SlideShare a Scribd company logo
WHITEPAPER
AN INTEGRATED SECURITY SYSTEM (ISS) OPTIMISES
GLOBAL PORT SECURITY
By Jaco Cronje, Director, EES
Due to global developments, it is becoming increasingly important to enhance and optimise the
security of ships and port facilities worldwide. Ports are having to progressively improve safety
and security strategies and systems to maintain global security compliance.
ABOUT EES:
Established in 2001, EES Africa (Pty) Ltd specialises in the integration of multiple
system infrastructure including ICT, Data Centres, Audio Visual, Life Safety, Security
and Building Automation Systems. As an ISO 9001:2008 certiļ¬ed company, our
vision is to be Africaā€™s management, engineering and auditing professional service
provider of choice.
The EES Value Proposition focuses on translating technology into tangible delivera-
bles for clients through the experience of a talented team of Engineering and ICT
Consultants and Project Managers. With ofļ¬ces in Cape Town, Johannesburg and
Stellenbosch, EES operates predominantly in the Renewable Energy, Oil & Gas, Fi-
nancial Services, Infrastructure, Utilities, Telecoms and Mining sectors.
CONTENTS
Page 2 Introduction
Page 2 Context: ISPS Code
Page 2 Security Breaches
Page 3 Solution: an Integrated Security System (ISS)
Page 3 Recommendations
I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 1
EES Cape Town ofļ¬ce:
G11 Silverberg Terrace
3 Silverwood Close
Steenberg Ofļ¬ce Park
Cape Town 7945
PO Box 31322, Tokai 7966
Western Cape, South Africa
Email: info@eeslive.com
Tel: +27 (0)21 702 8340
Fax: +27 (0) 86 532 3532
EES Johannesburg ofļ¬ce:
Unit 8, West Block Loft Ofļ¬ces,
First Floor, The Zone Phase II,
26 Cradock Avenue, Rosebank, 2186
PO Box 31322, Tokai 7966
Western Cape, South Africa
Email: info@eeslive.com
Tel: +27 (0)10 590 6270
Fax: +27 (0) 86 532 3532
EES Stellenbosch ofļ¬ce:
18 Tegno Road
Techno Park
Stellenbosch 7599
PO Box 31322, Tokai 7966
Western Cape, South Africa
Email: info@eeslive.com
Tel: +27 (0)21 200 5939
Fax: +27 (0) 86 532 3532
Introduction
Due to global developments, it is becoming increasingly
important to enhance and optimise the security of ships
and port facilities worldwide. Ports are having to progres-
sively improve safety and security strategies and systems
to maintain global security compliance.
Throughout history, ports have handled a diverse range
of trafļ¬c. Because a key objective of a port is to enable
ships to dock and transfer people or cargo to or from
land, support and storage facilities vary widely and may
extend for miles.
Ports are evolving from mere transportation centres to
centres directly involved in more complex, value-added
activities such as cargo processing and logistics. This
requires new processes, practices and technological ad-
vances in control, integration and connectivity.
An integral role that technological advances in control,
integration and connectivity play is port security and pro-
tection of ports against acts of terrorism. The vital need
to enhance port security was highlighted in the wake of
the events of September 2001, which changed the na-
ture of security at all transportation hubs globally. Since
then, very signiļ¬cant progress has been made in the de-
sign and implementation of leading edge security sys-
tems. The piracy attacks of yachts, container vessels and
oil tankers globally and especially off the coast of East
Africa has further emphasised the need for the security
of both ships and other sea vessels.
Today international trade and open commerce produces
numerous challenges to port security. Different, complex
shipping systems and the need to keep trafļ¬c moving
smoothly, exacerbate these challenges. Optimal, inte-
grated and automated control in such a complex envi-
ronment is required.
The need to improve security is especially important in
the case of ports experiencing growth. This in particular
applies to emerging economies.
With growth, it is necessary to have security measures
that correlate with the increased people volumes, trafļ¬c
volumes and threats posed by such an important hub. To
accommodate the increased load, correct procedures are
in some cases not followed, exposing risks and making
ports, product and countries vulnerable to security attacks.
With regard to ports, the International Convention for
the Safety of Life at Sea (SOLAS), 1974, paves the way
for the International Ship and Port Facility Security Code
(ISPS Code) to enhance the security of ships and port
facilities. These are all supported by the United Nationā€™s
International Maritime Organisation (IMO).
AN INTEGRATED SECURITY SYSTEM (ISS)
OPTIMISES GLOBAL PORT SECURITY
March 2014
Context: ISPS Code
The International Ship and Port Facility Security Code (ISPS Code) is a com-
prehensive set of measures to enhance the security of ships and port fa-
cilities, developed in response to the perceived threats to ships and port
facilities after the 9/11 attacks in the United States.
The ISPS Code is implemented through chapter XI-2 ā€œSpecial measures to
enhance maritime securityā€ in the International Convention for the Safety
of Life at Sea (SOLAS), 1974. The Code has two parts, one mandatory and
one recommendatory.
International regulations based on the ISPS Code were enacted by Europe
and the United Kingdom in 2004, and in 2002 the United States enacted
the provisions of the Maritime Transportation Security Act of 2002 and
aligned domestic regulations with the maritime security standards of SO-
LAS and the ISPS Code.
In essence, the Code takes the approach that ensuring the security of ships
and port facilities is a risk management activity and that, to determine what
security measures are appropriate, an assessment of the risks must be made
in each particular case. The purpose of the Code is to provide a standard-
ised, consistent framework for evaluating risk. This enables Governments
to offset changes in threat with changes in vulnerability for ships and port
facilities through determination of appropriate security levels and corre-
sponding security measures.
Security Breaches
Security breaches can manifest themselves as:
ā€¢ Petty Crime
ā€¢ Syndicates
ā€¢ Espionage
ā€¢ Sabotage
ā€¢ Hostage Taking
ā€¢ National Security Threats
ā€¢ Cyber Crime
ā€¢ Fires
ā€¢ Natural Disasters
As attacks become increasingly advanced, security systems can no longer
be viewed as individual silos as was previously the case, but it is essential
that all security elements are integrated.
As such, an Integrated Security System (ISS) is required to ensure access to
facilities and data is authenticated, authorised and accounted for.
I MANAGEMENT I ENGINEERING I AUDITING I
I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 2
AN INTEGRATED SECURITY SYSTEM (ISS)
OPTIMISES GLOBAL PORT SECURITY
March 2014
I MANAGEMENT I ENGINEERING I AUDITING I
I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 3
Written by Jaco Cronje
Director, EES
Tel +27 (0)10 590 6271,
Email info@eeslive.com
Jaco is the Operations Director at EES Africa
(Pty) Ltd and a registered Professional
Engineer (Electrical and Electronic). He has
been involved in Project Directorship and
Managementofamongstothers,FIFAWorld
Cup Stadia, urban surveillance projects, ICT
system design and implementation projects
in the retail and hospitality industry. Jaco
is a Green Star SA Accredited Professional.
Solution: an Integrated Security System (ISS)
The aim of an ISS, which is in line with the ISPS Code,
is to:
ā€¢ Detect security threats and implement security
measures
ā€¢ Establish roles and responsibilities concerning
maritime security for governments, local
administrations, ship and port industries at the
national and international level
ā€¢ Collate and promulgate security-related information
ā€¢ Provide a methodology for security assessments
in order to have in place appropriate plans and
procedures to react to changing security levels
ISS, as the term deļ¬nes, provides a multi-layer, multi-
system approach to security. Drawing on experience in
analysing security risks to clients across multiple sectors,
a list of security systems to be audited, reported on, and
recommended can then be identiļ¬ed and recommended.
An ISS solution automatically links all security and surveil-
lance activities to the ISPS Code.
The systems listed in the paragraph below are integrated
and combined into a single physical space known as a
Security Operations Centre. This room is specially de-
signed to optimise lighting, temperature, air quality, dis-
play areas, ergonomics and operations.
The systems are:
ā€¢ CCTV which includes
- Facial Detection
- Number Plate Recognition
- Analytics
ā€¢ Weighbridges
- Access Control which includes Biometric and
Time & Attendance
ā€¢ Electronic Scanning
ā€¢ Technology Supporting Mobile Security Staff
ā€¢ Fire Detection
ā€¢ Intruder Alarm Systems
ā€¢ Hard Wired Alarms
ā€¢ PA Systems with Full Bi-directional Audio
ā€¢ Physical Security Information Management (PSIM)
ā€¢ Port Management Software
- Network Security which includes Authentication
Servers, Security Policies, Firewalls and Encryption
ā€¢ Asset Tracking
ā€¢ Holding Cells
ā€¢ Search Facilities
ā€¢ Visitor Management Systems
Recommendations
Ports need to ensure compliance to international codes and best practices
for safety of their clients (vessels & people) and to retain international cer-
tiļ¬cations.
Annual audits of the technology, facilities, procedures and skill sets need
to be conducted to ensure ports stay competitive in terms of security man-
agement.
An experienced security advisory and project management company, skilled
in use of the relevant technology, should be appointed to provide the re-
quired professional services to implement an ISS platform.
The professional services provider would focus on:
ā€¢ Audit and document current practices with regards to people
and process
ā€¢ Providing advice to government and commercial bodies on
security matters
ā€¢ Adapting existing systems and sourcing cutting edge technology
ā€¢ Planning and design of security systems
ā€¢ Independent procurement and tender evaluation
ā€¢ Supervision of system installations
ā€¢ System integration and commissioning
ā€¢ Testing of port security systems
ā€¢ Crisis management planning

More Related Content

What's hot

ADAM ADLER FLORIDA
ADAM ADLER FLORIDA ADAM ADLER FLORIDA
ADAM ADLER FLORIDA
AdamAdler10
Ā 
AfriSecure Info Pack (5)
AfriSecure Info Pack (5)AfriSecure Info Pack (5)
AfriSecure Info Pack (5)Barry Newman
Ā 
Aviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical SolutionsAviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical Solutions
Professional Aviation Services
Ā 
Creating and Implementing an Effective Port Facility Security Plan
Creating and Implementing an Effective Port Facility Security PlanCreating and Implementing an Effective Port Facility Security Plan
Creating and Implementing an Effective Port Facility Security PlanApewalen Samuel MBA, PFSO
Ā 
THE INTEGRATION OF RPAS IN CIVIL AIRSPACE by Andrea Maccapani
THE INTEGRATION OF RPAS IN CIVIL AIRSPACE by Andrea MaccapaniTHE INTEGRATION OF RPAS IN CIVIL AIRSPACE by Andrea Maccapani
THE INTEGRATION OF RPAS IN CIVIL AIRSPACE by Andrea MaccapaniALIAS Network
Ā 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
Community Protection Forum
Ā 
Middle East Cyber Security Conference & Exhibition 2015
Middle East Cyber Security Conference & Exhibition 2015Middle East Cyber Security Conference & Exhibition 2015
Middle East Cyber Security Conference & Exhibition 2015
Sustainable Smart Cities India
Ā 
ACS Newsletter 20 years Feb 2015
ACS Newsletter 20 years Feb 2015ACS Newsletter 20 years Feb 2015
ACS Newsletter 20 years Feb 2015Riaan Bellingan
Ā 
CampusBeat - Jan 2005
CampusBeat - Jan 2005CampusBeat - Jan 2005
CampusBeat - Jan 2005Irene Doerksen
Ā 
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Sandeep Kumar
Ā 
Brief CV - M Millington May 2016
Brief CV - M Millington May 2016Brief CV - M Millington May 2016
Brief CV - M Millington May 2016Mick Millington
Ā 
Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)
šŸ‡«šŸ‡· Ī  P. DĪ£BIĪ•N Ā©
Ā 
מכון היצוא - Milipol 2011 ×Ŗ×¢×Øוכ×Ŗ
מכון היצוא - Milipol 2011 ×Ŗ×¢×Øוכ×Ŗמכון היצוא - Milipol 2011 ×Ŗ×¢×Øוכ×Ŗ
מכון היצוא - Milipol 2011 ×Ŗ×¢×Øוכ×Ŗ
Israel Export Institute_מכון היצוא
Ā 

What's hot (15)

ADAM ADLER FLORIDA
ADAM ADLER FLORIDA ADAM ADLER FLORIDA
ADAM ADLER FLORIDA
Ā 
AfriSecure Info Pack (5)
AfriSecure Info Pack (5)AfriSecure Info Pack (5)
AfriSecure Info Pack (5)
Ā 
Aviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical SolutionsAviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical Solutions
Ā 
Creating and Implementing an Effective Port Facility Security Plan
Creating and Implementing an Effective Port Facility Security PlanCreating and Implementing an Effective Port Facility Security Plan
Creating and Implementing an Effective Port Facility Security Plan
Ā 
THE INTEGRATION OF RPAS IN CIVIL AIRSPACE by Andrea Maccapani
THE INTEGRATION OF RPAS IN CIVIL AIRSPACE by Andrea MaccapaniTHE INTEGRATION OF RPAS IN CIVIL AIRSPACE by Andrea Maccapani
THE INTEGRATION OF RPAS IN CIVIL AIRSPACE by Andrea Maccapani
Ā 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
Ā 
Middle East Cyber Security Conference & Exhibition 2015
Middle East Cyber Security Conference & Exhibition 2015Middle East Cyber Security Conference & Exhibition 2015
Middle East Cyber Security Conference & Exhibition 2015
Ā 
ACS Newsletter 20 years Feb 2015
ACS Newsletter 20 years Feb 2015ACS Newsletter 20 years Feb 2015
ACS Newsletter 20 years Feb 2015
Ā 
ISPS REVIVE
ISPS REVIVEISPS REVIVE
ISPS REVIVE
Ā 
isps code pp
isps code ppisps code pp
isps code pp
Ā 
CampusBeat - Jan 2005
CampusBeat - Jan 2005CampusBeat - Jan 2005
CampusBeat - Jan 2005
Ā 
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Ā 
Brief CV - M Millington May 2016
Brief CV - M Millington May 2016Brief CV - M Millington May 2016
Brief CV - M Millington May 2016
Ā 
Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)
Ā 
מכון היצוא - Milipol 2011 ×Ŗ×¢×Øוכ×Ŗ
מכון היצוא - Milipol 2011 ×Ŗ×¢×Øוכ×Ŗמכון היצוא - Milipol 2011 ×Ŗ×¢×Øוכ×Ŗ
מכון היצוא - Milipol 2011 ×Ŗ×¢×Øוכ×Ŗ
Ā 

Viewers also liked

Finalistas 9 fundacionprivadasamueletoo
Finalistas 9 fundacionprivadasamueletooFinalistas 9 fundacionprivadasamueletoo
Finalistas 9 fundacionprivadasamueletooWalter Fernandez
Ā 
La Vida Como Debe De Ser Sin Complicaciones
La Vida Como Debe De Ser   Sin ComplicacionesLa Vida Como Debe De Ser   Sin Complicaciones
La Vida Como Debe De Ser Sin Complicaciones
1morera2
Ā 
Tmg marketing singles
Tmg marketing singlesTmg marketing singles
Tmg marketing singles
Archicon
Ā 
Tonnellerie de l'Adour
Tonnellerie de l'AdourTonnellerie de l'Adour
Tonnellerie de l'AdourMatteo Malpassi
Ā 
Hergonsa en Castilla y LeĆ³n EconĆ³mica
Hergonsa en Castilla y LeĆ³n EconĆ³micaHergonsa en Castilla y LeĆ³n EconĆ³mica
Hergonsa en Castilla y LeĆ³n EconĆ³mica
Castilla y LeĆ³n EconĆ³mica
Ā 
Los Catalizadores Del Branding
Los Catalizadores Del BrandingLos Catalizadores Del Branding
Los Catalizadores Del Branding
Julia Lizette Villa Tun
Ā 
OclusiĆ³n 4 DeterminaciĆ³n clĆ­nica de la DV
OclusiĆ³n 4 DeterminaciĆ³n clĆ­nica de la DVOclusiĆ³n 4 DeterminaciĆ³n clĆ­nica de la DV
OclusiĆ³n 4 DeterminaciĆ³n clĆ­nica de la DV
edomarino
Ā 
Brent Daigle Curriculum Vitae
Brent Daigle Curriculum VitaeBrent Daigle Curriculum Vitae
Brent Daigle Curriculum VitaeBrent Daigle, Ph.D.
Ā 
Auray (Francia)
Auray (Francia)Auray (Francia)
Auray (Francia)
F. Ovies
Ā 
23 asawari fartade
23 asawari fartade23 asawari fartade
23 asawari fartadeSRJIS
Ā 
Sist. de Comunicacion
Sist. de ComunicacionSist. de Comunicacion
Sist. de Comunicacion
Alex Virreira
Ā 
Currriculo dr fuentes bolivar
Currriculo dr fuentes bolivarCurrriculo dr fuentes bolivar
Currriculo dr fuentes bolivarJosimar Maldonado
Ā 
Seguimiento de Proyectos mediante Earned Value
Seguimiento de Proyectos mediante Earned ValueSeguimiento de Proyectos mediante Earned Value
Seguimiento de Proyectos mediante Earned Value
Sergio Salimbeni
Ā 
Descarga libro gratis: Uso de las redes sociales en la empresa.
Descarga libro gratis: Uso de las redes sociales en la empresa.Descarga libro gratis: Uso de las redes sociales en la empresa.
Descarga libro gratis: Uso de las redes sociales en la empresa.
Oscar CarriĆ³n
Ā 
La teorĆ­a sinĆ©rgica exige la integraciĆ³n de las
La teorĆ­a sinĆ©rgica exige la integraciĆ³n de lasLa teorĆ­a sinĆ©rgica exige la integraciĆ³n de las
La teorĆ­a sinĆ©rgica exige la integraciĆ³n de las
Rubenad Rivera Botacio
Ā 
Arts Open Program: March 8-10th 2014, Castlemaine, Australia
Arts Open Program: March 8-10th 2014, Castlemaine, AustraliaArts Open Program: March 8-10th 2014, Castlemaine, Australia
Arts Open Program: March 8-10th 2014, Castlemaine, Australia
We Push Buttons
Ā 
Die Digitalisierung der Unternehmenskommunikation - Thesen eines Beduinen
Die Digitalisierung der Unternehmenskommunikation - Thesen eines BeduinenDie Digitalisierung der Unternehmenskommunikation - Thesen eines Beduinen
Die Digitalisierung der Unternehmenskommunikation - Thesen eines Beduinen
vibrio. Kommunikationsmanagement Dr. Kausch GmbH
Ā 
Risks of Interactive Communication. A Digital Literacy proposal
Risks of Interactive Communication. A Digital Literacy proposalRisks of Interactive Communication. A Digital Literacy proposal
Risks of Interactive Communication. A Digital Literacy proposal
Technological Ecosystems for Enhancing Multiculturality
Ā 

Viewers also liked (20)

Finalistas 9 fundacionprivadasamueletoo
Finalistas 9 fundacionprivadasamueletooFinalistas 9 fundacionprivadasamueletoo
Finalistas 9 fundacionprivadasamueletoo
Ā 
La Vida Como Debe De Ser Sin Complicaciones
La Vida Como Debe De Ser   Sin ComplicacionesLa Vida Como Debe De Ser   Sin Complicaciones
La Vida Como Debe De Ser Sin Complicaciones
Ā 
Colvipe
ColvipeColvipe
Colvipe
Ā 
Tmg marketing singles
Tmg marketing singlesTmg marketing singles
Tmg marketing singles
Ā 
Tonnellerie de l'Adour
Tonnellerie de l'AdourTonnellerie de l'Adour
Tonnellerie de l'Adour
Ā 
Hergonsa en Castilla y LeĆ³n EconĆ³mica
Hergonsa en Castilla y LeĆ³n EconĆ³micaHergonsa en Castilla y LeĆ³n EconĆ³mica
Hergonsa en Castilla y LeĆ³n EconĆ³mica
Ā 
Los Catalizadores Del Branding
Los Catalizadores Del BrandingLos Catalizadores Del Branding
Los Catalizadores Del Branding
Ā 
OclusiĆ³n 4 DeterminaciĆ³n clĆ­nica de la DV
OclusiĆ³n 4 DeterminaciĆ³n clĆ­nica de la DVOclusiĆ³n 4 DeterminaciĆ³n clĆ­nica de la DV
OclusiĆ³n 4 DeterminaciĆ³n clĆ­nica de la DV
Ā 
Brent Daigle Curriculum Vitae
Brent Daigle Curriculum VitaeBrent Daigle Curriculum Vitae
Brent Daigle Curriculum Vitae
Ā 
AP Vita Tronic_Eng
AP Vita Tronic_EngAP Vita Tronic_Eng
AP Vita Tronic_Eng
Ā 
Auray (Francia)
Auray (Francia)Auray (Francia)
Auray (Francia)
Ā 
23 asawari fartade
23 asawari fartade23 asawari fartade
23 asawari fartade
Ā 
Sist. de Comunicacion
Sist. de ComunicacionSist. de Comunicacion
Sist. de Comunicacion
Ā 
Currriculo dr fuentes bolivar
Currriculo dr fuentes bolivarCurrriculo dr fuentes bolivar
Currriculo dr fuentes bolivar
Ā 
Seguimiento de Proyectos mediante Earned Value
Seguimiento de Proyectos mediante Earned ValueSeguimiento de Proyectos mediante Earned Value
Seguimiento de Proyectos mediante Earned Value
Ā 
Descarga libro gratis: Uso de las redes sociales en la empresa.
Descarga libro gratis: Uso de las redes sociales en la empresa.Descarga libro gratis: Uso de las redes sociales en la empresa.
Descarga libro gratis: Uso de las redes sociales en la empresa.
Ā 
La teorĆ­a sinĆ©rgica exige la integraciĆ³n de las
La teorĆ­a sinĆ©rgica exige la integraciĆ³n de lasLa teorĆ­a sinĆ©rgica exige la integraciĆ³n de las
La teorĆ­a sinĆ©rgica exige la integraciĆ³n de las
Ā 
Arts Open Program: March 8-10th 2014, Castlemaine, Australia
Arts Open Program: March 8-10th 2014, Castlemaine, AustraliaArts Open Program: March 8-10th 2014, Castlemaine, Australia
Arts Open Program: March 8-10th 2014, Castlemaine, Australia
Ā 
Die Digitalisierung der Unternehmenskommunikation - Thesen eines Beduinen
Die Digitalisierung der Unternehmenskommunikation - Thesen eines BeduinenDie Digitalisierung der Unternehmenskommunikation - Thesen eines Beduinen
Die Digitalisierung der Unternehmenskommunikation - Thesen eines Beduinen
Ā 
Risks of Interactive Communication. A Digital Literacy proposal
Risks of Interactive Communication. A Digital Literacy proposalRisks of Interactive Communication. A Digital Literacy proposal
Risks of Interactive Communication. A Digital Literacy proposal
Ā 

Similar to An Integrated Security System Optimises Global Port Security

Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
CHRIS CLIFFORD
Ā 
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Danladi Caleb
Ā 
Indonesia Port Security - International Standards for Success - The Maritime ...
Indonesia Port Security - International Standards for Success - The Maritime ...Indonesia Port Security - International Standards for Success - The Maritime ...
Indonesia Port Security - International Standards for Success - The Maritime ...Scott Bernat
Ā 
Ī•Ī›Ī™Ī£ĪœĪ• MSAG 20181107 Ī¦ĻŽĻ„Ī·Ļ‚ Ī£ĪæĻ†ĻĻŽĪ½Ī·Ļ‚ ā€˜Cyber Security ĻƒĻ„Īæ Ī˜Ī±Ī»Ī¬ĻƒĻƒĪ¹Īæ Ī ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½ā€™
Ī•Ī›Ī™Ī£ĪœĪ• MSAG 20181107 Ī¦ĻŽĻ„Ī·Ļ‚ Ī£ĪæĻ†ĻĻŽĪ½Ī·Ļ‚ ā€˜Cyber Security ĻƒĻ„Īæ Ī˜Ī±Ī»Ī¬ĻƒĻƒĪ¹Īæ Ī ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½ā€™Ī•Ī›Ī™Ī£ĪœĪ• MSAG 20181107 Ī¦ĻŽĻ„Ī·Ļ‚ Ī£ĪæĻ†ĻĻŽĪ½Ī·Ļ‚ ā€˜Cyber Security ĻƒĻ„Īæ Ī˜Ī±Ī»Ī¬ĻƒĻƒĪ¹Īæ Ī ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½ā€™
Ī•Ī›Ī™Ī£ĪœĪ• MSAG 20181107 Ī¦ĻŽĻ„Ī·Ļ‚ Ī£ĪæĻ†ĻĻŽĪ½Ī·Ļ‚ ā€˜Cyber Security ĻƒĻ„Īæ Ī˜Ī±Ī»Ī¬ĻƒĻƒĪ¹Īæ Ī ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½ā€™
Ī•Ī»Ī»Ī·Ī½Ī¹ĪŗĻŒ Ī™Ī½ĻƒĻ„Ī¹Ļ„ĪæĻĻ„Īæ Ī£Ļ„ĻĪ±Ļ„Ī·Ī³Ī¹ĪŗĻŽĪ½ ĪœĪµĪ»ĪµĻ„ĻŽĪ½ (Ī•Ī›Ī™Ī£ĪœĪ•)
Ā 
Vitrociset Company Presentation
Vitrociset Company Presentation Vitrociset Company Presentation
Vitrociset Company Presentation
Arianna Nasetti
Ā 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
Ian Kelly
Ā 
IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port Security
Adlan Hussain
Ā 
DIGITALISATION IN SHIPPING & LOGISTICS
DIGITALISATION IN SHIPPING & LOGISTICSDIGITALISATION IN SHIPPING & LOGISTICS
DIGITALISATION IN SHIPPING & LOGISTICS
rohith30
Ā 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
European Services Institute
Ā 
ISM_CODE_SHIPBOARD_TRAINING_FAMILIARIZAT.pdf
ISM_CODE_SHIPBOARD_TRAINING_FAMILIARIZAT.pdfISM_CODE_SHIPBOARD_TRAINING_FAMILIARIZAT.pdf
ISM_CODE_SHIPBOARD_TRAINING_FAMILIARIZAT.pdf
AustinAgbolo
Ā 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
European Services Institute
Ā 
ADVANCEMENT IN SENSOR TECHNOLOGY IN SHIPPING.pptx
ADVANCEMENT IN SENSOR TECHNOLOGY IN SHIPPING.pptxADVANCEMENT IN SENSOR TECHNOLOGY IN SHIPPING.pptx
ADVANCEMENT IN SENSOR TECHNOLOGY IN SHIPPING.pptx
NoomanShaikh
Ā 
Brochure_Ombros_reduced size
Brochure_Ombros_reduced sizeBrochure_Ombros_reduced size
Brochure_Ombros_reduced sizeOmbros Consulting
Ā 
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdfGramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax Cybersec
Ā 
Health & Safety - Making employee health and safety your highest priority
Health & Safety - Making employee health and safety your highest priorityHealth & Safety - Making employee health and safety your highest priority
Health & Safety - Making employee health and safety your highest priority
Milling and Grain magazine
Ā 
Maritime Cyber Security-ĪšĻ…Ī²ĪµĻĪ½ĪæĪ±ĻƒĻ†Ī¬Ī»ĪµĪ¹Ī± ĪŗĪ±Ī¹ ĪĪ±Ļ…Ļ„Ī¹Ī»ĪÆĪ±
Maritime Cyber Security-ĪšĻ…Ī²ĪµĻĪ½ĪæĪ±ĻƒĻ†Ī¬Ī»ĪµĪ¹Ī± ĪŗĪ±Ī¹ ĪĪ±Ļ…Ļ„Ī¹Ī»ĪÆĪ±Maritime Cyber Security-ĪšĻ…Ī²ĪµĻĪ½ĪæĪ±ĻƒĻ†Ī¬Ī»ĪµĪ¹Ī± ĪŗĪ±Ī¹ ĪĪ±Ļ…Ļ„Ī¹Ī»ĪÆĪ±
Maritime Cyber Security-ĪšĻ…Ī²ĪµĻĪ½ĪæĪ±ĻƒĻ†Ī¬Ī»ĪµĪ¹Ī± ĪŗĪ±Ī¹ ĪĪ±Ļ…Ļ„Ī¹Ī»ĪÆĪ±
Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD
Ā 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
Vinoth Sivasubramanan
Ā 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
Antoine Vigneron
Ā 
Maritime Cybersecurity Developments maritimeoutlook.wordpress.com
Maritime Cybersecurity Developments maritimeoutlook.wordpress.comMaritime Cybersecurity Developments maritimeoutlook.wordpress.com
Maritime Cybersecurity Developments maritimeoutlook.wordpress.com
Nihal Peter Moraes
Ā 
IneodoBrasil_BD_ANG
IneodoBrasil_BD_ANGIneodoBrasil_BD_ANG
IneodoBrasil_BD_ANGCharline Demu
Ā 

Similar to An Integrated Security System Optimises Global Port Security (20)

Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
Ā 
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Ā 
Indonesia Port Security - International Standards for Success - The Maritime ...
Indonesia Port Security - International Standards for Success - The Maritime ...Indonesia Port Security - International Standards for Success - The Maritime ...
Indonesia Port Security - International Standards for Success - The Maritime ...
Ā 
Ī•Ī›Ī™Ī£ĪœĪ• MSAG 20181107 Ī¦ĻŽĻ„Ī·Ļ‚ Ī£ĪæĻ†ĻĻŽĪ½Ī·Ļ‚ ā€˜Cyber Security ĻƒĻ„Īæ Ī˜Ī±Ī»Ī¬ĻƒĻƒĪ¹Īæ Ī ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½ā€™
Ī•Ī›Ī™Ī£ĪœĪ• MSAG 20181107 Ī¦ĻŽĻ„Ī·Ļ‚ Ī£ĪæĻ†ĻĻŽĪ½Ī·Ļ‚ ā€˜Cyber Security ĻƒĻ„Īæ Ī˜Ī±Ī»Ī¬ĻƒĻƒĪ¹Īæ Ī ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½ā€™Ī•Ī›Ī™Ī£ĪœĪ• MSAG 20181107 Ī¦ĻŽĻ„Ī·Ļ‚ Ī£ĪæĻ†ĻĻŽĪ½Ī·Ļ‚ ā€˜Cyber Security ĻƒĻ„Īæ Ī˜Ī±Ī»Ī¬ĻƒĻƒĪ¹Īæ Ī ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½ā€™
Ī•Ī›Ī™Ī£ĪœĪ• MSAG 20181107 Ī¦ĻŽĻ„Ī·Ļ‚ Ī£ĪæĻ†ĻĻŽĪ½Ī·Ļ‚ ā€˜Cyber Security ĻƒĻ„Īæ Ī˜Ī±Ī»Ī¬ĻƒĻƒĪ¹Īæ Ī ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½ā€™
Ā 
Vitrociset Company Presentation
Vitrociset Company Presentation Vitrociset Company Presentation
Vitrociset Company Presentation
Ā 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
Ā 
IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port Security
Ā 
DIGITALISATION IN SHIPPING & LOGISTICS
DIGITALISATION IN SHIPPING & LOGISTICSDIGITALISATION IN SHIPPING & LOGISTICS
DIGITALISATION IN SHIPPING & LOGISTICS
Ā 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
Ā 
ISM_CODE_SHIPBOARD_TRAINING_FAMILIARIZAT.pdf
ISM_CODE_SHIPBOARD_TRAINING_FAMILIARIZAT.pdfISM_CODE_SHIPBOARD_TRAINING_FAMILIARIZAT.pdf
ISM_CODE_SHIPBOARD_TRAINING_FAMILIARIZAT.pdf
Ā 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
Ā 
ADVANCEMENT IN SENSOR TECHNOLOGY IN SHIPPING.pptx
ADVANCEMENT IN SENSOR TECHNOLOGY IN SHIPPING.pptxADVANCEMENT IN SENSOR TECHNOLOGY IN SHIPPING.pptx
ADVANCEMENT IN SENSOR TECHNOLOGY IN SHIPPING.pptx
Ā 
Brochure_Ombros_reduced size
Brochure_Ombros_reduced sizeBrochure_Ombros_reduced size
Brochure_Ombros_reduced size
Ā 
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdfGramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Ā 
Health & Safety - Making employee health and safety your highest priority
Health & Safety - Making employee health and safety your highest priorityHealth & Safety - Making employee health and safety your highest priority
Health & Safety - Making employee health and safety your highest priority
Ā 
Maritime Cyber Security-ĪšĻ…Ī²ĪµĻĪ½ĪæĪ±ĻƒĻ†Ī¬Ī»ĪµĪ¹Ī± ĪŗĪ±Ī¹ ĪĪ±Ļ…Ļ„Ī¹Ī»ĪÆĪ±
Maritime Cyber Security-ĪšĻ…Ī²ĪµĻĪ½ĪæĪ±ĻƒĻ†Ī¬Ī»ĪµĪ¹Ī± ĪŗĪ±Ī¹ ĪĪ±Ļ…Ļ„Ī¹Ī»ĪÆĪ±Maritime Cyber Security-ĪšĻ…Ī²ĪµĻĪ½ĪæĪ±ĻƒĻ†Ī¬Ī»ĪµĪ¹Ī± ĪŗĪ±Ī¹ ĪĪ±Ļ…Ļ„Ī¹Ī»ĪÆĪ±
Maritime Cyber Security-ĪšĻ…Ī²ĪµĻĪ½ĪæĪ±ĻƒĻ†Ī¬Ī»ĪµĪ¹Ī± ĪŗĪ±Ī¹ ĪĪ±Ļ…Ļ„Ī¹Ī»ĪÆĪ±
Ā 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
Ā 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
Ā 
Maritime Cybersecurity Developments maritimeoutlook.wordpress.com
Maritime Cybersecurity Developments maritimeoutlook.wordpress.comMaritime Cybersecurity Developments maritimeoutlook.wordpress.com
Maritime Cybersecurity Developments maritimeoutlook.wordpress.com
Ā 
IneodoBrasil_BD_ANG
IneodoBrasil_BD_ANGIneodoBrasil_BD_ANG
IneodoBrasil_BD_ANG
Ā 

More from EES Africa (Pty) Ltd

With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...
EES Africa (Pty) Ltd
Ā 
Sustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
Sustainable Solar Power-The Solution to Providing Energy for Low Cost HousingSustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
Sustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
EES Africa (Pty) Ltd
Ā 
Carrying your Organisation and Technology into the Next Decade
Carrying your Organisation and Technology into the Next DecadeCarrying your Organisation and Technology into the Next Decade
Carrying your Organisation and Technology into the Next Decade
EES Africa (Pty) Ltd
Ā 
Africa's Industrial Scenario-Weighing up the Opportunities and Challenges
Africa's Industrial Scenario-Weighing up the Opportunities and ChallengesAfrica's Industrial Scenario-Weighing up the Opportunities and Challenges
Africa's Industrial Scenario-Weighing up the Opportunities and Challenges
EES Africa (Pty) Ltd
Ā 
Technological Barriers to Implementing Smart Grids in South African Cities
Technological Barriers to Implementing Smart Grids in South African CitiesTechnological Barriers to Implementing Smart Grids in South African Cities
Technological Barriers to Implementing Smart Grids in South African Cities
EES Africa (Pty) Ltd
Ā 
Biomass - A Crucial Renewable Energy Source if Generated Correctly
Biomass - A Crucial Renewable Energy Source if Generated CorrectlyBiomass - A Crucial Renewable Energy Source if Generated Correctly
Biomass - A Crucial Renewable Energy Source if Generated Correctly
EES Africa (Pty) Ltd
Ā 
Give Your Company the Competitive Edge by Means of an IT Audit
Give Your Company the Competitive Edge by Means of an IT AuditGive Your Company the Competitive Edge by Means of an IT Audit
Give Your Company the Competitive Edge by Means of an IT Audit
EES Africa (Pty) Ltd
Ā 
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
EES Africa (Pty) Ltd
Ā 
Whitepaper: Security in the Network Environment
Whitepaper: Security in the Network EnvironmentWhitepaper: Security in the Network Environment
Whitepaper: Security in the Network Environment
EES Africa (Pty) Ltd
Ā 
Video conferencing:Bringing together business colleagues from across the world
Video conferencing:Bringing together business colleagues from across the worldVideo conferencing:Bringing together business colleagues from across the world
Video conferencing:Bringing together business colleagues from across the world
EES Africa (Pty) Ltd
Ā 
An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013
An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013
An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013EES Africa (Pty) Ltd
Ā 

More from EES Africa (Pty) Ltd (11)

With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...
Ā 
Sustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
Sustainable Solar Power-The Solution to Providing Energy for Low Cost HousingSustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
Sustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
Ā 
Carrying your Organisation and Technology into the Next Decade
Carrying your Organisation and Technology into the Next DecadeCarrying your Organisation and Technology into the Next Decade
Carrying your Organisation and Technology into the Next Decade
Ā 
Africa's Industrial Scenario-Weighing up the Opportunities and Challenges
Africa's Industrial Scenario-Weighing up the Opportunities and ChallengesAfrica's Industrial Scenario-Weighing up the Opportunities and Challenges
Africa's Industrial Scenario-Weighing up the Opportunities and Challenges
Ā 
Technological Barriers to Implementing Smart Grids in South African Cities
Technological Barriers to Implementing Smart Grids in South African CitiesTechnological Barriers to Implementing Smart Grids in South African Cities
Technological Barriers to Implementing Smart Grids in South African Cities
Ā 
Biomass - A Crucial Renewable Energy Source if Generated Correctly
Biomass - A Crucial Renewable Energy Source if Generated CorrectlyBiomass - A Crucial Renewable Energy Source if Generated Correctly
Biomass - A Crucial Renewable Energy Source if Generated Correctly
Ā 
Give Your Company the Competitive Edge by Means of an IT Audit
Give Your Company the Competitive Edge by Means of an IT AuditGive Your Company the Competitive Edge by Means of an IT Audit
Give Your Company the Competitive Edge by Means of an IT Audit
Ā 
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
Ā 
Whitepaper: Security in the Network Environment
Whitepaper: Security in the Network EnvironmentWhitepaper: Security in the Network Environment
Whitepaper: Security in the Network Environment
Ā 
Video conferencing:Bringing together business colleagues from across the world
Video conferencing:Bringing together business colleagues from across the worldVideo conferencing:Bringing together business colleagues from across the world
Video conferencing:Bringing together business colleagues from across the world
Ā 
An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013
An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013
An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013
Ā 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
Ā 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
Ā 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
Ā 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
Ā 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
Ā 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
Ā 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
Ā 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
UiPathCommunity
Ā 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
Ā 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
Ā 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
Ā 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
Ā 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
Ā 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Ā 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Ā 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Ā 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Ā 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Ā 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Ā 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
Ā 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Ā 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Ā 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Ā 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Ā 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
Ā 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ā 

An Integrated Security System Optimises Global Port Security

  • 1. WHITEPAPER AN INTEGRATED SECURITY SYSTEM (ISS) OPTIMISES GLOBAL PORT SECURITY By Jaco Cronje, Director, EES Due to global developments, it is becoming increasingly important to enhance and optimise the security of ships and port facilities worldwide. Ports are having to progressively improve safety and security strategies and systems to maintain global security compliance.
  • 2. ABOUT EES: Established in 2001, EES Africa (Pty) Ltd specialises in the integration of multiple system infrastructure including ICT, Data Centres, Audio Visual, Life Safety, Security and Building Automation Systems. As an ISO 9001:2008 certiļ¬ed company, our vision is to be Africaā€™s management, engineering and auditing professional service provider of choice. The EES Value Proposition focuses on translating technology into tangible delivera- bles for clients through the experience of a talented team of Engineering and ICT Consultants and Project Managers. With ofļ¬ces in Cape Town, Johannesburg and Stellenbosch, EES operates predominantly in the Renewable Energy, Oil & Gas, Fi- nancial Services, Infrastructure, Utilities, Telecoms and Mining sectors. CONTENTS Page 2 Introduction Page 2 Context: ISPS Code Page 2 Security Breaches Page 3 Solution: an Integrated Security System (ISS) Page 3 Recommendations I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 1 EES Cape Town ofļ¬ce: G11 Silverberg Terrace 3 Silverwood Close Steenberg Ofļ¬ce Park Cape Town 7945 PO Box 31322, Tokai 7966 Western Cape, South Africa Email: info@eeslive.com Tel: +27 (0)21 702 8340 Fax: +27 (0) 86 532 3532 EES Johannesburg ofļ¬ce: Unit 8, West Block Loft Ofļ¬ces, First Floor, The Zone Phase II, 26 Cradock Avenue, Rosebank, 2186 PO Box 31322, Tokai 7966 Western Cape, South Africa Email: info@eeslive.com Tel: +27 (0)10 590 6270 Fax: +27 (0) 86 532 3532 EES Stellenbosch ofļ¬ce: 18 Tegno Road Techno Park Stellenbosch 7599 PO Box 31322, Tokai 7966 Western Cape, South Africa Email: info@eeslive.com Tel: +27 (0)21 200 5939 Fax: +27 (0) 86 532 3532
  • 3. Introduction Due to global developments, it is becoming increasingly important to enhance and optimise the security of ships and port facilities worldwide. Ports are having to progres- sively improve safety and security strategies and systems to maintain global security compliance. Throughout history, ports have handled a diverse range of trafļ¬c. Because a key objective of a port is to enable ships to dock and transfer people or cargo to or from land, support and storage facilities vary widely and may extend for miles. Ports are evolving from mere transportation centres to centres directly involved in more complex, value-added activities such as cargo processing and logistics. This requires new processes, practices and technological ad- vances in control, integration and connectivity. An integral role that technological advances in control, integration and connectivity play is port security and pro- tection of ports against acts of terrorism. The vital need to enhance port security was highlighted in the wake of the events of September 2001, which changed the na- ture of security at all transportation hubs globally. Since then, very signiļ¬cant progress has been made in the de- sign and implementation of leading edge security sys- tems. The piracy attacks of yachts, container vessels and oil tankers globally and especially off the coast of East Africa has further emphasised the need for the security of both ships and other sea vessels. Today international trade and open commerce produces numerous challenges to port security. Different, complex shipping systems and the need to keep trafļ¬c moving smoothly, exacerbate these challenges. Optimal, inte- grated and automated control in such a complex envi- ronment is required. The need to improve security is especially important in the case of ports experiencing growth. This in particular applies to emerging economies. With growth, it is necessary to have security measures that correlate with the increased people volumes, trafļ¬c volumes and threats posed by such an important hub. To accommodate the increased load, correct procedures are in some cases not followed, exposing risks and making ports, product and countries vulnerable to security attacks. With regard to ports, the International Convention for the Safety of Life at Sea (SOLAS), 1974, paves the way for the International Ship and Port Facility Security Code (ISPS Code) to enhance the security of ships and port facilities. These are all supported by the United Nationā€™s International Maritime Organisation (IMO). AN INTEGRATED SECURITY SYSTEM (ISS) OPTIMISES GLOBAL PORT SECURITY March 2014 Context: ISPS Code The International Ship and Port Facility Security Code (ISPS Code) is a com- prehensive set of measures to enhance the security of ships and port fa- cilities, developed in response to the perceived threats to ships and port facilities after the 9/11 attacks in the United States. The ISPS Code is implemented through chapter XI-2 ā€œSpecial measures to enhance maritime securityā€ in the International Convention for the Safety of Life at Sea (SOLAS), 1974. The Code has two parts, one mandatory and one recommendatory. International regulations based on the ISPS Code were enacted by Europe and the United Kingdom in 2004, and in 2002 the United States enacted the provisions of the Maritime Transportation Security Act of 2002 and aligned domestic regulations with the maritime security standards of SO- LAS and the ISPS Code. In essence, the Code takes the approach that ensuring the security of ships and port facilities is a risk management activity and that, to determine what security measures are appropriate, an assessment of the risks must be made in each particular case. The purpose of the Code is to provide a standard- ised, consistent framework for evaluating risk. This enables Governments to offset changes in threat with changes in vulnerability for ships and port facilities through determination of appropriate security levels and corre- sponding security measures. Security Breaches Security breaches can manifest themselves as: ā€¢ Petty Crime ā€¢ Syndicates ā€¢ Espionage ā€¢ Sabotage ā€¢ Hostage Taking ā€¢ National Security Threats ā€¢ Cyber Crime ā€¢ Fires ā€¢ Natural Disasters As attacks become increasingly advanced, security systems can no longer be viewed as individual silos as was previously the case, but it is essential that all security elements are integrated. As such, an Integrated Security System (ISS) is required to ensure access to facilities and data is authenticated, authorised and accounted for. I MANAGEMENT I ENGINEERING I AUDITING I I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 2
  • 4. AN INTEGRATED SECURITY SYSTEM (ISS) OPTIMISES GLOBAL PORT SECURITY March 2014 I MANAGEMENT I ENGINEERING I AUDITING I I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 3 Written by Jaco Cronje Director, EES Tel +27 (0)10 590 6271, Email info@eeslive.com Jaco is the Operations Director at EES Africa (Pty) Ltd and a registered Professional Engineer (Electrical and Electronic). He has been involved in Project Directorship and Managementofamongstothers,FIFAWorld Cup Stadia, urban surveillance projects, ICT system design and implementation projects in the retail and hospitality industry. Jaco is a Green Star SA Accredited Professional. Solution: an Integrated Security System (ISS) The aim of an ISS, which is in line with the ISPS Code, is to: ā€¢ Detect security threats and implement security measures ā€¢ Establish roles and responsibilities concerning maritime security for governments, local administrations, ship and port industries at the national and international level ā€¢ Collate and promulgate security-related information ā€¢ Provide a methodology for security assessments in order to have in place appropriate plans and procedures to react to changing security levels ISS, as the term deļ¬nes, provides a multi-layer, multi- system approach to security. Drawing on experience in analysing security risks to clients across multiple sectors, a list of security systems to be audited, reported on, and recommended can then be identiļ¬ed and recommended. An ISS solution automatically links all security and surveil- lance activities to the ISPS Code. The systems listed in the paragraph below are integrated and combined into a single physical space known as a Security Operations Centre. This room is specially de- signed to optimise lighting, temperature, air quality, dis- play areas, ergonomics and operations. The systems are: ā€¢ CCTV which includes - Facial Detection - Number Plate Recognition - Analytics ā€¢ Weighbridges - Access Control which includes Biometric and Time & Attendance ā€¢ Electronic Scanning ā€¢ Technology Supporting Mobile Security Staff ā€¢ Fire Detection ā€¢ Intruder Alarm Systems ā€¢ Hard Wired Alarms ā€¢ PA Systems with Full Bi-directional Audio ā€¢ Physical Security Information Management (PSIM) ā€¢ Port Management Software - Network Security which includes Authentication Servers, Security Policies, Firewalls and Encryption ā€¢ Asset Tracking ā€¢ Holding Cells ā€¢ Search Facilities ā€¢ Visitor Management Systems Recommendations Ports need to ensure compliance to international codes and best practices for safety of their clients (vessels & people) and to retain international cer- tiļ¬cations. Annual audits of the technology, facilities, procedures and skill sets need to be conducted to ensure ports stay competitive in terms of security man- agement. An experienced security advisory and project management company, skilled in use of the relevant technology, should be appointed to provide the re- quired professional services to implement an ISS platform. The professional services provider would focus on: ā€¢ Audit and document current practices with regards to people and process ā€¢ Providing advice to government and commercial bodies on security matters ā€¢ Adapting existing systems and sourcing cutting edge technology ā€¢ Planning and design of security systems ā€¢ Independent procurement and tender evaluation ā€¢ Supervision of system installations ā€¢ System integration and commissioning ā€¢ Testing of port security systems ā€¢ Crisis management planning