SlideShare a Scribd company logo
Holistic Nuclear Security
An International Challenge
Cevn Vibert
//
Thales CNI Security Facility
Who… am I?
Cevn Vibert CITP MIET MInstMC MBCS
Solutions Architect & CNI Facility Manager
Security and Consulting
Thales UK
07791080623 Cevn.Vibert@UK.ThalesGroup.comCevn has over 25 years in Industry in a wide range of markets and industries.
Projects with EDF, Sellafield, RWE, National Grid, BP, KOC, LUL and Network Rail, together with Thames Water, Dwr
Cymru, and many more.
Experienced with Command and Control C2 Systems, Control Rooms, System of Systems, CCTV, Access Control,
Situational Awareness, Robust and Resilient Architectures, PLCs, SCADA, Industrial Networks, Knowledge Databases,
Incident Management, CBRN systems, Emergency Management, Reporting Solutions, Communications and Mobile
Systems.
Years of experience within the security threat environment has reinforced the necessity for integrated holistic
security to manage current and emerging threats. Situational Awareness solutions are key to providing adaptive,
effective and timely response to events.
//
Thales CNI Security Facility
Who… is Thales?
Mountbatten House, Basing View, Basingstoke, Hants. RG21 4HJ
£11.5bn revenue global company with over 65,000 employees; £1.3bn and 7,500 with Thales UK.
Thales UK services a wide range of markets including Critical National Infrastructure protection.
Thales UK is a long-term service delivery partner to EDF Generation’s existing nuclear fleet and is providing a
deployable communications capability as part of the Japanese Earthquake Response Programme.
Thales UK also has interests across the NDA estate, focussing on the provision of security, resilience and
emergency management capability.
Thales UK recognises security as a global challenge for the nuclear industry and understands how only a
holistic approach to infrastructure protection will manage that risk to acceptable levels.
//
Thales CNI Security Facility
Thales expertise - Nuclear
30 years of expertise:
 Most UK energy production sites use Thales systems to operate
their facilities.
Thales supports the UK energy sector with:
 DPCS Data Processing & Control Systems (Nuclear)
 Critical to safe operation of EDF’s UK’s nuclear power
stations
 APMS Advanced Plant Management Solutions (Fossil)
 Developed for RWE Npower
 60 Systems installed in 9 Power Stations
 EDF’s technology partner to extend life of existing nuclear power
fleet:
 Obsolescence management
 Fault and failure analysis
 Re-engineering services
 Spares & Supply Chain management
 Skills and competence management (SQEP)
//
Thales CNI Security Facility
Nuclear Power: Emergency Response
Deployable Communications & Information System (DCIS)
 Japanese Earthquake Response Programme (ONR requirement)
 Addressing ‘Beyond Design Basis’ scenarios due to extreme natural events
 Provides critical data from the nuclear power station to decision makers
 Transportable Emergency Response Modules:
 Completely self-sufficient with resilient communications architecture
 Capability held in storage at key points in the UK
 Emergency scenario requires Human Factors expertise to make operation intuitive
//
Thales CNI Security Facility
Nuclear Security
• What Threats….?
• Why Security…?
• How to manage Security?
• When to manage Security?
• Benefits of managing Security?
• What Thales is doing……..
……..We can all work… Together, Smarter, Safer
//
Thales CNI Security Facility
What… does a security threat look like?
Targeted Threat to physical security
//
Thales CNI Security Facility
Disruption to Operations
What… does a security threat look like?
What… does a security threat look like?
//
Thales CNI Security Facility
What… does a security threat look like?
SCADA System Threats
0 /0 /
Thales CNI Security Facility
What… does a security threat look like?
Importance of Procedures and Policies
1 /1 /
Thales CNI Security Facility
What… does a security threat look like?
The “Normal Person” internal threat
2 /2 /
Thales CNI Security Facility
Why… Security?
It doesn’t matter where in the world you are, there are potential security
threats, and are all linked to a number of primary objectives.
Protests/Demonstrations
Terrorism
IP Theft
Unscrupulous
Competitors
Nuisance Disruption
Organised Crime
Disgruntled Employees
3 /3 /
Thales CNI Security Facility
How… to deal with Security Threats?
Threats take many forms;
•Physical Access to Facilities
•Theft of Material/Data
•Placement of Material/Data
•Cyber Attack on Control Systems/Operations
•Denial of Service
•IP/ID theft
Deter
Detect
Recover
Respond
4 /4 /
Thales CNI Security Facility
When… to apply security?
It is possible to extend the before-event activity to deter and detect long
before someone approaches a physical or cyber perimeter.
5 /5 /
Thales CNI Security Facility
When… to apply security?
To manage threats the international community must consider security on a holistic basis.
• Physical (Situational Awareness)
• Operational (business logic linked to ConOps),
• Cyber (all the time with a SOC/NOC) ,
• Personnel (vetting before employment and during, authentication every-day every- access-
point, qualifications/records continuously updated and linked to security)
• Pattern-of-Life (social media monitoring predicting events, duress response identifying
events in progress, unusual behaviour identification predicting or identifying issues)
• Combating one without the other leaves inherent weaknesses
• Wider reaching commercial and efficiency benefits can be realised.
6 /6 /
Thales CNI Security Facility
Resilience AND EM?
Interrelationships with Emergency Management & Resilience have to be managed
• Post Fukushima there is a lot of focus on Resilience
• We need to ensure security remains part of the holistic considerations
Emergency Preparedness
Incident and Emergency Management
Emergency Monitoring
7 /7 /
Thales CNI Security Facility
Benefits…. the realisation?
• Efficiency in guard force optimisation
• Efficiency of control room staff optimisation
• Improved control room response times
• Reduced manned response times
• Enables rapid complex decision making
• Safety enhancement through improved access/egress
• Improved muster capability
• Safety enhancement through right worker, right place, right qualifications
• Lower security threat risk
• Lower contingency/reserve due to reduced risk
• Reduced outage due to quicker recovery from security/emergency incidents
• Remote monitoring/control in security/emergency situations
• Prevention of egress into threat or contamination zones
8 /8 /
Thales CNI Security Facility
Thales CNI Facility
What are we all doing about Integrated Holistic Nuclear Security?…..
9 /9 /
Thales CNI Security Facility
Cross-industry analogies
0 /0 /
Thales CNI Security Facility
CNI Situational Awareness
Industrial IT
Networks
GIS / Geo
Systems
Emergency
Management
Incident
Management
Business
Links
Mobile C2
Systems
Information
&
Reports
Integrated
Communications
(ICCS)
Process
Cyber
Operation
Integration
Multiple
System
Integration
Multiple
Security
Levels
Situation
Awareness
Sensors
Video
Management
Access
Control
Physical
Security
PSIMs
ConOps
NB. More detailed version at end
1 /1 /
Thales CNI Security Facility
The UK CNI Facility
• Simulate enterprise wide networks
• Demonstrate security/emergency/resilience management systems working together
• Understand impacts of cyber threats to networks and management systems
• Assess industry products/applications for security vulnerabilities
• Develop lock-downs for legacy and new systems to enhance security
• Run customer scenarios and collaboratively develop operational requirements
• Explore innovative approaches to holistic security (e.g. social media predictive, biometrics)
2 /2 /
Thales CNI Security Facility
…In the News…
3 /3 /
Thales CNI Security Facility
Holistic Security Situational Awareness
 Physical Security (Fences, Intrusion Detection, CCTV, Resilient Networks)
 Controlling a Nuclear Power Plant, Perimeter Access or Pipeline Protection using
Automation Systems (SCADA and PLCs)
 PSIM - integration of 3rd
parties
 Hypervisor – Situational Awareness - Hypervision using secure, collaborative, resilient,
scalable data-bus architectures and web technologies.
 TVS – Large Scale CCTV Video Management solutions
 Wyvern – Emergency Management Situational Awareness and Security Response
Planning solution.
 ECHO – incident and First Responder C2 deployments
 iCAS – CBRN (Chemical Biological Radiological and Nuclear) Mobile Sensors, Algorithms,
and Situational Awareness tracking displays.
 DCIS - Deployable Communication Information Systems
4 /4 /
Thales CNI Security Facility
Holistic Security Situational Awareness
Thales iCAS – CBRN Sensor platform, algorithms and C2
Thales Cougar Team Radio
– Secure Civil Comms
Thales TeoPad – Secure Multimedia Tablets
Thales UWB Radar
– locate people inside buildings
5 /5 /
Thales CNI Security Facility
Holistic Security Situational Awareness
Thales ECHO – Incident Crisis Management Thales Wyvern – Emergency Information Management C2
Thales TVS – Intelligent Video Management Thales Hypervisor – Situational Awareness
6 /6 /
Thales CNI Security Facility
3rd
party suppliers
Synectics – PCIM, VA, VMS Westermo – Industrial Rugged Networking
Pelco - CCTV
Vidsys – PCIM
Geoquip – PIDS
Invensys – SCADA
Rockwell – PLCs and SCADA
ABB – SCADA
Adroit – SCADA
Products4Automation – Win911 alarms
Many suppliers have loaned or donated components for our CIP Facility. We neither endorse or promote their
systems above others. Thales is product agnostic. We enjoy working with partners but the customer’s solution is
our focus. The 3rd
parties are examples at the CNI Facility.
7 /7 /
Thales CNI Security Facility
Partner Organisations
UK Government Cyber Strategy
MOD-Industry Defence Cyber Protection Partnership
Cyber Insurance Forum
8 /8 /
Thales CNI Security Facility
Cyber Integration Centre
 World Class Cyber Centre
 £2.5Million recently invested
 85 Cyber Engineers
 Building UK Cyber Standards for HMGov.
 Virtual Machines
 Any combination of Operating Systems
 Multiple concurrent scenarios using VLANs
 Mixture or virtual and ‘real’ equipment
 Current known zoo of Virus and Malware
 Spirent
 Test Centre (OSI Layers 1-3)
 Avalanche (OSI Layers 4-7)
 WAN Impairment
 Can create and run 80 million users
 Network traffic
 Web / web access
 Stress Test
 Partner with World cyber systems suppliers
9 /9 /
Thales CNI Security Facility
Cyber Facility
0 /0 /
Thales CNI Security Facility
Cyber Facility
1 /1 /
Thales CNI Security Facility
Cyber Facility
2 /2 /
Thales CNI Security Facility
Cyber Facility
How many cameras viewable on the internet
Figures for just one manufacturer
3 /3 /
Thales CNI Security Facility
CNI Projects – World examples
Mexico City
Ras Tanurah Refinery/Terminal
French Ballard “Pentagon”
Mecca
15,000 CCTV cameras
500 + Operators
8 Command Centres
60,000 calls/day
Largest Oil Terminal
20km perimeter
Turnkey solution
Foiled a suicide bomber
HQ for French MOD, Army, Navy,
Air Force and Directorates
10,000 users
Very high resilience
Crowd Flow and Density
Monitoring
5,000+ cameras
700 TV screens
4 /4 /
Thales CNI Security Facility
Holistic Security - Situational Awareness
5 /5 /
Thales CNI Security Facility
Benefits…. the realisation?
Integrated Holistic approachEfficiency
EffectivenessEfficiency
Effectiveness
Efficiency
Effectiveness
Efficiency
Effectiveness
Right People,
Right Thing,
Right Place,
Right Time
Public Relations,
Public Confidence,
Staff Confidence.
KPIs
6 /6 /
Thales CNI Security Facility
Nuclear Security - Themes for Discussion
 To what extent is the security threat understood; cyber,
physical, operational, other?
 How could such threats manifest themselves within the nuclear
industry?
 What measures are currently in place to protect against such
threats?
 How does the ONR evaluate the threat and what regulation
is/will be put in place to protect against it?
 What mitigation would need to be in place to translate the
threat picture into an acceptable and manageable risk
 How do you report and respond to incidents?
 How do you assess performance?
 What does good look like in the nuclear sector, can it be
benchmarked against other sectors?
 What support could Thales provide to in the complex area of
holistic integrated security.
Questions? – Discussion Themes…
7 /7 /
Thales CNI Security Facility
Together. Smarter. Safer.
THALES – Mountbatten House, Basing View, Basingstoke, Hampshire, RG21 4HJ, UK
Thank You.
8 /8 /
Thales CNI Security Facility
CNI Facility

More Related Content

What's hot

ZONeSEC in ERNCIP
ZONeSEC in ERNCIPZONeSEC in ERNCIP
ZONeSEC in ERNCIP
José Ramón Martínez Salio
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
Power System Operation
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copyevsrao
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
Defence and Security Accelerator
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
Yulia Rotar
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
Dale Butler
 
Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...
Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...
Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...
Claudy75
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryUKTI2014
 
ADAM ADLER FLORIDA
ADAM ADLER FLORIDA ADAM ADLER FLORIDA
ADAM ADLER FLORIDA
AdamAdler10
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
EnergySec
 
American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009
infracritical
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
EnergySec
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
Ivan Carmona
 
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
Adlan Hussain
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...David Sidhu
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
EnergySec
 
Simplex networking overview_brochure
Simplex networking overview_brochureSimplex networking overview_brochure
Simplex networking overview_brochure
JeremyGarcia46
 

What's hot (17)

ZONeSEC in ERNCIP
ZONeSEC in ERNCIPZONeSEC in ERNCIP
ZONeSEC in ERNCIP
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
 
Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...
Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...
Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th January
 
ADAM ADLER FLORIDA
ADAM ADLER FLORIDA ADAM ADLER FLORIDA
ADAM ADLER FLORIDA
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Simplex networking overview_brochure
Simplex networking overview_brochureSimplex networking overview_brochure
Simplex networking overview_brochure
 

Viewers also liked

Cevn Vibert Introduction Presentation
Cevn Vibert Introduction PresentationCevn Vibert Introduction Presentation
Cevn Vibert Introduction Presentationcevn
 
Cevnvibertpresentation1
Cevnvibertpresentation1Cevnvibertpresentation1
Cevnvibertpresentation1
cevn
 
Trabajo colectivo momento individual
Trabajo colectivo momento individualTrabajo colectivo momento individual
Trabajo colectivo momento individual
Silvia Gomez
 
tx outcomes POne.0061568(1)
tx outcomes POne.0061568(1)tx outcomes POne.0061568(1)
tx outcomes POne.0061568(1)Myrna Cozen
 
Eddy Current Evaluation 3-1
Eddy Current Evaluation 3-1Eddy Current Evaluation 3-1
Eddy Current Evaluation 3-1Ethan Gros
 
Research Process
Research ProcessResearch Process
Research Process
Jedi Labs
 
Hire magento developers
Hire  magento developersHire  magento developers
Hire magento developers
HireMagentoDevelopers
 
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
tacitnugget8140
 
^^ New different type media related news for big english movie san andreas @ ...
^^ New different type media related news for big english movie san andreas @ ...^^ New different type media related news for big english movie san andreas @ ...
^^ New different type media related news for big english movie san andreas @ ...
Deepak Somaji-Sawant
 
Mechanical ventilation, sedation and analgesia in pediatric burns
Mechanical ventilation, sedation and analgesia in pediatric burnsMechanical ventilation, sedation and analgesia in pediatric burns
Mechanical ventilation, sedation and analgesia in pediatric burns
Sergey Shushunov
 
Cata brochure - Product List
Cata brochure - Product ListCata brochure - Product List
Cata brochure - Product List
Cata Appliances Ltd
 
Presentación en power aprendizaje autonomo
Presentación en power aprendizaje autonomoPresentación en power aprendizaje autonomo
Presentación en power aprendizaje autonomo
UNIVIM
 
it165wv.us taxrev forms
it165wv.us taxrev forms  it165wv.us taxrev forms
it165wv.us taxrev forms taxman taxman
 
Learning object harmonic motion
Learning object harmonic motionLearning object harmonic motion
Learning object harmonic motion
Miles Jaques
 
A Compilation of all Astrological Info!
A Compilation of all Astrological Info!A Compilation of all Astrological Info!
A Compilation of all Astrological Info!frodo2222
 
The Genographic Project
The Genographic ProjectThe Genographic Project
The Genographic Project
slc45a3
 
Team Performance and Leadership
Team Performance and LeadershipTeam Performance and Leadership
Team Performance and Leadership
Leda Karabela
 

Viewers also liked (20)

Cevn Vibert Introduction Presentation
Cevn Vibert Introduction PresentationCevn Vibert Introduction Presentation
Cevn Vibert Introduction Presentation
 
Cevnvibertpresentation1
Cevnvibertpresentation1Cevnvibertpresentation1
Cevnvibertpresentation1
 
Trabajo colectivo momento individual
Trabajo colectivo momento individualTrabajo colectivo momento individual
Trabajo colectivo momento individual
 
tx outcomes POne.0061568(1)
tx outcomes POne.0061568(1)tx outcomes POne.0061568(1)
tx outcomes POne.0061568(1)
 
Eddy Current Evaluation 3-1
Eddy Current Evaluation 3-1Eddy Current Evaluation 3-1
Eddy Current Evaluation 3-1
 
Research Process
Research ProcessResearch Process
Research Process
 
Hire magento developers
Hire  magento developersHire  magento developers
Hire magento developers
 
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
Promises Addiction Treatment | Alcohol Drug Rehab Malibu -
 
^^ New different type media related news for big english movie san andreas @ ...
^^ New different type media related news for big english movie san andreas @ ...^^ New different type media related news for big english movie san andreas @ ...
^^ New different type media related news for big english movie san andreas @ ...
 
Mechanical ventilation, sedation and analgesia in pediatric burns
Mechanical ventilation, sedation and analgesia in pediatric burnsMechanical ventilation, sedation and analgesia in pediatric burns
Mechanical ventilation, sedation and analgesia in pediatric burns
 
Cmmaao pvt-ltd-pmi
Cmmaao pvt-ltd-pmiCmmaao pvt-ltd-pmi
Cmmaao pvt-ltd-pmi
 
Io Streams
Io StreamsIo Streams
Io Streams
 
Cata brochure - Product List
Cata brochure - Product ListCata brochure - Product List
Cata brochure - Product List
 
Presentación en power aprendizaje autonomo
Presentación en power aprendizaje autonomoPresentación en power aprendizaje autonomo
Presentación en power aprendizaje autonomo
 
it165wv.us taxrev forms
it165wv.us taxrev forms  it165wv.us taxrev forms
it165wv.us taxrev forms
 
Avgust
AvgustAvgust
Avgust
 
Learning object harmonic motion
Learning object harmonic motionLearning object harmonic motion
Learning object harmonic motion
 
A Compilation of all Astrological Info!
A Compilation of all Astrological Info!A Compilation of all Astrological Info!
A Compilation of all Astrological Info!
 
The Genographic Project
The Genographic ProjectThe Genographic Project
The Genographic Project
 
Team Performance and Leadership
Team Performance and LeadershipTeam Performance and Leadership
Team Performance and Leadership
 

Similar to Cevnvibertpresentation1

CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
CSO_Presentations
 
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I start
Rockwell Automation
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
ClubHack
 
Crisis Management Tekes Safety and Security programme 2013
Crisis Management Tekes Safety and Security programme 2013Crisis Management Tekes Safety and Security programme 2013
Crisis Management Tekes Safety and Security programme 2013Turvallisuus2013
 
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
ADGP, Public Grivences, Bangalore
 
Defesa de Doutorado: HAMSTER - healthy, mobility and security-based data comm...
Defesa de Doutorado: HAMSTER - healthy, mobility and security-based data comm...Defesa de Doutorado: HAMSTER - healthy, mobility and security-based data comm...
Defesa de Doutorado: HAMSTER - healthy, mobility and security-based data comm...
Daniel Fernando Pigatto
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updatedSantos Kumaar.S
 
CNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & GasCNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & Gas
Adlan Hussain
 
Accelerator Enduring Competition Challenge - Session 2
Accelerator Enduring Competition Challenge - Session 2Accelerator Enduring Competition Challenge - Session 2
Accelerator Enduring Competition Challenge - Session 2
Heather-Fiona Egan
 
Case Study Cepsa English
Case Study Cepsa EnglishCase Study Cepsa English
Case Study Cepsa English
Telefónica Grandes Clientes
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
Ivan Carmona
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
Steven SIM Kok Leong
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
Dell EMC World
 
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
EnergySec
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirt
vngundi
 
Wouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departementWouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departementimec.archive
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
DefCamp
 
Comptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseComptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident response
ShivamSharma909
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
Ploynatcha Akkaraputtipat
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
Dawn Nash Pfeiffer
 

Similar to Cevnvibertpresentation1 (20)

CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I start
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Crisis Management Tekes Safety and Security programme 2013
Crisis Management Tekes Safety and Security programme 2013Crisis Management Tekes Safety and Security programme 2013
Crisis Management Tekes Safety and Security programme 2013
 
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
 
Defesa de Doutorado: HAMSTER - healthy, mobility and security-based data comm...
Defesa de Doutorado: HAMSTER - healthy, mobility and security-based data comm...Defesa de Doutorado: HAMSTER - healthy, mobility and security-based data comm...
Defesa de Doutorado: HAMSTER - healthy, mobility and security-based data comm...
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
 
CNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & GasCNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & Gas
 
Accelerator Enduring Competition Challenge - Session 2
Accelerator Enduring Competition Challenge - Session 2Accelerator Enduring Competition Challenge - Session 2
Accelerator Enduring Competition Challenge - Session 2
 
Case Study Cepsa English
Case Study Cepsa EnglishCase Study Cepsa English
Case Study Cepsa English
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirt
 
Wouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departementWouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departement
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Comptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseComptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident response
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
 

Recently uploaded

一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
nikitacareer3
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
RicletoEspinosa1
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 

Cevnvibertpresentation1

  • 1. Holistic Nuclear Security An International Challenge Cevn Vibert
  • 2. // Thales CNI Security Facility Who… am I? Cevn Vibert CITP MIET MInstMC MBCS Solutions Architect & CNI Facility Manager Security and Consulting Thales UK 07791080623 Cevn.Vibert@UK.ThalesGroup.comCevn has over 25 years in Industry in a wide range of markets and industries. Projects with EDF, Sellafield, RWE, National Grid, BP, KOC, LUL and Network Rail, together with Thames Water, Dwr Cymru, and many more. Experienced with Command and Control C2 Systems, Control Rooms, System of Systems, CCTV, Access Control, Situational Awareness, Robust and Resilient Architectures, PLCs, SCADA, Industrial Networks, Knowledge Databases, Incident Management, CBRN systems, Emergency Management, Reporting Solutions, Communications and Mobile Systems. Years of experience within the security threat environment has reinforced the necessity for integrated holistic security to manage current and emerging threats. Situational Awareness solutions are key to providing adaptive, effective and timely response to events.
  • 3. // Thales CNI Security Facility Who… is Thales? Mountbatten House, Basing View, Basingstoke, Hants. RG21 4HJ £11.5bn revenue global company with over 65,000 employees; £1.3bn and 7,500 with Thales UK. Thales UK services a wide range of markets including Critical National Infrastructure protection. Thales UK is a long-term service delivery partner to EDF Generation’s existing nuclear fleet and is providing a deployable communications capability as part of the Japanese Earthquake Response Programme. Thales UK also has interests across the NDA estate, focussing on the provision of security, resilience and emergency management capability. Thales UK recognises security as a global challenge for the nuclear industry and understands how only a holistic approach to infrastructure protection will manage that risk to acceptable levels.
  • 4. // Thales CNI Security Facility Thales expertise - Nuclear 30 years of expertise:  Most UK energy production sites use Thales systems to operate their facilities. Thales supports the UK energy sector with:  DPCS Data Processing & Control Systems (Nuclear)  Critical to safe operation of EDF’s UK’s nuclear power stations  APMS Advanced Plant Management Solutions (Fossil)  Developed for RWE Npower  60 Systems installed in 9 Power Stations  EDF’s technology partner to extend life of existing nuclear power fleet:  Obsolescence management  Fault and failure analysis  Re-engineering services  Spares & Supply Chain management  Skills and competence management (SQEP)
  • 5. // Thales CNI Security Facility Nuclear Power: Emergency Response Deployable Communications & Information System (DCIS)  Japanese Earthquake Response Programme (ONR requirement)  Addressing ‘Beyond Design Basis’ scenarios due to extreme natural events  Provides critical data from the nuclear power station to decision makers  Transportable Emergency Response Modules:  Completely self-sufficient with resilient communications architecture  Capability held in storage at key points in the UK  Emergency scenario requires Human Factors expertise to make operation intuitive
  • 6. // Thales CNI Security Facility Nuclear Security • What Threats….? • Why Security…? • How to manage Security? • When to manage Security? • Benefits of managing Security? • What Thales is doing…….. ……..We can all work… Together, Smarter, Safer
  • 7. // Thales CNI Security Facility What… does a security threat look like? Targeted Threat to physical security
  • 8. // Thales CNI Security Facility Disruption to Operations What… does a security threat look like? What… does a security threat look like?
  • 9. // Thales CNI Security Facility What… does a security threat look like? SCADA System Threats
  • 10. 0 /0 / Thales CNI Security Facility What… does a security threat look like? Importance of Procedures and Policies
  • 11. 1 /1 / Thales CNI Security Facility What… does a security threat look like? The “Normal Person” internal threat
  • 12. 2 /2 / Thales CNI Security Facility Why… Security? It doesn’t matter where in the world you are, there are potential security threats, and are all linked to a number of primary objectives. Protests/Demonstrations Terrorism IP Theft Unscrupulous Competitors Nuisance Disruption Organised Crime Disgruntled Employees
  • 13. 3 /3 / Thales CNI Security Facility How… to deal with Security Threats? Threats take many forms; •Physical Access to Facilities •Theft of Material/Data •Placement of Material/Data •Cyber Attack on Control Systems/Operations •Denial of Service •IP/ID theft Deter Detect Recover Respond
  • 14. 4 /4 / Thales CNI Security Facility When… to apply security? It is possible to extend the before-event activity to deter and detect long before someone approaches a physical or cyber perimeter.
  • 15. 5 /5 / Thales CNI Security Facility When… to apply security? To manage threats the international community must consider security on a holistic basis. • Physical (Situational Awareness) • Operational (business logic linked to ConOps), • Cyber (all the time with a SOC/NOC) , • Personnel (vetting before employment and during, authentication every-day every- access- point, qualifications/records continuously updated and linked to security) • Pattern-of-Life (social media monitoring predicting events, duress response identifying events in progress, unusual behaviour identification predicting or identifying issues) • Combating one without the other leaves inherent weaknesses • Wider reaching commercial and efficiency benefits can be realised.
  • 16. 6 /6 / Thales CNI Security Facility Resilience AND EM? Interrelationships with Emergency Management & Resilience have to be managed • Post Fukushima there is a lot of focus on Resilience • We need to ensure security remains part of the holistic considerations Emergency Preparedness Incident and Emergency Management Emergency Monitoring
  • 17. 7 /7 / Thales CNI Security Facility Benefits…. the realisation? • Efficiency in guard force optimisation • Efficiency of control room staff optimisation • Improved control room response times • Reduced manned response times • Enables rapid complex decision making • Safety enhancement through improved access/egress • Improved muster capability • Safety enhancement through right worker, right place, right qualifications • Lower security threat risk • Lower contingency/reserve due to reduced risk • Reduced outage due to quicker recovery from security/emergency incidents • Remote monitoring/control in security/emergency situations • Prevention of egress into threat or contamination zones
  • 18. 8 /8 / Thales CNI Security Facility Thales CNI Facility What are we all doing about Integrated Holistic Nuclear Security?…..
  • 19. 9 /9 / Thales CNI Security Facility Cross-industry analogies
  • 20. 0 /0 / Thales CNI Security Facility CNI Situational Awareness Industrial IT Networks GIS / Geo Systems Emergency Management Incident Management Business Links Mobile C2 Systems Information & Reports Integrated Communications (ICCS) Process Cyber Operation Integration Multiple System Integration Multiple Security Levels Situation Awareness Sensors Video Management Access Control Physical Security PSIMs ConOps NB. More detailed version at end
  • 21. 1 /1 / Thales CNI Security Facility The UK CNI Facility • Simulate enterprise wide networks • Demonstrate security/emergency/resilience management systems working together • Understand impacts of cyber threats to networks and management systems • Assess industry products/applications for security vulnerabilities • Develop lock-downs for legacy and new systems to enhance security • Run customer scenarios and collaboratively develop operational requirements • Explore innovative approaches to holistic security (e.g. social media predictive, biometrics)
  • 22. 2 /2 / Thales CNI Security Facility …In the News…
  • 23. 3 /3 / Thales CNI Security Facility Holistic Security Situational Awareness  Physical Security (Fences, Intrusion Detection, CCTV, Resilient Networks)  Controlling a Nuclear Power Plant, Perimeter Access or Pipeline Protection using Automation Systems (SCADA and PLCs)  PSIM - integration of 3rd parties  Hypervisor – Situational Awareness - Hypervision using secure, collaborative, resilient, scalable data-bus architectures and web technologies.  TVS – Large Scale CCTV Video Management solutions  Wyvern – Emergency Management Situational Awareness and Security Response Planning solution.  ECHO – incident and First Responder C2 deployments  iCAS – CBRN (Chemical Biological Radiological and Nuclear) Mobile Sensors, Algorithms, and Situational Awareness tracking displays.  DCIS - Deployable Communication Information Systems
  • 24. 4 /4 / Thales CNI Security Facility Holistic Security Situational Awareness Thales iCAS – CBRN Sensor platform, algorithms and C2 Thales Cougar Team Radio – Secure Civil Comms Thales TeoPad – Secure Multimedia Tablets Thales UWB Radar – locate people inside buildings
  • 25. 5 /5 / Thales CNI Security Facility Holistic Security Situational Awareness Thales ECHO – Incident Crisis Management Thales Wyvern – Emergency Information Management C2 Thales TVS – Intelligent Video Management Thales Hypervisor – Situational Awareness
  • 26. 6 /6 / Thales CNI Security Facility 3rd party suppliers Synectics – PCIM, VA, VMS Westermo – Industrial Rugged Networking Pelco - CCTV Vidsys – PCIM Geoquip – PIDS Invensys – SCADA Rockwell – PLCs and SCADA ABB – SCADA Adroit – SCADA Products4Automation – Win911 alarms Many suppliers have loaned or donated components for our CIP Facility. We neither endorse or promote their systems above others. Thales is product agnostic. We enjoy working with partners but the customer’s solution is our focus. The 3rd parties are examples at the CNI Facility.
  • 27. 7 /7 / Thales CNI Security Facility Partner Organisations UK Government Cyber Strategy MOD-Industry Defence Cyber Protection Partnership Cyber Insurance Forum
  • 28. 8 /8 / Thales CNI Security Facility Cyber Integration Centre  World Class Cyber Centre  £2.5Million recently invested  85 Cyber Engineers  Building UK Cyber Standards for HMGov.  Virtual Machines  Any combination of Operating Systems  Multiple concurrent scenarios using VLANs  Mixture or virtual and ‘real’ equipment  Current known zoo of Virus and Malware  Spirent  Test Centre (OSI Layers 1-3)  Avalanche (OSI Layers 4-7)  WAN Impairment  Can create and run 80 million users  Network traffic  Web / web access  Stress Test  Partner with World cyber systems suppliers
  • 29. 9 /9 / Thales CNI Security Facility Cyber Facility
  • 30. 0 /0 / Thales CNI Security Facility Cyber Facility
  • 31. 1 /1 / Thales CNI Security Facility Cyber Facility
  • 32. 2 /2 / Thales CNI Security Facility Cyber Facility How many cameras viewable on the internet Figures for just one manufacturer
  • 33. 3 /3 / Thales CNI Security Facility CNI Projects – World examples Mexico City Ras Tanurah Refinery/Terminal French Ballard “Pentagon” Mecca 15,000 CCTV cameras 500 + Operators 8 Command Centres 60,000 calls/day Largest Oil Terminal 20km perimeter Turnkey solution Foiled a suicide bomber HQ for French MOD, Army, Navy, Air Force and Directorates 10,000 users Very high resilience Crowd Flow and Density Monitoring 5,000+ cameras 700 TV screens
  • 34. 4 /4 / Thales CNI Security Facility Holistic Security - Situational Awareness
  • 35. 5 /5 / Thales CNI Security Facility Benefits…. the realisation? Integrated Holistic approachEfficiency EffectivenessEfficiency Effectiveness Efficiency Effectiveness Efficiency Effectiveness Right People, Right Thing, Right Place, Right Time Public Relations, Public Confidence, Staff Confidence. KPIs
  • 36. 6 /6 / Thales CNI Security Facility Nuclear Security - Themes for Discussion  To what extent is the security threat understood; cyber, physical, operational, other?  How could such threats manifest themselves within the nuclear industry?  What measures are currently in place to protect against such threats?  How does the ONR evaluate the threat and what regulation is/will be put in place to protect against it?  What mitigation would need to be in place to translate the threat picture into an acceptable and manageable risk  How do you report and respond to incidents?  How do you assess performance?  What does good look like in the nuclear sector, can it be benchmarked against other sectors?  What support could Thales provide to in the complex area of holistic integrated security. Questions? – Discussion Themes…
  • 37. 7 /7 / Thales CNI Security Facility Together. Smarter. Safer. THALES – Mountbatten House, Basing View, Basingstoke, Hampshire, RG21 4HJ, UK Thank You.
  • 38. 8 /8 / Thales CNI Security Facility CNI Facility

Editor's Notes

  1. Presented as a reminder to all involved. Add specific aim if required.