Comprehensive Security Master Plan
Comprehensive Security Master Plan
Risk assessment Security strategy Preparedness, prevention, response, and recovery Organizational behavior and management Budget
Provide Citizens with Electricity Develop New and Innovative Approaches to Energy Safeguard Energy
Values: Safety, Justice, Fairness, Respect Goals: Safety, Performance, Value Strives for Reliability in Electric Transmissions Nurture Strong Relationships with Local Businesses Strong Code of Ethics Transformational Leaders
Attacks to Cripple Energy Output Workplace Shooters Criminal Threats Cyber Criminals: Hackers, Malware, Unauthorized Users Natural Disasters Terrorist Attacks
#1 Needs Immediate Action: Physically Securing the Perimeter, Secure People, and Secure Information Systems #2 When Funds Come Available: Additional Security Measures #3 Long Term Planning: Establishing Written Security Policies and Training the Employees
Reduce Impact of Security Breach Prevent Security Breach Physical Security Measures Cyber Prevention Measures Establish Prevention Policies
Security Plan Contact First Responders Evacuate Facilities Following Safety Protocol
Search and Rescue Rebuild Coordinated Effort to Reestablish Operations Fix Structural Damage
Total: $250,000 Physical Security budget $150,000 Fences around power stations security guards Video Cameras Keyless entry Security Alarms
IT Security $30,000 Antiviral software Encryption Software IT Security Policies Passwords Authorized Users
Personal Security $50,000 Lighting in parking garage Security Guards Video Cameras Organizational Training $20,000 IT Security Polices Emergency Preparedness Security Plan
Physical, Personal, and IT Security Organizational Behavior Risk Assessment Comprehensive Security Plan
Center for Disease Control. (2005). Preparing for a Bombing: A Common Sense Approach. Retrieved August 14, 2013 from http://emergency.cdc.gov/masscasualties/preparingterroristbombing.asp Gofin, R. (2005). Preparedness and response to terrorism: A framework for public health action. European Journal of Public Health, 15(1): pp. 100-104 IBM Corporation. (2012). Best practices for cyber security in the electric power sector. Retrieved July 21, 2013 from http://public.dhe.ibm.com/common/ssi/ecm/en/euw03064usen/EUW03064USEN.P DF Panda Energy. (2012). About Us. Retrieved July 21, 2013 from http://www.pandaenergy.com/Home/tabid/36/Default.aspx McGinnis, S. (2010). Organizational Behavior and Management Thinking. Retrieved August 8, 2013 from http://www.jblearning.com/samples/076373473x/3473x_ch03_4759.pdf Teller, T. (2013). The Biggest Cyber Security Threats of 2013. Retrieved July 21, 2013 from http://www.forbes.com/sites/ciocentral/2012/12/05/the-biggest-cybersecuritythreats-of-2013