SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
COMPANY
PRESENTATION
CRITICAL INFRASTRUCTURE &
KEY RESOURCES PROTECTION
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
THE ISSUE
Future energy supply - North Africa & Southwest Asia
2
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
THE ISSUE
Security of energy supply under pressure
3
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
THE ISSUE
Terrorist attacks in Sahel and Magreb after 9/11
4
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
THE ISSUE
Oil & gas assets in the heart of instability
5
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
FROM HSE
towards
THE ISSUE
Piper Alpha – 1988 (167 )
Bhopal – 1984 (10,000)
PDVSA Venezeuela - 2012 (42) Macondo US – 2010 (11)
Toulouse – 2001 (29)
P36 Brazil 2001 – (10)
Threat to energy production companies is evolving
The Face of Events to come?
Yemen various– 2013 (116 incidents)
Saudi Aramco, Dolphin Energy,
RasGas, … 2012 - now
6
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
DIGITAL & PHYSICAL THREAT?
O&G COMPANIES REPORTED:
82% OF INCREASED SUCCESSFUL CYBER
ATTACKS
69% ”NOT CONFIDENT” THEIR
ORGANIZATION WERE ABLE TO DETECT
ALL CYBERATTACKS
An integrated security approach is needed!
7
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
OUR VALUE PROPOSITION
We offer Integrated security solutions and risk
services that will provide real-time actionable
information and total risk analysis
To companies and organizations that need to
protect assets and resources that are critical for
society and organizational performance
In order to act before critical incidents happen and
the availability and performance of people and
assets are compromised.
8
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
WHAT WE DO
SOCIAL MEDIA
MONITORING
SHIELD
& ALERT
RT-COMMAND
& CONTROL
RT-VITAL SIGNS
& GEOFENCE
SECURE
COMMS
LAWFUL
INTERCEPTION
OPEN SOURCE
ANALYSIS
CINCIDENTS
TRACKER
CYBER
SENSING
M&A
SUPPORT
FINANCIAL
RISK
TECHNCAL
RISK
COMPANY
RADAR
ADVANCED
INTELLIGENCE
PERSONAL
RADAR
ENERGY MARKET
STUDIES
COUNTRY
RISK
GEOPOLITICAL
RISK
STRATEGY &
DEVELOPMENT
SUPPORT
SOLUTIONS &
SERVICES
INFORMATION &
ALERTING SERVICES
OIL & GAS
POWER
GENERATION
WATER
SUPPLY
DEFENSE &
SECURITY
GOVERNMENT
FINANCIAL
INSTITUTIONS
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
STRATEGY &
DEVELOPEMENT SUPPORT
Strategic consultancy & Project support
• Geopolitical & Country risk assessment
• Energy Market Studies
• Financial and Technical Risk & Due diligence
• CIKR Strategy and Feasibility
• Project and Business Development
• Gulf Investment Radar (future)
Critical Infrastructure Protection Services
• Threat and Vulnerability Assessment
• Solution Design, Built, Implement & Operate
• Project Management & Training and Support
10
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
INFORMATION &
ALERTING SERVICES
Information & Alerting Services
• Country Radar
• Company Radar
• Personal Radar
• Critical Incidents Tracking
• Shield & Alert
Communication Services
• Secure Mobile Voice & Messaging
11
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Enterprise Solutions
• RT Location-based Social Media Monitoring
• RT Command & Control
• RT Vital signs & Geofencing
• Shield & Alert Intercompany & Mobile
• Lawful Interception
• Cyber …
• Secure Mobile Voice & Messaging
Services
• Secure Mobile Voice & Messaging
• Project Management
• Solution design, installation and implementation
• Training and Support
SOLUTIONS & SERVICES
12
LOCATE – LISTEN – ANALYZE – ACT
Anyplace, Anywhere, Anytime
CRITICAL ENERGY
INFRASTRUCTURE
CRITICAL INFRASTRUCTURE &
KEY RESOURCES PROTECTION
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 14
FOCUS AREAS ENERGY
NOT ALL
ASSETS
ARE
EQUALLY
CRITICAL!
POWER GENERATION
WATER
PRODUCTION
OFF-SHORE
ENERGY
ON-SHORE ENERGY
GOVERNMENT
INSTITUTIONS
DEFENCE
SECURITY
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 15
SIGNIFICANT IMPACT
NORMAL IMPACT
LOW IMPACT
CRITICAL IMPACT
IMPACT LEVELS
THREAT
VULNERABILITY
RISK
IMPACT
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 16
OUR CIP APPROACH
Perimeter &
Border security
Command &
Control
Personal Safety &
Security
Cyber &
Data security
Emergency
Response
Associated risk
Targeted risk
Specific risk
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Risk associated to the environment & ecosystem
Geopolitical
• Arab Spring and MENA
• Brexit-EU instability
• Turkey-Russia-Ukraine
• Russia-Iran-Syria/Arab countries
• Fin. instability, oil (energy) prices/ investments /production
Country & Regional
• Arab states and Arab Spring
• Impact of growing extremism/terrorism
• Piracy and Offshore security
• Economic and military integration MENA
• Succession Arab regimes
Market
• Ecosystem & Infrastructure
• Market stability
17
ASSOCIATED RISK
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
• Impact Arab Spring/Winter on security MENA region
• Impact oil/gas prices on economical stability MENA-Africa
and bilateral/ multilateral investments strategies SWFs
• Retraction (perceived) US-EU from MENA, re-emergence
Russian influence and China/India
• Increased terrorism/extremism risks EMEA
• Confrontation Sunni-Shia regions (Iran-Saudi)
• Brexit and worldwide economic impact
• Globalisation versus regionalisation
• Position US$ versus EU-Rubble-Rinbim
• Upcoming elections US-U-EU and impact EMEA
• Impact of non-Western economic-financial relations with
African and Arab countries (China-India)
18
ASSOCIATED RISK
Geopolitical risk
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
MENA:
• Increased insecurity and instability due to extremism/
fundamentalism/ terrorism
• Regime instabilities due to lower economic growth, growing
discrepancies ruling elite-people, unemployment, lack of
investments
• Confrontation between Sunni-Shi’a groups
• Lack of conformity within nation states (Syria, Iraq, Libya,
Yemen, Algeria)
• Succession threats regime (Saudi Arabia, UAE, Bahrain)
Sub-Saharan Africa:
• Low economic growth potential and high unemployment
• Increased extremism and instability (Chad, Nigeria, Niger,
Mozambique, Uganda, Kenia)
• Increased threats towards energy infrastructure on- and
offshore (Nigeria, Mauritania, Angola)
19
ASSOCIATED RISK
Country & Regional risk
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
• Investment risks & mitigation – political/ legal/ security
• Due diligence - company/ persons/ institutions / technology
• Assessments & benchmarking – oil/ gas/ security/ defence/ financial
• Political foresights - analysis dynamics political system/ power players/
regional constellation
• Economic foresights - internal analysis dynamics economic situation
country/ region/ sector
• Security foresights - market related terrorism/ fundamentalism/ extremism
• Analysis sanctions regimes and legal-financial-trade frameworks EU-
GCC/North Africa-Iran
• Lobbying EU-GCC-North Africa power players/ stakeholders/ regional-
national governments etc.
• HSSE of travel and/or corporate operations in highly critical environments
20
ASSOCIATED RISK
Market risk
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Risk and threat targeted at critical assets, operations & people
• Monitor external threats and risk as they develop
• Provide actionable information
• Land, Sea and Air
• Physical and Digital
21
TARGETED RISK
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Critical Incidents Tracking
22
TARGETED RISK
• Tracking/alerting, risk rating and analysis specific to the
African continent and key Arab states (Saudi Arabia, Egypt,
Libya, Algeria, Jordan), while targeting also Turkey
• Stability rating of a region, a nation, a group of countries
• Events and incidents are captured by teams on the ground,
summarized, analyzed and disseminated
• Trackers use personal and public sources and incidents are
submitted to the Regional Moderating Analyst
• A live map that is fed from a continuously updated database of
rated and validated incidents.
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Critical Incidents Tracking
23
TARGETED RISK
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Location-based Social Media Monitoring
Open source analytics & security
24
TARGETED RISK
Geo-Fence a location
Collect Social Chatter
Target Social Influencers
Explore and Analyze
View detailed information and analytics.
Examine trends, survey social sentiment and
measure success.
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 25
TARGETED RISK
Integrated Surveillance technology
Impregnable perimeter detection
Enables verification & validation of threat
Further extend Identification Perimeter (+ 30 - 5 km)
Enables verification & validation of threat
Close-in Identification Perimeter (+5 - 1 km)
Enables verification & validation of threat
Live Video, II, FLIR, SAR,
Photography, Facial and
Number Recognition,
Analytics
Live Video, II, FLIR, SAR,
Photography, Facial and
Number Recognition,
Analytics, Mapping
Extend Detect Perimeter (+120 - 30 km)
Enables advanced warning and identification
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
TARGETED RISK
26
Counter-UAV Technology
TRACK
RESPOND,
DECEIVE,
DISRUPT
RESPOND
DETECT
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Cyber attack - Root cause analysis
27
TARGETED RISK
Rapidly remediate post-attacks!
The average exploit lasts over 200 days,
with breach activity lying quietly or moving
slowly to exfiltrate your data.
Through efficient metadata storage and
threat feed ingestion, security teams can
go back in time to analyze the full duration
of breach activity on a network.
Our communication analytics tools act as a
force multiplier enabling quicker and more
thorough analysis with fewer resources.
Link Charts
Geospatial Analysis
Turn Communication Data into
Communication Intelligence
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
Risk and threat originating from traffic around and inside your
premises and critical operations
• Monitor internal threats and risk as they develop
• Provide actionable information
• Land, Sea and Air
• Physical and Digital
28
SPECIFIC RISK
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 29
SPECIFIC RISK
Perimeter security
Level 1
• Detection fence using linked
vibration sensor lines
• CCTV recognition & verification
Level 2
• Magnetic burried systems
• Detect the local change in magnetic flux
Level 3
• Wave-alert Leak Detection
• Detect and locate leaks< 1 minute
Level 4
• Marine cut-through detection
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 30
SPECIFIC RISK
Biometric identity surveillance
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 31
SPECIFIC RISK
3D Facial Intelligence solution
Name: John F. Kennedy
DOB: 05/29/1917
Address: 1600 Pennsylvania Ave.
City: Washington
State: DC
03/17/1943
Source: DL
11/9/1960
Source: NID
05/29/1962
Source: Psprt
11/22/1963
Source: Video
10/02/1963
Source: 3D
Enr
04/1/1930
Source: NID
Real-time identity match & alert from 2D
(still frame & video) and 3D data feed
Integrate, enhance and analyze existing data
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES
• a real-time event management platform that integrates
predictive analytics and leading-edge visualization
technologies to improve situational awareness and
provide a common operating platform to emergency
management services.
• communicate with employees during an emergency.
Predictive analytics and indications and warnings are
provided.
32
SPECIFIC RISK
Real-time active mobility mapping & analysis
• Geographic Based Updates
• Two-Way Communication
• Automatically notify
designated contacts
• Configurable Panic Button
• Advanced Predictive
Analytics
• Indications and Warnings
• Real-Time Web-Based
Dashboard
• Automatically Prioritize
Locations
• 4D Visualization
• Secure Indoor Elevation
• Organize and Visualize
Multimedia Data Feeds
• DVR Event Data
• Manage Multiple Locations
from the Same Screen
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 33
SPECIFIC RISK
Command & Control
Sensor
Feeds
Socio-Cultural
Data
Open Source
Data
Security Force
Data
Regional
NGO
Data
Customers
VEROCY.COM
MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 34
SPECIFIC RISK
Integrated Security & Command
• Real-time decision making aide with a common operating picture and
situational awareness.
• Open Architecture
– Add new sensors and systems without recompiling the base
software
– Ingests target position information and other standard messages
• 3 Dimensional map with multi-touch
• Ability to add landmarks and annotate
• Integrated Video Decoder for Live video sensor feeds
• Motion detection and Alerts to the operator
• Range Rings, Range and Bearing Calculators
• Event Playback of entity movement and video
• Layer Management and Filtering aiding in declutter
THANK YOU!
CRITICAL INFRASTRUCTURE &
KEY RESOURCES PROTECTION
INQUIRIES@VEROCY.COM

Weitere ähnliche Inhalte

Ähnlich wie 162410_Verocy_CIKR_LR

Verocy risk integrated strategy presentation
Verocy risk integrated strategy presentation Verocy risk integrated strategy presentation
Verocy risk integrated strategy presentation Cyril Widdershoven
 
Defining Resilience Trends in Continuity, Chloe DEMROVSKY
Defining Resilience Trends in Continuity, Chloe DEMROVSKYDefining Resilience Trends in Continuity, Chloe DEMROVSKY
Defining Resilience Trends in Continuity, Chloe DEMROVSKYGlobal Risk Forum GRFDavos
 
RMSI_DisasterManagement-1.ppt
RMSI_DisasterManagement-1.pptRMSI_DisasterManagement-1.ppt
RMSI_DisasterManagement-1.pptMadhukar Sanap
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security Adhar kashyap
 
Assessing the Impact of Infrastructure Quality on Firm Productivity in Africa
Assessing the Impact of Infrastructure Quality on Firm Productivity in AfricaAssessing the Impact of Infrastructure Quality on Firm Productivity in Africa
Assessing the Impact of Infrastructure Quality on Firm Productivity in AfricaDr Lendy Spires
 
ICLR Friday Forum: A Profile of Earthquake Risk in Canada (April 17, 2020)
ICLR Friday Forum: A Profile of Earthquake Risk in Canada (April 17, 2020) ICLR Friday Forum: A Profile of Earthquake Risk in Canada (April 17, 2020)
ICLR Friday Forum: A Profile of Earthquake Risk in Canada (April 17, 2020) glennmcgillivray
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitolTechU
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
 
Exploring the Future of Resilience and Mitigation to Better Plan for Disaster...
Exploring the Future of Resilience and Mitigation to Better Plan for Disaster...Exploring the Future of Resilience and Mitigation to Better Plan for Disaster...
Exploring the Future of Resilience and Mitigation to Better Plan for Disaster...Global Risk Forum GRFDavos
 
A View on the Future of Maritime Training and Simulation
A View on the Future of Maritime Training and SimulationA View on the Future of Maritime Training and Simulation
A View on the Future of Maritime Training and SimulationAndy Fawkes
 
Emerging & Frontier Commercial Real Estate Markets 2015
Emerging & Frontier Commercial Real Estate Markets 2015Emerging & Frontier Commercial Real Estate Markets 2015
Emerging & Frontier Commercial Real Estate Markets 2015Cushman & Wakefield
 
Drone Service Market Size, Share, Trend, Forecast, & Competitive Analysis
Drone Service Market Size, Share, Trend, Forecast, & Competitive AnalysisDrone Service Market Size, Share, Trend, Forecast, & Competitive Analysis
Drone Service Market Size, Share, Trend, Forecast, & Competitive AnalysisStratview Research
 
Cyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by ImprevaCyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by ImprevaGhader Ahmadi
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
One Africa Network (OAN) Webcast: COVID-19 Crisis - Leading Change and the Ne...
One Africa Network (OAN) Webcast: COVID-19 Crisis - Leading Change and the Ne...One Africa Network (OAN) Webcast: COVID-19 Crisis - Leading Change and the Ne...
One Africa Network (OAN) Webcast: COVID-19 Crisis - Leading Change and the Ne...SSCG Consulting
 
Risk Identification in power plants risk i
Risk Identification in power plants risk iRisk Identification in power plants risk i
Risk Identification in power plants risk iPeter Cockcroft
 

Ähnlich wie 162410_Verocy_CIKR_LR (20)

Verocy risk integrated strategy presentation
Verocy risk integrated strategy presentation Verocy risk integrated strategy presentation
Verocy risk integrated strategy presentation
 
Defining Resilience Trends in Continuity, Chloe DEMROVSKY
Defining Resilience Trends in Continuity, Chloe DEMROVSKYDefining Resilience Trends in Continuity, Chloe DEMROVSKY
Defining Resilience Trends in Continuity, Chloe DEMROVSKY
 
RMSI_DisasterManagement-1.ppt
RMSI_DisasterManagement-1.pptRMSI_DisasterManagement-1.ppt
RMSI_DisasterManagement-1.ppt
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
 
Assessing the Impact of Infrastructure Quality on Firm Productivity in Africa
Assessing the Impact of Infrastructure Quality on Firm Productivity in AfricaAssessing the Impact of Infrastructure Quality on Firm Productivity in Africa
Assessing the Impact of Infrastructure Quality on Firm Productivity in Africa
 
ICLR Friday Forum: A Profile of Earthquake Risk in Canada (April 17, 2020)
ICLR Friday Forum: A Profile of Earthquake Risk in Canada (April 17, 2020) ICLR Friday Forum: A Profile of Earthquake Risk in Canada (April 17, 2020)
ICLR Friday Forum: A Profile of Earthquake Risk in Canada (April 17, 2020)
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
Exploring the Future of Resilience and Mitigation to Better Plan for Disaster...
Exploring the Future of Resilience and Mitigation to Better Plan for Disaster...Exploring the Future of Resilience and Mitigation to Better Plan for Disaster...
Exploring the Future of Resilience and Mitigation to Better Plan for Disaster...
 
A View on the Future of Maritime Training and Simulation
A View on the Future of Maritime Training and SimulationA View on the Future of Maritime Training and Simulation
A View on the Future of Maritime Training and Simulation
 
Emerging & Frontier Commercial Real Estate Markets 2015
Emerging & Frontier Commercial Real Estate Markets 2015Emerging & Frontier Commercial Real Estate Markets 2015
Emerging & Frontier Commercial Real Estate Markets 2015
 
original.pdf
original.pdforiginal.pdf
original.pdf
 
Drone Service Market Size, Share, Trend, Forecast, & Competitive Analysis
Drone Service Market Size, Share, Trend, Forecast, & Competitive AnalysisDrone Service Market Size, Share, Trend, Forecast, & Competitive Analysis
Drone Service Market Size, Share, Trend, Forecast, & Competitive Analysis
 
Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013
 
Cyberthreat Defense Report Edge 2017-cdr-report
Cyberthreat Defense Report Edge 2017-cdr-reportCyberthreat Defense Report Edge 2017-cdr-report
Cyberthreat Defense Report Edge 2017-cdr-report
 
Cyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by ImprevaCyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by Impreva
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
One Africa Network (OAN) Webcast: COVID-19 Crisis - Leading Change and the Ne...
One Africa Network (OAN) Webcast: COVID-19 Crisis - Leading Change and the Ne...One Africa Network (OAN) Webcast: COVID-19 Crisis - Leading Change and the Ne...
One Africa Network (OAN) Webcast: COVID-19 Crisis - Leading Change and the Ne...
 
Dynamis, Inc. Capabilities (6.6.23).pdf
Dynamis, Inc. Capabilities (6.6.23).pdfDynamis, Inc. Capabilities (6.6.23).pdf
Dynamis, Inc. Capabilities (6.6.23).pdf
 
Risk Identification in power plants risk i
Risk Identification in power plants risk iRisk Identification in power plants risk i
Risk Identification in power plants risk i
 

Mehr von Cyril Widdershoven

Final verocy saudi vison2030_iro (3)
Final verocy saudi vison2030_iro (3)Final verocy saudi vison2030_iro (3)
Final verocy saudi vison2030_iro (3)Cyril Widdershoven
 
Turkey Moody's downgrade statements
Turkey Moody's downgrade statementsTurkey Moody's downgrade statements
Turkey Moody's downgrade statementsCyril Widdershoven
 
International Mediterranean Conference Istanbul 20-22nd April 2016
International Mediterranean Conference Istanbul 20-22nd April 2016International Mediterranean Conference Istanbul 20-22nd April 2016
International Mediterranean Conference Istanbul 20-22nd April 2016Cyril Widdershoven
 
International Mediterranean Conference Istanbul 20-22nd April 2016
International Mediterranean Conference Istanbul 20-22nd April 2016International Mediterranean Conference Istanbul 20-22nd April 2016
International Mediterranean Conference Istanbul 20-22nd April 2016Cyril Widdershoven
 
Brochure-VOTI-Industrie-week-69744-web
Brochure-VOTI-Industrie-week-69744-webBrochure-VOTI-Industrie-week-69744-web
Brochure-VOTI-Industrie-week-69744-webCyril Widdershoven
 
Global Energy Security Conference 2016
Global Energy Security Conference 2016Global Energy Security Conference 2016
Global Energy Security Conference 2016Cyril Widdershoven
 
managementscope-energiespecial8-17185
managementscope-energiespecial8-17185managementscope-energiespecial8-17185
managementscope-energiespecial8-17185Cyril Widdershoven
 

Mehr von Cyril Widdershoven (17)

Final verocy saudi vison2030_iro (3)
Final verocy saudi vison2030_iro (3)Final verocy saudi vison2030_iro (3)
Final verocy saudi vison2030_iro (3)
 
Arabswfmonitor january-2017
Arabswfmonitor january-2017Arabswfmonitor january-2017
Arabswfmonitor january-2017
 
Dec_Report_2016-1
Dec_Report_2016-1Dec_Report_2016-1
Dec_Report_2016-1
 
Turkey Moody's downgrade statements
Turkey Moody's downgrade statementsTurkey Moody's downgrade statements
Turkey Moody's downgrade statements
 
introducing-MEA-Risk
introducing-MEA-Riskintroducing-MEA-Risk
introducing-MEA-Risk
 
NAMEA Press Release_June 2016
NAMEA Press Release_June 2016NAMEA Press Release_June 2016
NAMEA Press Release_June 2016
 
krant-20160617-0-007-025
krant-20160617-0-007-025krant-20160617-0-007-025
krant-20160617-0-007-025
 
Invitation GMR6 17062016 (1)
Invitation GMR6 17062016 (1)Invitation GMR6 17062016 (1)
Invitation GMR6 17062016 (1)
 
International Mediterranean Conference Istanbul 20-22nd April 2016
International Mediterranean Conference Istanbul 20-22nd April 2016International Mediterranean Conference Istanbul 20-22nd April 2016
International Mediterranean Conference Istanbul 20-22nd April 2016
 
International Mediterranean Conference Istanbul 20-22nd April 2016
International Mediterranean Conference Istanbul 20-22nd April 2016International Mediterranean Conference Istanbul 20-22nd April 2016
International Mediterranean Conference Istanbul 20-22nd April 2016
 
Brochure-VOTI-Industrie-week-69744-web
Brochure-VOTI-Industrie-week-69744-webBrochure-VOTI-Industrie-week-69744-web
Brochure-VOTI-Industrie-week-69744-web
 
egypt-feb01-feb07-2016
egypt-feb01-feb07-2016egypt-feb01-feb07-2016
egypt-feb01-feb07-2016
 
Global Energy Security Conference 2016
Global Energy Security Conference 2016Global Energy Security Conference 2016
Global Energy Security Conference 2016
 
VEROCY KVK Rotterdam
VEROCY KVK RotterdamVEROCY KVK Rotterdam
VEROCY KVK Rotterdam
 
armex_nr._2_2016
armex_nr._2_2016armex_nr._2_2016
armex_nr._2_2016
 
Refdag Opinie 2001-PK-06_07
Refdag Opinie 2001-PK-06_07Refdag Opinie 2001-PK-06_07
Refdag Opinie 2001-PK-06_07
 
managementscope-energiespecial8-17185
managementscope-energiespecial8-17185managementscope-energiespecial8-17185
managementscope-energiespecial8-17185
 

162410_Verocy_CIKR_LR

  • 2. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES THE ISSUE Future energy supply - North Africa & Southwest Asia 2
  • 3. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES THE ISSUE Security of energy supply under pressure 3
  • 4. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES THE ISSUE Terrorist attacks in Sahel and Magreb after 9/11 4
  • 5. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES THE ISSUE Oil & gas assets in the heart of instability 5
  • 6. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES FROM HSE towards THE ISSUE Piper Alpha – 1988 (167 ) Bhopal – 1984 (10,000) PDVSA Venezeuela - 2012 (42) Macondo US – 2010 (11) Toulouse – 2001 (29) P36 Brazil 2001 – (10) Threat to energy production companies is evolving The Face of Events to come? Yemen various– 2013 (116 incidents) Saudi Aramco, Dolphin Energy, RasGas, … 2012 - now 6
  • 7. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES DIGITAL & PHYSICAL THREAT? O&G COMPANIES REPORTED: 82% OF INCREASED SUCCESSFUL CYBER ATTACKS 69% ”NOT CONFIDENT” THEIR ORGANIZATION WERE ABLE TO DETECT ALL CYBERATTACKS An integrated security approach is needed! 7
  • 8. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES OUR VALUE PROPOSITION We offer Integrated security solutions and risk services that will provide real-time actionable information and total risk analysis To companies and organizations that need to protect assets and resources that are critical for society and organizational performance In order to act before critical incidents happen and the availability and performance of people and assets are compromised. 8
  • 9. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES WHAT WE DO SOCIAL MEDIA MONITORING SHIELD & ALERT RT-COMMAND & CONTROL RT-VITAL SIGNS & GEOFENCE SECURE COMMS LAWFUL INTERCEPTION OPEN SOURCE ANALYSIS CINCIDENTS TRACKER CYBER SENSING M&A SUPPORT FINANCIAL RISK TECHNCAL RISK COMPANY RADAR ADVANCED INTELLIGENCE PERSONAL RADAR ENERGY MARKET STUDIES COUNTRY RISK GEOPOLITICAL RISK STRATEGY & DEVELOPMENT SUPPORT SOLUTIONS & SERVICES INFORMATION & ALERTING SERVICES OIL & GAS POWER GENERATION WATER SUPPLY DEFENSE & SECURITY GOVERNMENT FINANCIAL INSTITUTIONS
  • 10. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES STRATEGY & DEVELOPEMENT SUPPORT Strategic consultancy & Project support • Geopolitical & Country risk assessment • Energy Market Studies • Financial and Technical Risk & Due diligence • CIKR Strategy and Feasibility • Project and Business Development • Gulf Investment Radar (future) Critical Infrastructure Protection Services • Threat and Vulnerability Assessment • Solution Design, Built, Implement & Operate • Project Management & Training and Support 10
  • 11. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES INFORMATION & ALERTING SERVICES Information & Alerting Services • Country Radar • Company Radar • Personal Radar • Critical Incidents Tracking • Shield & Alert Communication Services • Secure Mobile Voice & Messaging 11
  • 12. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES Enterprise Solutions • RT Location-based Social Media Monitoring • RT Command & Control • RT Vital signs & Geofencing • Shield & Alert Intercompany & Mobile • Lawful Interception • Cyber … • Secure Mobile Voice & Messaging Services • Secure Mobile Voice & Messaging • Project Management • Solution design, installation and implementation • Training and Support SOLUTIONS & SERVICES 12 LOCATE – LISTEN – ANALYZE – ACT Anyplace, Anywhere, Anytime
  • 14. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 14 FOCUS AREAS ENERGY NOT ALL ASSETS ARE EQUALLY CRITICAL! POWER GENERATION WATER PRODUCTION OFF-SHORE ENERGY ON-SHORE ENERGY GOVERNMENT INSTITUTIONS DEFENCE SECURITY
  • 15. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 15 SIGNIFICANT IMPACT NORMAL IMPACT LOW IMPACT CRITICAL IMPACT IMPACT LEVELS THREAT VULNERABILITY RISK IMPACT
  • 16. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 16 OUR CIP APPROACH Perimeter & Border security Command & Control Personal Safety & Security Cyber & Data security Emergency Response Associated risk Targeted risk Specific risk
  • 17. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES Risk associated to the environment & ecosystem Geopolitical • Arab Spring and MENA • Brexit-EU instability • Turkey-Russia-Ukraine • Russia-Iran-Syria/Arab countries • Fin. instability, oil (energy) prices/ investments /production Country & Regional • Arab states and Arab Spring • Impact of growing extremism/terrorism • Piracy and Offshore security • Economic and military integration MENA • Succession Arab regimes Market • Ecosystem & Infrastructure • Market stability 17 ASSOCIATED RISK
  • 18. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES • Impact Arab Spring/Winter on security MENA region • Impact oil/gas prices on economical stability MENA-Africa and bilateral/ multilateral investments strategies SWFs • Retraction (perceived) US-EU from MENA, re-emergence Russian influence and China/India • Increased terrorism/extremism risks EMEA • Confrontation Sunni-Shia regions (Iran-Saudi) • Brexit and worldwide economic impact • Globalisation versus regionalisation • Position US$ versus EU-Rubble-Rinbim • Upcoming elections US-U-EU and impact EMEA • Impact of non-Western economic-financial relations with African and Arab countries (China-India) 18 ASSOCIATED RISK Geopolitical risk
  • 19. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES MENA: • Increased insecurity and instability due to extremism/ fundamentalism/ terrorism • Regime instabilities due to lower economic growth, growing discrepancies ruling elite-people, unemployment, lack of investments • Confrontation between Sunni-Shi’a groups • Lack of conformity within nation states (Syria, Iraq, Libya, Yemen, Algeria) • Succession threats regime (Saudi Arabia, UAE, Bahrain) Sub-Saharan Africa: • Low economic growth potential and high unemployment • Increased extremism and instability (Chad, Nigeria, Niger, Mozambique, Uganda, Kenia) • Increased threats towards energy infrastructure on- and offshore (Nigeria, Mauritania, Angola) 19 ASSOCIATED RISK Country & Regional risk
  • 20. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES • Investment risks & mitigation – political/ legal/ security • Due diligence - company/ persons/ institutions / technology • Assessments & benchmarking – oil/ gas/ security/ defence/ financial • Political foresights - analysis dynamics political system/ power players/ regional constellation • Economic foresights - internal analysis dynamics economic situation country/ region/ sector • Security foresights - market related terrorism/ fundamentalism/ extremism • Analysis sanctions regimes and legal-financial-trade frameworks EU- GCC/North Africa-Iran • Lobbying EU-GCC-North Africa power players/ stakeholders/ regional- national governments etc. • HSSE of travel and/or corporate operations in highly critical environments 20 ASSOCIATED RISK Market risk
  • 21. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES Risk and threat targeted at critical assets, operations & people • Monitor external threats and risk as they develop • Provide actionable information • Land, Sea and Air • Physical and Digital 21 TARGETED RISK
  • 22. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES Critical Incidents Tracking 22 TARGETED RISK • Tracking/alerting, risk rating and analysis specific to the African continent and key Arab states (Saudi Arabia, Egypt, Libya, Algeria, Jordan), while targeting also Turkey • Stability rating of a region, a nation, a group of countries • Events and incidents are captured by teams on the ground, summarized, analyzed and disseminated • Trackers use personal and public sources and incidents are submitted to the Regional Moderating Analyst • A live map that is fed from a continuously updated database of rated and validated incidents.
  • 23. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES Critical Incidents Tracking 23 TARGETED RISK
  • 24. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES Location-based Social Media Monitoring Open source analytics & security 24 TARGETED RISK Geo-Fence a location Collect Social Chatter Target Social Influencers Explore and Analyze View detailed information and analytics. Examine trends, survey social sentiment and measure success.
  • 25. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 25 TARGETED RISK Integrated Surveillance technology Impregnable perimeter detection Enables verification & validation of threat Further extend Identification Perimeter (+ 30 - 5 km) Enables verification & validation of threat Close-in Identification Perimeter (+5 - 1 km) Enables verification & validation of threat Live Video, II, FLIR, SAR, Photography, Facial and Number Recognition, Analytics Live Video, II, FLIR, SAR, Photography, Facial and Number Recognition, Analytics, Mapping Extend Detect Perimeter (+120 - 30 km) Enables advanced warning and identification
  • 26. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES TARGETED RISK 26 Counter-UAV Technology TRACK RESPOND, DECEIVE, DISRUPT RESPOND DETECT
  • 27. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES Cyber attack - Root cause analysis 27 TARGETED RISK Rapidly remediate post-attacks! The average exploit lasts over 200 days, with breach activity lying quietly or moving slowly to exfiltrate your data. Through efficient metadata storage and threat feed ingestion, security teams can go back in time to analyze the full duration of breach activity on a network. Our communication analytics tools act as a force multiplier enabling quicker and more thorough analysis with fewer resources. Link Charts Geospatial Analysis Turn Communication Data into Communication Intelligence
  • 28. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES Risk and threat originating from traffic around and inside your premises and critical operations • Monitor internal threats and risk as they develop • Provide actionable information • Land, Sea and Air • Physical and Digital 28 SPECIFIC RISK
  • 29. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 29 SPECIFIC RISK Perimeter security Level 1 • Detection fence using linked vibration sensor lines • CCTV recognition & verification Level 2 • Magnetic burried systems • Detect the local change in magnetic flux Level 3 • Wave-alert Leak Detection • Detect and locate leaks< 1 minute Level 4 • Marine cut-through detection
  • 30. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 30 SPECIFIC RISK Biometric identity surveillance
  • 31. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 31 SPECIFIC RISK 3D Facial Intelligence solution Name: John F. Kennedy DOB: 05/29/1917 Address: 1600 Pennsylvania Ave. City: Washington State: DC 03/17/1943 Source: DL 11/9/1960 Source: NID 05/29/1962 Source: Psprt 11/22/1963 Source: Video 10/02/1963 Source: 3D Enr 04/1/1930 Source: NID Real-time identity match & alert from 2D (still frame & video) and 3D data feed Integrate, enhance and analyze existing data
  • 32. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES • a real-time event management platform that integrates predictive analytics and leading-edge visualization technologies to improve situational awareness and provide a common operating platform to emergency management services. • communicate with employees during an emergency. Predictive analytics and indications and warnings are provided. 32 SPECIFIC RISK Real-time active mobility mapping & analysis • Geographic Based Updates • Two-Way Communication • Automatically notify designated contacts • Configurable Panic Button • Advanced Predictive Analytics • Indications and Warnings • Real-Time Web-Based Dashboard • Automatically Prioritize Locations • 4D Visualization • Secure Indoor Elevation • Organize and Visualize Multimedia Data Feeds • DVR Event Data • Manage Multiple Locations from the Same Screen
  • 33. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 33 SPECIFIC RISK Command & Control Sensor Feeds Socio-Cultural Data Open Source Data Security Force Data Regional NGO Data Customers
  • 34. VEROCY.COM MANAGING VALUE OF CRITICAL INFRASTRUCTURE AND KEY RESOURCES 34 SPECIFIC RISK Integrated Security & Command • Real-time decision making aide with a common operating picture and situational awareness. • Open Architecture – Add new sensors and systems without recompiling the base software – Ingests target position information and other standard messages • 3 Dimensional map with multi-touch • Ability to add landmarks and annotate • Integrated Video Decoder for Live video sensor feeds • Motion detection and Alerts to the operator • Range Rings, Range and Bearing Calculators • Event Playback of entity movement and video • Layer Management and Filtering aiding in declutter
  • 35. THANK YOU! CRITICAL INFRASTRUCTURE & KEY RESOURCES PROTECTION INQUIRIES@VEROCY.COM