Pa awwa2006 presentationrev1fin_feb


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Actual Title of Presentation
  • Important Slide…needs to stand out
  • Also Important Slide
  • Will need to decide who I ask to give me a quote on this point
  • This will be perhaps three or four photo slides that show actual examples of “No-No’s”
  • Will need to ask someone to give quote on this
  • The next four slides can be compressed into one or two slides if possible
  • Will have to think about actual wording here that will make point to audience
  • The wording of these questions will be improved
  • Need input from David Rockford on some of these
  • Needs to be telling slide
  • Will add words to this once I have main presentation sorted-out
  • Same as (32) above
  • This is just a slide indicating that I will be happy to answer any questions…
  • Pa awwa2006 presentationrev1fin_feb

    1. 1. Has Your New Security System Increased Your Facility’s Liability?
    2. 2. Public Health Security Bioterrorism and Response Act (PL107-188) June 2002 <ul><li>All water facilities with 3,300 users or more, initiate a vulnerability assessment (VA). </li></ul><ul><li>The recommendations arising from these VA’s included those related to security improvements. </li></ul><ul><li>Costs for such security improvements are very substantial, and in many cases, simply cost prohibitive. </li></ul>
    3. 3. Flowchart of RAM-W SM Methodology Site Characterization Project Kickoff Facility Prioritization & Threat Assessment Consequence Assessment Fault Tree Analysis Security System Effectiveness Analysis Risk Analysis & Reduction Plan Vulnerability Assessment Report Review of Documentation ERP Update Planning Security Enhancements Utility Operations & Planning
    4. 4. Vulnerability Assessment Recommendations <ul><li>Included: </li></ul><ul><ul><li>Security Improvements </li></ul></ul><ul><ul><li>Mitigation </li></ul></ul><ul><ul><li>Other </li></ul></ul>
    5. 5. Implementation of New Security Systems <ul><li>Access Control </li></ul><ul><li>CCTV Camera Surveillance </li></ul><ul><li>Perimeter Fencing </li></ul><ul><li>Intrusion Detection </li></ul>
    6. 6. New Security Systems in Place <ul><li>Everyone Happy </li></ul><ul><li>Risk Reduced as per VA Recommendations </li></ul><ul><li>Just One Possible Problem…… </li></ul>
    7. 7. Your New Security Systems May Have Significantly Increased Your Liability, Even to the Point of Negligence or Gross Negligence
    8. 8. The Reason for Increased Liability <ul><li>A Simple Step That Was Overlooked Or Deemed Unnecessary When It was Decided To Implement The VA Recommendations And Install New Security Systems </li></ul><ul><li>GOOD SECURITY DESIGN CRITERIA </li></ul>
    9. 9. Statement <ul><li>Many Security Systems Are Installed Without Being Designed, And More Importantly, Without Proper Design Criteria </li></ul>
    10. 11. Lack Of Design Criteria <ul><li>Leads to Four Major Problems: </li></ul><ul><ul><li>Inadequate Counter Measures to meet Threat Level </li></ul></ul><ul><ul><li>Faulty Security System Design </li></ul></ul><ul><ul><li>Inability to Support Installed Security System </li></ul></ul><ul><ul><li>Possible Legal Consequences </li></ul></ul>
    11. 12. Industry Quote <ul><li>In the security environment of “Post 9/11”, and given the media scrutiny of all key infrastructure, it would be unwise if not reckless, to implement new security systems without adequate design, and good design criteria in keeping with industry standards </li></ul>
    12. 13. Steven S. Wilder <ul><li>President & Chief Operating Officer </li></ul><ul><li>Sorensen Wilder & Associates </li></ul><ul><li>Bradley, Illinois </li></ul>
    13. 14. Inadequate Security <ul><li>Failure To Detect </li></ul><ul><li>Failure To Surveil </li></ul><ul><li>Inadequate Perimeter Security </li></ul><ul><li>Inadequate Security At All Critical Assets </li></ul><ul><li>Inappropriate Equipment </li></ul><ul><li>Does Not Provide Adequate Protection To Meet Threat Level </li></ul>
    14. 15. Exterior Door Hinge
    15. 16. Fencing
    16. 17. Alarm Wiring
    17. 18. Door Contacts
    18. 19. Difficult To Protect
    19. 20. Fencing and Jersey Barrier
    20. 21. Faulty Security System <ul><li>Does Not Meet Intent </li></ul><ul><li>No Integration </li></ul><ul><li>Monitoring Inadequate </li></ul><ul><li>Wrong Equipment </li></ul>
    21. 22. Security Professionals Agree Good Security Design and Design Criteria is Essential to Successful Security System Operation
    22. 23. Consultants In Agreement <ul><li>Jim Woodruff </li></ul><ul><li>American Consulting Engineers </li></ul><ul><li>Tom Pecoraro </li></ul><ul><li>Labor Management Concepts </li></ul><ul><li>Gil Fallon </li></ul><ul><li>Attinco </li></ul><ul><li>Walter Adams </li></ul><ul><li>Rolf Jensen & Associates </li></ul><ul><li>Ken Burris </li></ul><ul><li>Environmental Resources Management </li></ul><ul><li>David Rockford </li></ul><ul><li>The Wickford Group </li></ul>
    23. 24. Examples <ul><li>Perimeter Detection </li></ul><ul><ul><li>Environment </li></ul></ul><ul><ul><li>Dual Technology </li></ul></ul>
    24. 25. Examples <ul><li>CCTV Camera Surveillance </li></ul><ul><ul><li>Resolution </li></ul></ul><ul><ul><li>Field of View </li></ul></ul><ul><ul><li>Positioning </li></ul></ul><ul><ul><li>Fixed Versus Mobile (PTZ) </li></ul></ul><ul><ul><li>Recording </li></ul></ul><ul><ul><li>Lighting </li></ul></ul>
    25. 26. Examples <ul><li>Alarm Systems </li></ul><ul><ul><li>Supervised System </li></ul></ul><ul><ul><li>Positioning of Devices </li></ul></ul><ul><ul><li>Motion Detectors </li></ul></ul>
    26. 27. Examples <ul><li>Access Control </li></ul><ul><ul><li>Electro-Magnetic Locks </li></ul></ul><ul><ul><li>Fire Code </li></ul></ul><ul><ul><li>Types of Reader Device </li></ul></ul>
    27. 28. Examples <ul><li>Identification </li></ul><ul><ul><li>Ability to Read at a Distance </li></ul></ul><ul><ul><li>Symbols </li></ul></ul><ul><ul><li>Counterfeit Measures </li></ul></ul>
    28. 29. Inability to Support Security System Design <ul><ul><ul><li>Procurement sends out RFP to local security contractors for “Security System” </li></ul></ul></ul><ul><ul><ul><li>Security Contractor installs what they think will “do the job” </li></ul></ul></ul><ul><ul><ul><li>When something happens, you are the one that will have to answer various questions posed by the Defense Attorney….. </li></ul></ul></ul>
    29. 31. Likely Questions…. <ul><ul><li>1) Why did you use this equipment </li></ul></ul><ul><ul><ul><li>Cameras </li></ul></ul></ul><ul><ul><ul><li>Motion Detectors </li></ul></ul></ul><ul><ul><ul><li>Type of DVR </li></ul></ul></ul><ul><ul><ul><li>Intrusion Detection Equipment </li></ul></ul></ul><ul><ul><ul><li>Type of Fence </li></ul></ul></ul>
    30. 32. Likely Questions <ul><li>Explain the reasons for installing this type of security system? </li></ul><ul><li>Why did the security only attempt to cover the outer perimeter? </li></ul><ul><li>Why were Insider threats ignored? </li></ul><ul><li>The following people had clearance for all access points……. Why? </li></ul><ul><li>What was the Design Criteria for the security system? </li></ul>
    31. 33. Importance of Good Design Criteria That Is Consistent With Security Industry Requirements <ul><li>Provides a Qualified Reason for All Aspects of the Security System </li></ul><ul><li>Explains why certain decisions were taken in the design of the system based on Weighted Objectives </li></ul><ul><li>Justifies the Level of Protection against the Threat Level </li></ul>
    32. 34. System Already Installed <ul><li>There are several options </li></ul><ul><ul><li>Review System </li></ul></ul><ul><ul><li>Prepare Sound Design Criteria </li></ul></ul><ul><ul><li>Modify Equipment </li></ul></ul><ul><ul><li>Add to System </li></ul></ul><ul><ul><li>Add Deterrent Factor </li></ul></ul>
    33. 35. Summary <ul><li>Results of Vulnerability Assessments </li></ul><ul><li>New Security Systems & Measures </li></ul><ul><li>Designed to Industry Standards….Or </li></ul><ul><li>Increased Liability </li></ul><ul><li>Security Design Criteria </li></ul><ul><li>Examples </li></ul><ul><li>What To Do Now </li></ul>
    34. 36. Benefits Of Good Design Criteria <ul><li>Sound Basis of Design to Industry Standards </li></ul><ul><li>Provides Foundation for Security System </li></ul><ul><li>Establishes Optimum Protection Level in Keeping with the Identified Threat (DBT) </li></ul><ul><li>Provides Clear Reasons for Types of Equipment and Positioning of Such Equipment </li></ul><ul><li>Likely to Prevent Possible Charges of Negligence or Gross Negligence </li></ul>
    35. 37. Questions Phone: 609-208-0112 E-mail: