevant systems
  42. 42. Presents unified information
  43. 43. Controls all connected systems
  44. 44. Assesses data to provide early warning
  45. 45. Predicts contamination spread and source
  46. 46. Responds dynamically by procedures
  47. 47. Records and reports automatically.</li></li></ul><li>WaterWallTM<br />Matrix display for managing and viewing live and recorded video<br />GIS Interface<br />(Maps)<br />Task Screen & Incident Log that enables the operator to simply & quickly manage incidents and situation<br />
  48. 48. BlueBoxTM Event Detection System<br />Intelligently detects unusual water quality events, offering an innovative approach to time series analysis of highly variable data.<br />Collects information from a wide range of <br /> different sensors<br />Filters abnormal data manually and automatically<br />Dynamically creates a baseline database<br />Factors effect of equipment age.<br />Takes into account the periodicity effect<br />Can function efficiently with missing parameters<br />User-friendly interface<br />IDENTIFIES ABNORMAL SITUATIONS<br />MINIMISESFALSE ALARMS<br />
  49. 49. BlueBoxTM Event Detection System<br />
  50. 50. Contamination Simulation System (CSS)<br />Activated as soon as abnormal behavior is recognized<br />A sophisticated hydraulic simulator / online module analyzes:<br />Contamination source <br />Calculates the amount of contamination over time <br />Predicts spread of contamination<br />GIS displays <br />
  51. 51. Contamination Simulation System (CSS)<br />
  52. 52. Whitewater Security System Benefits<br />Minimise the risk of damage to public health and water supply.<br />Create a unified system by connecting all existing systems.<br />Predict water contamination spread directions and potential leakage.<br />Early detection of water abnormal behaviour and water security events.<br />Improve organisational preparedness to water situations.<br />Improve management of internal and external factors involved in a water situation.<br />Relevant information display made available to managers in both routine and emergency cases. <br />
  53. 53. Whitewater Security System Benefits<br />(contd)<br />De-briefs and learning based on drills/scenarios and real events.<br />Reduce administrative overheads, achieve long-term economic savings and utilise resources more efficiently.<br /> Reduce human error and the frequency of false alarms.<br /> Deliver a platform for operational compliance.<br /> Unique predictive, analytical and proactive detection techniques using BlueBoxTM.<br /> Early warning system and real-time alerting.<br />In line with IWO, ISO and EPA regulations<br />
  54. 54. Security Program Development Phases<br />Phase 1<br />Phase 2<br />Phase 3<br />Tailor-made<br />Security<br />Program Development<br />Implementation<br />&<br />Support<br />Water Security<br />Enhancement Review<br />
  55. 55. Water Security Enhancement Review<br />Phase 1.<br />Typically <br />3 to 6 months<br />Four Subject Matter Experts<br />2. Questionnaire Data Review<br />1. Questionnaire Data<br />3. On-site Survey – 1 week<br />4. Evaluation Report<br />
  56. 56. The Review Program <br />Phase 1<br />Organizational goals and objectives<br />Organizational structure<br />Water distribution infrastructure<br />Water quality monitoring infrastructure<br />Water leakage systems<br />Physical & electronic security systems<br />Procedures-routine<br />&<br />emergency<br />Relations with external public organizations<br />Geographic Information Systems<br />Technology infrastructure<br />SCADA<br />CRM<br />
  57. 57. Outcomes of the Review<br />Presentation to SW on <br />the findings<br />Real life demo of Whitewater security system with SW data<br />Comprehensive report highlighting water security gaps<br />Accurate pricing for an end-to end water security package that delivers:<br />
  58. 58. Highlighting the need for review<br />Large water systems may distribute through thousands of km of pipes, and hundreds of reservoirs & pumping stations<br />Large water systems can spend millions per year on leakage prevention<br />Unknown amounts are often spent on control systems, pipe monitoring systems, water quality systems, water pressure systems, etc.<br />Can costs be reduced? Can efficiencies be improved? Is compliance an issue? Can situation response time be reduced? Is central holistic control important?<br />
  59. 59. Whitewater Benefits Summary<br />Lower operational costs<br />Minimize human error factor<br />Accelerate response time<br />Protect investments in existing solutions<br />
  60. 60. Prepared in Collaboration withDarlot Consulting Groupand Whitewater Security<br />Join the Water Security Discussion Group on LinkedIn! linkedin.w-watersecurity.com <br />
  61. 61. Thank you!<br />

×