1 / 25

Protection of Critical Environmental Infrastructure A Report on a Series of Infrastructure Security Summits

Protection of Critical Environmental Infrastructure A Report on a Series of Infrastructure Security Summits. Will Kirksey, P.E. RASco, Inc . Wkirksey2001@yahoo.com. Overview. Background Overall findings and driving forces Guidelines for Action Technology characteristics. Background.

baina
Download Presentation

Protection of Critical Environmental Infrastructure A Report on a Series of Infrastructure Security Summits

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protection of Critical Environmental InfrastructureA Report on a Series of Infrastructure Security Summits Will Kirksey, P.E. RASco, Inc. Wkirksey2001@yahoo.com

  2. Overview • Background • Overall findings and driving forces • Guidelines for Action • Technology characteristics

  3. Background The infrastructure security summits: • Conducted by The Infrastructure Security Partnership, and through CERF’s* Executive Program Series • Brought together senior level government and private sector executives • Addressed policy, technology, and contingency planning issues • Covered cross-cutting issues and specific sectors *The Civil Engineering Research Foundation, ASCE’s research arm www.cerf.org

  4. The Infrastructure Security Partnership • An association of associations and agencies • Founding members: ACEC, AIA, ASCE, AGC, CII, FEMA, FFC, NIST, NAVFAC, SAME, USACE • Purpose: • Facilitate broad dialogue and collaboration • Offer sources of technical support and comment www.tisp.org

  5. Workshop Topics • Protecting Infrastructure – the first post 9/11 summit of construction industry and government executives • Critical Infrastructure Protection Priorities: The Built Environment -- commissioned by the Executive Office of the President • Building System Security Summit • Critical Water Infrastructure Dialogue • Securing the Nation’s Surface Transportation Systems

  6. Critical Environmental Infrastructure • Definition: • Physical facilities providing essential environmental protection, control, and health and safety • Facilities that could compromise environmental protection, control, and health and safety if attacked • Examples: • Water and wastewater systems • Energy systems • Chemical production and storage

  7. Overall Findings • Build broader Collaboration • Define a Risk-based response • Adopt Performance-based technology • Strategies should include: • Immediate action • Tactics evolving over time • Identify measures to meet Multiple Challenges

  8. We haven’t the money, So we’ll have to think. - Lord Rutherford

  9. Driving Forces • Mission Diversity • Decentralization of infrastructure • Tight finance and force delivery ratios • Increasing time, cost, and risk of long supply lines • Increased focus on security and force protection • New codes, standards, and regulations • Paradigm shifting technology innovation

  10. Today, if you are not confused, You are just not thinking clearly - L. Peter

  11. Guidelines:Assess and Measure • Conduct a threat and risk assessment • Apply consistent standards and metrics • Look at the whole system For more info: www.asme.org

  12. Guidelines:Plan and Train • Develop system and local facility contingency plans • Include strategic, tactical, and operational issues • Obtain cross-disciplinary, multi-stakeholder involvement

  13. Plans are worthless, Planning is priceless. - Winston Churchill

  14. Guidelines: Build Alliances • Improve intra- and inter-organization/agency coordination • Copy, borrow, leverage tools and methods • Capture lessons learned overseas

  15. If everyone is thinking alike, Then someone isn’t thinking - Gen. George S. Patton, Jr.

  16. Guidelines:Change the Facility • Multi-function innovation -- improve productivity while enhancing security • Increase design and ops redundancy • Focus on how to manage consequences

  17. Guidelines:Accelerate the adoption of R&D • Collaborate in technology evaluation and demonstration • Generate credible performance data • Develop links with existing evaluation programs (e.g., the Combating Terrorism Technical Support Working Group, www.tswg.org ) • Remove barriers to innovation

  18. Learning is not compulsory; Neither is survival. - W. Edwards Deming

  19. Surveillance and monitoring Access control In-service maintenance and repair Automated controls Materials Modular construction techniques Small-scale, decentralized infrastructure Key Technologies

  20. Information Technology • Facility Information Systems • O&M • First responders • Diagnosis and forensics • Robots and automation • Integrated data and communications systems • Analytical and sensing technologies (real time)

  21. Its better to know some of the questions Than all of the answers. - James Thurber

  22. New Construction Approaches • Mass produced modular systems • Advanced project delivery technology • Innovative service restoration technology • Asset hardening technology • More cost effective drilling and excavation • New integrated barrier design

  23. SUMMARY • Collaboration • Risk-based response • Performance-based technology • Multiple timeframes • Multi-function technology

  24. Adversity has the effect of eliciting talents, Which in prosperous circumstances would Have lain dormant - Horace

  25. Additional Resources • www.tisp.org • www.cerf.org • www.asme.org – risk assessment guidance • www.epa.gov/safewater/securityhttp://www.waterisac.org/ -- physical and cyber security info on threats to water

More Related