Download - Pa awwa2006 presentationrev1fin_feb
![Page 1: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/1.jpg)
Wivenhoe Management Group
Has Your New Security System Increased Has Your New Security System Increased Your Facility’s Liability?Your Facility’s Liability?
![Page 2: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/2.jpg)
Wivenhoe Management Group
Public Health Security Public Health Security Bioterrorism and Response Act Bioterrorism and Response Act
(PL107-188) June 2002(PL107-188) June 2002
• All water facilities with 3,300 users or more, initiate a vulnerability assessment (VA).
• The recommendations arising from these VA’s included those related to security improvements.
• Costs for such security improvements are very substantial, and in many cases, simply cost prohibitive.
![Page 3: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/3.jpg)
Wivenhoe Management Group
Flowchart ofFlowchart ofRAM-WRAM-WSM SM MethodologyMethodology
Site Characterization
ProjectKickoff
Facility Prioritization&
Threat Assessment
ConsequenceAssessment
FaultTree
Analysis
Security SystemEffectiveness Analysis
Risk Analysis&
ReductionPlan
VulnerabilityAssessment
Report
Review ofDocumentation
ERP Update
PlanningSecurity
Enhancements
Utility Operations & Planning
![Page 4: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/4.jpg)
Wivenhoe Management Group
Vulnerability AssessmentVulnerability Assessment RecommendationsRecommendations
Included:• Security Improvements• Mitigation• Other
![Page 5: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/5.jpg)
Wivenhoe Management Group
Implementation of New Security Implementation of New Security SystemsSystems
• Access Control• CCTV Camera
Surveillance• Perimeter Fencing• Intrusion Detection
![Page 6: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/6.jpg)
Wivenhoe Management Group
New Security Systems in PlaceNew Security Systems in Place
• Everyone Happy• Risk Reduced as per VA
Recommendations• Just One Possible Problem……
![Page 7: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/7.jpg)
Wivenhoe Management Group
Your New Security Systems May Your New Security Systems May Have Significantly Increased Your Have Significantly Increased Your
Liability, Even to the Point of Liability, Even to the Point of Negligence or Gross NegligenceNegligence or Gross Negligence
![Page 8: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/8.jpg)
Wivenhoe Management Group
The Reason for Increased LiabilityThe Reason for Increased Liability
• A Simple Step That Was Overlooked Or Deemed Unnecessary When It was Decided To Implement The VA Recommendations And Install New Security Systems
• GOOD SECURITY DESIGN CRITERIA
![Page 9: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/9.jpg)
Wivenhoe Management Group
StatementStatement
Many Security Systems Are Many Security Systems Are Installed Without Being Designed, Installed Without Being Designed, And More Importantly, Without And More Importantly, Without Proper Design CriteriaProper Design Criteria
![Page 10: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/10.jpg)
Wivenhoe Management Group
![Page 11: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/11.jpg)
Wivenhoe Management Group
Lack Of Design CriteriaLack Of Design Criteria
Leads to Four Major Problems:
1) Inadequate Counter Measures to meet Threat Level
2) Faulty Security System Design
3) Inability to Support Installed Security System
4) Possible Legal Consequences
![Page 12: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/12.jpg)
Wivenhoe Management Group
Industry QuoteIndustry Quote
• In the security environment of “Post 9/11”, and given the media scrutiny of all key infrastructure, it would be unwise if not reckless, to implement new security systems without adequate design, and good design criteria in keeping with industry standards
![Page 13: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/13.jpg)
Wivenhoe Management Group
Steven S. WilderSteven S. Wilder
• President & Chief Operating Officer
Sorensen Wilder & Associates
Bradley, Illinois
![Page 14: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/14.jpg)
Wivenhoe Management Group
Inadequate SecurityInadequate Security
• Failure To Detect• Failure To Surveil• Inadequate Perimeter Security• Inadequate Security At All Critical
Assets• Inappropriate Equipment• Does Not Provide Adequate
Protection To Meet Threat Level
![Page 15: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/15.jpg)
Wivenhoe Management Group
Exterior Door HingeExterior Door Hinge
![Page 16: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/16.jpg)
Wivenhoe Management Group
FencingFencing
![Page 17: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/17.jpg)
Wivenhoe Management Group
Alarm WiringAlarm Wiring
![Page 18: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/18.jpg)
Wivenhoe Management Group
Door ContactsDoor Contacts
![Page 19: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/19.jpg)
Wivenhoe Management Group
Difficult To ProtectDifficult To Protect
![Page 20: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/20.jpg)
Wivenhoe Management Group
Fencing and Jersey BarrierFencing and Jersey Barrier
![Page 21: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/21.jpg)
Wivenhoe Management Group
Faulty Security SystemFaulty Security System
1) Does Not Meet Intent
2) No Integration
3) Monitoring Inadequate
4) Wrong Equipment
![Page 22: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/22.jpg)
Wivenhoe Management Group
Security Professionals AgreeSecurity Professionals Agree
Good Security Design and Design Criteria is Essential to Successful
Security System Operation
![Page 23: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/23.jpg)
Wivenhoe Management Group
Consultants In AgreementConsultants In Agreement• Jim Woodruff• American Consulting
Engineers
• Tom Pecoraro• Labor Management
Concepts
• Gil Fallon• Attinco
• Walter Adams• Rolf Jensen &
Associates
• Ken Burris• Environmental
Resources Management
• David Rockford• The Wickford Group
![Page 24: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/24.jpg)
Wivenhoe Management Group
ExamplesExamples
• Perimeter Detection– Environment– Dual Technology
![Page 25: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/25.jpg)
Wivenhoe Management Group
ExamplesExamples
• CCTV Camera Surveillance– Resolution– Field of View– Positioning– Fixed Versus Mobile (PTZ)– Recording– Lighting
![Page 26: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/26.jpg)
Wivenhoe Management Group
ExamplesExamples
• Alarm Systems– Supervised System
– Positioning of Devices
– Motion Detectors
![Page 27: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/27.jpg)
Wivenhoe Management Group
ExamplesExamples
• Access Control– Electro-Magnetic Locks– Fire Code– Types of Reader Device
![Page 28: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/28.jpg)
Wivenhoe Management Group
ExamplesExamples
• Identification– Ability to Read at a
Distance– Symbols– Counterfeit Measures
![Page 29: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/29.jpg)
Wivenhoe Management Group
Inability to Support Inability to Support Security System DesignSecurity System Design
Procurement sends out RFP to local security contractors for “Security System”
Security Contractor installs what they think will “do the job”
When something happens, you are the one that will have to answer various questions posed by the Defense Attorney…..
![Page 30: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/30.jpg)
Wivenhoe Management Group
![Page 31: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/31.jpg)
Wivenhoe Management Group
Likely Questions….Likely Questions….
1) Why did you use this equipment– Cameras– Motion Detectors– Type of DVR– Intrusion Detection Equipment– Type of Fence
![Page 32: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/32.jpg)
Wivenhoe Management Group
Likely QuestionsLikely Questions2) Explain the reasons for installing
this type of security system?
3) Why did the security only attempt to cover the outer perimeter?
4) Why were Insider threats ignored?
5) The following people had clearance for all access points……. Why?
6) What was the Design Criteria for the security system?
![Page 33: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/33.jpg)
Wivenhoe Management Group
Importance of Good Design Importance of Good Design Criteria That Is Consistent With Criteria That Is Consistent With Security Industry RequirementsSecurity Industry Requirements
• Provides a Qualified Reason for All Aspects of the Security System
• Explains why certain decisions were taken in the design of the system based on Weighted Objectives
• Justifies the Level of Protection against the Threat Level
![Page 34: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/34.jpg)
Wivenhoe Management Group
System Already InstalledSystem Already Installed
There are several options1) Review System2) Prepare Sound Design
Criteria3) Modify Equipment4) Add to System5) Add Deterrent Factor
![Page 35: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/35.jpg)
Wivenhoe Management Group
SummarySummary• Results of Vulnerability Assessments• New Security Systems & Measures• Designed to Industry Standards….Or• Increased Liability• Security Design Criteria• Examples• What To Do Now
![Page 36: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/36.jpg)
Wivenhoe Management Group
Benefits Of Good Design CriteriaBenefits Of Good Design Criteria• Sound Basis of Design to Industry Standards• Provides Foundation for Security System• Establishes Optimum Protection Level in
Keeping with the Identified Threat (DBT)• Provides Clear Reasons for Types of
Equipment and Positioning of Such Equipment
• Likely to Prevent Possible Charges of Negligence or Gross Negligence
![Page 37: Pa awwa2006 presentationrev1fin_feb](https://reader036.vdocuments.site/reader036/viewer/2022062706/557c69f6d8b42a855d8b4b2d/html5/thumbnails/37.jpg)
Wivenhoe Management Group
QuestionsQuestions
www.wivenhoegroup.comwww.wivenhoegroup.comPhone: 609-208-0112Phone: 609-208-0112
E-mail: [email protected]: [email protected]