SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Touristic Port Security

Riccardo Baldassarri
RINA Security Manager
CP Expo 2013, October 29th 2013 - Genova
Security Management
Services and References
RINA is a member of:
ISO International Standardization Organization T/C8 Working group supply
chain security (ISO 28000 standard)
CISM – Italian Committee for Maritime Security
UNI – Italian Standardization Body Technical Committee on Societal
RINA Maritime Security background
Security.
RINA is a Recognized Security Organization for many Flag Administrations
RINA is a recognized training center for Maritime Security training and
certification of Ship, Company and Port Facility Security Officer for Italy and
many flag administrations.
Maritime Security
Services
Maritime Security Management Services:
Ports and Terminal
Ship and Shipping Companies
Pleasure Port
Piracy.

RINA Maritime Security background

Ports:
Security Assessment and Plans.

Terminal and Touristic Ports:
Port Facility Security Assessment
Port Facility Security Plan
Drills
Training.
Ports and Port
Facilities Definitions
Port is any specified area of land and water containing works and
equipment designed to facilitate commercial maritime transport
operations, having within its boundaries one or more port facilities, for
which a security plan has been developed in compliance with the ISPS
Code, providing services to ships as defined by Regulation 2 of Chapter XIRINA Maritime Security background
2 of the SOLAS Convention.
Port Facility means a location, decided by the Contracting Government or
by the Designated Authority, where the ship/port interface takes place;
this includes areas such as anchorages, waiting berths and approaches
from seaward, as appropriate. In these locations the ISPS Code is
mandatory.
What is a Touristic Port?

A Touristic Port is a specified area of land and water containing works and
equipment designed to facilitate the recovery of pleasure vessels and
nautical tourists living on board, including berthing of large yachts, both for
private and commercial use, and tender services for cruise ships.
For the particular scope of service, normally it is located close to a touristic
area.
Commercial Port
Security Layout

COURTESY OF GENOVA PORT AUTHORITY
Commercial Port
Security Layout

COURTESY OF GENOVA PORT AUTHORITY

7
Port Boundaries
DIRECTIVE 2005/65/EC
(Port Security)
Touristic Port Layout
with ISPS CODE AREA

COURTESY OF MARINA DI PORTO CERVO
Cruise Ship at anchor
near a famous site

PORTOFINO

10
Cruise Ship tender
service and facility

11
Why ISPS Code in
Touristic Ports?

This is a sample of data relevant to the business of cruise ships and Mega
Yacht traffic where maritime security is mandatory for a Touristic Port
(ref. data for 2011 and 2012):
No. of Cruise ships at anchor: 194
Isps Mega Yachts interface: 145
Passengers in transit: 67,000.
Why ISPS Code in
Touristic Ports?

Consequently, for Touristic Port Managers the only way to maintain this
business opportunity was:
to comply with ISPS Code requirements during Cruise Ship and Mega Yacht
interface.
RINA Methodology
Review
1. Asset characterization
2. Threat Assessment
3. Vulnerability Analysis
4. Risk Assessment
5. Security Program

1. Identify critical assets
Evaluate existing measures
Evaluate severity of impacts
2. Characterize adversaries
in relation to target
attractiveness
3. Identify scenarios
Evaluate consequences
Evaluate effectiveness
Evaluate vulnerability
4. Evaluate risk
5. Identify measures
Prioritize actions.
RINA Methodology

COURTESY OF MARINA DI PORTO CERVO
Asset Protection
Standards

Use of mobile fencing during interfaces
Use of video analytics/intelligent video motion detection
Monitoring by security guards of access control and restricted area
CCTV covering total area with sensor devices, enhanced lighting, access
points guarded
Guard patrolling
Full vehicle search
Access of selected visitors only
Central Security Monitoring Center; etc.
CCTV Security
Monitoring System

COURTESY OF MARINA DI PORTO CERVO
Security Layout

COURTESY OF MARINA DI PORTO CERVO
Cruise Ship Tenders ISPS
Interface Restricted Area

ISPS CODE
RESTRICTED AREA

COURTESY OF MARINA DI PORTOFINO
Example of Restricted Area for
Mega Yacht/ Touristic Port
ISPS Interface

COURTESY OF VENICE YACHT PIER
Example of Restricted Area for
Mega Yacht/ Touristic Port
ISPS Interface

COURTESY OF VENICE YACHT PIER
ISPS Ship/ Touristic
Port Interface
Restricted Area Layout

COURTESY OF MARINA DI OLBIA
RINA Security Program
Security Administration & Organization
Personnel training
Drills & exercises
Records & documentation
Response to change in security level
Communications & Information System
Technical Security System & Equipment Maintenance
Access Procedures & Restricted areas
Security monitoring procedures
Security Incident procedures & investigation
Emergency Procedures
Search Procedures
Personnel Protection
Security Reporting & Performance Indicators.
ISPS THREAT LEVEL and
Touristic Ports

MARSEC LEVEL 3
MARSEC LEVEL 2
MARSEC LEVEL 1

CONFIRMATION

THREAT LEVEL
CHANGE
COMMUNICATION
DEACTIVATION

ISPS CODE LEVELS

NOTIFICATION

ACTIVATION

Designated
Authority

TOURISTIC PORT
PFSO

CORPORATE SECURITY
POLICY

EXAMPLE: CORPORATE
THREAT LEVELS

Severe
High
Medium
Low

MARSEC Level 1: Minimum appropriate measures shall be maintained at all times (may correspond to Low or Medium).
MARSEC Level 2: Appropriate additional protective measures shall be maintained for a period of time as a result of
heightened risk of a transportation security incident. (corresponds to Threat Level High).
MARSEC Level 3: Further specific protective security measures shall be maintained for a limited period of time when an
incident is probable, imminent, or has occurred. (corresponds to Threat Level Severe).
Company Threat Level may change when MARSEC Level changes, depending on Company risk assessment, with adoption
of temporary security measures.
Thank you for your
attention

Contenu connexe

Tendances

Isps code guidelines
Isps code guidelinesIsps code guidelines
Isps code guidelinesnwvirus
 
Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)🇫🇷 Π P. DΣBIΕN ©
 
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Danladi Caleb
 
Maritime security operative isps
Maritime security operative ispsMaritime security operative isps
Maritime security operative ispsMiguel Diaz Medina
 
Role of ism code in promoting maritime safety by caleb danladi bako
Role of ism code in promoting maritime safety by caleb danladi bakoRole of ism code in promoting maritime safety by caleb danladi bako
Role of ism code in promoting maritime safety by caleb danladi bakoDanladi Caleb
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patternsNoel Tan
 
Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)Pawanexh Kohli
 
Anti ship piracy training
Anti ship piracy trainingAnti ship piracy training
Anti ship piracy trainingNoel Tan
 
What are ISPS Charges
What are ISPS ChargesWhat are ISPS Charges
What are ISPS ChargesXeneta
 
STCW Basic Safety Training
STCW Basic Safety TrainingSTCW Basic Safety Training
STCW Basic Safety TrainingMatthew Peck
 
Beluga sea piracy training
Beluga sea piracy trainingBeluga sea piracy training
Beluga sea piracy trainingNoel Tan
 
Anti Piracy Solutions
Anti Piracy SolutionsAnti Piracy Solutions
Anti Piracy SolutionsShyam Paliwal
 
Intro to basic safety and seamanship2
Intro to basic safety and seamanship2Intro to basic safety and seamanship2
Intro to basic safety and seamanship2Pat Cabangis
 
B. security levels
B. security levelsB. security levels
B. security levelsNoel Tan
 
Safety awareness training program
Safety awareness training programSafety awareness training program
Safety awareness training programNoel Tan
 

Tendances (20)

Isps code guidelines
Isps code guidelinesIsps code guidelines
Isps code guidelines
 
Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)
 
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
 
Maritime security operative isps
Maritime security operative ispsMaritime security operative isps
Maritime security operative isps
 
Role of ism code in promoting maritime safety by caleb danladi bako
Role of ism code in promoting maritime safety by caleb danladi bakoRole of ism code in promoting maritime safety by caleb danladi bako
Role of ism code in promoting maritime safety by caleb danladi bako
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
 
Isps (1)
Isps (1)Isps (1)
Isps (1)
 
Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)
 
Anti ship piracy training
Anti ship piracy trainingAnti ship piracy training
Anti ship piracy training
 
What are ISPS Charges
What are ISPS ChargesWhat are ISPS Charges
What are ISPS Charges
 
Maritime Security and Security Responsibilities
Maritime Security and Security ResponsibilitiesMaritime Security and Security Responsibilities
Maritime Security and Security Responsibilities
 
Solas assigment
Solas  assigmentSolas  assigment
Solas assigment
 
STCW Basic Safety Training
STCW Basic Safety TrainingSTCW Basic Safety Training
STCW Basic Safety Training
 
Beluga sea piracy training
Beluga sea piracy trainingBeluga sea piracy training
Beluga sea piracy training
 
Life saving signals
Life saving signalsLife saving signals
Life saving signals
 
On board safety
   On board safety    On board safety
On board safety
 
Anti Piracy Solutions
Anti Piracy SolutionsAnti Piracy Solutions
Anti Piracy Solutions
 
Intro to basic safety and seamanship2
Intro to basic safety and seamanship2Intro to basic safety and seamanship2
Intro to basic safety and seamanship2
 
B. security levels
B. security levelsB. security levels
B. security levels
 
Safety awareness training program
Safety awareness training programSafety awareness training program
Safety awareness training program
 

En vedette

Brad Williams - Building Maritime Capabilities 2010
Brad Williams - Building Maritime Capabilities 2010Brad Williams - Building Maritime Capabilities 2010
Brad Williams - Building Maritime Capabilities 2010NASBLA
 
Malaysia (asian cuisine)
Malaysia  (asian cuisine)Malaysia  (asian cuisine)
Malaysia (asian cuisine)Pat Cabangis
 

En vedette (6)

Brad Williams - Building Maritime Capabilities 2010
Brad Williams - Building Maritime Capabilities 2010Brad Williams - Building Maritime Capabilities 2010
Brad Williams - Building Maritime Capabilities 2010
 
Malaysia (asian cuisine)
Malaysia  (asian cuisine)Malaysia  (asian cuisine)
Malaysia (asian cuisine)
 
Engine quiz
Engine quizEngine quiz
Engine quiz
 
Crowd Management
Crowd ManagementCrowd Management
Crowd Management
 
A Short Note on ISPS Code
A Short Note on ISPS CodeA Short Note on ISPS Code
A Short Note on ISPS Code
 
ISPS Code
ISPS CodeISPS Code
ISPS Code
 

Similaire à Touristic Port Security

Medi-Cube Final Event Digital Marina
Medi-Cube Final Event Digital MarinaMedi-Cube Final Event Digital Marina
Medi-Cube Final Event Digital MarinaURENIO Research Unit
 
port technologies
port technologies port technologies
port technologies Abhishek
 
NOVIKONTAS_Group_presentation
NOVIKONTAS_Group_presentationNOVIKONTAS_Group_presentation
NOVIKONTAS_Group_presentationVladimir Efimov
 
SATELLITE AIS FOR GLOBAL MARITIME TRAFFIC MONITORING
SATELLITE AIS FOR GLOBAL MARITIME TRAFFIC MONITORINGSATELLITE AIS FOR GLOBAL MARITIME TRAFFIC MONITORING
SATELLITE AIS FOR GLOBAL MARITIME TRAFFIC MONITORINGZulkifli Abdul Aziz
 
Regs4ships Presentation 2010
Regs4ships Presentation 2010Regs4ships Presentation 2010
Regs4ships Presentation 2010RichardEastham
 
IRJET - Boat Localization and Alert System for Border Identification usin...
IRJET -  	  Boat Localization and Alert System for Border Identification usin...IRJET -  	  Boat Localization and Alert System for Border Identification usin...
IRJET - Boat Localization and Alert System for Border Identification usin...IRJET Journal
 
SMi Group's Border Security 2019
SMi Group's Border Security 2019SMi Group's Border Security 2019
SMi Group's Border Security 2019Dale Butler
 
Management of shipping (1)
Management of shipping (1)Management of shipping (1)
Management of shipping (1)Fredrick Olali
 
Maritime cyber security threats & consequence part 2
Maritime cyber security  threats & consequence part 2Maritime cyber security  threats & consequence part 2
Maritime cyber security threats & consequence part 2pankaj kapoor
 
UKHO - Simon Hampshire - Situational Awareness - Any Time, Any Place, Anywhere
UKHO - Simon Hampshire - Situational Awareness - Any Time, Any Place, AnywhereUKHO - Simon Hampshire - Situational Awareness - Any Time, Any Place, Anywhere
UKHO - Simon Hampshire - Situational Awareness - Any Time, Any Place, AnywhereEsri UK
 
Sai sts transhipment solutions
Sai sts transhipment solutionsSai sts transhipment solutions
Sai sts transhipment solutionsAyu Anira
 
SAI STS Transhipment Solutions
SAI STS Transhipment SolutionsSAI STS Transhipment Solutions
SAI STS Transhipment SolutionsAyu Anira
 
REPORT OF THE 3RD MEETING OF PMAWCA HARBOUR MASTERS’ NETWORK,
REPORT OF THE 3RD MEETING OF PMAWCA HARBOUR MASTERS’ NETWORK,REPORT OF THE 3RD MEETING OF PMAWCA HARBOUR MASTERS’ NETWORK,
REPORT OF THE 3RD MEETING OF PMAWCA HARBOUR MASTERS’ NETWORK,AGPAOC- PMAWCA
 
Presentation of Nicola Pusceddu Region of Sardinia, OPTIMED project
Presentation of Nicola Pusceddu Region of Sardinia, OPTIMED projectPresentation of Nicola Pusceddu Region of Sardinia, OPTIMED project
Presentation of Nicola Pusceddu Region of Sardinia, OPTIMED projectASCAME
 

Similaire à Touristic Port Security (20)

Medi-Cube Final Event Digital Marina
Medi-Cube Final Event Digital MarinaMedi-Cube Final Event Digital Marina
Medi-Cube Final Event Digital Marina
 
port technologies
port technologies port technologies
port technologies
 
i-ship brochure
i-ship brochurei-ship brochure
i-ship brochure
 
iShip Inlecom Systems
iShip Inlecom SystemsiShip Inlecom Systems
iShip Inlecom Systems
 
Chemical tankers
Chemical tankersChemical tankers
Chemical tankers
 
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
 
NOVIKONTAS_Group_presentation
NOVIKONTAS_Group_presentationNOVIKONTAS_Group_presentation
NOVIKONTAS_Group_presentation
 
SATELLITE AIS FOR GLOBAL MARITIME TRAFFIC MONITORING
SATELLITE AIS FOR GLOBAL MARITIME TRAFFIC MONITORINGSATELLITE AIS FOR GLOBAL MARITIME TRAFFIC MONITORING
SATELLITE AIS FOR GLOBAL MARITIME TRAFFIC MONITORING
 
Port Vessel Assurance Service by Clive Sheard
Port Vessel Assurance Service by Clive Sheard   Port Vessel Assurance Service by Clive Sheard
Port Vessel Assurance Service by Clive Sheard
 
Regs4ships Presentation 2010
Regs4ships Presentation 2010Regs4ships Presentation 2010
Regs4ships Presentation 2010
 
IRJET - Boat Localization and Alert System for Border Identification usin...
IRJET -  	  Boat Localization and Alert System for Border Identification usin...IRJET -  	  Boat Localization and Alert System for Border Identification usin...
IRJET - Boat Localization and Alert System for Border Identification usin...
 
SMi Group's Border Security 2019
SMi Group's Border Security 2019SMi Group's Border Security 2019
SMi Group's Border Security 2019
 
Management of shipping (1)
Management of shipping (1)Management of shipping (1)
Management of shipping (1)
 
Maritime cyber security threats & consequence part 2
Maritime cyber security  threats & consequence part 2Maritime cyber security  threats & consequence part 2
Maritime cyber security threats & consequence part 2
 
UKHO - Simon Hampshire - Situational Awareness - Any Time, Any Place, Anywhere
UKHO - Simon Hampshire - Situational Awareness - Any Time, Any Place, AnywhereUKHO - Simon Hampshire - Situational Awareness - Any Time, Any Place, Anywhere
UKHO - Simon Hampshire - Situational Awareness - Any Time, Any Place, Anywhere
 
Sai sts transhipment solutions
Sai sts transhipment solutionsSai sts transhipment solutions
Sai sts transhipment solutions
 
SAI STS Transhipment Solutions
SAI STS Transhipment SolutionsSAI STS Transhipment Solutions
SAI STS Transhipment Solutions
 
REPORT OF THE 3RD MEETING OF PMAWCA HARBOUR MASTERS’ NETWORK,
REPORT OF THE 3RD MEETING OF PMAWCA HARBOUR MASTERS’ NETWORK,REPORT OF THE 3RD MEETING OF PMAWCA HARBOUR MASTERS’ NETWORK,
REPORT OF THE 3RD MEETING OF PMAWCA HARBOUR MASTERS’ NETWORK,
 
SOCAR Trading and PurpleTRAC Case Study
SOCAR Trading and PurpleTRAC Case StudySOCAR Trading and PurpleTRAC Case Study
SOCAR Trading and PurpleTRAC Case Study
 
Presentation of Nicola Pusceddu Region of Sardinia, OPTIMED project
Presentation of Nicola Pusceddu Region of Sardinia, OPTIMED projectPresentation of Nicola Pusceddu Region of Sardinia, OPTIMED project
Presentation of Nicola Pusceddu Region of Sardinia, OPTIMED project
 

Plus de Community Protection Forum

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Community Protection Forum
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Community Protection Forum
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...Community Protection Forum
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachCommunity Protection Forum
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Community Protection Forum
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCommunity Protection Forum
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Community Protection Forum
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsCommunity Protection Forum
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesCommunity Protection Forum
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceCommunity Protection Forum
 

Plus de Community Protection Forum (20)

The Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in CyberspaceThe Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in Cyberspace
 
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security Projects & Projects Safety
Security Projects & Projects SafetySecurity Projects & Projects Safety
Security Projects & Projects Safety
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
 

Dernier

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Touristic Port Security

  • 1. Touristic Port Security Riccardo Baldassarri RINA Security Manager CP Expo 2013, October 29th 2013 - Genova
  • 2. Security Management Services and References RINA is a member of: ISO International Standardization Organization T/C8 Working group supply chain security (ISO 28000 standard) CISM – Italian Committee for Maritime Security UNI – Italian Standardization Body Technical Committee on Societal RINA Maritime Security background Security. RINA is a Recognized Security Organization for many Flag Administrations RINA is a recognized training center for Maritime Security training and certification of Ship, Company and Port Facility Security Officer for Italy and many flag administrations.
  • 3. Maritime Security Services Maritime Security Management Services: Ports and Terminal Ship and Shipping Companies Pleasure Port Piracy. RINA Maritime Security background Ports: Security Assessment and Plans. Terminal and Touristic Ports: Port Facility Security Assessment Port Facility Security Plan Drills Training.
  • 4. Ports and Port Facilities Definitions Port is any specified area of land and water containing works and equipment designed to facilitate commercial maritime transport operations, having within its boundaries one or more port facilities, for which a security plan has been developed in compliance with the ISPS Code, providing services to ships as defined by Regulation 2 of Chapter XIRINA Maritime Security background 2 of the SOLAS Convention. Port Facility means a location, decided by the Contracting Government or by the Designated Authority, where the ship/port interface takes place; this includes areas such as anchorages, waiting berths and approaches from seaward, as appropriate. In these locations the ISPS Code is mandatory.
  • 5. What is a Touristic Port? A Touristic Port is a specified area of land and water containing works and equipment designed to facilitate the recovery of pleasure vessels and nautical tourists living on board, including berthing of large yachts, both for private and commercial use, and tender services for cruise ships. For the particular scope of service, normally it is located close to a touristic area.
  • 6. Commercial Port Security Layout COURTESY OF GENOVA PORT AUTHORITY
  • 7. Commercial Port Security Layout COURTESY OF GENOVA PORT AUTHORITY 7
  • 9. Touristic Port Layout with ISPS CODE AREA COURTESY OF MARINA DI PORTO CERVO
  • 10. Cruise Ship at anchor near a famous site PORTOFINO 10
  • 11. Cruise Ship tender service and facility 11
  • 12. Why ISPS Code in Touristic Ports? This is a sample of data relevant to the business of cruise ships and Mega Yacht traffic where maritime security is mandatory for a Touristic Port (ref. data for 2011 and 2012): No. of Cruise ships at anchor: 194 Isps Mega Yachts interface: 145 Passengers in transit: 67,000.
  • 13. Why ISPS Code in Touristic Ports? Consequently, for Touristic Port Managers the only way to maintain this business opportunity was: to comply with ISPS Code requirements during Cruise Ship and Mega Yacht interface.
  • 14. RINA Methodology Review 1. Asset characterization 2. Threat Assessment 3. Vulnerability Analysis 4. Risk Assessment 5. Security Program 1. Identify critical assets Evaluate existing measures Evaluate severity of impacts 2. Characterize adversaries in relation to target attractiveness 3. Identify scenarios Evaluate consequences Evaluate effectiveness Evaluate vulnerability 4. Evaluate risk 5. Identify measures Prioritize actions.
  • 15. RINA Methodology COURTESY OF MARINA DI PORTO CERVO
  • 16. Asset Protection Standards Use of mobile fencing during interfaces Use of video analytics/intelligent video motion detection Monitoring by security guards of access control and restricted area CCTV covering total area with sensor devices, enhanced lighting, access points guarded Guard patrolling Full vehicle search Access of selected visitors only Central Security Monitoring Center; etc.
  • 17. CCTV Security Monitoring System COURTESY OF MARINA DI PORTO CERVO
  • 18. Security Layout COURTESY OF MARINA DI PORTO CERVO
  • 19. Cruise Ship Tenders ISPS Interface Restricted Area ISPS CODE RESTRICTED AREA COURTESY OF MARINA DI PORTOFINO
  • 20. Example of Restricted Area for Mega Yacht/ Touristic Port ISPS Interface COURTESY OF VENICE YACHT PIER
  • 21. Example of Restricted Area for Mega Yacht/ Touristic Port ISPS Interface COURTESY OF VENICE YACHT PIER
  • 22. ISPS Ship/ Touristic Port Interface Restricted Area Layout COURTESY OF MARINA DI OLBIA
  • 23. RINA Security Program Security Administration & Organization Personnel training Drills & exercises Records & documentation Response to change in security level Communications & Information System Technical Security System & Equipment Maintenance Access Procedures & Restricted areas Security monitoring procedures Security Incident procedures & investigation Emergency Procedures Search Procedures Personnel Protection Security Reporting & Performance Indicators.
  • 24. ISPS THREAT LEVEL and Touristic Ports MARSEC LEVEL 3 MARSEC LEVEL 2 MARSEC LEVEL 1 CONFIRMATION THREAT LEVEL CHANGE COMMUNICATION DEACTIVATION ISPS CODE LEVELS NOTIFICATION ACTIVATION Designated Authority TOURISTIC PORT PFSO CORPORATE SECURITY POLICY EXAMPLE: CORPORATE THREAT LEVELS Severe High Medium Low MARSEC Level 1: Minimum appropriate measures shall be maintained at all times (may correspond to Low or Medium). MARSEC Level 2: Appropriate additional protective measures shall be maintained for a period of time as a result of heightened risk of a transportation security incident. (corresponds to Threat Level High). MARSEC Level 3: Further specific protective security measures shall be maintained for a limited period of time when an incident is probable, imminent, or has occurred. (corresponds to Threat Level Severe). Company Threat Level may change when MARSEC Level changes, depending on Company risk assessment, with adoption of temporary security measures.
  • 25. Thank you for your attention