SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Critical Infrastructure Protection and interdependency issues:
industry vision within the EC framework approach
Fabio Bagnoli
D’Appolonia S.p.A.
AN ISO 9001 AND ISO 14001 CERTIFIED COMPANY
www.dappolonia.it
D’Appolonia S.p.A.
D’Appolonia is a major Italy-based engineering company that provides multidisciplinary
engineering consulting and design services to a great variety of public and private clients
The Company has been established by Dr. Elio D’Appolonia in 1956 in Pittsburgh
(Pennsylvania), and is present in Italy since 1981
In 1983 the Italian office, headquartered in Genoa, became the independent company
D’Appolonia S.p.A.
The company since December 2011 is part of the RINA Group
Engineering Services
D’Appolonia provides engineering and management services during the whole project
life cycle:









Feasibility studies and research
Conceptual design and project specifications
Preliminary and detailed design
Physical and virtual validation
Management of suppliers and system integration
Construction management and supervision
Commissioning and support to homologation and certification
Maintenance and operation
Company Offices
The “Origins”
 The European Council of June 2004 asked the Commission to prepare an
overall strategy to protect critical infrastructure. In response, the Commission
adopted on 20 October 2004 a Communication “Critical Infrastructure
Protection in the Fight Against Terrorism” putting forward clear suggestions on

what would enhance European prevention, preparedness and response to
terrorist attacks involving critical infrastructures.
 The Council conclusions on “Prevention, Preparedness and Response to

Terrorist Attacks” and the “EU Solidarity Programme on the Consequences of
Terrorist Threats and Attacks” adopted by Council in December 2004 endorsed
the intention of the Commission to propose a European Programme for Critical
Infrastructure Protection (EPCIP)
The “Pillars”

 European Programme for Critical Infrastructure Protection
 Adoption of Directive 2008/114/EC
 Financial measures to support the strategy
Critical Infrastrucutre Protection CIP
 CIP requires the active participation of the owners and operators of
infrastructure, regulators, professional bodies and industry associations in
cooperation with all levels of government, and the public.
 CIP is focused on the need to minimise risks to public health, safety and
confidence, ensure our economic security.

 The objectives of CIP are to identify critical infrastructure, analyse
vulnerability and interdependence, and protect from, and prepare for, all
hazards.
 As not all critical infrastructure can be protected from all threats,
appropriate risk management techniques should be used to determine
relative criticality, the level of protective security,
 The sharing of information relating to threats and vulnerabilities will assist
governments, and owners and operators of critical infrastructure to better
manage risk.
Support to Security Projects
The Commission provides two types of funding for security-related
projects:
 Operational, highly specific and policy-oriented activities are supported

by the Framework Programme on Security and Safeguarding Liberties,
which is composed of two specific programmes: Prevention,
Preparedness and Consequence Management of Terrorism and
Prevention of and Fight against Crime.
 Longer-term research is supported by the Security theme, under the 7th
Framework Programme (FP7), with a budget of EUR 1.4 billion for
2007-13.
The CIPS Programme
The Prevention, Preparedness and Consequence Management of
Terrorism and other Security-related Risks (CIPS) programme is
designed to protect citizens and critical infrastructures from terrorist
attacks and other security incidents.

The EU has allocated EUR 140 million for the period 2007–13 for
operational cooperation and coordination actions (strengthening
networking, mutual confidence and understanding, developing
contingency plans, exchanging and disseminating information,
experiences and best practices
Main Areas
 Prevention and Preparedness refers to measures aimed at
preventing and/or reducing risks linked to terrorism and other
security related risks.
 Consequence Management refers to the coordination of measures
taken in order to react to and to reduce the impact of the effects of a
security related incident, in particular resulting from terrorist attacks
in order to ensure a smooth coordination of crisis management and
security actions.
Expected Outcome

 Development of Instruments
 Common Framework
 Methods and techniques
 Exchange and Dissemination
Main Areas
 Prevention and Preparedness refers to measures aimed at
preventing and/or reducing risks linked to terrorism and other
security related risks.
 Consequence Management refers to the coordination of measures
taken in order to react to and to reduce the impact of the effects of a
security related incident, in particular resulting from terrorist attacks
in order to ensure a smooth coordination of crisis management and
security actions.
Our Vision
 Close cooperation with end users, public bodies and other
operators of Critical Infrastructures
 Strong synergies with industries providing technologies
 Definition and validation of new comprehensive methodologies for
all the analyses to be undertaken to assess threats, vulnerabilities
and risks, that could be offered to Critical Infrastructures operators
and other end users

 Interdependency issues needs a consolidated security culture and a
strong multidisciplinary approach
 Combination with deep competences in the involved domains
Security Culture

SECURITY APPROACH

PHYSICAL
SECURITY

TOOLS AND
FACILITIES

INFORMATION
SECURITY

SECURITY RISK
MANAGEMENT
Interdependency issue
 Interdependencies among Critical Infrastructures are complex and
need to be understood since disruptions in one infrastructure can
propagate into other infrastructures.
 Interdependencies between infrastructures, in fact, imply that an
impact on one infrastructure is also an impact on one or more other
interconnected infrastructures.

Focus on impact analysis within a
“multidomain” approach
Our involvement in CIPS projects
 Involvement in projects in different domains
 Cross fertilization among the different involved areas and their relevant
approaches
 Development of new harmonised methodologies and implementation of
supporting tools to propose to our customers
Transportation sector - EUMASS Project

 The EUMASS objective was the delivery of a unified and flexible solution
for risk assessment methodology to be applied by all European Mass
Transit operators.
 Main goal was to achieve an integrated process composed by the audit and
risk assessment methodologies supported by a software tool.
 An audit method was prepared to translate empirical evaluations into
objective inputs for the risk analysis models and to monitor them during the
system lifecycle.

 A semi-quantitative risk assessment methodology was developed to
continuously evaluate the risks associated to a system and to evaluate the
effectiveness of the implemented countermeasures.
 A software tool was developed to support the user along the whole
process.
Tools for operators - COBALT Project

 Main aim of the COBALT is to
provide CI operators and owners
with an instrument which will help in
defining the risk their infrastructures
are subject to.
 COBALT aims at providing endusers with an instrument that will
help them evaluating which
countermeasures are the most
effective to reduce the risks a CI is
subject to, from an implementation
and maintenance costs point of
view.
 Finally COBALT aims at developing
and instrument to evaluate the CI
security generating a report showing
the evaluated risks and the
countermeasures implemented.
Urban Security – MAPEX Project
 To develop a probabilistic mapping damage methodology for the assessment,
analysis and optimization of the security level of urban critical infrastructure
against external blast effects
 Simplified methodologies for analyzing 3D complex urban scenarios taking into
account urban layout, building characteristics and the existing interaction against
blast.
 To harmonized the outputs of the tools according to the key agents
engineers/architects/urban authorities/Security staff).

(Structural
Brussels
Podgorica
Beijing
Seoul
Cairo
Istanbul
St. Petersburg
Abu Dhabi

Rome
Milan
Viareggio
Naples
Brindisi
Palermo

D’Appolonia S.p.A.
Headquarters:
Via San Nazaro,19
16145 Genova – Italy
Tel. +39 010 3628148 Fax +39 010 3621078
E-mail: dappolonia@dappolonia.it
Web site http://www.dappolonia.it

Contenu connexe

En vedette (8)

[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism
 
Indian para special forces
Indian para special forcesIndian para special forces
Indian para special forces
 
20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor
 
Guide amdec (très intéressant)
Guide amdec (très intéressant)Guide amdec (très intéressant)
Guide amdec (très intéressant)
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Formation AMDEC
Formation AMDECFormation AMDEC
Formation AMDEC
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 

Similaire à Critical Infrastructure Protection and Interdependency Issues

Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratory
Salam Shah
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
pteromys_volans
 
Img s sumary-paper_for_march19_meeting
Img s sumary-paper_for_march19_meetingImg s sumary-paper_for_march19_meeting
Img s sumary-paper_for_march19_meeting
Marco Manso
 
ECE_CTCS_WP.6_2016_4E_GRM
ECE_CTCS_WP.6_2016_4E_GRMECE_CTCS_WP.6_2016_4E_GRM
ECE_CTCS_WP.6_2016_4E_GRM
Markus Krebsz
 
Towards Quantification of Cyber Risk
Towards Quantification of Cyber RiskTowards Quantification of Cyber Risk
Towards Quantification of Cyber Risk
Kirstjen Nielsen
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
segughana
 
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdfWP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
ritikashinde6
 

Similaire à Critical Infrastructure Protection and Interdependency Issues (20)

Salvi etpis pesi_02112010_reduced-obintcp
Salvi etpis pesi_02112010_reduced-obintcpSalvi etpis pesi_02112010_reduced-obintcp
Salvi etpis pesi_02112010_reduced-obintcp
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
WP6_2015_05E
WP6_2015_05EWP6_2015_05E
WP6_2015_05E
 
European Risk Management Seminar 2018 - Cyber Report
European Risk Management Seminar 2018 - Cyber Report European Risk Management Seminar 2018 - Cyber Report
European Risk Management Seminar 2018 - Cyber Report
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratory
 
Allignment of CIIP Structures
Allignment of CIIP StructuresAllignment of CIIP Structures
Allignment of CIIP Structures
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME project
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
 
Img s sumary-paper_for_march19_meeting
Img s sumary-paper_for_march19_meetingImg s sumary-paper_for_march19_meeting
Img s sumary-paper_for_march19_meeting
 
ECE_CTCS_WP.6_2016_4E_GRM
ECE_CTCS_WP.6_2016_4E_GRMECE_CTCS_WP.6_2016_4E_GRM
ECE_CTCS_WP.6_2016_4E_GRM
 
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014 Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
 
Towards Quantification of Cyber Risk
Towards Quantification of Cyber RiskTowards Quantification of Cyber Risk
Towards Quantification of Cyber Risk
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
ELEMENTS OF RISK MANAGEMENT AND VALUE ENGINEERING
ELEMENTS OF RISK MANAGEMENT AND VALUE ENGINEERINGELEMENTS OF RISK MANAGEMENT AND VALUE ENGINEERING
ELEMENTS OF RISK MANAGEMENT AND VALUE ENGINEERING
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
EFFECTIVE RISK MANAGEMENT IN CONSTRUCTION PROJECTS
EFFECTIVE RISK MANAGEMENT IN CONSTRUCTION PROJECTSEFFECTIVE RISK MANAGEMENT IN CONSTRUCTION PROJECTS
EFFECTIVE RISK MANAGEMENT IN CONSTRUCTION PROJECTS
 
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdfWP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
 

Plus de Community Protection Forum

Plus de Community Protection Forum (20)

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security Projects & Projects Safety
Security Projects & Projects SafetySecurity Projects & Projects Safety
Security Projects & Projects Safety
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
 
Geomatics for Disaster Management and Survey
Geomatics for Disaster Management and SurveyGeomatics for Disaster Management and Survey
Geomatics for Disaster Management and Survey
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Critical Infrastructure Protection and Interdependency Issues

  • 1. Critical Infrastructure Protection and interdependency issues: industry vision within the EC framework approach Fabio Bagnoli D’Appolonia S.p.A. AN ISO 9001 AND ISO 14001 CERTIFIED COMPANY www.dappolonia.it
  • 2. D’Appolonia S.p.A. D’Appolonia is a major Italy-based engineering company that provides multidisciplinary engineering consulting and design services to a great variety of public and private clients The Company has been established by Dr. Elio D’Appolonia in 1956 in Pittsburgh (Pennsylvania), and is present in Italy since 1981 In 1983 the Italian office, headquartered in Genoa, became the independent company D’Appolonia S.p.A. The company since December 2011 is part of the RINA Group
  • 3. Engineering Services D’Appolonia provides engineering and management services during the whole project life cycle:         Feasibility studies and research Conceptual design and project specifications Preliminary and detailed design Physical and virtual validation Management of suppliers and system integration Construction management and supervision Commissioning and support to homologation and certification Maintenance and operation
  • 5. The “Origins”  The European Council of June 2004 asked the Commission to prepare an overall strategy to protect critical infrastructure. In response, the Commission adopted on 20 October 2004 a Communication “Critical Infrastructure Protection in the Fight Against Terrorism” putting forward clear suggestions on what would enhance European prevention, preparedness and response to terrorist attacks involving critical infrastructures.  The Council conclusions on “Prevention, Preparedness and Response to Terrorist Attacks” and the “EU Solidarity Programme on the Consequences of Terrorist Threats and Attacks” adopted by Council in December 2004 endorsed the intention of the Commission to propose a European Programme for Critical Infrastructure Protection (EPCIP)
  • 6. The “Pillars”  European Programme for Critical Infrastructure Protection  Adoption of Directive 2008/114/EC  Financial measures to support the strategy
  • 7. Critical Infrastrucutre Protection CIP  CIP requires the active participation of the owners and operators of infrastructure, regulators, professional bodies and industry associations in cooperation with all levels of government, and the public.  CIP is focused on the need to minimise risks to public health, safety and confidence, ensure our economic security.  The objectives of CIP are to identify critical infrastructure, analyse vulnerability and interdependence, and protect from, and prepare for, all hazards.  As not all critical infrastructure can be protected from all threats, appropriate risk management techniques should be used to determine relative criticality, the level of protective security,  The sharing of information relating to threats and vulnerabilities will assist governments, and owners and operators of critical infrastructure to better manage risk.
  • 8. Support to Security Projects The Commission provides two types of funding for security-related projects:  Operational, highly specific and policy-oriented activities are supported by the Framework Programme on Security and Safeguarding Liberties, which is composed of two specific programmes: Prevention, Preparedness and Consequence Management of Terrorism and Prevention of and Fight against Crime.  Longer-term research is supported by the Security theme, under the 7th Framework Programme (FP7), with a budget of EUR 1.4 billion for 2007-13.
  • 9. The CIPS Programme The Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks (CIPS) programme is designed to protect citizens and critical infrastructures from terrorist attacks and other security incidents. The EU has allocated EUR 140 million for the period 2007–13 for operational cooperation and coordination actions (strengthening networking, mutual confidence and understanding, developing contingency plans, exchanging and disseminating information, experiences and best practices
  • 10. Main Areas  Prevention and Preparedness refers to measures aimed at preventing and/or reducing risks linked to terrorism and other security related risks.  Consequence Management refers to the coordination of measures taken in order to react to and to reduce the impact of the effects of a security related incident, in particular resulting from terrorist attacks in order to ensure a smooth coordination of crisis management and security actions.
  • 11. Expected Outcome  Development of Instruments  Common Framework  Methods and techniques  Exchange and Dissemination
  • 12. Main Areas  Prevention and Preparedness refers to measures aimed at preventing and/or reducing risks linked to terrorism and other security related risks.  Consequence Management refers to the coordination of measures taken in order to react to and to reduce the impact of the effects of a security related incident, in particular resulting from terrorist attacks in order to ensure a smooth coordination of crisis management and security actions.
  • 13. Our Vision  Close cooperation with end users, public bodies and other operators of Critical Infrastructures  Strong synergies with industries providing technologies  Definition and validation of new comprehensive methodologies for all the analyses to be undertaken to assess threats, vulnerabilities and risks, that could be offered to Critical Infrastructures operators and other end users  Interdependency issues needs a consolidated security culture and a strong multidisciplinary approach  Combination with deep competences in the involved domains
  • 14. Security Culture SECURITY APPROACH PHYSICAL SECURITY TOOLS AND FACILITIES INFORMATION SECURITY SECURITY RISK MANAGEMENT
  • 15. Interdependency issue  Interdependencies among Critical Infrastructures are complex and need to be understood since disruptions in one infrastructure can propagate into other infrastructures.  Interdependencies between infrastructures, in fact, imply that an impact on one infrastructure is also an impact on one or more other interconnected infrastructures. Focus on impact analysis within a “multidomain” approach
  • 16. Our involvement in CIPS projects  Involvement in projects in different domains  Cross fertilization among the different involved areas and their relevant approaches  Development of new harmonised methodologies and implementation of supporting tools to propose to our customers
  • 17. Transportation sector - EUMASS Project  The EUMASS objective was the delivery of a unified and flexible solution for risk assessment methodology to be applied by all European Mass Transit operators.  Main goal was to achieve an integrated process composed by the audit and risk assessment methodologies supported by a software tool.  An audit method was prepared to translate empirical evaluations into objective inputs for the risk analysis models and to monitor them during the system lifecycle.  A semi-quantitative risk assessment methodology was developed to continuously evaluate the risks associated to a system and to evaluate the effectiveness of the implemented countermeasures.  A software tool was developed to support the user along the whole process.
  • 18. Tools for operators - COBALT Project  Main aim of the COBALT is to provide CI operators and owners with an instrument which will help in defining the risk their infrastructures are subject to.  COBALT aims at providing endusers with an instrument that will help them evaluating which countermeasures are the most effective to reduce the risks a CI is subject to, from an implementation and maintenance costs point of view.  Finally COBALT aims at developing and instrument to evaluate the CI security generating a report showing the evaluated risks and the countermeasures implemented.
  • 19. Urban Security – MAPEX Project  To develop a probabilistic mapping damage methodology for the assessment, analysis and optimization of the security level of urban critical infrastructure against external blast effects  Simplified methodologies for analyzing 3D complex urban scenarios taking into account urban layout, building characteristics and the existing interaction against blast.  To harmonized the outputs of the tools according to the key agents engineers/architects/urban authorities/Security staff). (Structural
  • 20. Brussels Podgorica Beijing Seoul Cairo Istanbul St. Petersburg Abu Dhabi Rome Milan Viareggio Naples Brindisi Palermo D’Appolonia S.p.A. Headquarters: Via San Nazaro,19 16145 Genova – Italy Tel. +39 010 3628148 Fax +39 010 3621078 E-mail: dappolonia@dappolonia.it Web site http://www.dappolonia.it