1 / 6

AIP 2 Update

AIP 2 Update. Performance of Threat/Vulnerability/Risk Assessments leading to the determination of Mitigation and Security-Related Business Rules. Colonel Edward Addison USTRANSCOM Force Protection edward.addison@hq.transcom.mil. January 25, 2005. Tasks.

lavi
Download Presentation

AIP 2 Update

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. AIP 2 Update Performance of Threat/Vulnerability/Risk Assessments leading to the determination of Mitigation and Security-Related Business Rules Colonel Edward Addison USTRANSCOM Force Protection edward.addison@hq.transcom.mil January 25, 2005

  2. Tasks • 2.A. Perform threat, vulnerability, and risk assessments of the AA&E distribution system to manage AA&E risks with current information. • Foundational to understanding the Current Operating Environment (COE) and discussions on mitigation, security initiatives, technologies, etc. • 2.B. Based on the results of the most current threat, vulnerability and risk analysis, ensure DoD AA&E security-related business rules are scalable and are applied appropriately and consistently with current distribution system risks.

  3. Key Participants • OSD – Policy / execution guidance • Services – Intelligence, V/RA, mitigation support • TRANSCOM – Intelligence, V/RA, mitigation support • Commercial Partners – Source reporting, mitigation support • DoT – Intelligence, mitigation support • TSA – Intelligence, mitigation support • NORTHCOM – Intelligence, V/RA, mitigation support • DIA – Intelligence support • CIFA – Intelligence support • FBI – Intelligence support • DTRA – performance of VA • DoD CIP – performance of VA • NCIS – intelligence support • Army CID – intelligence support • AFOSI – intelligence support

  4. Proposed Course of Action • Identify PM for coordination and oversight of AIP 2 execution • Identify funding source • Perform Threat Assessment: • Identify process / spectrum to be assessed (both in-transit and nodal) • Use DIA transportation assessment as baseline / starting point. • Collaboration by key participants in relative data collection, analysis and development of overall threat assessment • Determination / prioritization of CONUS/OCONUS threats • Continuous process v. minimum requirement every three years

  5. Proposed Course of Action, cont. • Coordination / Performance of Vulnerability / Risk Assessments: • Utilize threat assessment for focus of efforts, and determination of VA necessity / applicability • Identify single points of failure, critical nodes, at-risk locations, activities • Collaboration by key participants in performance of full-spectrum V/RA • Determination of Mitigation and Security-Related Business Rules: • Leverage existing technologies / best security practices to respond, prevent and protect (mission assurance) • Pursue / design / integrate future technologies / initiatives as required through collaborative relationships with key participants • Clarification, verification and enforcement of regulatory policies and requirements in concert with commercial partners

  6. Discussion

More Related