SlideShare a Scribd company logo
Cohorts LLP
Security Risk Management




                      Presentation to
                      Network Rail

                     June 2011
Cohorts LLP
Security Risk Management




                           The Team
          • Chenaga
          • Cohorts
          • Vigie
Cohorts LLP


                                                         Scope
Security Risk Management




          •        Project Justification
          •        Network Rail is the subject of endemic metal theft, affecting operational delivery to the public
                   costing hundreds of thousands of pounds per calendar month to shareholders.

                   Project Product
          •        Fixed wing Aerial Surveillance Platform,
          •        Project Management
          •        Intelligence fusion and lead operations through resource integration

          •        Project Deliverables
          •        Reduction in metal theft - to be agreed in SLAs and KPIs
          •        Ferrous Watch will contribute to an increase percentage in apprehension rates to be agreed in
                   SLAs and KPIs
          •        Increased graphical software interface for intelligence analysis and planning
          •        Increased situational awareness
          •        Increased theft deterrence through media controlled released coverage
          •        Increase the risk of discovery of malicious operatives

                   Project Objective
          •        To harness, develop and integrate all relevant agency resources focused on the prevention and/or
                   reduction of metal theft from Network Rail, in order to maximize corps operations and revenue in a
                   sustainable and flexible manner.

                   Assumptions/Limitations
          •        Compliance with applicable laws, rules and regulations
          •        Cooperation with government, non-government and other third parties endorsed by Network Rail
          •        Intelligence flow between agencies, assured by Information sharing agreements.
Cohorts LLP
Security Risk Management




                           Presentation Agenda
                    Introduction
                    Threats to
                    The Requirement
                    The Solution
                    Benefits
                    Way Forward
                    Summary
                    Conclusion
Cohorts LLP
Security Risk Management




                    1. Introduction
Cohorts LLP
Security Risk Management




                           Introduction
Cohorts LLP
Security Risk Management




                    2. Threat
Cohorts LLP
Security Risk Management




                            Threat
          • Metal theft
          • Cable theft
          • Line safety
          • Full / part
           cancelations
          Profit – 2009 direct losses schedule 8 circa
            >£ 200,000 plus secondary losses
Cohorts LLP
Security Risk Management




                                Impact
          •        Delay
          •        Cost
          •        Commuter discontent
          •        Injury
          •        Reputation
Cohorts LLP
Security Risk Management




                    3. The Requirement
Cohorts LLP
Security Risk Management




                           The Requirement
            Information Gathering – Air System
            Information Dissemination – Ground System
            Intelligence support –Intervention, Evidence & Apprehension
Cohorts LLP
Security Risk Management




                    4. The Solution
Cohorts LLP
Security Risk Management




                           Risk Manage
          Prevent
                               Reduce
                               Threat
          Pursue
                                             Reduce
                                              Risk
           Protect
                               Reduce
                             Vulnerability
           Prepare
Cohorts LLP
Security Risk Management




                              The Solution
                    A fully integrated system comprising:

                    Air Platform
                    Surveillance Suite
                    Ground Control Station
                    Law enforcement or Private Security
                    Response Capabilities
Cohorts LLP
Security Risk Management




      1 Surveillance
                                       Process
      2 Acquisition
      3 Data Transmission
      4 Onward transmission to Ground Control Station
      5 Alternative communications SATCOM
      6 Investigate / Intervene




                                         Response Capability
Cohorts LLP

                           Sensor Pod
Security Risk Management




             Advanced FLIR Systems fully digital camera
              suite
                         High definition infra red,
                             colour and low-light cameras
                         Day/night operation
                         All weather capability
                         120 times zoom - long range
                             viewing
                         Fully stabilised camera pod
Cohorts LLP
Security Risk Management


                               Air-platform
         All composite-made hi Tech component, cost
          effective low maintenance airframe
         Twin diesel engines. Quiet, low-fuel
          consumption
                            High endurance - up to 8 hours - long
                             loiter time
                            Low IR and Radar signatures
                            188 knot airspeed - rapid deployment.
                            Can be converted to a UAV
Cohorts LLP
Security Risk Management




                            Video Data
             Real-time video downloads from aircraft to
              ground station
             Immediate onwards distribution of video via
              internet
             Access to video using passwords or encrypted
              data
             Locations, times and details of contacts provided
              in as separate files
             Video linked to rail information service.
             Positional data files supported by Google Earth
              software
Cohorts LLP
Security Risk Management




                           Platform Capabilities




                                                   19
Cohorts LLP
Security Risk Management




                           Night Time Capability
                    Thermal Imager
                    Low-light Camera




                                        Displays & Recorders
                                        Digital IMU/GPS
                                        Moving Map Systems

                                                            20
                                                                 20
Cohorts LLP
Security Risk Management




                           Post Flight Analysis

          Requirements:
          • Google Earth
          • Data from RIS
          • Down link to ground
            station for integration
          Process
          • Flight & RIS data is filed
          • Files are identified and then dropped
            into Goggle Earth
          • Aircraft track is highlighted and ship
            details are click-on for analysis
Cohorts LLP
Security Risk Management




                             Post Flight Analysis

                           Flight plan
Cohorts LLP
Security Risk Management




                      5. The Benefits
Cohorts LLP
Security Risk Management




                           Operational Benefits
                     High definition images
                     Day and night operations
                     Virtual real time data
                     Plug and Play
                     Easy and secure data access
                     Low cost and long endurance
                     Cost effective – running costs, 20% of a
                      UAV, 50% of a Helicopter
Cohorts LLP
Security Risk Management




                           Other Benefits

            Communication liaison capability
            Reduced reaction time
            Investigatory capability
            Manned platform –
            extra set of eyes
Cohorts LLP
Security Risk Management




                           Strategic Benefits
                     Loss into profit
                     Safer and more secure network
                     Intelligence lead
                     Reinforce Network Rail brand
Cohorts LLP
Security Risk Management




                    6. The Way Forward
Cohorts LLP
Security Risk Management




                                       The Plan
                           Deliver a complete and timely surveillance
                            capability for NETWORK RAIL, in order to
                           increase the chance of discovery and deter
                                      the opportunity of theft.

                     PHASE 1 – Demonstration
                     PHASE 2 – Contract period (1-3 year(s)
                     renewable)
Cohorts LLP
Security Risk Management




                    7. Summary
Cohorts LLP
Security Risk Management




                                Key Driver Summary
                           The right people and resource capability
                           Understanding of the threat
                           Clear identification of the requirement
                           A working integrated aerial solution
                           Vision of the benefits it will bring
                           A plan on how it will be delivered
Cohorts LLP
Security Risk Management




                    8. Conclusion
Cohorts LLP
Security Risk Management




                            Conclusion
             This is the system that can deliver what you require
              in order to address the threat
             Highly responsive to meet customer time
              requirements
             Scalable to meet the technical needs
             Reliable and integrated network centric solution
             Cost effective and aligne for operational budget
Cohorts LLP
Security Risk Management




                                   Questions
                           Sleepers … what sleepers ?
Cohorts LLP
Security Risk Management

More Related Content

What's hot

Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
Network Intelligence India
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
 
9th Annual Maritime Reconnaissance and Surveillance
9th Annual Maritime Reconnaissance and Surveillance9th Annual Maritime Reconnaissance and Surveillance
9th Annual Maritime Reconnaissance and Surveillance
DefenceIQ
 
Maritime Cyber Security Education
Maritime Cyber Security EducationMaritime Cyber Security Education
Maritime Cyber Security Education
Valentin Bañaco
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
tovmug
 
Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42
DroneSec
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
Prime Infoserv
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
Symosis Security (Previously C-Level Security)
 
Making your Asterisk System Secure
Making your Asterisk System SecureMaking your Asterisk System Secure
Making your Asterisk System Secure
Digium
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
Andrew Wong
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNI
fEngel
 

What's hot (12)

Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
9th Annual Maritime Reconnaissance and Surveillance
9th Annual Maritime Reconnaissance and Surveillance9th Annual Maritime Reconnaissance and Surveillance
9th Annual Maritime Reconnaissance and Surveillance
 
Maritime Cyber Security Education
Maritime Cyber Security EducationMaritime Cyber Security Education
Maritime Cyber Security Education
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
 
Making your Asterisk System Secure
Making your Asterisk System SecureMaking your Asterisk System Secure
Making your Asterisk System Secure
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNI
 

Viewers also liked

Jiew jan iphone
Jiew jan iphoneJiew jan iphone
Jiew jan iphone
babylittlecass
 
Guia uno
Guia unoGuia uno
Guia uno
GLORIA GUIZA
 
Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)
Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)
Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)MedicalWeb.gr
 
11+carta espagnol
11+carta espagnol11+carta espagnol
11+carta espagnol
Eduard Busquets Massip
 
Dr. Graphx Case Study
Dr. Graphx Case StudyDr. Graphx Case Study
Dr. Graphx Case Study
stevenmfisher
 
Portada
PortadaPortada
Portada
GLORIA GUIZA
 
Proyecto sobre una_idea_de_negocio
Proyecto sobre una_idea_de_negocioProyecto sobre una_idea_de_negocio
Proyecto sobre una_idea_de_negocio
GLORIA GUIZA
 

Viewers also liked (7)

Jiew jan iphone
Jiew jan iphoneJiew jan iphone
Jiew jan iphone
 
Guia uno
Guia unoGuia uno
Guia uno
 
Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)
Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)
Λιάτης - Φροντιστήριο (Παθοφυσιολογία του ΣΔ τύπου 2)
 
11+carta espagnol
11+carta espagnol11+carta espagnol
11+carta espagnol
 
Dr. Graphx Case Study
Dr. Graphx Case StudyDr. Graphx Case Study
Dr. Graphx Case Study
 
Portada
PortadaPortada
Portada
 
Proyecto sobre una_idea_de_negocio
Proyecto sobre una_idea_de_negocioProyecto sobre una_idea_de_negocio
Proyecto sobre una_idea_de_negocio
 

Similar to Network rail counter metal theft aerial platform 20111111

DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
iQHub
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
iQHub
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Angeloluca Barba
 
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
Hawaii Geographic Information Coordinating Council
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
Andris Soroka
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM Security
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
Francisco González Jiménez
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 
Adding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf codeAdding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf code
AFCOM
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
Information Security Awareness Group
 
An Introduction to South Seas Corporation
An Introduction to South Seas CorporationAn Introduction to South Seas Corporation
An Introduction to South Seas Corporation
Ed Mohr
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
cVidya Networks
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
Reddy Marri
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
Real-Time Innovations (RTI)
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
Ramy Houssaini
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
Steven SIM Kok Leong
 
RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
AdaCore
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Chad Lawler
 
C2MS
C2MSC2MS
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
Paul F. Roberts
 

Similar to Network rail counter metal theft aerial platform 20111111 (20)

DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Adding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf codeAdding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf code
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
An Introduction to South Seas Corporation
An Introduction to South Seas CorporationAn Introduction to South Seas Corporation
An Introduction to South Seas Corporation
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
C2MS
C2MSC2MS
C2MS
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
 

Recently uploaded

buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
Susan Laney
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
Any kyc Account
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Lviv Startup Club
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
Christian Dahlen
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
Adani case
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 

Recently uploaded (20)

buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 

Network rail counter metal theft aerial platform 20111111

  • 1. Cohorts LLP Security Risk Management Presentation to Network Rail June 2011
  • 2. Cohorts LLP Security Risk Management The Team • Chenaga • Cohorts • Vigie
  • 3. Cohorts LLP Scope Security Risk Management • Project Justification • Network Rail is the subject of endemic metal theft, affecting operational delivery to the public costing hundreds of thousands of pounds per calendar month to shareholders. Project Product • Fixed wing Aerial Surveillance Platform, • Project Management • Intelligence fusion and lead operations through resource integration • Project Deliverables • Reduction in metal theft - to be agreed in SLAs and KPIs • Ferrous Watch will contribute to an increase percentage in apprehension rates to be agreed in SLAs and KPIs • Increased graphical software interface for intelligence analysis and planning • Increased situational awareness • Increased theft deterrence through media controlled released coverage • Increase the risk of discovery of malicious operatives Project Objective • To harness, develop and integrate all relevant agency resources focused on the prevention and/or reduction of metal theft from Network Rail, in order to maximize corps operations and revenue in a sustainable and flexible manner. Assumptions/Limitations • Compliance with applicable laws, rules and regulations • Cooperation with government, non-government and other third parties endorsed by Network Rail • Intelligence flow between agencies, assured by Information sharing agreements.
  • 4. Cohorts LLP Security Risk Management Presentation Agenda Introduction Threats to The Requirement The Solution Benefits Way Forward Summary Conclusion
  • 5. Cohorts LLP Security Risk Management 1. Introduction
  • 6. Cohorts LLP Security Risk Management Introduction
  • 7. Cohorts LLP Security Risk Management 2. Threat
  • 8. Cohorts LLP Security Risk Management Threat • Metal theft • Cable theft • Line safety • Full / part cancelations Profit – 2009 direct losses schedule 8 circa >£ 200,000 plus secondary losses
  • 9. Cohorts LLP Security Risk Management Impact • Delay • Cost • Commuter discontent • Injury • Reputation
  • 10. Cohorts LLP Security Risk Management 3. The Requirement
  • 11. Cohorts LLP Security Risk Management The Requirement Information Gathering – Air System Information Dissemination – Ground System Intelligence support –Intervention, Evidence & Apprehension
  • 12. Cohorts LLP Security Risk Management 4. The Solution
  • 13. Cohorts LLP Security Risk Management Risk Manage Prevent Reduce Threat Pursue Reduce Risk Protect Reduce Vulnerability Prepare
  • 14. Cohorts LLP Security Risk Management The Solution A fully integrated system comprising: Air Platform Surveillance Suite Ground Control Station Law enforcement or Private Security Response Capabilities
  • 15. Cohorts LLP Security Risk Management 1 Surveillance Process 2 Acquisition 3 Data Transmission 4 Onward transmission to Ground Control Station 5 Alternative communications SATCOM 6 Investigate / Intervene Response Capability
  • 16. Cohorts LLP Sensor Pod Security Risk Management  Advanced FLIR Systems fully digital camera suite  High definition infra red, colour and low-light cameras  Day/night operation  All weather capability  120 times zoom - long range viewing  Fully stabilised camera pod
  • 17. Cohorts LLP Security Risk Management Air-platform  All composite-made hi Tech component, cost effective low maintenance airframe  Twin diesel engines. Quiet, low-fuel consumption  High endurance - up to 8 hours - long loiter time  Low IR and Radar signatures  188 knot airspeed - rapid deployment.  Can be converted to a UAV
  • 18. Cohorts LLP Security Risk Management Video Data  Real-time video downloads from aircraft to ground station  Immediate onwards distribution of video via internet  Access to video using passwords or encrypted data  Locations, times and details of contacts provided in as separate files  Video linked to rail information service.  Positional data files supported by Google Earth software
  • 19. Cohorts LLP Security Risk Management Platform Capabilities 19
  • 20. Cohorts LLP Security Risk Management Night Time Capability Thermal Imager Low-light Camera Displays & Recorders Digital IMU/GPS Moving Map Systems 20 20
  • 21. Cohorts LLP Security Risk Management Post Flight Analysis Requirements: • Google Earth • Data from RIS • Down link to ground station for integration Process • Flight & RIS data is filed • Files are identified and then dropped into Goggle Earth • Aircraft track is highlighted and ship details are click-on for analysis
  • 22. Cohorts LLP Security Risk Management Post Flight Analysis Flight plan
  • 23. Cohorts LLP Security Risk Management 5. The Benefits
  • 24. Cohorts LLP Security Risk Management Operational Benefits  High definition images  Day and night operations  Virtual real time data  Plug and Play  Easy and secure data access  Low cost and long endurance  Cost effective – running costs, 20% of a UAV, 50% of a Helicopter
  • 25. Cohorts LLP Security Risk Management Other Benefits Communication liaison capability Reduced reaction time Investigatory capability Manned platform – extra set of eyes
  • 26. Cohorts LLP Security Risk Management Strategic Benefits  Loss into profit  Safer and more secure network  Intelligence lead  Reinforce Network Rail brand
  • 27. Cohorts LLP Security Risk Management 6. The Way Forward
  • 28. Cohorts LLP Security Risk Management The Plan Deliver a complete and timely surveillance capability for NETWORK RAIL, in order to increase the chance of discovery and deter the opportunity of theft. PHASE 1 – Demonstration PHASE 2 – Contract period (1-3 year(s) renewable)
  • 29. Cohorts LLP Security Risk Management 7. Summary
  • 30. Cohorts LLP Security Risk Management Key Driver Summary The right people and resource capability Understanding of the threat Clear identification of the requirement A working integrated aerial solution Vision of the benefits it will bring A plan on how it will be delivered
  • 31. Cohorts LLP Security Risk Management 8. Conclusion
  • 32. Cohorts LLP Security Risk Management Conclusion  This is the system that can deliver what you require in order to address the threat  Highly responsive to meet customer time requirements  Scalable to meet the technical needs  Reliable and integrated network centric solution  Cost effective and aligne for operational budget
  • 33. Cohorts LLP Security Risk Management Questions Sleepers … what sleepers ?