Due to global developments, it is becoming increasingly important to enhance and optimise the security of ships and port facilities worldwide. Ports are having to progressively improve safety and security strategies and systems to maintain global security compliance.
Ports are evolving from mere transportation centres to centres directly involved in more complex, value-added activities such as cargo processing and logistics. This requires new processes, practices and technological advances in control, integration and connectivity.
ADAM ADLER FLORIDA - Adam Adler is the current Fund Manager at The Adler Fund, a private organization focusing on investing in the health and wellness, real estate, technology and healthcare space.
As the Founder of Fuse Science, Adam was the companyās CEO and primary investor. He personally signed over 20 world renown celebrity and athlete partnerships and endorsements for Fuse, including Tiger Woods, Andy Murray, David Ortiz, Paul Pierce, and Daymond John. He facilitated the transition to the public market in April 2011 and formed a team of top executives all strategically placed to bring shareholder value through bringing senior level expertise. Mr. Adler spearheaded the acquisition strategy Fuse implemented to bring global awareness around its platform technology.
Adam has substantial business and management experience, and a great understanding of the operation and responsibilities public companies. Adamās true passion is remaining involved in the Chabad movement and supporting childrenās hospitals.
Insights from David Alexander ICAO AVSEC Pm and General Manager: AVSEC at Professional Aviation Security on current aviation security challenges including recent airport attacks and providing some possible practical solutions
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Sandeep Kumar
Ā
Rapidsoft Systems (http:///www.rapidsoftsystems.com) is a leading outsourced software development, and IT service company based in NJ with offices in the US, India and Middle East. In the last 10 years, our team has produced over 400+ successful projects including numerous prestigious mobile and web apps for big corporations.
Rapidsoft Systemd also offers Defentect, an integrated advanced system for Detecting Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) Threats proactively. This sensor based system can provide pro-active threat detection from terrorists and save lives.
This presentation provides some information about Defentect CBRNE safety System. If you are looking for security and safety of homelan, contact us at +1 609 439 4775 for more information.
La Vida Como Debe De Ser Sin Complicaciones1morera2
Ā
Somos seres integrales, necesitamos recordarlo y renovarnos, para ser parte de la solucion que las personas necesitan para vivir en abundancia.
Quiero compartir mi visiĆ³n y mi mision con todos los interesados en crear redes de ayuda autosustentables.
Bendiciones y besos sonrientes.
Claudia Morera
ADAM ADLER FLORIDA - Adam Adler is the current Fund Manager at The Adler Fund, a private organization focusing on investing in the health and wellness, real estate, technology and healthcare space.
As the Founder of Fuse Science, Adam was the companyās CEO and primary investor. He personally signed over 20 world renown celebrity and athlete partnerships and endorsements for Fuse, including Tiger Woods, Andy Murray, David Ortiz, Paul Pierce, and Daymond John. He facilitated the transition to the public market in April 2011 and formed a team of top executives all strategically placed to bring shareholder value through bringing senior level expertise. Mr. Adler spearheaded the acquisition strategy Fuse implemented to bring global awareness around its platform technology.
Adam has substantial business and management experience, and a great understanding of the operation and responsibilities public companies. Adamās true passion is remaining involved in the Chabad movement and supporting childrenās hospitals.
Insights from David Alexander ICAO AVSEC Pm and General Manager: AVSEC at Professional Aviation Security on current aviation security challenges including recent airport attacks and providing some possible practical solutions
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Sandeep Kumar
Ā
Rapidsoft Systems (http:///www.rapidsoftsystems.com) is a leading outsourced software development, and IT service company based in NJ with offices in the US, India and Middle East. In the last 10 years, our team has produced over 400+ successful projects including numerous prestigious mobile and web apps for big corporations.
Rapidsoft Systemd also offers Defentect, an integrated advanced system for Detecting Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) Threats proactively. This sensor based system can provide pro-active threat detection from terrorists and save lives.
This presentation provides some information about Defentect CBRNE safety System. If you are looking for security and safety of homelan, contact us at +1 609 439 4775 for more information.
La Vida Como Debe De Ser Sin Complicaciones1morera2
Ā
Somos seres integrales, necesitamos recordarlo y renovarnos, para ser parte de la solucion que las personas necesitan para vivir en abundancia.
Quiero compartir mi visiĆ³n y mi mision con todos los interesados en crear redes de ayuda autosustentables.
Bendiciones y besos sonrientes.
Claudia Morera
Arts Open Program: March 8-10th 2014, Castlemaine, AustraliaWe Push Buttons
Ā
Arts Open is a Visual Arts extravaganza featuring over 70 artists, across 40 studios and galleries.
The program will not just feature the opportunity to meet the artists in their own studios but also incorporate Public Talks, Book Signings, and a Gala Ball.
Labour Day Weekend 2014 in Castlemaine, regional Victoria, Australia.
Ein Vortrag Ć¼ber die Zukunft der Arbeit, Mitarbeiter, die zu Marken werden und den Google Author Rank vor Managern der ERGO Versicherung am 25 10 2013
Marlink IMO 2021 Guide to Cyber Risk ManagementCHRIS CLIFFORD
Ā
Applicable to commercial ships with over 500 gross tonnage, the IMO resolution (MSC 428, 98) confirmed all shipping companies need to have cyber security in their safety management system. Flag states are encouraged to ensure these requirements are met by vessel operators in the first annual audit after January 2021. Non-compliance may lead to vessel detainment. This means maritime companies need to be identifying and safeguarding against maritime cyber risks now to be ready for the first annual verification of the Companyās Document of Compliance.
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Danladi Caleb
Ā
Maritime security comes out as one of the essential issue in the modern society because of the social and political implication towards the achievement of growth and development
IPSecurityCenterTM PSIM Enhancing Port SecurityAdlan Hussain
Ā
IPSecurityCenter is a software based integration and management platform, which connects disparate security systems such as radar, analytics, PIDS, GPS tracking, GIS mapping and video surveillance; aggregating intelligence allows organizations to react faster and more precisely to incidents. IPSecurityCenter provides operators with real-time situation awareness, through a common operating picture (COP) and following an alert, alarm or trigger presents step by step process guidance, ensuring complete compliance to organizational security policies.
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdfGramax Cybersec
Ā
Role of Cybersecurity in Maritime: A high-risk sector
Maritime, an ancient industry responsible carriage for 90% of global trade, stands as a cornerstone of the world economy. Despite initial perceptions that maritime assets are immune, the increased reliance on industrial control systems (ICS) and satellite communications renders this age-old industry susceptible to cyber adversaries. The reluctance to openly share information and collaborate on cybersecurity best practices has exacerbated the issue, leading to a surge in maritime cyber incidents, up by a staggering 900% since 2017. The NotPetya cyberattack in June 2017 stands out as one of the most devastating incidents, causing over $10 billion in damages. This malware, initially targeting Ukrainian companies, had a far-reaching impact, affecting global giants like Maersk, which lost significant data and infrastructure.
In this article, we will take you through the crucial role of cybersecurity in the maritime sector, offering insights into the intricacies of the maritime ecosystem, and identifying key vulnerable systems. Additionally, we will explore the far-reaching consequences of successful cyberattacks and effective strategies for cyber risk management in this high-stakes domain.
Global Industries, Inc recently announced that two of their divisions were honoured at the annual conference of the Great Plains Safety and Health Organisation. MFS/York/Stormor was named as a silver award winner. Additionally, Nebraska Engineering Company (NECO) was named a bronze award winner for their continued efforts and improvements in creating a safe work environment for their employees.
Maritime Cybersecurity Developments maritimeoutlook.wordpress.comNihal Peter Moraes
Ā
Maritime cybersecurity developments from IMO and IRClass. Also, reference guidelines from ISO/IEC 27001 Standards, NIST and guidelines published by BIMCO, INTERTANKO and ICS among others.
With the evolution of technology, a comprehensive mobility strategy is impera...EES Africa (Pty) Ltd
Ā
Today, it is essential to have access to the internet, cloud and company data, as well as be able to communicate with co-workers, associates and clients no matter oneās location. Ever increasing advances in technology make this possible. It is vital for an organisation to have a cutting edge mobility strategy in place to optimise efficiency and ensure that should a device be lost, stolen or damaged, communication continues.
Sustainable Solar Power-The Solution to Providing Energy for Low Cost HousingEES Africa (Pty) Ltd
Ā
South Africa faces an immense challenge to address the backlog in the construction and delivery
of quality, low cost housing. While there are a number of initiatives underway, there is said to be a
backlog of some 2.3 million houses. Integral to the construction of these houses is the provision of
energy for basic needs. Solar technology is a cost-effective solution for providing energy to low cost houses.
Carrying your Organisation and Technology into the Next DecadeEES Africa (Pty) Ltd
Ā
What does your organisation need to consider to ensure your company's technology enables efficiency and success to 2020 and beyond including the following:
Technology Trends
The 4th Utility
Network Infrastructure Required for the Technology of your Building
Data Usage and Connectivity
Increasing the Resilience of your IT System
Africa's Industrial Scenario-Weighing up the Opportunities and ChallengesEES Africa (Pty) Ltd
Ā
Africaās growth is projected to accelerate to 4.8% in 2014 and 5 to 6% in 2015, levels which have not been seen since the global economic crisis of 2009. Africa has weathered internal and external shocks and is poised to achieve healthy economic growth rates. Against this encouraging backdrop are however numerous challenges.
Technological Barriers to Implementing Smart Grids in South African CitiesEES Africa (Pty) Ltd
Ā
The technological barriers to implementing the smart grid in South Africa are as follows:
- Data privacy and cyber security
- Open standards for interoperability
- Longevity of solutions
- Connectivity requirements
- Skills shortages
Biomass - A Crucial Renewable Energy Source if Generated CorrectlyEES Africa (Pty) Ltd
Ā
Biomass is a renewable energy source derived from biological material, such as plants, wood and farming by-products. As an energy source, it can be used directly via combustion to produce heat, or indirectly after converting it to various forms of biofuel.
Biomass energy has a dual effect, depending on where and how it is produced. If generated correctly it can be produced in ways that reduce global warming, as opposed to increasing it. It can help clean up the air, water, soil, and protect wildlife, or it can degrade lands, forests, water, and harm public health.
Give Your Company the Competitive Edge by Means of an IT AuditEES Africa (Pty) Ltd
Ā
With increasing technological developments and competition, companies are looking at ways to enhance and optimise their information technology (IT) systems and technical infrastructure. An information technology audit, also referred to as a technical infrastructure audit, is an invaluable process to undertake to accomplish this.
It examines IT governance and how a companyās IT environment performs against best practice and emerging, leading edge technology. It does this by scrutinising information systems, their inputs, outputs and processing, capabilities and performance
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...EES Africa (Pty) Ltd
Ā
South Africa is a country fraught with ongoing challenges in the form of severe power shortages and an inconsistent, unreliable power supply. The increased solar energy allocation, if implemented, would of course help alleviate this situation by diversifying energy resources and boosting energy security.
Threats to network security are escalating dramatically. Technology advancements in social media, mobile devices, wifi and cloud services are increasing a companyās vulnerability to attacks. Cyber risks and cyber threats are a major concern for large revenue generating organisations.
Video conferencing:Bringing together business colleagues from across the worldEES Africa (Pty) Ltd
Ā
State-of-the art information and communication technology (ICT) makes it increasingly easy for people the world over to communicate in real-time. Perhaps the pinnacle of communication technology is Video Conferencing (VC) which enables virtual interaction to take place between business colleagues from different sites or remote sites, as if they are situated right next to each other.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
Ā
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Ā
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties ā USA
Expansion of bot farms ā how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks ā Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Ā
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But thereās more:
In a second workflow supporting the same use case, youāll see:
Your campaign sent to target colleagues for approval
If the āApproveā button is clicked, a Jira/Zendesk ticket is created for the marketing design team
Butāif the āRejectā button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Ā
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. Whatās changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Ā
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
Ā
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Ā
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
Ā
As AI technology is pushing into IT I was wondering myself, as an āinfrastructure container kubernetes guyā, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefitās both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
Ā
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Ā
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
Ā
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ā
An Integrated Security System Optimises Global Port Security
1. WHITEPAPER
AN INTEGRATED SECURITY SYSTEM (ISS) OPTIMISES
GLOBAL PORT SECURITY
By Jaco Cronje, Director, EES
Due to global developments, it is becoming increasingly important to enhance and optimise the
security of ships and port facilities worldwide. Ports are having to progressively improve safety
and security strategies and systems to maintain global security compliance.
2. ABOUT EES:
Established in 2001, EES Africa (Pty) Ltd specialises in the integration of multiple
system infrastructure including ICT, Data Centres, Audio Visual, Life Safety, Security
and Building Automation Systems. As an ISO 9001:2008 certiļ¬ed company, our
vision is to be Africaās management, engineering and auditing professional service
provider of choice.
The EES Value Proposition focuses on translating technology into tangible delivera-
bles for clients through the experience of a talented team of Engineering and ICT
Consultants and Project Managers. With ofļ¬ces in Cape Town, Johannesburg and
Stellenbosch, EES operates predominantly in the Renewable Energy, Oil & Gas, Fi-
nancial Services, Infrastructure, Utilities, Telecoms and Mining sectors.
CONTENTS
Page 2 Introduction
Page 2 Context: ISPS Code
Page 2 Security Breaches
Page 3 Solution: an Integrated Security System (ISS)
Page 3 Recommendations
I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 1
EES Cape Town ofļ¬ce:
G11 Silverberg Terrace
3 Silverwood Close
Steenberg Ofļ¬ce Park
Cape Town 7945
PO Box 31322, Tokai 7966
Western Cape, South Africa
Email: info@eeslive.com
Tel: +27 (0)21 702 8340
Fax: +27 (0) 86 532 3532
EES Johannesburg ofļ¬ce:
Unit 8, West Block Loft Ofļ¬ces,
First Floor, The Zone Phase II,
26 Cradock Avenue, Rosebank, 2186
PO Box 31322, Tokai 7966
Western Cape, South Africa
Email: info@eeslive.com
Tel: +27 (0)10 590 6270
Fax: +27 (0) 86 532 3532
EES Stellenbosch ofļ¬ce:
18 Tegno Road
Techno Park
Stellenbosch 7599
PO Box 31322, Tokai 7966
Western Cape, South Africa
Email: info@eeslive.com
Tel: +27 (0)21 200 5939
Fax: +27 (0) 86 532 3532
3. Introduction
Due to global developments, it is becoming increasingly
important to enhance and optimise the security of ships
and port facilities worldwide. Ports are having to progres-
sively improve safety and security strategies and systems
to maintain global security compliance.
Throughout history, ports have handled a diverse range
of trafļ¬c. Because a key objective of a port is to enable
ships to dock and transfer people or cargo to or from
land, support and storage facilities vary widely and may
extend for miles.
Ports are evolving from mere transportation centres to
centres directly involved in more complex, value-added
activities such as cargo processing and logistics. This
requires new processes, practices and technological ad-
vances in control, integration and connectivity.
An integral role that technological advances in control,
integration and connectivity play is port security and pro-
tection of ports against acts of terrorism. The vital need
to enhance port security was highlighted in the wake of
the events of September 2001, which changed the na-
ture of security at all transportation hubs globally. Since
then, very signiļ¬cant progress has been made in the de-
sign and implementation of leading edge security sys-
tems. The piracy attacks of yachts, container vessels and
oil tankers globally and especially off the coast of East
Africa has further emphasised the need for the security
of both ships and other sea vessels.
Today international trade and open commerce produces
numerous challenges to port security. Different, complex
shipping systems and the need to keep trafļ¬c moving
smoothly, exacerbate these challenges. Optimal, inte-
grated and automated control in such a complex envi-
ronment is required.
The need to improve security is especially important in
the case of ports experiencing growth. This in particular
applies to emerging economies.
With growth, it is necessary to have security measures
that correlate with the increased people volumes, trafļ¬c
volumes and threats posed by such an important hub. To
accommodate the increased load, correct procedures are
in some cases not followed, exposing risks and making
ports, product and countries vulnerable to security attacks.
With regard to ports, the International Convention for
the Safety of Life at Sea (SOLAS), 1974, paves the way
for the International Ship and Port Facility Security Code
(ISPS Code) to enhance the security of ships and port
facilities. These are all supported by the United Nationās
International Maritime Organisation (IMO).
AN INTEGRATED SECURITY SYSTEM (ISS)
OPTIMISES GLOBAL PORT SECURITY
March 2014
Context: ISPS Code
The International Ship and Port Facility Security Code (ISPS Code) is a com-
prehensive set of measures to enhance the security of ships and port fa-
cilities, developed in response to the perceived threats to ships and port
facilities after the 9/11 attacks in the United States.
The ISPS Code is implemented through chapter XI-2 āSpecial measures to
enhance maritime securityā in the International Convention for the Safety
of Life at Sea (SOLAS), 1974. The Code has two parts, one mandatory and
one recommendatory.
International regulations based on the ISPS Code were enacted by Europe
and the United Kingdom in 2004, and in 2002 the United States enacted
the provisions of the Maritime Transportation Security Act of 2002 and
aligned domestic regulations with the maritime security standards of SO-
LAS and the ISPS Code.
In essence, the Code takes the approach that ensuring the security of ships
and port facilities is a risk management activity and that, to determine what
security measures are appropriate, an assessment of the risks must be made
in each particular case. The purpose of the Code is to provide a standard-
ised, consistent framework for evaluating risk. This enables Governments
to offset changes in threat with changes in vulnerability for ships and port
facilities through determination of appropriate security levels and corre-
sponding security measures.
Security Breaches
Security breaches can manifest themselves as:
ā¢ Petty Crime
ā¢ Syndicates
ā¢ Espionage
ā¢ Sabotage
ā¢ Hostage Taking
ā¢ National Security Threats
ā¢ Cyber Crime
ā¢ Fires
ā¢ Natural Disasters
As attacks become increasingly advanced, security systems can no longer
be viewed as individual silos as was previously the case, but it is essential
that all security elements are integrated.
As such, an Integrated Security System (ISS) is required to ensure access to
facilities and data is authenticated, authorised and accounted for.
I MANAGEMENT I ENGINEERING I AUDITING I
I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 2
4. AN INTEGRATED SECURITY SYSTEM (ISS)
OPTIMISES GLOBAL PORT SECURITY
March 2014
I MANAGEMENT I ENGINEERING I AUDITING I
I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 3
Written by Jaco Cronje
Director, EES
Tel +27 (0)10 590 6271,
Email info@eeslive.com
Jaco is the Operations Director at EES Africa
(Pty) Ltd and a registered Professional
Engineer (Electrical and Electronic). He has
been involved in Project Directorship and
Managementofamongstothers,FIFAWorld
Cup Stadia, urban surveillance projects, ICT
system design and implementation projects
in the retail and hospitality industry. Jaco
is a Green Star SA Accredited Professional.
Solution: an Integrated Security System (ISS)
The aim of an ISS, which is in line with the ISPS Code,
is to:
ā¢ Detect security threats and implement security
measures
ā¢ Establish roles and responsibilities concerning
maritime security for governments, local
administrations, ship and port industries at the
national and international level
ā¢ Collate and promulgate security-related information
ā¢ Provide a methodology for security assessments
in order to have in place appropriate plans and
procedures to react to changing security levels
ISS, as the term deļ¬nes, provides a multi-layer, multi-
system approach to security. Drawing on experience in
analysing security risks to clients across multiple sectors,
a list of security systems to be audited, reported on, and
recommended can then be identiļ¬ed and recommended.
An ISS solution automatically links all security and surveil-
lance activities to the ISPS Code.
The systems listed in the paragraph below are integrated
and combined into a single physical space known as a
Security Operations Centre. This room is specially de-
signed to optimise lighting, temperature, air quality, dis-
play areas, ergonomics and operations.
The systems are:
ā¢ CCTV which includes
- Facial Detection
- Number Plate Recognition
- Analytics
ā¢ Weighbridges
- Access Control which includes Biometric and
Time & Attendance
ā¢ Electronic Scanning
ā¢ Technology Supporting Mobile Security Staff
ā¢ Fire Detection
ā¢ Intruder Alarm Systems
ā¢ Hard Wired Alarms
ā¢ PA Systems with Full Bi-directional Audio
ā¢ Physical Security Information Management (PSIM)
ā¢ Port Management Software
- Network Security which includes Authentication
Servers, Security Policies, Firewalls and Encryption
ā¢ Asset Tracking
ā¢ Holding Cells
ā¢ Search Facilities
ā¢ Visitor Management Systems
Recommendations
Ports need to ensure compliance to international codes and best practices
for safety of their clients (vessels & people) and to retain international cer-
tiļ¬cations.
Annual audits of the technology, facilities, procedures and skill sets need
to be conducted to ensure ports stay competitive in terms of security man-
agement.
An experienced security advisory and project management company, skilled
in use of the relevant technology, should be appointed to provide the re-
quired professional services to implement an ISS platform.
The professional services provider would focus on:
ā¢ Audit and document current practices with regards to people
and process
ā¢ Providing advice to government and commercial bodies on
security matters
ā¢ Adapting existing systems and sourcing cutting edge technology
ā¢ Planning and design of security systems
ā¢ Independent procurement and tender evaluation
ā¢ Supervision of system installations
ā¢ System integration and commissioning
ā¢ Testing of port security systems
ā¢ Crisis management planning