SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Touristic Port Security

Riccardo Baldassarri
RINA Security Manager
CP Expo 2013, October 29th 2013 - Genova
Security Management
Services and References
RINA is a member of:
ISO International Standardization Organization T/C8 Working group supply
chain security (ISO 28000 standard)
CISM – Italian Committee for Maritime Security
UNI – Italian Standardization Body Technical Committee on Societal
RINA Maritime Security background
Security.
RINA is a Recognized Security Organization for many Flag Administrations
RINA is a recognized training center for Maritime Security training and
certification of Ship, Company and Port Facility Security Officer for Italy and
many flag administrations.
Maritime Security
Services
Maritime Security Management Services:
Ports and Terminal
Ship and Shipping Companies
Pleasure Port
Piracy.

RINA Maritime Security background

Ports:
Security Assessment and Plans.

Terminal and Touristic Ports:
Port Facility Security Assessment
Port Facility Security Plan
Drills
Training.
Ports and Port
Facilities Definitions
Port is any specified area of land and water containing works and
equipment designed to facilitate commercial maritime transport
operations, having within its boundaries one or more port facilities, for
which a security plan has been developed in compliance with the ISPS
Code, providing services to ships as defined by Regulation 2 of Chapter XIRINA Maritime Security background
2 of the SOLAS Convention.
Port Facility means a location, decided by the Contracting Government or
by the Designated Authority, where the ship/port interface takes place;
this includes areas such as anchorages, waiting berths and approaches
from seaward, as appropriate. In these locations the ISPS Code is
mandatory.
What is a Touristic Port?

A Touristic Port is a specified area of land and water containing works and
equipment designed to facilitate the recovery of pleasure vessels and
nautical tourists living on board, including berthing of large yachts, both for
private and commercial use, and tender services for cruise ships.
For the particular scope of service, normally it is located close to a touristic
area.
Commercial Port
Security Layout

COURTESY OF GENOVA PORT AUTHORITY
Commercial Port
Security Layout

COURTESY OF GENOVA PORT AUTHORITY

7
Port Boundaries
DIRECTIVE 2005/65/EC
(Port Security)
Touristic Port Layout
with ISPS CODE AREA

COURTESY OF MARINA DI PORTO CERVO
Cruise Ship at anchor
near a famous site

PORTOFINO

10
Cruise Ship tender
service and facility

11
Why ISPS Code in
Touristic Ports?

This is a sample of data relevant to the business of cruise ships and Mega
Yacht traffic where maritime security is mandatory for a Touristic Port
(ref. data for 2011 and 2012):
No. of Cruise ships at anchor: 194
Isps Mega Yachts interface: 145
Passengers in transit: 67,000.
Why ISPS Code in
Touristic Ports?

Consequently, for Touristic Port Managers the only way to maintain this
business opportunity was:
to comply with ISPS Code requirements during Cruise Ship and Mega Yacht
interface.
RINA Methodology
Review
1. Asset characterization
2. Threat Assessment
3. Vulnerability Analysis
4. Risk Assessment
5. Security Program

1. Identify critical assets
Evaluate existing measures
Evaluate severity of impacts
2. Characterize adversaries
in relation to target
attractiveness
3. Identify scenarios
Evaluate consequences
Evaluate effectiveness
Evaluate vulnerability
4. Evaluate risk
5. Identify measures
Prioritize actions.
RINA Methodology

COURTESY OF MARINA DI PORTO CERVO
Asset Protection
Standards

Use of mobile fencing during interfaces
Use of video analytics/intelligent video motion detection
Monitoring by security guards of access control and restricted area
CCTV covering total area with sensor devices, enhanced lighting, access
points guarded
Guard patrolling
Full vehicle search
Access of selected visitors only
Central Security Monitoring Center; etc.
CCTV Security
Monitoring System

COURTESY OF MARINA DI PORTO CERVO
Security Layout

COURTESY OF MARINA DI PORTO CERVO
Cruise Ship Tenders ISPS
Interface Restricted Area

ISPS CODE
RESTRICTED AREA

COURTESY OF MARINA DI PORTOFINO
Example of Restricted Area for
Mega Yacht/ Touristic Port
ISPS Interface

COURTESY OF VENICE YACHT PIER
Example of Restricted Area for
Mega Yacht/ Touristic Port
ISPS Interface

COURTESY OF VENICE YACHT PIER
ISPS Ship/ Touristic
Port Interface
Restricted Area Layout

COURTESY OF MARINA DI OLBIA
RINA Security Program
Security Administration & Organization
Personnel training
Drills & exercises
Records & documentation
Response to change in security level
Communications & Information System
Technical Security System & Equipment Maintenance
Access Procedures & Restricted areas
Security monitoring procedures
Security Incident procedures & investigation
Emergency Procedures
Search Procedures
Personnel Protection
Security Reporting & Performance Indicators.
ISPS THREAT LEVEL and
Touristic Ports

MARSEC LEVEL 3
MARSEC LEVEL 2
MARSEC LEVEL 1

CONFIRMATION

THREAT LEVEL
CHANGE
COMMUNICATION
DEACTIVATION

ISPS CODE LEVELS

NOTIFICATION

ACTIVATION

Designated
Authority

TOURISTIC PORT
PFSO

CORPORATE SECURITY
POLICY

EXAMPLE: CORPORATE
THREAT LEVELS

Severe
High
Medium
Low

MARSEC Level 1: Minimum appropriate measures shall be maintained at all times (may correspond to Low or Medium).
MARSEC Level 2: Appropriate additional protective measures shall be maintained for a period of time as a result of
heightened risk of a transportation security incident. (corresponds to Threat Level High).
MARSEC Level 3: Further specific protective security measures shall be maintained for a limited period of time when an
incident is probable, imminent, or has occurred. (corresponds to Threat Level Severe).
Company Threat Level may change when MARSEC Level changes, depending on Company risk assessment, with adoption
of temporary security measures.
Thank you for your
attention

Mais conteúdo relacionado

Mais procurados

Isps code guidelines
Isps code guidelinesIsps code guidelines
Isps code guidelines
nwvirus
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
Noel Tan
 
Anti ship piracy training
Anti ship piracy trainingAnti ship piracy training
Anti ship piracy training
Noel Tan
 
Intro to basic safety and seamanship2
Intro to basic safety and seamanship2Intro to basic safety and seamanship2
Intro to basic safety and seamanship2
Pat Cabangis
 
B. security levels
B. security levelsB. security levels
B. security levels
Noel Tan
 

Mais procurados (20)

Isps code guidelines
Isps code guidelinesIsps code guidelines
Isps code guidelines
 
Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)Emsa advanced ship security training 18 20 may 2016 web (1)
Emsa advanced ship security training 18 20 may 2016 web (1)
 
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
Effectiveness of isps code in addressing maritime insecurity by caleb danladi...
 
Maritime security operative isps
Maritime security operative ispsMaritime security operative isps
Maritime security operative isps
 
Role of ism code in promoting maritime safety by caleb danladi bako
Role of ism code in promoting maritime safety by caleb danladi bakoRole of ism code in promoting maritime safety by caleb danladi bako
Role of ism code in promoting maritime safety by caleb danladi bako
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
 
Isps (1)
Isps (1)Isps (1)
Isps (1)
 
Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)Ship Security Training Manual (Sample)
Ship Security Training Manual (Sample)
 
Anti ship piracy training
Anti ship piracy trainingAnti ship piracy training
Anti ship piracy training
 
What are ISPS Charges
What are ISPS ChargesWhat are ISPS Charges
What are ISPS Charges
 
Maritime Security and Security Responsibilities
Maritime Security and Security ResponsibilitiesMaritime Security and Security Responsibilities
Maritime Security and Security Responsibilities
 
Solas assigment
Solas  assigmentSolas  assigment
Solas assigment
 
STCW Basic Safety Training
STCW Basic Safety TrainingSTCW Basic Safety Training
STCW Basic Safety Training
 
Beluga sea piracy training
Beluga sea piracy trainingBeluga sea piracy training
Beluga sea piracy training
 
Life saving signals
Life saving signalsLife saving signals
Life saving signals
 
On board safety
   On board safety    On board safety
On board safety
 
Anti Piracy Solutions
Anti Piracy SolutionsAnti Piracy Solutions
Anti Piracy Solutions
 
Intro to basic safety and seamanship2
Intro to basic safety and seamanship2Intro to basic safety and seamanship2
Intro to basic safety and seamanship2
 
B. security levels
B. security levelsB. security levels
B. security levels
 
Safety awareness training program
Safety awareness training programSafety awareness training program
Safety awareness training program
 

Destaque (6)

Brad Williams - Building Maritime Capabilities 2010
Brad Williams - Building Maritime Capabilities 2010Brad Williams - Building Maritime Capabilities 2010
Brad Williams - Building Maritime Capabilities 2010
 
Malaysia (asian cuisine)
Malaysia  (asian cuisine)Malaysia  (asian cuisine)
Malaysia (asian cuisine)
 
Engine quiz
Engine quizEngine quiz
Engine quiz
 
Crowd Management
Crowd ManagementCrowd Management
Crowd Management
 
A Short Note on ISPS Code
A Short Note on ISPS CodeA Short Note on ISPS Code
A Short Note on ISPS Code
 
ISPS Code
ISPS CodeISPS Code
ISPS Code
 

Semelhante a Touristic Port Security

NOVIKONTAS_Group_presentation
NOVIKONTAS_Group_presentationNOVIKONTAS_Group_presentation
NOVIKONTAS_Group_presentation
Vladimir Efimov
 
Regs4ships Presentation 2010
Regs4ships Presentation 2010Regs4ships Presentation 2010
Regs4ships Presentation 2010
RichardEastham
 
Sai sts transhipment solutions
Sai sts transhipment solutionsSai sts transhipment solutions
Sai sts transhipment solutions
Ayu Anira
 
SAI STS Transhipment Solutions
SAI STS Transhipment SolutionsSAI STS Transhipment Solutions
SAI STS Transhipment Solutions
Ayu Anira
 
Presentation of Nicola Pusceddu Region of Sardinia, OPTIMED project
Presentation of Nicola Pusceddu Region of Sardinia, OPTIMED projectPresentation of Nicola Pusceddu Region of Sardinia, OPTIMED project
Presentation of Nicola Pusceddu Region of Sardinia, OPTIMED project
ASCAME
 

Semelhante a Touristic Port Security (20)

Medi-Cube Final Event Digital Marina
Medi-Cube Final Event Digital MarinaMedi-Cube Final Event Digital Marina
Medi-Cube Final Event Digital Marina
 
port technologies
port technologies port technologies
port technologies
 
i-ship brochure
i-ship brochurei-ship brochure
i-ship brochure
 
iShip Inlecom Systems
iShip Inlecom SystemsiShip Inlecom Systems
iShip Inlecom Systems
 
Chemical tankers
Chemical tankersChemical tankers
Chemical tankers
 
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
 
NOVIKONTAS_Group_presentation
NOVIKONTAS_Group_presentationNOVIKONTAS_Group_presentation
NOVIKONTAS_Group_presentation
 
SATELLITE AIS FOR GLOBAL MARITIME TRAFFIC MONITORING
SATELLITE AIS FOR GLOBAL MARITIME TRAFFIC MONITORINGSATELLITE AIS FOR GLOBAL MARITIME TRAFFIC MONITORING
SATELLITE AIS FOR GLOBAL MARITIME TRAFFIC MONITORING
 
Port Vessel Assurance Service by Clive Sheard
Port Vessel Assurance Service by Clive Sheard   Port Vessel Assurance Service by Clive Sheard
Port Vessel Assurance Service by Clive Sheard
 
Regs4ships Presentation 2010
Regs4ships Presentation 2010Regs4ships Presentation 2010
Regs4ships Presentation 2010
 
IRJET - Boat Localization and Alert System for Border Identification usin...
IRJET -  	  Boat Localization and Alert System for Border Identification usin...IRJET -  	  Boat Localization and Alert System for Border Identification usin...
IRJET - Boat Localization and Alert System for Border Identification usin...
 
SMi Group's Border Security 2019
SMi Group's Border Security 2019SMi Group's Border Security 2019
SMi Group's Border Security 2019
 
Management of shipping (1)
Management of shipping (1)Management of shipping (1)
Management of shipping (1)
 
Maritime cyber security threats & consequence part 2
Maritime cyber security  threats & consequence part 2Maritime cyber security  threats & consequence part 2
Maritime cyber security threats & consequence part 2
 
UKHO - Simon Hampshire - Situational Awareness - Any Time, Any Place, Anywhere
UKHO - Simon Hampshire - Situational Awareness - Any Time, Any Place, AnywhereUKHO - Simon Hampshire - Situational Awareness - Any Time, Any Place, Anywhere
UKHO - Simon Hampshire - Situational Awareness - Any Time, Any Place, Anywhere
 
Sai sts transhipment solutions
Sai sts transhipment solutionsSai sts transhipment solutions
Sai sts transhipment solutions
 
SAI STS Transhipment Solutions
SAI STS Transhipment SolutionsSAI STS Transhipment Solutions
SAI STS Transhipment Solutions
 
REPORT OF THE 3RD MEETING OF PMAWCA HARBOUR MASTERS’ NETWORK,
REPORT OF THE 3RD MEETING OF PMAWCA HARBOUR MASTERS’ NETWORK,REPORT OF THE 3RD MEETING OF PMAWCA HARBOUR MASTERS’ NETWORK,
REPORT OF THE 3RD MEETING OF PMAWCA HARBOUR MASTERS’ NETWORK,
 
SOCAR Trading and PurpleTRAC Case Study
SOCAR Trading and PurpleTRAC Case StudySOCAR Trading and PurpleTRAC Case Study
SOCAR Trading and PurpleTRAC Case Study
 
Presentation of Nicola Pusceddu Region of Sardinia, OPTIMED project
Presentation of Nicola Pusceddu Region of Sardinia, OPTIMED projectPresentation of Nicola Pusceddu Region of Sardinia, OPTIMED project
Presentation of Nicola Pusceddu Region of Sardinia, OPTIMED project
 

Mais de Community Protection Forum

Mais de Community Protection Forum (20)

The Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in CyberspaceThe Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in Cyberspace
 
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security Projects & Projects Safety
Security Projects & Projects SafetySecurity Projects & Projects Safety
Security Projects & Projects Safety
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Touristic Port Security

  • 1. Touristic Port Security Riccardo Baldassarri RINA Security Manager CP Expo 2013, October 29th 2013 - Genova
  • 2. Security Management Services and References RINA is a member of: ISO International Standardization Organization T/C8 Working group supply chain security (ISO 28000 standard) CISM – Italian Committee for Maritime Security UNI – Italian Standardization Body Technical Committee on Societal RINA Maritime Security background Security. RINA is a Recognized Security Organization for many Flag Administrations RINA is a recognized training center for Maritime Security training and certification of Ship, Company and Port Facility Security Officer for Italy and many flag administrations.
  • 3. Maritime Security Services Maritime Security Management Services: Ports and Terminal Ship and Shipping Companies Pleasure Port Piracy. RINA Maritime Security background Ports: Security Assessment and Plans. Terminal and Touristic Ports: Port Facility Security Assessment Port Facility Security Plan Drills Training.
  • 4. Ports and Port Facilities Definitions Port is any specified area of land and water containing works and equipment designed to facilitate commercial maritime transport operations, having within its boundaries one or more port facilities, for which a security plan has been developed in compliance with the ISPS Code, providing services to ships as defined by Regulation 2 of Chapter XIRINA Maritime Security background 2 of the SOLAS Convention. Port Facility means a location, decided by the Contracting Government or by the Designated Authority, where the ship/port interface takes place; this includes areas such as anchorages, waiting berths and approaches from seaward, as appropriate. In these locations the ISPS Code is mandatory.
  • 5. What is a Touristic Port? A Touristic Port is a specified area of land and water containing works and equipment designed to facilitate the recovery of pleasure vessels and nautical tourists living on board, including berthing of large yachts, both for private and commercial use, and tender services for cruise ships. For the particular scope of service, normally it is located close to a touristic area.
  • 6. Commercial Port Security Layout COURTESY OF GENOVA PORT AUTHORITY
  • 7. Commercial Port Security Layout COURTESY OF GENOVA PORT AUTHORITY 7
  • 9. Touristic Port Layout with ISPS CODE AREA COURTESY OF MARINA DI PORTO CERVO
  • 10. Cruise Ship at anchor near a famous site PORTOFINO 10
  • 11. Cruise Ship tender service and facility 11
  • 12. Why ISPS Code in Touristic Ports? This is a sample of data relevant to the business of cruise ships and Mega Yacht traffic where maritime security is mandatory for a Touristic Port (ref. data for 2011 and 2012): No. of Cruise ships at anchor: 194 Isps Mega Yachts interface: 145 Passengers in transit: 67,000.
  • 13. Why ISPS Code in Touristic Ports? Consequently, for Touristic Port Managers the only way to maintain this business opportunity was: to comply with ISPS Code requirements during Cruise Ship and Mega Yacht interface.
  • 14. RINA Methodology Review 1. Asset characterization 2. Threat Assessment 3. Vulnerability Analysis 4. Risk Assessment 5. Security Program 1. Identify critical assets Evaluate existing measures Evaluate severity of impacts 2. Characterize adversaries in relation to target attractiveness 3. Identify scenarios Evaluate consequences Evaluate effectiveness Evaluate vulnerability 4. Evaluate risk 5. Identify measures Prioritize actions.
  • 15. RINA Methodology COURTESY OF MARINA DI PORTO CERVO
  • 16. Asset Protection Standards Use of mobile fencing during interfaces Use of video analytics/intelligent video motion detection Monitoring by security guards of access control and restricted area CCTV covering total area with sensor devices, enhanced lighting, access points guarded Guard patrolling Full vehicle search Access of selected visitors only Central Security Monitoring Center; etc.
  • 17. CCTV Security Monitoring System COURTESY OF MARINA DI PORTO CERVO
  • 18. Security Layout COURTESY OF MARINA DI PORTO CERVO
  • 19. Cruise Ship Tenders ISPS Interface Restricted Area ISPS CODE RESTRICTED AREA COURTESY OF MARINA DI PORTOFINO
  • 20. Example of Restricted Area for Mega Yacht/ Touristic Port ISPS Interface COURTESY OF VENICE YACHT PIER
  • 21. Example of Restricted Area for Mega Yacht/ Touristic Port ISPS Interface COURTESY OF VENICE YACHT PIER
  • 22. ISPS Ship/ Touristic Port Interface Restricted Area Layout COURTESY OF MARINA DI OLBIA
  • 23. RINA Security Program Security Administration & Organization Personnel training Drills & exercises Records & documentation Response to change in security level Communications & Information System Technical Security System & Equipment Maintenance Access Procedures & Restricted areas Security monitoring procedures Security Incident procedures & investigation Emergency Procedures Search Procedures Personnel Protection Security Reporting & Performance Indicators.
  • 24. ISPS THREAT LEVEL and Touristic Ports MARSEC LEVEL 3 MARSEC LEVEL 2 MARSEC LEVEL 1 CONFIRMATION THREAT LEVEL CHANGE COMMUNICATION DEACTIVATION ISPS CODE LEVELS NOTIFICATION ACTIVATION Designated Authority TOURISTIC PORT PFSO CORPORATE SECURITY POLICY EXAMPLE: CORPORATE THREAT LEVELS Severe High Medium Low MARSEC Level 1: Minimum appropriate measures shall be maintained at all times (may correspond to Low or Medium). MARSEC Level 2: Appropriate additional protective measures shall be maintained for a period of time as a result of heightened risk of a transportation security incident. (corresponds to Threat Level High). MARSEC Level 3: Further specific protective security measures shall be maintained for a limited period of time when an incident is probable, imminent, or has occurred. (corresponds to Threat Level Severe). Company Threat Level may change when MARSEC Level changes, depending on Company risk assessment, with adoption of temporary security measures.
  • 25. Thank you for your attention