2. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
THE ISSUE
Future energy supply - North Africa & Southwest Asia
2
3. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
THE ISSUE
Security of energy supply under pressure
3
4. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
THE ISSUE
Terrorist attacks in Sahel and Magreb after 9/11
4
5. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
THE ISSUE
Oil & gas assets in the heart of instability
5
6. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
FROM HSE
towards
THE ISSUE
Piper Alpha – 1988 (167 )
Bhopal – 1984 (10,000)
PDVSA Venezeuela - 2012 (42) Macondo US – 2010 (11)
Toulouse – 2001 (29)
P36 Brazil 2001 – (10)
Threat to energy production companies is evolving
The Face of Events to come?
Yemen various– 2013 (116 incidents)
Saudi Aramco, Dolphin Energy,
RasGas, … 2012 - now
6
7. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
DIGITAL & PHYSICAL THREAT?
O&G COMPANIES REPORTED:
82% OF INCREASED SUCCESSFUL CYBER
ATTACKS
69% ”NOT CONFIDENT” THEIR
ORGANIZATION WERE ABLE TO DETECT
ALL CYBERATTACKS
An integrated security approach is needed!
7
8. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
OUR VALUE PROPOSITION
We offer Integrated security solutions and risk
services that will provide real-time actionable
information and total risk analysis
To companies and organizations that need to
protect assets and resources that are critical for
society and organizational performance
In order to act before critical incidents happen and
the availability and performance of people and
assets are compromised.
8
9. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
WHAT WE DO
SOCIAL MEDIA
MONITORING
SHIELD
& ALERT
RT-COMMAND
& CONTROL
RT-VITAL SIGNS
& GEOFENCE
SECURE
COMMS
LAWFUL
INTERCEPTION
OPEN SOURCE
ANALYSIS
CINCIDENTS
TRACKER
CYBER
SENSING
M&A
SUPPORT
FINANCIAL
RISK
TECHNCAL
RISK
COMPANY
RADAR
ADVANCED
INTELLIGENCE
PERSONAL
RADAR
ENERGY MARKET
STUDIES
COUNTRY
RISK
GEOPOLITICAL
RISK
STRATEGY &
DEVELOPMENT
SUPPORT
SOLUTIONS &
SERVICES
INFORMATION &
ALERTING SERVICES
OIL & GAS
POWER
GENERATION
WATER
SUPPLY
DEFENSE &
SECURITY
GOVERNMENT
FINANCIAL
INSTITUTIONS
10. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
STRATEGY &
DEVELOPEMENT SUPPORT
Strategic consultancy & Project support
• Geopolitical & Country risk assessment
• Energy Market Studies
• Financial and Technical Risk & Due diligence
• CIKR Strategy and Feasibility
• Project and Business Development
• Gulf Investment Radar (future)
Critical Infrastructure Protection Services
• Threat and Vulnerability Assessment
• Solution Design, Built, Implement & Operate
• Project Management & Training and Support
10
11. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
INFORMATION &
ALERTING SERVICES
Information & Alerting Services
• Country Radar
• Company Radar
• Personal Radar
• Critical Incidents Tracking
• Shield & Alert
Communication Services
• Secure Mobile Voice & Messaging
11
12. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Enterprise Solutions
• RT Location-based Social Media Monitoring
• RT Command & Control
• RT Vital signs & Geofencing
• Shield & Alert Intercompany & Mobile
• Lawful Interception
• Cyber …
• Secure Mobile Voice & Messaging
Services
• Secure Mobile Voice & Messaging
• Project Management
• Solution design, installation and implementation
• Training and Support
SOLUTIONS & SERVICES
12
LOCATE – LISTEN – ANALYZE – ACT
Anyplace, Anywhere, Anytime
14. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 14
FOCUS AREAS ENERGY
NOT ALL
ASSETS
ARE
EQUALLY
CRITICAL!
POWER GENERATION
WATER
PRODUCTION
OFF-SHORE
ENERGY
ON-SHORE ENERGY
GOVERNMENT
INSTITUTIONS
DEFENCE
SECURITY
15. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 15
SIGNIFICANT IMPACT
NORMAL IMPACT
LOW IMPACT
CRITICAL IMPACT
IMPACT LEVELS
THREAT
VULNERABILITY
RISK
IMPACT
16. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 16
OUR CIP APPROACH
Perimeter &
Border security
Command &
Control
Personal Safety &
Security
Cyber &
Data security
Emergency
Response
Associated risk
Targeted risk
Specific risk
17. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Risk associated to the environment & ecosystem
Geopolitical
• Arab Spring and MENA
• Brexit-EU instability
• Turkey-Russia-Ukraine
• Russia-Iran-Syria/Arab countries
• Fin. instability, oil (energy) prices/ investments /production
Country & Regional
• Arab states and Arab Spring
• Impact of growing extremism/terrorism
• Piracy and Offshore security
• Economic and military integration MENA
• Succession Arab regimes
Market
• Ecosystem & Infrastructure
• Market stability
17
ASSOCIATED RISK
18. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
• Impact Arab Spring/Winter on security MENA region
• Impact oil/gas prices on economical stability MENA-Africa
and bilateral/ multilateral investments strategies SWFs
• Retraction (perceived) US-EU from MENA, re-emergence
Russian influence and China/India
• Increased terrorism/extremism risks EMEA
• Confrontation Sunni-Shia regions (Iran-Saudi)
• Brexit and worldwide economic impact
• Globalisation versus regionalisation
• Position US$ versus EU-Rubble-Rinbim
• Upcoming elections US-U-EU and impact EMEA
• Impact of non-Western economic-financial relations with
African and Arab countries (China-India)
18
ASSOCIATED RISK
Geopolitical risk
19. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
MENA:
• Increased insecurity and instability due to extremism/
fundamentalism/ terrorism
• Regime instabilities due to lower economic growth, growing
discrepancies ruling elite-people, unemployment, lack of
investments
• Confrontation between Sunni-Shi’a groups
• Lack of conformity within nation states (Syria, Iraq, Libya,
Yemen, Algeria)
• Succession threats regime (Saudi Arabia, UAE, Bahrain)
Sub-Saharan Africa:
• Low economic growth potential and high unemployment
• Increased extremism and instability (Chad, Nigeria, Niger,
Mozambique, Uganda, Kenia)
• Increased threats towards energy infrastructure on- and
offshore (Nigeria, Mauritania, Angola)
19
ASSOCIATED RISK
Country & Regional risk
20. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
• Investment risks & mitigation – political/ legal/ security
• Due diligence - company/ persons/ institutions / technology
• Assessments & benchmarking – oil/ gas/ security/ defence/ financial
• Political foresights - analysis dynamics political system/ power players/
regional constellation
• Economic foresights - internal analysis dynamics economic situation
country/ region/ sector
• Security foresights - market related terrorism/ fundamentalism/ extremism
• Analysis sanctions regimes and legal-financial-trade frameworks EU-
GCC/North Africa-Iran
• Lobbying EU-GCC-North Africa power players/ stakeholders/ regional-
national governments etc.
• HSSE of travel and/or corporate operations in highly critical environments
20
ASSOCIATED RISK
Market risk
21. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Risk and threat targeted at critical assets, operations & people
• Monitor external threats and risk as they develop
• Provide actionable information
• Land, Sea and Air
• Physical and Digital
21
TARGETED RISK
22. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Critical Incidents Tracking
22
TARGETED RISK
• Tracking/alerting, risk rating and analysis specific to the
African continent and key Arab states (Saudi Arabia, Egypt,
Libya, Algeria, Jordan), while targeting also Turkey
• Stability rating of a region, a nation, a group of countries
• Events and incidents are captured by teams on the ground,
summarized, analyzed and disseminated
• Trackers use personal and public sources and incidents are
submitted to the Regional Moderating Analyst
• A live map that is fed from a continuously updated database of
rated and validated incidents.
23. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Critical Incidents Tracking
23
TARGETED RISK
24. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Location-based Social Media Monitoring
Open source analytics & security
24
TARGETED RISK
Geo-Fence a location
Collect Social Chatter
Target Social Influencers
Explore and Analyze
View detailed information and analytics.
Examine trends, survey social sentiment and
measure success.
25. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 25
TARGETED RISK
Integrated Surveillance technology
Impregnable perimeter detection
Enables verification & validation of threat
Further extend Identification Perimeter (+ 30 - 5 km)
Enables verification & validation of threat
Close-in Identification Perimeter (+5 - 1 km)
Enables verification & validation of threat
Live Video, II, FLIR, SAR,
Photography, Facial and
Number Recognition,
Analytics
Live Video, II, FLIR, SAR,
Photography, Facial and
Number Recognition,
Analytics, Mapping
Extend Detect Perimeter (+120 - 30 km)
Enables advanced warning and identification
26. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
TARGETED RISK
26
Counter-UAV Technology
TRACK
RESPOND,
DECEIVE,
DISRUPT
RESPOND
DETECT
27. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Cyber attack - Root cause analysis
27
TARGETED RISK
Rapidly remediate post-attacks!
The average exploit lasts over 200 days,
with breach activity lying quietly or moving
slowly to exfiltrate your data.
Through efficient metadata storage and
threat feed ingestion, security teams can
go back in time to analyze the full duration
of breach activity on a network.
Our communication analytics tools act as a
force multiplier enabling quicker and more
thorough analysis with fewer resources.
Link Charts
Geospatial Analysis
Turn Communication Data into
Communication Intelligence
28. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Risk and threat originating from traffic around and inside your
premises and critical operations
• Monitor internal threats and risk as they develop
• Provide actionable information
• Land, Sea and Air
• Physical and Digital
28
SPECIFIC RISK
29. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 29
SPECIFIC RISK
Perimeter security
Level 1
• Detection fence using linked
vibration sensor lines
• CCTV recognition & verification
Level 2
• Magnetic burried systems
• Detect the local change in magnetic flux
Level 3
• Wave-alert Leak Detection
• Detect and locate leaks< 1 minute
Level 4
• Marine cut-through detection
30. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 30
SPECIFIC RISK
Biometric identity surveillance
31. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 31
SPECIFIC RISK
3D Facial Intelligence solution
Name: John F. Kennedy
DOB: 05/29/1917
Address: 1600 Pennsylvania Ave.
City: Washington
State: DC
03/17/1943
Source: DL
11/9/1960
Source: NID
05/29/1962
Source: Psprt
11/22/1963
Source: Video
10/02/1963
Source: 3D
Enr
04/1/1930
Source: NID
Real-time identity match & alert from 2D
(still frame & video) and 3D data feed
Integrate, enhance and analyze existing data
32. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
• a real-time event management platform that integrates
predictive analytics and leading-edge visualization
technologies to improve situational awareness and
provide a common operating platform to emergency
management services.
• communicate with employees during an emergency.
Predictive analytics and indications and warnings are
provided.
32
SPECIFIC RISK
Real-time active mobility mapping & analysis
• Geographic Based Updates
• Two-Way Communication
• Automatically notify
designated contacts
• Configurable Panic Button
• Advanced Predictive
Analytics
• Indications and Warnings
• Real-Time Web-Based
Dashboard
• Automatically Prioritize
Locations
• 4D Visualization
• Secure Indoor Elevation
• Organize and Visualize
Multimedia Data Feeds
• DVR Event Data
• Manage Multiple Locations
from the Same Screen
33. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 33
SPECIFIC RISK
Command & Control
Sensor
Feeds
Socio-Cultural
Data
Open Source
Data
Security Force
Data
Regional
NGO
Data
Customers
34. VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 34
SPECIFIC RISK
Integrated Security & Command
• Real-time decision making aide with a common operating picture and
situational awareness.
• Open Architecture
– Add new sensors and systems without recompiling the base
software
– Ingests target position information and other standard messages
• 3 Dimensional map with multi-touch
• Ability to add landmarks and annotate
• Integrated Video Decoder for Live video sensor feeds
• Motion detection and Alerts to the operator
• Range Rings, Range and Bearing Calculators
• Event Playback of entity movement and video
• Layer Management and Filtering aiding in declutter