SlideShare uma empresa Scribd logo
1 de 45
An Introduction to
Emergency
Preparedness
Michigan SBDC Customer Groups
Four customer groups are served by the SBDC:
• New ventures
• Existing businesses
• Growth companies
• Advanced technology companies
Michigan SBDC Services
Four core services are provided by the SBDC:
• No cost 1:1 consulting
• Business education
• Information based planning through
(secondary) market research
• Technology commercialization
Michigan SBDC Teams
Four teams of consultants provide services for the
SBDC:
• Small Business Team
• Business Growth Team
• Export Assistance Team
• Technology Commercialization Team
Michigan SBDC Business Education
Take advantage of these learning opportunities for Entrepreneurs.
Whether online or at your local MISBDC office, the following trainings
are presented by experienced professionals who can help you start and
grow your business. Select from the range of topics where and when
you need them. Registration is easy: www.SBDCMichigan.org
• Starting a Business
• Business Plan
• Financial and Accounting
• Customer Relations
• Government Contracting
• Internet and Social Media
• Legal
• Management
• Marketing and Sales
The Michigan SBDC is funded through a cooperative agreement
with the U.S. Small Business Administration (SBA), the Michigan
Economic Development Corporation (MEDC) and matching
funds from Local Network partners in each region.
The Michigan SBDC
Michigan SBDC State Lead Center
Grand Valley State University
Seidman College of Business
Ian Rogers – Training Manager
www.SBDCMichigan.org
Jerry Becker
Director CCEMHSD Background/Bio
• 1979 – 2008 Police Officer/ Sheriff’s Deputy/ Deputy Marshal Michigan, Texas,
Colorado. Retired 2015.
• 1989 – 2010 Fire Marshal, Captain – Retired 2010. Fire/Haz Mat/ Emergency
Vehicle Driving Instructor – MFFTC/ Current.
• 2009 – Present Clare County Emergency Management/Homeland Security
Director, Director Clare County Broadband Network Users Group, Oversee
Clare County Public Safety Communications Systems.
• FEMA NIMS Certified, MICIMS WEBEOC Instructor/ PEM Professional
Emergency Manager EMHSD – MSP, Local RIC Intelligence Officer R6, Vice
Chair Region 6 Homeland Security Division , Member of West Michigan Cyber
Security Consortium.
Emergency Management:
Who we are and what we do
The Five Phases of
Emergency Management
1. Protection (Prevention)
2. Preparedness
3. Response
4. Recovery
5. Mitigation
Emergency Management Basics
A Snapshot
• (No Two EM Programs are identical).
• Develops and maintains the counties EAG/EOP or
Emergency Action Plan.
• Responsible for Administration, Planning, Coordination
and operation of all Emergency Preparedness activities in
Jurisdiction.
• Liaison with State (MSP District Homeland Security
Division, and Federal DHS and other agencies.
• Coordinates training countywide, recruitment and
training of volunteers.
Emergency Management Basics
• Coordinate Public education, Preparedness activities, Which
may include Business Planning assistance, And Including
school drills, HB4713.
• Conduct Exercises and Drills to test capabilities and identify
gaps and THIRA (Threat Hazard Identification and Risk
Assessment).
• Conduct the activity of all other public and private agencies
engaged in any emergency or disaster and relief programs.
• Negotiate and establish buildings and facilities for disaster
relief efforts such as shelters etc.
• Coordinate and issue alerts and public notification including
emergency services agencies.
• Be responsible for administration of any Homeland Security
Activities that affect local jurisdiction.
EM Authorities; P.A. 390 of 1976
• State of Michigan Emergency Management Act.
• Formally established Emergency Management.
• Clare County Established Emergency Management
formally by Resolution on September 04, 1979 and
Amended December 20, 1982 Section 402.
• Formerly known as “Civil Defense”.
• Pub 102 “The Michigan Emergency Management Act”
Requires that any municipality of 25,000 or more shall
appoint an
P.A. 390 continued
• EM coordinator, Further any community with a
population of 10,000 or more may appoint an
Emergency Management Coordinator,
• Or A municipality of 10,000 or more may also
choose to operate under the Counties Plan and
operating procedures.
• A Public College or University with a combined
average population of 25,000 shall appoint an
EM coordinator.
• Then in 2001 the world and the U.S. Changed..
9/11
Or This in 2005
Disaster Facts
• Hurricane Katrina; August 29th, 2005.
• 175MPH + winds.
• 1,833 Deaths, 108 + Billion dollars damage, 80%
New Orleans flooded.
• Joplin Mo. EF5 Tornado 200-322 MPH Winds; May
22nd 2011, 5:34P.M. est., 160+ Deaths, $2.8 Billion
damage, 75% Joplin Damaged or destroyed, 7000
Homes, Including Medical center.
• 911 Terrorist attacks; September 11th 2001, 8:46
A.M. est. 2,996 Deaths, $Billions in damage.
• HSPD-8 Homeland Security/ National Preparedness
Directive.
• Post-Katrina Emergency Management Reform Act
of 2006 (PKEMRA)
The Biggest Threats
• Floods and Weather are the biggest threats
currently.
• Floods/Related kill more people and cause more
property damage worldwide each year than any
other event!
• The average U.S. Annual flood losses in the past
10 years were more than $2.9+ Billion.
• Terrorist Attacks either HVE’s or International.
• CYBER ATTACK!
Michigan’s Disaster History
Declarations since 1990.
• 42+ Governor declared disasters and
emergencies.
• 13+ Presidential, (9) Major, 4 Emergencies.
• (1) Fire Suppression.
• Virtually every county in Michigan has
experienced a disaster event!
• Unfortunately it is not if, but when.
In A Distaster
• The Emergency Management Director;
• Advises the CEO for local declaration “State of
Emergency”.
• Activates the EOC.
• Prepares and forwards request for “State
declaration” to the Governor.
• Finally if needed coordinates with Governor
and other public officials to obtain via the
Governor a “Presidential Disaster Declaration”.
• All these processes begin mobilization of
Material and financial resources to name a few,
to help our communities recover.
The Declaration Process in Brief
1. Local incident occurs, PDA - 72 hours takes
place, Local officials notified.
2. Local EM/CEO coordinate and issue “State of
Emergency” and request State and Federal
assistance.
3. State analyzes data, etc. pushes up to
Governor to “Issue State of Emergency” “State
of Disaster”.
4. Governor pushes up to FEMA Region V and
makes request/recommendation to President.
5. President either declares or denies.
ARE YOU
PREPARED?
Section# 2 COOP & COG
Today's Security Threats
1. Cyber attack from within U.S. or Outside.
2. “Lone Wolf” HVE’s Active Threats or
Bombers.
3. Terrorism U.S. Grown or Outside Self
Radicalized.
4. Intellectual or Economic Theft, and or
corporate espionage.
Cybersecurity: A definition
Cybersecurity is the body of technologies, processes, and
practices designed to protect networks, computers,
programs,
and data from attack, damage, or unauthorized access.
Cybercrime
Cybercrime is any violation of federal, state, or local statute
or malicious or suspicious activity in which a computer, a
network, or a device is an integral component of the
violation.
DATA BREACHES BY TYPE:
• Identity Theft remains the primary type of breach, accounting for
75% of all records compromised and slightly more than half 53% of
data breaches in the first half of 2015.
• Government and Healthcare sectors accounted for about two
thirds of compromised data records (31% and 34% respectively),
Healthcare accounted for 21%Retail accounted for 4%.
• Your Credit Card data is worth about >$1.85, Your Personal
Medical/Health Record is worth as much as <$300.00 per copy.
• The U.S. Accounted for (76%) of data breaches.
• Configger/Conficker Virus in XP machines/Networks.
• The Deep Web – The Dark Web.
Examples: Cyber/Breach
Events
• Staples Hack - The data breach at the Staples office-
supply chain may have affected roughly 1.16 million
payment cards as criminals deployed malware to
point-of-sale systems at 115 stores.
• Home Depot Hack - As Home Depot continues to
assess the damage caused by a security breach that
gave hackers access to 56 million credit and debit
cards, tech experts say large retailers should turn
their attention to addressing breaches quickly
instead of trying to prevent all of them On February
4, 2015, *
• Anthem, Inc., the nation’s second-largest health
insurer, reported hackers broke into and stole a
database containing the personal information of
approximately 80 million customers and
employees.1 Although industry watchers do not
believe that this incident resulted in the loss of
personal health information, 5-8Mil.
• Yahoo Data Breach 2014 Revealed 2016 1+Bil.
Passwords and personal information stolen.
POS SYSTEMS
What is phishing?
Phishing is the act of sending an e-mail to a user
falsely claiming to be a legitimate enterprise in an
attempt to scam the user into surrendering private
information that could be used for identity theft.
Beware of Phishing Schemes
DearWebmail User,
Your webmail account quota has exceededstorage limit; to avoid the blockage
of your webmail account you are to re-validate your webmail account to upgrade
your webmail quota for unlimited usage re-validate here
Failure to do this, will result in limited access toyour mailbox.
Sincerely Web Administrator.
White House Help Desk
P.S.: This is an auto-generated message. Please do not reply to this email.
Webmail Administrator <mrdavidmartins55@gmail.com>
43 percent of companies were immediately
put out of business by a “major loss” of
computer records, and another 51 percent
permanently closed their doors within two
years — leaving a mere six percent “survival”.
What Can I Do To Protect
Myself?
• Task 1 Practice Good online safety
and security. Dispose of equipment
such as Hard drives and data
appropriately. (Good Housekeeping).
“Backups”.
• Task 2 Keep updates and software
patches current, Don’t download
anything you are unsure or suspect
of. When using Social Media Sites;
Remember ANYTHING YOU POST IS
POTENTIALLY AVAILABLE TO
EVERYONE! (Pictures & Location
Information) *Watering Holes.
• Task 3 Maintain Malware, Spyware,
and Anti-Virus Programs (Up to Date)
On All Devices. Practice Safe Internet!
Task 1
Task 2
Task 3
Business Continuity Planning
Emergencies are unplanned events that can cause significant injury, or even
death, to employees, customers, or the public, disrupt or close down
operations, cause physical or environmental damage, or harm the organization’s
public image. The changing threat paradigm and recent emergencies, including
acts of nature, technological emergencies, civil disturbances, and terrorist
incidents have shifted public awareness, most importantly, business owners and
managers, to the need for an all hazards emergency plan or continuity of
operations (COOP) plan.
A COOP plan addresses emergencies from an all hazards approach. The COOP
plan is designed to establish policy and guidance to ensure the execution of
mission essential functions and to direct the relocation of personnel and
resources to an alternate facility capable of supporting operations. The plan
should develop procedures for alerting, notifying, activating and deploying
employees; identify mission essential functions; establish an alternate facility;
and roster personnel with authority and knowledge of functions.
COOP Primary Elements
Core Components of Plan (many of these will be a separate
annex in the plan)
1. Plans and Procedures
2. Mission Essential Functions
3. Delegations of Authority
4. Orders of Succession
5. Alternate Facilities
6. Interoperable Communications
7. Vital Records and Databases
8. Logistics and Administration
9. Personnel Issues and Coordination
10. Security
11. Testing, Training and Exercising
12. Program Management
Additional Cyber/Personal Security
Information Sites
• www.stcguide.com
• www.dhs.gov/stopthinkconnect
• www.uscert.com
• www.infragard.org
• www.michiganicac.com
• https://smallbusinessbigthreat.com/
• www.merit.edu/cyberrange
http://www.dhs.gov/publication/isc-occupant-emergency-programs-guide
Run, Hide, Fight video with closed captioning option:
http://www.fbi.gov/about-us/cirg/active-shooter-and-mass-casualty-incidents/run-
hide-fight-video
To report a computer security incident, either contact US-CERT at
888-282-0870, or go to https://forms.uscert.gov/report/ and
complete the US-CERT Incident Reporting System form.
Additional Resources
• www.ready.gov
• www.preparemybusiness.org/
• www.clareco.net/emergency_services/
• www.noaa.gov
• www.smart911.com
• www.do1thing.com
• www.michiganicac.com
ARE YOU
PREPARED?
Section #2 Active Threat/Shooter
An “Active Shooter” is an individual actively engaging in killing or
attempting to kill people in a confined and populated area; in
most cases, active shooters use firearm(s) and there is no pattern
or method to their selection of victims.
Active Shooter situations are unpredictable and evolve quickly.
Typically, the immediate deployment of Law Enforcement is
required to stop the shooting and mitigate harm to victims.
Because Active Shooter incidents are often over within 5-15
minutes, before Law Enforcement arrives on the scene,
individuals must be prepared both mentally and physically to deal
with an active shooter situation.
PROFILE OF AN ACTIVE SHOOTER
11 Million
Seriously
Mentally
ill in
America
as of 2015
James Holmes 24 killed 12 people and injured more than 70 others
when he opened fire on a midnight showing of The Dark Knight
Rises at a Century 16 multiplex in Aurora, Colorado on July 20, 2012
“He was a bit of a prodigy. After he finished his assignments in fifth grade, he
and a classmate filled the time writing code and building a website for the
school. His teacher, impressed, called him a Renaissance child."
Active Threat
TERMINOLOGY FOR EMERGENCY MODES
OUTSIDE THREAT MODE
(DANGER IS OUTSIDE BUILDING)
1. Outside Threat Mode is announced. If outside, enter building immediately.
2. Staff, make sure all exterior doors and windows are closed and locked.
3. Do not let anyone in or out of the building.
4. Continue business as usual inside the building.
5. Staff may use phones to contact the office if anything suspicious is noticed.
6. This mode will end when the office is notified by Law Enforcement to give
the All Clear over the PA, Radio or in Person.
LOCKDOWN MODE
(DANGER IS INSIDE BUILDING)
1. Lockdown Mode is announced. If you are outside, do not enter the building.
2. Staff, quickly check the hall for visitors.
3. Lock and close your door. (barricade if possible)
4. Turn lights off if possible and close windows and blinds.
5. Hide out of sight and be quiet.
6. Phones should not be used other than by staff to receive emergency text
messages from Public Safety.
7. Do not open door for anyone. Wait until Law Enforcement enters your room
and places you into Secure Mode (outlined below).
SECURE MODE
(LAW ENFORCEMENT IS STILL CLEARING BUILDING)
1. Secure Mode shall be announced to each room by Law Enforcement.
2. Lights can be turned on.
3. Classroom instruction may resume if possible.
4. Doors will remain locked.
5. Nobody shall be roaming the halls.
Listen for All Clear to be given over the PA, Radio or in Person.
Active Threat Conclusions
1. Make a plan, Work with local agencies.
2. Train your people.
3. Drill/Exercise, No “Got Ya” Moments
4. Take it seriously.
5. Be flexible and willing to adapt your plan as the
need arises and conditions change.
6. STAY SAFE!
On Guard
• Local Law Enforcement
• Mi-OC Michigan Intelligence Center
• DHS Department of Homeland security
• Local Emergency Management/EMHSD
• FBI
• NSA
• Secret Service
• Michigan State Police
Contact Information
• Jerry Becker – Clare County Emergency
Management Director.
• Clare County Emergency Management 225 West
Main Street Harrison, MI 48625.
• Office Phone: 989-539-6161.
• Email: beckerj@clareco.net/ Website:
http://www.clareco.net/emergency_services/
Thank You!
Questions and Answers

Mais conteúdo relacionado

Destaque

Emergency Preparedness
Emergency PreparednessEmergency Preparedness
Emergency Preparednessexpertsows
 
The State Of Emergency Preparedness on 9/11/14: Are We Ready?
The State Of Emergency Preparedness on 9/11/14: Are We Ready?The State Of Emergency Preparedness on 9/11/14: Are We Ready?
The State Of Emergency Preparedness on 9/11/14: Are We Ready?Nicholas Kman, MD, FACEP
 
Emergency tray
Emergency trayEmergency tray
Emergency traySn Taurus
 
Cooking merit badge (2016)
Cooking merit badge (2016)Cooking merit badge (2016)
Cooking merit badge (2016)Brian Brown
 
Emergency Department/Hospital Inpatient Initiative
Emergency Department/Hospital Inpatient InitiativeEmergency Department/Hospital Inpatient Initiative
Emergency Department/Hospital Inpatient InitiativeGroup Health Cooperative
 
Safe and legal traffic stops 2014
Safe and legal traffic stops 2014Safe and legal traffic stops 2014
Safe and legal traffic stops 2014Mdunnam
 
Boy Scouts Photography Merit Badge Course
Boy Scouts Photography Merit Badge CourseBoy Scouts Photography Merit Badge Course
Boy Scouts Photography Merit Badge Courseronm2
 
Earthquake preparedness ppt
Earthquake preparedness pptEarthquake preparedness ppt
Earthquake preparedness pptAlexcisMelendez
 
Earthquake Presentation
Earthquake PresentationEarthquake Presentation
Earthquake PresentationRyan Cataga
 
Haywood Fitness - Presentation for Eagle Scouts Personal Fitness Merit Badge
Haywood Fitness - Presentation for Eagle Scouts Personal Fitness Merit BadgeHaywood Fitness - Presentation for Eagle Scouts Personal Fitness Merit Badge
Haywood Fitness - Presentation for Eagle Scouts Personal Fitness Merit BadgeDustin Haywood
 
The crash cart
The crash cartThe crash cart
The crash cartJaber Nami
 
Citizenship in the nation-Merit Badge Course
Citizenship in the nation-Merit Badge CourseCitizenship in the nation-Merit Badge Course
Citizenship in the nation-Merit Badge CourseTodd Cella
 

Destaque (14)

Boy scout transition
Boy scout transitionBoy scout transition
Boy scout transition
 
Emergency Preparedness
Emergency PreparednessEmergency Preparedness
Emergency Preparedness
 
The State Of Emergency Preparedness on 9/11/14: Are We Ready?
The State Of Emergency Preparedness on 9/11/14: Are We Ready?The State Of Emergency Preparedness on 9/11/14: Are We Ready?
The State Of Emergency Preparedness on 9/11/14: Are We Ready?
 
Emergency tray
Emergency trayEmergency tray
Emergency tray
 
Cooking merit badge (2016)
Cooking merit badge (2016)Cooking merit badge (2016)
Cooking merit badge (2016)
 
Emergency Department/Hospital Inpatient Initiative
Emergency Department/Hospital Inpatient InitiativeEmergency Department/Hospital Inpatient Initiative
Emergency Department/Hospital Inpatient Initiative
 
Safe and legal traffic stops 2014
Safe and legal traffic stops 2014Safe and legal traffic stops 2014
Safe and legal traffic stops 2014
 
Boy Scouts Photography Merit Badge Course
Boy Scouts Photography Merit Badge CourseBoy Scouts Photography Merit Badge Course
Boy Scouts Photography Merit Badge Course
 
Citizenship In The World
Citizenship In The WorldCitizenship In The World
Citizenship In The World
 
Earthquake preparedness ppt
Earthquake preparedness pptEarthquake preparedness ppt
Earthquake preparedness ppt
 
Earthquake Presentation
Earthquake PresentationEarthquake Presentation
Earthquake Presentation
 
Haywood Fitness - Presentation for Eagle Scouts Personal Fitness Merit Badge
Haywood Fitness - Presentation for Eagle Scouts Personal Fitness Merit BadgeHaywood Fitness - Presentation for Eagle Scouts Personal Fitness Merit Badge
Haywood Fitness - Presentation for Eagle Scouts Personal Fitness Merit Badge
 
The crash cart
The crash cartThe crash cart
The crash cart
 
Citizenship in the nation-Merit Badge Course
Citizenship in the nation-Merit Badge CourseCitizenship in the nation-Merit Badge Course
Citizenship in the nation-Merit Badge Course
 

Semelhante a Introduction to Emergency Preparedness

Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBsMary Brophy
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentationSreejith Nair
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docxCHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docxtiffanyd4
 
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...Health IT Conference – iHT2
 
Reputation management and crisis - Jan 24, 2018
Reputation management and crisis - Jan 24, 2018Reputation management and crisis - Jan 24, 2018
Reputation management and crisis - Jan 24, 2018Julian Matthews
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxKENNEDY GITHAIGA
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationDr. Lydia Kostopoulos
 
Do I really need cyber liability insurance?
Do I really need cyber liability insurance?Do I really need cyber liability insurance?
Do I really need cyber liability insurance?Crafted
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20Marc S. Sokol
 

Semelhante a Introduction to Emergency Preparedness (20)

Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
Small Business Tip Card
Small Business Tip CardSmall Business Tip Card
Small Business Tip Card
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
What is data privacy?
What is data privacy?What is data privacy?
What is data privacy?
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docxCHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
 
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
 
Reputation management and crisis - Jan 24, 2018
Reputation management and crisis - Jan 24, 2018Reputation management and crisis - Jan 24, 2018
Reputation management and crisis - Jan 24, 2018
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptx
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security Presentation
 
Do I really need cyber liability insurance?
Do I really need cyber liability insurance?Do I really need cyber liability insurance?
Do I really need cyber liability insurance?
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 

Introduction to Emergency Preparedness

  • 2. Michigan SBDC Customer Groups Four customer groups are served by the SBDC: • New ventures • Existing businesses • Growth companies • Advanced technology companies
  • 3. Michigan SBDC Services Four core services are provided by the SBDC: • No cost 1:1 consulting • Business education • Information based planning through (secondary) market research • Technology commercialization
  • 4. Michigan SBDC Teams Four teams of consultants provide services for the SBDC: • Small Business Team • Business Growth Team • Export Assistance Team • Technology Commercialization Team
  • 5. Michigan SBDC Business Education Take advantage of these learning opportunities for Entrepreneurs. Whether online or at your local MISBDC office, the following trainings are presented by experienced professionals who can help you start and grow your business. Select from the range of topics where and when you need them. Registration is easy: www.SBDCMichigan.org • Starting a Business • Business Plan • Financial and Accounting • Customer Relations • Government Contracting • Internet and Social Media • Legal • Management • Marketing and Sales
  • 6. The Michigan SBDC is funded through a cooperative agreement with the U.S. Small Business Administration (SBA), the Michigan Economic Development Corporation (MEDC) and matching funds from Local Network partners in each region. The Michigan SBDC Michigan SBDC State Lead Center Grand Valley State University Seidman College of Business Ian Rogers – Training Manager www.SBDCMichigan.org
  • 7. Jerry Becker Director CCEMHSD Background/Bio • 1979 – 2008 Police Officer/ Sheriff’s Deputy/ Deputy Marshal Michigan, Texas, Colorado. Retired 2015. • 1989 – 2010 Fire Marshal, Captain – Retired 2010. Fire/Haz Mat/ Emergency Vehicle Driving Instructor – MFFTC/ Current. • 2009 – Present Clare County Emergency Management/Homeland Security Director, Director Clare County Broadband Network Users Group, Oversee Clare County Public Safety Communications Systems. • FEMA NIMS Certified, MICIMS WEBEOC Instructor/ PEM Professional Emergency Manager EMHSD – MSP, Local RIC Intelligence Officer R6, Vice Chair Region 6 Homeland Security Division , Member of West Michigan Cyber Security Consortium.
  • 8. Emergency Management: Who we are and what we do
  • 9. The Five Phases of Emergency Management 1. Protection (Prevention) 2. Preparedness 3. Response 4. Recovery 5. Mitigation
  • 10. Emergency Management Basics A Snapshot • (No Two EM Programs are identical). • Develops and maintains the counties EAG/EOP or Emergency Action Plan. • Responsible for Administration, Planning, Coordination and operation of all Emergency Preparedness activities in Jurisdiction. • Liaison with State (MSP District Homeland Security Division, and Federal DHS and other agencies. • Coordinates training countywide, recruitment and training of volunteers.
  • 11. Emergency Management Basics • Coordinate Public education, Preparedness activities, Which may include Business Planning assistance, And Including school drills, HB4713. • Conduct Exercises and Drills to test capabilities and identify gaps and THIRA (Threat Hazard Identification and Risk Assessment). • Conduct the activity of all other public and private agencies engaged in any emergency or disaster and relief programs. • Negotiate and establish buildings and facilities for disaster relief efforts such as shelters etc. • Coordinate and issue alerts and public notification including emergency services agencies. • Be responsible for administration of any Homeland Security Activities that affect local jurisdiction.
  • 12. EM Authorities; P.A. 390 of 1976 • State of Michigan Emergency Management Act. • Formally established Emergency Management. • Clare County Established Emergency Management formally by Resolution on September 04, 1979 and Amended December 20, 1982 Section 402. • Formerly known as “Civil Defense”. • Pub 102 “The Michigan Emergency Management Act” Requires that any municipality of 25,000 or more shall appoint an
  • 13. P.A. 390 continued • EM coordinator, Further any community with a population of 10,000 or more may appoint an Emergency Management Coordinator, • Or A municipality of 10,000 or more may also choose to operate under the Counties Plan and operating procedures. • A Public College or University with a combined average population of 25,000 shall appoint an EM coordinator. • Then in 2001 the world and the U.S. Changed..
  • 14. 9/11
  • 15. Or This in 2005
  • 16. Disaster Facts • Hurricane Katrina; August 29th, 2005. • 175MPH + winds. • 1,833 Deaths, 108 + Billion dollars damage, 80% New Orleans flooded. • Joplin Mo. EF5 Tornado 200-322 MPH Winds; May 22nd 2011, 5:34P.M. est., 160+ Deaths, $2.8 Billion damage, 75% Joplin Damaged or destroyed, 7000 Homes, Including Medical center. • 911 Terrorist attacks; September 11th 2001, 8:46 A.M. est. 2,996 Deaths, $Billions in damage. • HSPD-8 Homeland Security/ National Preparedness Directive. • Post-Katrina Emergency Management Reform Act of 2006 (PKEMRA)
  • 17. The Biggest Threats • Floods and Weather are the biggest threats currently. • Floods/Related kill more people and cause more property damage worldwide each year than any other event! • The average U.S. Annual flood losses in the past 10 years were more than $2.9+ Billion. • Terrorist Attacks either HVE’s or International. • CYBER ATTACK!
  • 18. Michigan’s Disaster History Declarations since 1990. • 42+ Governor declared disasters and emergencies. • 13+ Presidential, (9) Major, 4 Emergencies. • (1) Fire Suppression. • Virtually every county in Michigan has experienced a disaster event! • Unfortunately it is not if, but when.
  • 19. In A Distaster • The Emergency Management Director; • Advises the CEO for local declaration “State of Emergency”. • Activates the EOC. • Prepares and forwards request for “State declaration” to the Governor. • Finally if needed coordinates with Governor and other public officials to obtain via the Governor a “Presidential Disaster Declaration”. • All these processes begin mobilization of Material and financial resources to name a few, to help our communities recover.
  • 20. The Declaration Process in Brief 1. Local incident occurs, PDA - 72 hours takes place, Local officials notified. 2. Local EM/CEO coordinate and issue “State of Emergency” and request State and Federal assistance. 3. State analyzes data, etc. pushes up to Governor to “Issue State of Emergency” “State of Disaster”. 4. Governor pushes up to FEMA Region V and makes request/recommendation to President. 5. President either declares or denies.
  • 22. Today's Security Threats 1. Cyber attack from within U.S. or Outside. 2. “Lone Wolf” HVE’s Active Threats or Bombers. 3. Terrorism U.S. Grown or Outside Self Radicalized. 4. Intellectual or Economic Theft, and or corporate espionage.
  • 23. Cybersecurity: A definition Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access. Cybercrime Cybercrime is any violation of federal, state, or local statute or malicious or suspicious activity in which a computer, a network, or a device is an integral component of the violation.
  • 24. DATA BREACHES BY TYPE: • Identity Theft remains the primary type of breach, accounting for 75% of all records compromised and slightly more than half 53% of data breaches in the first half of 2015. • Government and Healthcare sectors accounted for about two thirds of compromised data records (31% and 34% respectively), Healthcare accounted for 21%Retail accounted for 4%. • Your Credit Card data is worth about >$1.85, Your Personal Medical/Health Record is worth as much as <$300.00 per copy. • The U.S. Accounted for (76%) of data breaches. • Configger/Conficker Virus in XP machines/Networks. • The Deep Web – The Dark Web.
  • 25. Examples: Cyber/Breach Events • Staples Hack - The data breach at the Staples office- supply chain may have affected roughly 1.16 million payment cards as criminals deployed malware to point-of-sale systems at 115 stores. • Home Depot Hack - As Home Depot continues to assess the damage caused by a security breach that gave hackers access to 56 million credit and debit cards, tech experts say large retailers should turn their attention to addressing breaches quickly instead of trying to prevent all of them On February 4, 2015, * • Anthem, Inc., the nation’s second-largest health insurer, reported hackers broke into and stole a database containing the personal information of approximately 80 million customers and employees.1 Although industry watchers do not believe that this incident resulted in the loss of personal health information, 5-8Mil. • Yahoo Data Breach 2014 Revealed 2016 1+Bil. Passwords and personal information stolen. POS SYSTEMS
  • 26. What is phishing? Phishing is the act of sending an e-mail to a user falsely claiming to be a legitimate enterprise in an attempt to scam the user into surrendering private information that could be used for identity theft. Beware of Phishing Schemes
  • 27. DearWebmail User, Your webmail account quota has exceededstorage limit; to avoid the blockage of your webmail account you are to re-validate your webmail account to upgrade your webmail quota for unlimited usage re-validate here Failure to do this, will result in limited access toyour mailbox. Sincerely Web Administrator. White House Help Desk P.S.: This is an auto-generated message. Please do not reply to this email. Webmail Administrator <mrdavidmartins55@gmail.com>
  • 28.
  • 29. 43 percent of companies were immediately put out of business by a “major loss” of computer records, and another 51 percent permanently closed their doors within two years — leaving a mere six percent “survival”.
  • 30. What Can I Do To Protect Myself? • Task 1 Practice Good online safety and security. Dispose of equipment such as Hard drives and data appropriately. (Good Housekeeping). “Backups”. • Task 2 Keep updates and software patches current, Don’t download anything you are unsure or suspect of. When using Social Media Sites; Remember ANYTHING YOU POST IS POTENTIALLY AVAILABLE TO EVERYONE! (Pictures & Location Information) *Watering Holes. • Task 3 Maintain Malware, Spyware, and Anti-Virus Programs (Up to Date) On All Devices. Practice Safe Internet! Task 1 Task 2 Task 3
  • 31. Business Continuity Planning Emergencies are unplanned events that can cause significant injury, or even death, to employees, customers, or the public, disrupt or close down operations, cause physical or environmental damage, or harm the organization’s public image. The changing threat paradigm and recent emergencies, including acts of nature, technological emergencies, civil disturbances, and terrorist incidents have shifted public awareness, most importantly, business owners and managers, to the need for an all hazards emergency plan or continuity of operations (COOP) plan. A COOP plan addresses emergencies from an all hazards approach. The COOP plan is designed to establish policy and guidance to ensure the execution of mission essential functions and to direct the relocation of personnel and resources to an alternate facility capable of supporting operations. The plan should develop procedures for alerting, notifying, activating and deploying employees; identify mission essential functions; establish an alternate facility; and roster personnel with authority and knowledge of functions.
  • 32. COOP Primary Elements Core Components of Plan (many of these will be a separate annex in the plan) 1. Plans and Procedures 2. Mission Essential Functions 3. Delegations of Authority 4. Orders of Succession 5. Alternate Facilities 6. Interoperable Communications 7. Vital Records and Databases 8. Logistics and Administration 9. Personnel Issues and Coordination 10. Security 11. Testing, Training and Exercising 12. Program Management
  • 33. Additional Cyber/Personal Security Information Sites • www.stcguide.com • www.dhs.gov/stopthinkconnect • www.uscert.com • www.infragard.org • www.michiganicac.com • https://smallbusinessbigthreat.com/ • www.merit.edu/cyberrange http://www.dhs.gov/publication/isc-occupant-emergency-programs-guide Run, Hide, Fight video with closed captioning option: http://www.fbi.gov/about-us/cirg/active-shooter-and-mass-casualty-incidents/run- hide-fight-video To report a computer security incident, either contact US-CERT at 888-282-0870, or go to https://forms.uscert.gov/report/ and complete the US-CERT Incident Reporting System form.
  • 34. Additional Resources • www.ready.gov • www.preparemybusiness.org/ • www.clareco.net/emergency_services/ • www.noaa.gov • www.smart911.com • www.do1thing.com • www.michiganicac.com
  • 35. ARE YOU PREPARED? Section #2 Active Threat/Shooter
  • 36.
  • 37. An “Active Shooter” is an individual actively engaging in killing or attempting to kill people in a confined and populated area; in most cases, active shooters use firearm(s) and there is no pattern or method to their selection of victims. Active Shooter situations are unpredictable and evolve quickly. Typically, the immediate deployment of Law Enforcement is required to stop the shooting and mitigate harm to victims. Because Active Shooter incidents are often over within 5-15 minutes, before Law Enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation. PROFILE OF AN ACTIVE SHOOTER
  • 39. James Holmes 24 killed 12 people and injured more than 70 others when he opened fire on a midnight showing of The Dark Knight Rises at a Century 16 multiplex in Aurora, Colorado on July 20, 2012 “He was a bit of a prodigy. After he finished his assignments in fifth grade, he and a classmate filled the time writing code and building a website for the school. His teacher, impressed, called him a Renaissance child."
  • 40.
  • 41. Active Threat TERMINOLOGY FOR EMERGENCY MODES OUTSIDE THREAT MODE (DANGER IS OUTSIDE BUILDING) 1. Outside Threat Mode is announced. If outside, enter building immediately. 2. Staff, make sure all exterior doors and windows are closed and locked. 3. Do not let anyone in or out of the building. 4. Continue business as usual inside the building. 5. Staff may use phones to contact the office if anything suspicious is noticed. 6. This mode will end when the office is notified by Law Enforcement to give the All Clear over the PA, Radio or in Person. LOCKDOWN MODE (DANGER IS INSIDE BUILDING) 1. Lockdown Mode is announced. If you are outside, do not enter the building. 2. Staff, quickly check the hall for visitors. 3. Lock and close your door. (barricade if possible) 4. Turn lights off if possible and close windows and blinds. 5. Hide out of sight and be quiet. 6. Phones should not be used other than by staff to receive emergency text messages from Public Safety. 7. Do not open door for anyone. Wait until Law Enforcement enters your room and places you into Secure Mode (outlined below). SECURE MODE (LAW ENFORCEMENT IS STILL CLEARING BUILDING) 1. Secure Mode shall be announced to each room by Law Enforcement. 2. Lights can be turned on. 3. Classroom instruction may resume if possible. 4. Doors will remain locked. 5. Nobody shall be roaming the halls. Listen for All Clear to be given over the PA, Radio or in Person.
  • 42. Active Threat Conclusions 1. Make a plan, Work with local agencies. 2. Train your people. 3. Drill/Exercise, No “Got Ya” Moments 4. Take it seriously. 5. Be flexible and willing to adapt your plan as the need arises and conditions change. 6. STAY SAFE!
  • 43. On Guard • Local Law Enforcement • Mi-OC Michigan Intelligence Center • DHS Department of Homeland security • Local Emergency Management/EMHSD • FBI • NSA • Secret Service • Michigan State Police
  • 44. Contact Information • Jerry Becker – Clare County Emergency Management Director. • Clare County Emergency Management 225 West Main Street Harrison, MI 48625. • Office Phone: 989-539-6161. • Email: beckerj@clareco.net/ Website: http://www.clareco.net/emergency_services/

Notas do Editor

  1. September 11th 2001, 8:46A.M.est, Terrorist attack; 2,996 Killed, Billions + in damage, Multiple buildings destroyed or damaged.
  2. Hurricane Katrina; August 29th 2005,175MPH , $108Billion damage,1,833 deaths, 80% New Orleans Flooded.