SlideShare a Scribd company logo
1 of 32
Matt Runyan
Network Consulting Engineer, Cisco Systems – Tactical Operations
matrunya@cisco.com

March 2013



© 2013 Cisco and/or its affiliates. All rights reserved.           1
Thanks to:
                                                           Rakesh Bharania
                                                           NCE,Cisco TacOps



                                                           For initial Networked EOC
                                                           whitepaper, available upon
                                                           request




© 2013 Cisco and/or its affiliates. All rights reserved.                                2
•  Network Consulting Engineer,
                  Cisco Systems - Tactical Operations



           •  Volunteer Firefighter / EMT-B,
                  Apex (NC) Fire Department



           •  Communications Unit Leader (COML),
                  NCTF-4 USAR (Type III)


© 2013 Cisco and/or its affiliates. All rights reserved.   3
                                                               3
•  About Cisco Tactical Operations

•  Network Enabled EOC
       Concept and Design
•  IT/Security Considerations
•  EOC Communications Suite
       Resiliency
       Redundancy
       Voice/Video/Data
       Interoperability
•  Testing Your Solution & Training People
•  Q&A

•  Conclusion
© 2013 Cisco and/or its affiliates. All rights reserved.   4
© 2013 Cisco and/or its affiliates. All rights reserved.   5
Team Mission                                     Team Focus Areas


              To deliver a unique level of                  ! Corporate Social
              service in corporate and
              individual risk mitigation,                   Responsibility /
              critical network availability,                Emergency Response
              and rapid recovery from                       ! Internal Support
              natural or man-made
              disasters through a highly                    ! Industry Influence and
              skilled team of operational                   Thought Leadership
              and technical experts.                        ! Business Enablement
                                                            and Consulting




© 2013 Cisco and/or its affiliates. All rights reserved.                               6
•  Network Emergency Response Vehicle
     (NERV)
           •        NIMS Type II Mobile Communications Center.
           •        Large scale network services core
           •        “Respond locally, communicate globally”

•  Mobile Communicator Vehicle
     (MC2/MCV)
           •        NIMS Type IV (with satellite, VoIP) MCC
           •        Medium scale network services core

•  Emergency Communications Kit
     (ECK)
           •        Rapidly deployable communications capability
           •        Ship or hand-carry via air transport




© 2013 Cisco and/or its affiliates. All rights reserved.           7
!  Satellite, BGAN, 4G cellular                             !  TelePresence Video Conferencing
                                                               (H.323 and SIP)
!  Land Mobile Radio (LMR)
   UHF/VHF/800/VHF low band                                 !  IP Video Surveillance
!  Amateur Radio UHF/VHF/HF                                 !  Digital Media Encoder – Streaming
                                                               video
!  IPICS - Radio Interoperability
                                                            !  Cisco ISR G2 routers
!  Wireless LAN (Mesh)                                         (DMVPN, IPSEC,IDS/IPS, WAAS)
!  IP Telephony                                             !  Printer/Scanner/Fax




 © 2013 Cisco and/or its affiliates. All rights reserved.                                     8
© 2013 Cisco and/or its affiliates. All rights reserved.   9
Coordinating Resources
                                                           Policy Making
                                                           Operations
                                                           Information Gathering
                                                           Public Information Dissemination
                                                           Hosting Visitors




© 2013 Cisco and/or its affiliates. All rights reserved.                                      10
•  Location and potential hazards
          First you must survive the disaster, then respond

•  Building layout and Personnel support

•  IT and Information Security in Critical Path

•  Understanding workflows & NIMS Requirements
            •        Within EOC (individuals / teams)
            •        EOC to outside agencies & entities - interoperability

•  The EOC Communications Suite:
            •        Resiliency and Redundancy of key functions / systems
            •        Information Security in the EOC
            •        IP Telephony and Video Systems
            •        Wireless Networks
            •        Remote Access and Interoperability Systems
© 2013 Cisco and/or its affiliates. All rights reserved.                     11
Implication:
              Engage your IT and Information Security resources
              early and often!
© 2013 Cisco and/or its affiliates. All rights reserved.          12
•  Example: “Watch Desk” -> IC -> Operations -> Logistics ->
       Finance/Administration
•  Have backup points of contact or
       line of succession for key positions.
•  Workflows can influence physical layout of building
       (video walls, breakout rooms, separate area for media)
•  Individuals may be grouped by ICS Position, Branch or other
       function (Logistics, Law Enforcement / Fire / Public Works, etc.)
•  Smooth flow of information for best situational awareness is
       critical for crisis decision-making



© 2013 Cisco and/or its affiliates. All rights reserved.                   13
•  Information Sharing for Situational Awareness

•  Mutual Aid / Resource Requests
•  With whom do I need to talk to and share information?
            •  Peer Level: Adjoining Cities / Counties
            •  Higher Level: County -> State, State -> Federal
            •  Lower Level: State -> Regional, Regional -> County
            •  Other Organizations: Military, Utilities, Red Cross, VOAD, Fusion Centers
            •  Public Information: News Media, Social Media (value in two-way conversation)




© 2013 Cisco and/or its affiliates. All rights reserved.                                      14
© 2013 Cisco and/or its affiliates. All rights reserved.   15
•  Telephone (internal systems and PSTN, NAWAS)

•  Land Mobile Radio Systems
•  Email, file sharing and group collaboration
       (Intranet websites, wikis, chat tools)
•  Specialized apps, incident management tools and databases
       (WebEOC, E-Team, CAD, NCIC/DCI, resource catalogs, HR,
       finance, digital signage, EAS/IPAWS, etc.)
•  Video tools (Video Teleconferencing, video surveillance, analytics)

•  Remote access (VPN or Web)

•  Mobile Apps for Smart Phones & Tablets

•  Wireless Intranet and Internet access for employees and guests

© 2013 Cisco and/or its affiliates. All rights reserved.                 16
•  Typical Threats:
                 Service Disruption
                 Network abuse
                 Unauthorized access

•  Defense in Depth
       (policies, awareness, firewalls, AV, web content filters, etc.)
•  Suite of tools
       (detection, reporting, alerting, mitigation, auditing)
•  Maintain some ease of use
       - otherwise, users will circumvent security




© 2013 Cisco and/or its affiliates. All rights reserved.                 17
•  Redundant network hardware and
       cabling
•  Independent A/B Power feeds

•  Server clustering for High Availability
•  Data backup and restore

•  Cloud services – do your homework!

•  Sometimes,
       less complex = more reliable
•  Cost vs. reliability tradeoffs




© 2013 Cisco and/or its affiliates. All rights reserved.   18
•  Converged IP voice and data network = flexibility

•  Remote access for alternate locations and mobile workers
         - VOST (Virtual Operations Support Team) concept
•  Stable Power required for stable communications
         - Redundant generator / UPS systems with aggressive PM
•  Redundant circuits – diverse media
       e.g.: DS-3 and VPN on business-class cable modem, 4G, VSAT
•  Physical path diversity: backhoe example

•  Good relationship with service providers. Know escalation paths!

•  TSP on critical circuits http://tsp.ncs.gov

•  Document and test “failover” processes

© 2013 Cisco and/or its affiliates. All rights reserved.              19
•  Resiliency: Where does my data live? Known hazards?

•  Resiliency: Backup and Restore documented and tested
•  Redundancy: Redundant HW, network, power, etc.

•  Redundancy: Options for local production and cloud DR instances

•  Security: Who has access and control?

•  Security: Do provider’s security measures meet requirements?




© 2013 Cisco and/or its affiliates. All rights reserved.             20
•  Increased Flexibility

•  Decreased TCO
•  Unified Communications
       (voice, video, chat, voicemail, fax)
•  “Survivable” solutions
       resilient to server failures
•  Cloud services – do your homework!

•  Proper design is imperative
       (Capacity, Quality of Service)
•  Underlying network must be stable



© 2013 Cisco and/or its affiliates. All rights reserved.   21
•  Enhanced collaboration experience

•  Real-time information for situational
       awareness (CCTV surveillance /
       traffic cameras, analytics)
•  PC Desktop screen sharing
       capabilities
•  Dedicated VTC units, PC,
       smartphone, tablet apps
•  Web-based services for meetings
•  Video walls for common
       operational picture


© 2013 Cisco and/or its affiliates. All rights reserved.   22
•  VPN Software allows Work-from-Anywhere flexibility

•  Hardware Solutions for single, multi-user sites or vehicles




© 2013 Cisco and/or its affiliates. All rights reserved.         23
•  BYOD (Smartphone / Tablet)

•  Laptops and USB Dongles
•  Backup connection methods

•  Guest vs. Trusted user access

•  Interference mitigation technology

•  WiFi:
       2.4/5.8 GHz - shared
       4.9 GHz Public Safety Exclusive
•  4G/LTE:
       Commercial networks
       “D-Block” 700 MHz for Public Safety

© 2013 Cisco and/or its affiliates. All rights reserved.   24
•  More than just radios!

•  Voice, Video and Data sharing
•  5 Rights of Emergency
       Communications:
            •        Right Information
            •        Right Time
            •        Right Person
            •        Right Format
            •        Right Device

•  Many solutions: choose carefully
       (and implement even more carefully)
•  Poorly implemented interop solutions cause more harm than good

© 2013 Cisco and/or its affiliates. All rights reserved.            25
© 2013 Cisco and/or its affiliates. All rights reserved.   26
•  Give employees (and volunteers) the proper training to operate in
       sub-optimal environments
•  Ensure periodic opportunities to learn updated processes and
       technology
•  Set goals for each individual in what they are expected to do in
       each situation
•  Seek feedback on how to improve processes after exercises and
       actual events




© 2013 Cisco and/or its affiliates. All rights reserved.               27
•  Design realistic scenarios:
       Success can build morale, and stress helps find weaknesses
•  Develop exercise injects based on real-world issues

•  Include EOC Building evacuation scenarios often overlooked
       (e.g. fire alarm, hazmat, bomb threat)
•  Involve your PIOs and IT and other support staff
       in addition to traditional responders
•  Test failover and relocating to alternate sites:
       Do all critical processes and tools still work?
•  Document results, seek feedback and work to improve
       for “next time” - on a real incident or exercise


© 2013 Cisco and/or its affiliates. All rights reserved.            28
© 2013 Cisco and/or its affiliates. All rights reserved.   29
!  On Cisco.com:
      http://www.cisco.com/go/tacops

   !  Email: tacops-info@cisco.com

   !  Facebook: Cisco TACOPS
      http://www.facebook.com/
      cisco.tacops

   !  Twitter: @CiscoTACOPS




© 2013 Cisco and/or its affiliates. All rights reserved.   30
•  Cisco Tactical Operations: please
       engage with us and tour our vehicles!
•  Network Enabled EOC
       Concept and Design
•  IT/Security Considerations

•  EOC Communications Suite
       Resiliency
       Redundancy
       Voice/Video/Data
       Interoperability
•  Testing your solution



© 2013 Cisco and/or its affiliates. All rights reserved.   31
Thank you.




© 2013 Cisco and/or its affiliates. All rights reserved.   32

More Related Content

What's hot

GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
Clay Melugin
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
Irsandi Hasan
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
Ivan Carmona
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
Shane Glenn
 
What is exactly anti fragile in dev ops - v3
What is exactly anti fragile in dev ops - v3What is exactly anti fragile in dev ops - v3
What is exactly anti fragile in dev ops - v3
Asher Sterkin
 

What's hot (20)

The Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster ReliefThe Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster Relief
 
Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012
 
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)
 
Working Together: The Private Sector in Humanitarian Response
Working Together: The Private Sector in Humanitarian ResponseWorking Together: The Private Sector in Humanitarian Response
Working Together: The Private Sector in Humanitarian Response
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
 
Inside Cybero
Inside CyberoInside Cybero
Inside Cybero
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Axoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing ServicesAxoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing Services
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirt
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
Cisco ccna security
Cisco ccna securityCisco ccna security
Cisco ccna security
 
Structural organization of LSA architecture
Structural organization of LSA architectureStructural organization of LSA architecture
Structural organization of LSA architecture
 
What is exactly anti fragile in dev ops - v3
What is exactly anti fragile in dev ops - v3What is exactly anti fragile in dev ops - v3
What is exactly anti fragile in dev ops - v3
 
OWASP Cloud Top 10
OWASP Cloud Top 10OWASP Cloud Top 10
OWASP Cloud Top 10
 
Collaborative defence strategies for network security
Collaborative defence strategies for network securityCollaborative defence strategies for network security
Collaborative defence strategies for network security
 

Similar to The Network Enabled EOC

The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryThe Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS Delivery
OpSource
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
Carl De Groote
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
omar awad
 

Similar to The Network Enabled EOC (20)

Iia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V FinalIia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V Final
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Latest_Resume
Latest_ResumeLatest_Resume
Latest_Resume
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
 
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryThe Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS Delivery
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
 
The Cloud Security Landscape
The Cloud Security LandscapeThe Cloud Security Landscape
The Cloud Security Landscape
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
OMG DDS Tutorial - Part I
OMG DDS Tutorial - Part IOMG DDS Tutorial - Part I
OMG DDS Tutorial - Part I
 
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...
 

The Network Enabled EOC

  • 1. Matt Runyan Network Consulting Engineer, Cisco Systems – Tactical Operations matrunya@cisco.com March 2013 © 2013 Cisco and/or its affiliates. All rights reserved. 1
  • 2. Thanks to: Rakesh Bharania NCE,Cisco TacOps For initial Networked EOC whitepaper, available upon request © 2013 Cisco and/or its affiliates. All rights reserved. 2
  • 3. •  Network Consulting Engineer, Cisco Systems - Tactical Operations •  Volunteer Firefighter / EMT-B, Apex (NC) Fire Department •  Communications Unit Leader (COML), NCTF-4 USAR (Type III) © 2013 Cisco and/or its affiliates. All rights reserved. 3 3
  • 4. •  About Cisco Tactical Operations •  Network Enabled EOC Concept and Design •  IT/Security Considerations •  EOC Communications Suite Resiliency Redundancy Voice/Video/Data Interoperability •  Testing Your Solution & Training People •  Q&A •  Conclusion © 2013 Cisco and/or its affiliates. All rights reserved. 4
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. 5
  • 6. Team Mission Team Focus Areas To deliver a unique level of ! Corporate Social service in corporate and individual risk mitigation, Responsibility / critical network availability, Emergency Response and rapid recovery from ! Internal Support natural or man-made disasters through a highly ! Industry Influence and skilled team of operational Thought Leadership and technical experts. ! Business Enablement and Consulting © 2013 Cisco and/or its affiliates. All rights reserved. 6
  • 7. •  Network Emergency Response Vehicle (NERV) •  NIMS Type II Mobile Communications Center. •  Large scale network services core •  “Respond locally, communicate globally” •  Mobile Communicator Vehicle (MC2/MCV) •  NIMS Type IV (with satellite, VoIP) MCC •  Medium scale network services core •  Emergency Communications Kit (ECK) •  Rapidly deployable communications capability •  Ship or hand-carry via air transport © 2013 Cisco and/or its affiliates. All rights reserved. 7
  • 8. !  Satellite, BGAN, 4G cellular !  TelePresence Video Conferencing (H.323 and SIP) !  Land Mobile Radio (LMR) UHF/VHF/800/VHF low band !  IP Video Surveillance !  Amateur Radio UHF/VHF/HF !  Digital Media Encoder – Streaming video !  IPICS - Radio Interoperability !  Cisco ISR G2 routers !  Wireless LAN (Mesh) (DMVPN, IPSEC,IDS/IPS, WAAS) !  IP Telephony !  Printer/Scanner/Fax © 2013 Cisco and/or its affiliates. All rights reserved. 8
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. 9
  • 10. Coordinating Resources Policy Making Operations Information Gathering Public Information Dissemination Hosting Visitors © 2013 Cisco and/or its affiliates. All rights reserved. 10
  • 11. •  Location and potential hazards First you must survive the disaster, then respond •  Building layout and Personnel support •  IT and Information Security in Critical Path •  Understanding workflows & NIMS Requirements •  Within EOC (individuals / teams) •  EOC to outside agencies & entities - interoperability •  The EOC Communications Suite: •  Resiliency and Redundancy of key functions / systems •  Information Security in the EOC •  IP Telephony and Video Systems •  Wireless Networks •  Remote Access and Interoperability Systems © 2013 Cisco and/or its affiliates. All rights reserved. 11
  • 12. Implication: Engage your IT and Information Security resources early and often! © 2013 Cisco and/or its affiliates. All rights reserved. 12
  • 13. •  Example: “Watch Desk” -> IC -> Operations -> Logistics -> Finance/Administration •  Have backup points of contact or line of succession for key positions. •  Workflows can influence physical layout of building (video walls, breakout rooms, separate area for media) •  Individuals may be grouped by ICS Position, Branch or other function (Logistics, Law Enforcement / Fire / Public Works, etc.) •  Smooth flow of information for best situational awareness is critical for crisis decision-making © 2013 Cisco and/or its affiliates. All rights reserved. 13
  • 14. •  Information Sharing for Situational Awareness •  Mutual Aid / Resource Requests •  With whom do I need to talk to and share information? •  Peer Level: Adjoining Cities / Counties •  Higher Level: County -> State, State -> Federal •  Lower Level: State -> Regional, Regional -> County •  Other Organizations: Military, Utilities, Red Cross, VOAD, Fusion Centers •  Public Information: News Media, Social Media (value in two-way conversation) © 2013 Cisco and/or its affiliates. All rights reserved. 14
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved. 15
  • 16. •  Telephone (internal systems and PSTN, NAWAS) •  Land Mobile Radio Systems •  Email, file sharing and group collaboration (Intranet websites, wikis, chat tools) •  Specialized apps, incident management tools and databases (WebEOC, E-Team, CAD, NCIC/DCI, resource catalogs, HR, finance, digital signage, EAS/IPAWS, etc.) •  Video tools (Video Teleconferencing, video surveillance, analytics) •  Remote access (VPN or Web) •  Mobile Apps for Smart Phones & Tablets •  Wireless Intranet and Internet access for employees and guests © 2013 Cisco and/or its affiliates. All rights reserved. 16
  • 17. •  Typical Threats: Service Disruption Network abuse Unauthorized access •  Defense in Depth (policies, awareness, firewalls, AV, web content filters, etc.) •  Suite of tools (detection, reporting, alerting, mitigation, auditing) •  Maintain some ease of use - otherwise, users will circumvent security © 2013 Cisco and/or its affiliates. All rights reserved. 17
  • 18. •  Redundant network hardware and cabling •  Independent A/B Power feeds •  Server clustering for High Availability •  Data backup and restore •  Cloud services – do your homework! •  Sometimes, less complex = more reliable •  Cost vs. reliability tradeoffs © 2013 Cisco and/or its affiliates. All rights reserved. 18
  • 19. •  Converged IP voice and data network = flexibility •  Remote access for alternate locations and mobile workers - VOST (Virtual Operations Support Team) concept •  Stable Power required for stable communications - Redundant generator / UPS systems with aggressive PM •  Redundant circuits – diverse media e.g.: DS-3 and VPN on business-class cable modem, 4G, VSAT •  Physical path diversity: backhoe example •  Good relationship with service providers. Know escalation paths! •  TSP on critical circuits http://tsp.ncs.gov •  Document and test “failover” processes © 2013 Cisco and/or its affiliates. All rights reserved. 19
  • 20. •  Resiliency: Where does my data live? Known hazards? •  Resiliency: Backup and Restore documented and tested •  Redundancy: Redundant HW, network, power, etc. •  Redundancy: Options for local production and cloud DR instances •  Security: Who has access and control? •  Security: Do provider’s security measures meet requirements? © 2013 Cisco and/or its affiliates. All rights reserved. 20
  • 21. •  Increased Flexibility •  Decreased TCO •  Unified Communications (voice, video, chat, voicemail, fax) •  “Survivable” solutions resilient to server failures •  Cloud services – do your homework! •  Proper design is imperative (Capacity, Quality of Service) •  Underlying network must be stable © 2013 Cisco and/or its affiliates. All rights reserved. 21
  • 22. •  Enhanced collaboration experience •  Real-time information for situational awareness (CCTV surveillance / traffic cameras, analytics) •  PC Desktop screen sharing capabilities •  Dedicated VTC units, PC, smartphone, tablet apps •  Web-based services for meetings •  Video walls for common operational picture © 2013 Cisco and/or its affiliates. All rights reserved. 22
  • 23. •  VPN Software allows Work-from-Anywhere flexibility •  Hardware Solutions for single, multi-user sites or vehicles © 2013 Cisco and/or its affiliates. All rights reserved. 23
  • 24. •  BYOD (Smartphone / Tablet) •  Laptops and USB Dongles •  Backup connection methods •  Guest vs. Trusted user access •  Interference mitigation technology •  WiFi: 2.4/5.8 GHz - shared 4.9 GHz Public Safety Exclusive •  4G/LTE: Commercial networks “D-Block” 700 MHz for Public Safety © 2013 Cisco and/or its affiliates. All rights reserved. 24
  • 25. •  More than just radios! •  Voice, Video and Data sharing •  5 Rights of Emergency Communications: •  Right Information •  Right Time •  Right Person •  Right Format •  Right Device •  Many solutions: choose carefully (and implement even more carefully) •  Poorly implemented interop solutions cause more harm than good © 2013 Cisco and/or its affiliates. All rights reserved. 25
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved. 26
  • 27. •  Give employees (and volunteers) the proper training to operate in sub-optimal environments •  Ensure periodic opportunities to learn updated processes and technology •  Set goals for each individual in what they are expected to do in each situation •  Seek feedback on how to improve processes after exercises and actual events © 2013 Cisco and/or its affiliates. All rights reserved. 27
  • 28. •  Design realistic scenarios: Success can build morale, and stress helps find weaknesses •  Develop exercise injects based on real-world issues •  Include EOC Building evacuation scenarios often overlooked (e.g. fire alarm, hazmat, bomb threat) •  Involve your PIOs and IT and other support staff in addition to traditional responders •  Test failover and relocating to alternate sites: Do all critical processes and tools still work? •  Document results, seek feedback and work to improve for “next time” - on a real incident or exercise © 2013 Cisco and/or its affiliates. All rights reserved. 28
  • 29. © 2013 Cisco and/or its affiliates. All rights reserved. 29
  • 30. !  On Cisco.com: http://www.cisco.com/go/tacops !  Email: tacops-info@cisco.com !  Facebook: Cisco TACOPS http://www.facebook.com/ cisco.tacops !  Twitter: @CiscoTACOPS © 2013 Cisco and/or its affiliates. All rights reserved. 30
  • 31. •  Cisco Tactical Operations: please engage with us and tour our vehicles! •  Network Enabled EOC Concept and Design •  IT/Security Considerations •  EOC Communications Suite Resiliency Redundancy Voice/Video/Data Interoperability •  Testing your solution © 2013 Cisco and/or its affiliates. All rights reserved. 31
  • 32. Thank you. © 2013 Cisco and/or its affiliates. All rights reserved. 32