SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
Critical Infrastructure Protection and interdependency issues:
industry vision within the EC framework approach
Fabio Bagnoli
D’Appolonia S.p.A.
AN ISO 9001 AND ISO 14001 CERTIFIED COMPANY
www.dappolonia.it
D’Appolonia S.p.A.
D’Appolonia is a major Italy-based engineering company that provides multidisciplinary
engineering consulting and design services to a great variety of public and private clients
The Company has been established by Dr. Elio D’Appolonia in 1956 in Pittsburgh
(Pennsylvania), and is present in Italy since 1981
In 1983 the Italian office, headquartered in Genoa, became the independent company
D’Appolonia S.p.A.
The company since December 2011 is part of the RINA Group
Engineering Services
D’Appolonia provides engineering and management services during the whole project
life cycle:









Feasibility studies and research
Conceptual design and project specifications
Preliminary and detailed design
Physical and virtual validation
Management of suppliers and system integration
Construction management and supervision
Commissioning and support to homologation and certification
Maintenance and operation
Company Offices
The “Origins”
 The European Council of June 2004 asked the Commission to prepare an
overall strategy to protect critical infrastructure. In response, the Commission
adopted on 20 October 2004 a Communication “Critical Infrastructure
Protection in the Fight Against Terrorism” putting forward clear suggestions on

what would enhance European prevention, preparedness and response to
terrorist attacks involving critical infrastructures.
 The Council conclusions on “Prevention, Preparedness and Response to

Terrorist Attacks” and the “EU Solidarity Programme on the Consequences of
Terrorist Threats and Attacks” adopted by Council in December 2004 endorsed
the intention of the Commission to propose a European Programme for Critical
Infrastructure Protection (EPCIP)
The “Pillars”

 European Programme for Critical Infrastructure Protection
 Adoption of Directive 2008/114/EC
 Financial measures to support the strategy
Critical Infrastrucutre Protection CIP
 CIP requires the active participation of the owners and operators of
infrastructure, regulators, professional bodies and industry associations in
cooperation with all levels of government, and the public.
 CIP is focused on the need to minimise risks to public health, safety and
confidence, ensure our economic security.

 The objectives of CIP are to identify critical infrastructure, analyse
vulnerability and interdependence, and protect from, and prepare for, all
hazards.
 As not all critical infrastructure can be protected from all threats,
appropriate risk management techniques should be used to determine
relative criticality, the level of protective security,
 The sharing of information relating to threats and vulnerabilities will assist
governments, and owners and operators of critical infrastructure to better
manage risk.
Support to Security Projects
The Commission provides two types of funding for security-related
projects:
 Operational, highly specific and policy-oriented activities are supported

by the Framework Programme on Security and Safeguarding Liberties,
which is composed of two specific programmes: Prevention,
Preparedness and Consequence Management of Terrorism and
Prevention of and Fight against Crime.
 Longer-term research is supported by the Security theme, under the 7th
Framework Programme (FP7), with a budget of EUR 1.4 billion for
2007-13.
The CIPS Programme
The Prevention, Preparedness and Consequence Management of
Terrorism and other Security-related Risks (CIPS) programme is
designed to protect citizens and critical infrastructures from terrorist
attacks and other security incidents.

The EU has allocated EUR 140 million for the period 2007–13 for
operational cooperation and coordination actions (strengthening
networking, mutual confidence and understanding, developing
contingency plans, exchanging and disseminating information,
experiences and best practices
Main Areas
 Prevention and Preparedness refers to measures aimed at
preventing and/or reducing risks linked to terrorism and other
security related risks.
 Consequence Management refers to the coordination of measures
taken in order to react to and to reduce the impact of the effects of a
security related incident, in particular resulting from terrorist attacks
in order to ensure a smooth coordination of crisis management and
security actions.
Expected Outcome

 Development of Instruments
 Common Framework
 Methods and techniques
 Exchange and Dissemination
Main Areas
 Prevention and Preparedness refers to measures aimed at
preventing and/or reducing risks linked to terrorism and other
security related risks.
 Consequence Management refers to the coordination of measures
taken in order to react to and to reduce the impact of the effects of a
security related incident, in particular resulting from terrorist attacks
in order to ensure a smooth coordination of crisis management and
security actions.
Our Vision
 Close cooperation with end users, public bodies and other
operators of Critical Infrastructures
 Strong synergies with industries providing technologies
 Definition and validation of new comprehensive methodologies for
all the analyses to be undertaken to assess threats, vulnerabilities
and risks, that could be offered to Critical Infrastructures operators
and other end users

 Interdependency issues needs a consolidated security culture and a
strong multidisciplinary approach
 Combination with deep competences in the involved domains
Security Culture

SECURITY APPROACH

PHYSICAL
SECURITY

TOOLS AND
FACILITIES

INFORMATION
SECURITY

SECURITY RISK
MANAGEMENT
Interdependency issue
 Interdependencies among Critical Infrastructures are complex and
need to be understood since disruptions in one infrastructure can
propagate into other infrastructures.
 Interdependencies between infrastructures, in fact, imply that an
impact on one infrastructure is also an impact on one or more other
interconnected infrastructures.

Focus on impact analysis within a
“multidomain” approach
Our involvement in CIPS projects
 Involvement in projects in different domains
 Cross fertilization among the different involved areas and their relevant
approaches
 Development of new harmonised methodologies and implementation of
supporting tools to propose to our customers
Transportation sector - EUMASS Project

 The EUMASS objective was the delivery of a unified and flexible solution
for risk assessment methodology to be applied by all European Mass
Transit operators.
 Main goal was to achieve an integrated process composed by the audit and
risk assessment methodologies supported by a software tool.
 An audit method was prepared to translate empirical evaluations into
objective inputs for the risk analysis models and to monitor them during the
system lifecycle.

 A semi-quantitative risk assessment methodology was developed to
continuously evaluate the risks associated to a system and to evaluate the
effectiveness of the implemented countermeasures.
 A software tool was developed to support the user along the whole
process.
Tools for operators - COBALT Project

 Main aim of the COBALT is to
provide CI operators and owners
with an instrument which will help in
defining the risk their infrastructures
are subject to.
 COBALT aims at providing endusers with an instrument that will
help them evaluating which
countermeasures are the most
effective to reduce the risks a CI is
subject to, from an implementation
and maintenance costs point of
view.
 Finally COBALT aims at developing
and instrument to evaluate the CI
security generating a report showing
the evaluated risks and the
countermeasures implemented.
Urban Security – MAPEX Project
 To develop a probabilistic mapping damage methodology for the assessment,
analysis and optimization of the security level of urban critical infrastructure
against external blast effects
 Simplified methodologies for analyzing 3D complex urban scenarios taking into
account urban layout, building characteristics and the existing interaction against
blast.
 To harmonized the outputs of the tools according to the key agents
engineers/architects/urban authorities/Security staff).

(Structural
Brussels
Podgorica
Beijing
Seoul
Cairo
Istanbul
St. Petersburg
Abu Dhabi

Rome
Milan
Viareggio
Naples
Brindisi
Palermo

D’Appolonia S.p.A.
Headquarters:
Via San Nazaro,19
16145 Genova – Italy
Tel. +39 010 3628148 Fax +39 010 3621078
E-mail: dappolonia@dappolonia.it
Web site http://www.dappolonia.it

Mais conteúdo relacionado

Destaque

[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-TerrorismChallenge:Future
 
Indian para special forces
Indian para special forcesIndian para special forces
Indian para special forcesBhanu Teja
 
20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactorPersonal Interactor
 
Guide amdec (très intéressant)
Guide amdec (très intéressant)Guide amdec (très intéressant)
Guide amdec (très intéressant)pascalbaudin
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 

Destaque (8)

[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism
 
Indian para special forces
Indian para special forcesIndian para special forces
Indian para special forces
 
20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor
 
Guide amdec (très intéressant)
Guide amdec (très intéressant)Guide amdec (très intéressant)
Guide amdec (très intéressant)
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Formation AMDEC
Formation AMDECFormation AMDEC
Formation AMDEC
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 

Semelhante a Critical Infrastructure Protection and Interdependency Issues

Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementchristophefeltus
 
European Risk Management Seminar 2018 - Cyber Report
European Risk Management Seminar 2018 - Cyber Report European Risk Management Seminar 2018 - Cyber Report
European Risk Management Seminar 2018 - Cyber Report FERMA
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Community Protection Forum
 
Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratorySalam Shah
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectTrilateral Research
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paperpteromys_volans
 
Img s sumary-paper_for_march19_meeting
Img s sumary-paper_for_march19_meetingImg s sumary-paper_for_march19_meeting
Img s sumary-paper_for_march19_meetingMarco Manso
 
ECE_CTCS_WP.6_2016_4E_GRM
ECE_CTCS_WP.6_2016_4E_GRMECE_CTCS_WP.6_2016_4E_GRM
ECE_CTCS_WP.6_2016_4E_GRMMarkus Krebsz
 
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014 Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014 ISERD Israel
 
Towards Quantification of Cyber Risk
Towards Quantification of Cyber RiskTowards Quantification of Cyber Risk
Towards Quantification of Cyber RiskKirstjen Nielsen
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationNUS-ISS
 
ELEMENTS OF RISK MANAGEMENT AND VALUE ENGINEERING
ELEMENTS OF RISK MANAGEMENT AND VALUE ENGINEERINGELEMENTS OF RISK MANAGEMENT AND VALUE ENGINEERING
ELEMENTS OF RISK MANAGEMENT AND VALUE ENGINEERINGAishwarya Phalke
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Glorisosegughana
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
 
EFFECTIVE RISK MANAGEMENT IN CONSTRUCTION PROJECTS
EFFECTIVE RISK MANAGEMENT IN CONSTRUCTION PROJECTSEFFECTIVE RISK MANAGEMENT IN CONSTRUCTION PROJECTS
EFFECTIVE RISK MANAGEMENT IN CONSTRUCTION PROJECTSvivatechijri
 
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdfWP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdfritikashinde6
 

Semelhante a Critical Infrastructure Protection and Interdependency Issues (20)

Salvi etpis pesi_02112010_reduced-obintcp
Salvi etpis pesi_02112010_reduced-obintcpSalvi etpis pesi_02112010_reduced-obintcp
Salvi etpis pesi_02112010_reduced-obintcp
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
WP6_2015_05E
WP6_2015_05EWP6_2015_05E
WP6_2015_05E
 
European Risk Management Seminar 2018 - Cyber Report
European Risk Management Seminar 2018 - Cyber Report European Risk Management Seminar 2018 - Cyber Report
European Risk Management Seminar 2018 - Cyber Report
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratory
 
Allignment of CIIP Structures
Allignment of CIIP StructuresAllignment of CIIP Structures
Allignment of CIIP Structures
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME project
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
 
Img s sumary-paper_for_march19_meeting
Img s sumary-paper_for_march19_meetingImg s sumary-paper_for_march19_meeting
Img s sumary-paper_for_march19_meeting
 
ECE_CTCS_WP.6_2016_4E_GRM
ECE_CTCS_WP.6_2016_4E_GRMECE_CTCS_WP.6_2016_4E_GRM
ECE_CTCS_WP.6_2016_4E_GRM
 
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014 Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
 
Towards Quantification of Cyber Risk
Towards Quantification of Cyber RiskTowards Quantification of Cyber Risk
Towards Quantification of Cyber Risk
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
ELEMENTS OF RISK MANAGEMENT AND VALUE ENGINEERING
ELEMENTS OF RISK MANAGEMENT AND VALUE ENGINEERINGELEMENTS OF RISK MANAGEMENT AND VALUE ENGINEERING
ELEMENTS OF RISK MANAGEMENT AND VALUE ENGINEERING
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
EFFECTIVE RISK MANAGEMENT IN CONSTRUCTION PROJECTS
EFFECTIVE RISK MANAGEMENT IN CONSTRUCTION PROJECTSEFFECTIVE RISK MANAGEMENT IN CONSTRUCTION PROJECTS
EFFECTIVE RISK MANAGEMENT IN CONSTRUCTION PROJECTS
 
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdfWP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
 

Mais de Community Protection Forum

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Community Protection Forum
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...Community Protection Forum
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachCommunity Protection Forum
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Community Protection Forum
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCommunity Protection Forum
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Community Protection Forum
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsCommunity Protection Forum
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesCommunity Protection Forum
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceCommunity Protection Forum
 

Mais de Community Protection Forum (20)

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security Projects & Projects Safety
Security Projects & Projects SafetySecurity Projects & Projects Safety
Security Projects & Projects Safety
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
 
Geomatics for Disaster Management and Survey
Geomatics for Disaster Management and SurveyGeomatics for Disaster Management and Survey
Geomatics for Disaster Management and Survey
 

Último

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Critical Infrastructure Protection and Interdependency Issues

  • 1. Critical Infrastructure Protection and interdependency issues: industry vision within the EC framework approach Fabio Bagnoli D’Appolonia S.p.A. AN ISO 9001 AND ISO 14001 CERTIFIED COMPANY www.dappolonia.it
  • 2. D’Appolonia S.p.A. D’Appolonia is a major Italy-based engineering company that provides multidisciplinary engineering consulting and design services to a great variety of public and private clients The Company has been established by Dr. Elio D’Appolonia in 1956 in Pittsburgh (Pennsylvania), and is present in Italy since 1981 In 1983 the Italian office, headquartered in Genoa, became the independent company D’Appolonia S.p.A. The company since December 2011 is part of the RINA Group
  • 3. Engineering Services D’Appolonia provides engineering and management services during the whole project life cycle:         Feasibility studies and research Conceptual design and project specifications Preliminary and detailed design Physical and virtual validation Management of suppliers and system integration Construction management and supervision Commissioning and support to homologation and certification Maintenance and operation
  • 5. The “Origins”  The European Council of June 2004 asked the Commission to prepare an overall strategy to protect critical infrastructure. In response, the Commission adopted on 20 October 2004 a Communication “Critical Infrastructure Protection in the Fight Against Terrorism” putting forward clear suggestions on what would enhance European prevention, preparedness and response to terrorist attacks involving critical infrastructures.  The Council conclusions on “Prevention, Preparedness and Response to Terrorist Attacks” and the “EU Solidarity Programme on the Consequences of Terrorist Threats and Attacks” adopted by Council in December 2004 endorsed the intention of the Commission to propose a European Programme for Critical Infrastructure Protection (EPCIP)
  • 6. The “Pillars”  European Programme for Critical Infrastructure Protection  Adoption of Directive 2008/114/EC  Financial measures to support the strategy
  • 7. Critical Infrastrucutre Protection CIP  CIP requires the active participation of the owners and operators of infrastructure, regulators, professional bodies and industry associations in cooperation with all levels of government, and the public.  CIP is focused on the need to minimise risks to public health, safety and confidence, ensure our economic security.  The objectives of CIP are to identify critical infrastructure, analyse vulnerability and interdependence, and protect from, and prepare for, all hazards.  As not all critical infrastructure can be protected from all threats, appropriate risk management techniques should be used to determine relative criticality, the level of protective security,  The sharing of information relating to threats and vulnerabilities will assist governments, and owners and operators of critical infrastructure to better manage risk.
  • 8. Support to Security Projects The Commission provides two types of funding for security-related projects:  Operational, highly specific and policy-oriented activities are supported by the Framework Programme on Security and Safeguarding Liberties, which is composed of two specific programmes: Prevention, Preparedness and Consequence Management of Terrorism and Prevention of and Fight against Crime.  Longer-term research is supported by the Security theme, under the 7th Framework Programme (FP7), with a budget of EUR 1.4 billion for 2007-13.
  • 9. The CIPS Programme The Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks (CIPS) programme is designed to protect citizens and critical infrastructures from terrorist attacks and other security incidents. The EU has allocated EUR 140 million for the period 2007–13 for operational cooperation and coordination actions (strengthening networking, mutual confidence and understanding, developing contingency plans, exchanging and disseminating information, experiences and best practices
  • 10. Main Areas  Prevention and Preparedness refers to measures aimed at preventing and/or reducing risks linked to terrorism and other security related risks.  Consequence Management refers to the coordination of measures taken in order to react to and to reduce the impact of the effects of a security related incident, in particular resulting from terrorist attacks in order to ensure a smooth coordination of crisis management and security actions.
  • 11. Expected Outcome  Development of Instruments  Common Framework  Methods and techniques  Exchange and Dissemination
  • 12. Main Areas  Prevention and Preparedness refers to measures aimed at preventing and/or reducing risks linked to terrorism and other security related risks.  Consequence Management refers to the coordination of measures taken in order to react to and to reduce the impact of the effects of a security related incident, in particular resulting from terrorist attacks in order to ensure a smooth coordination of crisis management and security actions.
  • 13. Our Vision  Close cooperation with end users, public bodies and other operators of Critical Infrastructures  Strong synergies with industries providing technologies  Definition and validation of new comprehensive methodologies for all the analyses to be undertaken to assess threats, vulnerabilities and risks, that could be offered to Critical Infrastructures operators and other end users  Interdependency issues needs a consolidated security culture and a strong multidisciplinary approach  Combination with deep competences in the involved domains
  • 14. Security Culture SECURITY APPROACH PHYSICAL SECURITY TOOLS AND FACILITIES INFORMATION SECURITY SECURITY RISK MANAGEMENT
  • 15. Interdependency issue  Interdependencies among Critical Infrastructures are complex and need to be understood since disruptions in one infrastructure can propagate into other infrastructures.  Interdependencies between infrastructures, in fact, imply that an impact on one infrastructure is also an impact on one or more other interconnected infrastructures. Focus on impact analysis within a “multidomain” approach
  • 16. Our involvement in CIPS projects  Involvement in projects in different domains  Cross fertilization among the different involved areas and their relevant approaches  Development of new harmonised methodologies and implementation of supporting tools to propose to our customers
  • 17. Transportation sector - EUMASS Project  The EUMASS objective was the delivery of a unified and flexible solution for risk assessment methodology to be applied by all European Mass Transit operators.  Main goal was to achieve an integrated process composed by the audit and risk assessment methodologies supported by a software tool.  An audit method was prepared to translate empirical evaluations into objective inputs for the risk analysis models and to monitor them during the system lifecycle.  A semi-quantitative risk assessment methodology was developed to continuously evaluate the risks associated to a system and to evaluate the effectiveness of the implemented countermeasures.  A software tool was developed to support the user along the whole process.
  • 18. Tools for operators - COBALT Project  Main aim of the COBALT is to provide CI operators and owners with an instrument which will help in defining the risk their infrastructures are subject to.  COBALT aims at providing endusers with an instrument that will help them evaluating which countermeasures are the most effective to reduce the risks a CI is subject to, from an implementation and maintenance costs point of view.  Finally COBALT aims at developing and instrument to evaluate the CI security generating a report showing the evaluated risks and the countermeasures implemented.
  • 19. Urban Security – MAPEX Project  To develop a probabilistic mapping damage methodology for the assessment, analysis and optimization of the security level of urban critical infrastructure against external blast effects  Simplified methodologies for analyzing 3D complex urban scenarios taking into account urban layout, building characteristics and the existing interaction against blast.  To harmonized the outputs of the tools according to the key agents engineers/architects/urban authorities/Security staff). (Structural
  • 20. Brussels Podgorica Beijing Seoul Cairo Istanbul St. Petersburg Abu Dhabi Rome Milan Viareggio Naples Brindisi Palermo D’Appolonia S.p.A. Headquarters: Via San Nazaro,19 16145 Genova – Italy Tel. +39 010 3628148 Fax +39 010 3621078 E-mail: dappolonia@dappolonia.it Web site http://www.dappolonia.it