Physical Security and Resiliency Design Manual OCTOBER 1, 2020 Revised September 1, 2021

Total Page:16

File Type:pdf, Size:1020Kb

Physical Security and Resiliency Design Manual OCTOBER 1, 2020 Revised September 1, 2021 U.S. Department of Veterans Affairs VA Facilities Management Physical Security and Resiliency Design Manual OCTOBER 1, 2020 Revised September 1, 2021 Cover Photos First row: Southeast Louisiana Veterans Health Care System, 1601 Perdido Street, New Orleans, Louisiana 70112; Washington D.C. Veterans Affairs Medical Center's (DCVAMC) Community Resource and Referral Center (CRRC), 1500 Franklin Street N.E., Washington, D.C. 20018. Second row: Orlando VA Medical Center, 13800 Veterans Way, Orlando, Florida 32827; Willamette National Cemetery, 11800 Southeast Mt. Scott Boulevard, Portland, Oregon 97086; Alaska VA Healthcare System, 1201 North Muldoon Road, Anchorage, Alaska 99504. U.S. DEPARTMENT OF VETERANS AFFAIRS PHYSICAL SECURITY & RESILIENCY DESIGN MANUAL October 1, 2020 Revised September 1, 2021 This page is intentionally blank. PHYSICAL SECURITY & RESILIENCY DESIGN MANUAL October 1, 2020 Revised 09-01-2021 PREFACE It has long been the policy of the U.S. Government to assure the continuity and viability of infrastructure that is critical to the mission of a Federal agency. Laws and regulations applicable to VA include: Executive Order 12656, issued November 18, 1988, requiring the head of each Federal department and agency to be prepared to respond adequately to all national security emergencies Public Law 107-188, Public Health Security and Bioterrorism Preparedness and Response Act of 2002 Public Law 107-287, Department of Veterans Affairs Emergency Preparedness Act of 2002 38 USC Sec. 901, which gives the Secretary the authority to prescribe regulations to provide for the maintenance of law and order and the protection of persons and property on VA properties. In response, the Department of Veterans Affairs (VA) conducted physical security assessments of 118 VA facilities, which resulted in 24 physical security strategies. The VA Secretary approved the Adoption of Physical Security Strategies for VA Facilities in 2006. Physical security and resiliency design requirements were developed to implement these strategies. This Physical Security and Resiliency Design Manual (PSRDM) supersedes the 2015 Physical Security Design Manuals (PSDM). Recommendations from the 2016 Value Management Study were considered when updating the PSRDM. The PSRDM represents exemplary collaboration across the entire VA. i PHYSICAL SECURITY & RESILIENCY DESIGN MANUAL October 1, 2020 Revised 09-01-2021 ACKNOWLEDGEMENTS The Physical Security and Resiliency Design Manual for the Department of Veterans Affairs is the result of work and input from many departments and individuals. We wish to thank the following for their valuable contributions and support to this Design Manual. Office of Construction & Facilities Management (CFM) Lloyd H. Siegel, FAIA Retired. Former Associate Executive Director, Office of Facilities Planning (OFP) Donald Myers, AIA Director, Facilities Standards Service (FSS) John Bulick, RA Director, Facilities Planning Development Service (FPDS) Jay Sztuk, AIA Retired. Former Director, Cost Estimating Service (CES) Mark Wiersma, PE Director, Consulting Support Service (CSS) Juan Archilla, PE Structural Engineer, FSS Thomas Biery, PE Retired. Former Mechanical Engineer, CSS Ken Carrico, AIA Director, Project Control Service Fei (Linda) Chan, AIA Planner/Architect, FPDS Jihaad Davenport, EIT AVS Value Management Coordinator, CES Gary Fischer, AIA Senior Healthcare Architect, FSS Asok Ghosh, PE, PhD Structural Engineer, CSS Ronald Johnson Architect/Specifications Writer, FSS Michael Koch Architect, CSS Fred Lau, PE Structural Engineer, FSS Larry Lau, PE Electrical Engineer, CSS Mahmut Nazli, PE Mechanical Engineer, FSS Christine Rai Leasing Team Lead, Office of Real Property (ORP) Dennis Sheils Retired. Former Deputy Director, FPDS Matthew Shepardson Management Analyst, FPDS Michael Taylor, PE Mechanical Engineer, FSS Bryan Unger, PE Structural Engineer, FSS Lam Vu, PE Electrical Engineer, FSS Veterans Health Administration (VHA) Edward A. Litvin, PE, CHFM Deputy to Assistant Deputy Under Secretary for Health Operations & Administration Jeffery C. Belczak VISN 2 Fire Protection and Safety Engineer Peter Brewster Emergency Management Specialist, Office of Emergency Management Troy Brown VHA Senior Security Specialist ii PHYSICAL SECURITY & RESILIENCY DESIGN MANUAL October 1, 2020 Revised 09-01-2021 Randall B. Dell, MSSI, CAAMA Acting Director, Office of Emergency Management (OEM) James Johnson Retired. Former Capital Program Consultant, OCAMES David Klein, PE Deputy Director and Fire Protection Program Manager, Office of Occupational Safety, Health, and GEMS Programs Oleh Kowalskyj, MSCE, CHFM, CCS Deputy Director for Healthcare Engineering, Office of Healthcare Engineering, Healthcare Environment and Facilities Programs (HEFP) Gary Krupa, PE Retired. Former Senior Electrical Engineer, Office of Healthcare Engineering, HEFP Peter Larrimer, PE Fire Protection Operations Manager, Office of Occupational Safety, Health, and GEMS Programs Dennis Olson EMCAP Program Manager, OEM Paul Phillips VISN 20 Emergency Manager/Capital Support Abid Rahman, MD Associate Director for Program Coordination, OEM Vincent Rizzo, PE Compliance Engineer, Office of Healthcare Engineering, HEFP David Sine, DrBE, CSP, ARM, CPHRM Chief Risk Officer, Office of Quality, Safety, and Value Kevin Thompson Field Program Manager, OEM Don Wainwright, FACHE Retired. Former Compliance Engineer, Office of Healthcare Engineering, HEFP Veterans Benefits Administration (VBA) John Green Assistant Director, Emergency Preparedness, Safety, Security and Watch Officers Division Saeed Noorbakhsh Architect/Senior Project Manager National Cemetery Administration (NCA) Michael Roth Director, Design and Construction Service Peggy Jensen Project Manager, Design and Construction Service Glenn Madderom Chief, Cemetery Development & Improvement Service Office of Information and Technology (OIT) David Cheplick Director, Wide Area Network, IT Operations and Services Kelly Bates, DCIE, CPMM Data Center & Infrastructure Engineer, Solution Delivery, Data Center & Infrastructure Engineering iii PHYSICAL SECURITY & RESILIENCY DESIGN MANUAL October 1, 2020 Revised 09-01-2021 Kevin Grzelka, CTIA, CISSP Data Center & Infrastructure Engineer, Solution Delivery, Data Center & Infrastructure Engineering John Wernau, DCIE Data Center & Infrastructure Engineer, Solution Delivery, Data Center & Infrastructure Engineering Michael Julian, RCDD Data Center & Infrastructure Engineer, Solution Delivery, Data Center & Infrastructure Engineering Curtis Derbigny Data Center & Infrastructure Engineer, Solution Delivery, Data Center & Infrastructure Engineering Matthew Hammaker TVE Project Manager, IT Operations and Services Office of Management (OM) Nikki Zook Management Analyst, Office of Asset Enterprise Management Office of Operations, Security, and Preparedness (OSP) Darryl G. Blackwell Division Chief, Policy and Infrastructure Protection Division, Office of Security and Law Enforcement Keith Frost Retired. Former Chief, Policy and Infrastructure Protection Division, Office of Security and Law Enforcement Joel Andrews Security Specialist Larry Casserly PACS-Program Manager Forrest Frakes, GCL, CET, PC Retired. Former Acting Chief, Special Systems Hector Marcayda Deputy HSPD-12 Program Manager John Robertson Program Analyst Keith Van Bakel Retired. Former Telecommunications Specialist National Institute of Building Sciences (NIBS) Project Team Michael Chipley, PhD, GICSP, PMP, LEED AP President, The PMC Group, LLC Theodore C. Moeller, PE, LEED AP Director of Electrical & Technology Engineering, GLHN Architects & Engineers, Inc Terrence P. Ryan, CPP President, TRyan AT/FP LLC Tom O. Sachs, AIA Director of Architectural Services, OKKS Studios, a subsidiary of Delta Engineers, Architects & Land Surveyors, PC, Kenneth Schram, PE LEED AP Principal-in-Charge Mechanical Engineer, Plumbing/Fire Protection Engineer, Syska Hennessy Group Robert Smilowitz, PhD, PE Principal, Thornton Tomasetti, Weidlinger Protective Design Practice iv PHYSICAL SECURITY & RESILIENCY DESIGN MANUAL October 1, 2020 Revised 09-01-2021 Peggy Van Eepoel, PE Associate Principal, Thornton Tomasetti, Weidlinger Protective Design Practice Nanne Davis Eliot, AIA, NCARB, PMP Esquire, Program Director, National Institute of Building Sciences v PHYSICAL SECURITY & RESILIENCY DESIGN MANUAL October 1, 2020 Revised 09-01-2021 TABLE OF CONTENTS 1 INTRODUCTION ..................................................................................................... 1-1 1.1 Scope, Purpose, and Goals ...................................................................................... 1-1 1.2 Authority ................................................................................................................. 1-2 1.3 Administration and Enforcement ........................................................................... 1-3 1.4 VA Facilities ............................................................................................................. 1-4 1.5 Planning, Budgeting, and Programming for Physical Security and Resiliency ........ 1-21 1.6 Introduction to Physical Security and Resiliency Concepts .................................... 1-22 1.7 Coordination and Prioritization of Physical Security and Resiliency Requirements with Other Documents .................................................................................................... 1-23 1.8 Requirements for Subject Matter Specialists ........................................................
Recommended publications
  • Project Division
    MAGAL SECURITY SYSTEMS Focused Solutions for the World’s Security Needs Kobi Vinokur, CFO March 2020 1 / SAFE HARBOR/ Statements concerning Magal Security’s business outlook or future economic performance, product introductions and plans and objectives related thereto, and statements concerning assumptions made or expectations as to any future events, conditions, performance or other matters, are "forward-looking statements'' as that term is defined under U.S. federal securities laws. Forward-looking statements are subject to various risks, uncertainties and other factors that could cause actual results to differ materially from those stated in such statements. These risks, uncertainties and factors include, but are not limited to: the effect of global economic conditions in general and conditions affecting Magal Security’s industry and target markets in particular; shifts in supply and demand; market acceptance of new products and continuing products' demand; the impact of competitive products and pricing on Magal Security’s and its customers' products and markets; timely product and technology development/upgrades and the ability to manage changes in market conditions as needed; the integration of acquired companies, their products and operations into Magal Security’s business; and other factors detailed in Magal Security’s filings with the Securities and Exchange Commission. Magal Security assumes no obligation to update the information in this release. Estimated growth rates and other predictive statements represent Magal Security’s assumptions and expectations in light of currently available information. Estimated growth rates and other predictive statements, are based on industry trends, circumstances involving clients and other factors, and they involve risks, variables and uncertainties.
    [Show full text]
  • Standard Review Plan 13.6.2 Physical Security
    NUREG-0800 U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN 13.6.2 PHYSICAL SECURITY - DESIGN CERTIFICATION REVIEW RESPONSIBILITIES Primary – Office of Nuclear Security and Incident Response Secondary – None I. AREAS OF REVIEW For design certification (DC) applications, the review involves the evaluation of the physical security program design, to include those physical protection and mitigative measure elements identified to be within the scope of an applicant’s design. The review must include the required physical security elements of a DC application and may also include a review of the voluntarily submitted physical protection and mitigative measure elements. DRAFT - August 2007 USNRC STANDARD REVIEW PLAN This Standard Review Plan, NUREG-0800, has been prepared to establish criteria that the U.S. Nuclear Regulatory Commission staff responsible for the review of applications to construct and operate nuclear power plants intends to use in evaluating whether an applicant/licensee meets the NRC's regulations. The Standard Review Plan is not a substitute for the NRC's regulations, and compliance with it is not required. However, an applicant is required to identify differences between the design features, analytical techniques, and procedural measures proposed for its facility and the SRP acceptance criteria and evaluate how the proposed alternatives to the SRP acceptance criteria provide an acceptable method of complying with the NRC regulations. The standard review plan sections are numbered in accordance with corresponding sections in Regulatory Guide 1.70, "Standard Format and Content of Safety Analysis Reports for Nuclear Power Plants (LWR Edition)." Not all sections of Regulatory Guide 1.70 have a corresponding review plan section.
    [Show full text]
  • Water Sector Cybersecurity Brief for States
    WATER SECTOR CYBERSECURITY BRIEF FOR STATES Introduction Implementing cybersecurity best practices is critical for water and wastewater utilities. Cyber-attacks are a growing threat to critical infrastructure sectors, including water and wastewater systems. Many critical infrastructure facilities have experienced cybersecurity incidents that led to the disruption of a business process or critical operation. Cyber Threats to Water and Wastewater Systems Cyber-attacks on water or wastewater utility business enterprise or process control systems can cause significant harm, such as: • Upset treatment and conveyance processes by opening and closing valves, overriding alarms or disabling pumps or other equipment; • Deface the utility’s website or compromise the email system; • Steal customers’ personal data or credit card information from the utility’s billing system; and • Install malicious programs like ransomware, which can disable business enterprise or process control operations. These attacks can: compromise the ability of water and wastewater utilities to provide clean and safe water to customers, erode customer confidence, and result in financial and legal liabilities. Benefits of a Cybersecurity Program The good news is that cybersecurity best practices can be very effective in eliminating the vulnerabilities that cyber-attacks exploit. Implementing a basic cybersecurity program can: • Ensure the integrity of process control systems; • Protect sensitive utility and customer information; • Reduce legal liabilities if customer or employee personal information is stolen; and • Maintain customer confidence. Challenges for Utilities in Starting a Cybersecurity Program Many water and wastewater utilities, particularly small systems, lack the resources for information technology (IT) and security specialists to assist them with starting a cybersecurity program. Utility personnel may believe that cyber-attacks do not present a risk to their systems or feel that they lack the technical capability to improve their cybersecurity.
    [Show full text]
  • Security Studies (SCST) 1
    Security Studies (SCST) 1 SECURITY STUDIES (SCST) SCST 2363. Intro to Homeland Security. 3 Hours. This introductory course is designed to familiarize students with the field of security studies. Topics include Surveys, threats, and challenges from terrorist attacks, to pandemics to climate change. SCST 2364. Homeland Sec Research Methods. 3 Hours. Students gain knowledge about research design and methodology. Students develop the ability to analyze and critically evaluate data, ideas, arguments, and policy. Students also hone critical thinking skills and enhance their ability to be effective consumers of data. SCST 2365. Intro to Emergency Management. 3 Hours. Students study the evolution of emergency management in the United States from early community-based response practices to the current robust national system focused on risk analysis, communications, risk prevention and mitigation, and social and economic recovery. Students examine benchmark policies, regulations, and directives that form the basis of the emergency management field. Students engage in case study research and gain exposure to current and emerging trends in emergency management domestically and internationally. SCST 2366. Introduction to Cybersecurity. 3 Hours. Students examine the problem of cybersecurity from a homeland security perspective. Students explore the diversity of threats and security measures in cyberspace from a non-technical perspective and with a focus on laws, strategies, and policies. Security issues, from crime to espionage to cyberwar, will be considered on both the micro and macro-level. SCST 2368. Transportation Security. 3 Hours. Students examine a wide range of facets that comprise the field of transportation security. As part of this course students assess the capabilities and vulnerabilities of the transportation network as well as explore the agencies and governance issues impacting transportation security.
    [Show full text]
  • Critical Infrastructure Protection: Concepts and Continuum
    Critical Infrastructure Protection: Concepts and Continuum Contents Introduction........................................................................................................ 3 Terms and concepts..................................................................................................................4 Protecting critical infrastructure is a continuum............................................ 5 Trusted collaboration and information sharing ground the CIP continuum......6 Key CIP capabilities ...................................................................................................................6 Sharing threat information leads to improved CIP.......................................................7 Establishing trustworthy policies and plans.................................................... 9 Prepare...........................................................................................................................................9 Review policies and existing programs.........................................................................9 Identify operational responsibilities...............................................................................9 Partner.........................................................................................................................................10 Coordinate.................................................................................................................................10 Plan...............................................................................................................................................12
    [Show full text]
  • Critical Infrastructure: Security Preparedness and Maturity Sponsored by Unisys Independently Conducted by Ponemon Institute LLC Publication Date: July 2014
    Critical Infrastructure: Security Preparedness and Maturity Sponsored by Unisys Independently conducted by Ponemon Institute LLC Publication Date: July 2014 31 Part 1. Introduction Ponemon Institute is pleased to present the results of the “Critical Infrastructure: Security Preparedness and Maturity” study, sponsored by Unisys. The purpose of this research is to learn how utility, oil and gas, alternate energy and manufacturing organizations are addressing cyber security threats. These industries have become a high profile target for security exploits. Moreover, it has been reported that if their industrial controls systems (ICS) and supervisory control and data acquisition (SCADA) systems were attacked the damage could be enormous. For example, an unnamed natural gas company hired an IT firm to test its corporate information system. POWER Magazine reported, “The consulting organization carelessly ventured into a part of the network that was directly connected the SCADA system. The penetration test locked up the SCADA system and the utility was not able to send gas through its pipelines for four hours. The outcome was the loss of service to its customer base for those four hours.”1 As the findings reveal, organizations are not as prepared as they should be to deal with the sophistication and frequency of a cyber threat or the negligence of an employee or third party. In fact, the majority of participants in this study do not believe their companies’ IT security programs are “mature.” For purposes of this research, a mature stage is defined as having most IT security program activities deployed. Most companies have defined what their security initiatives are but deployment and execution are still in the early or middle stages.
    [Show full text]
  • Standards for Building Materials, Equipment and Systems Used in Detention and Correctional Facilities
    NATIONAL INSTITUTE OF STANDARDS & TECHNOLOGY Research Information Center Gaithersburg, MD 20890 PUBLICATIONS NBSIR 87-3687 Standards for Building Materials, Equipment and Systems Used in Detention and Correctional Facilities Robert D. Dikkers Belinda C. Reeder U.S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Building Technology Building Environment Division Gaithersburg, MD 20899 November 1987 Prepared for: -QC ment of Justice 100 ititute of Corrections i, DC 20534 . U56 87-3687 1987 C . 2 Research Information Center National Bureau of Standards Gaithersburg, Maryland NBSIR 87-3687 20899 STANDARDS FOR BUILDING MATERIALS, EQUIPMENT AND SYSTEMS USED IN u - DETENTION AND CORRECTIONAL FACILITIES Robert D. Dikkers Belinda C. Reeder U.S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Building Technology Building Environment Division Gaithersburg, MD 20899 November 1987 Prepared for: U.S. Department of Justice National Institute of Corrections Washington, DC 20534 U.S. DEPARTMENT OF COMMERCE, C. William Verity, Secretary NATIONAL BUREAU OF STANDARDS, Ernest Ambler, Director TABLE OF CONTENTS Page Preface . vi Acknowledgements vii Executive Summary ix I . INTRODUCTION 1 A. Background , 1 B. Objectives and Scope of NBS Study 3 II. FACILITY DESIGN AND CONSTRUCTION 6 A. Facility Development Process 6 1 . Needs Assessment ........................................ 6 2 . Master Plan 6 3 . Mission Statement . 6 4. Architectural Program 7 5. Schematic Design and Design Development 7 6 . Construction 9 B. Security Levels 10 C . ACA S tandar ds 13 . III MATERIALS , EQUIPMENT AND SYSTEMS .... 14 A. Introduction 14 B. Performance Problems 15 C. Available Standards/Guide Specifications 20 iii TABLE OF CONTENTS (continued) 5 Page D« Perimeter Systems 21 1 .
    [Show full text]
  • Critical Infrastructure and Cyber Security Across the World
    $&' ! " ! " $).(/(-+,, $% % #% $%$% % ! " ! ! George Bush School of Government and Public Service Texas A&M University Dr. Engel’s Capstone, 2011 Introduction Executive Summary We were tasked by CENTRA Technology, Inc. to create a methodology that could be used to prioritize critical cyber assets in the United States. We have answered that call by developing a user-friendly, consequence-based methodology that requires the end user to carefully consider their cyber assets’ contributions to vital missions of national security, economic security, and public safety. The user will be able to clearly visualize the potential impact of a loss of cyber assets on those three indicators vis-à-vis one another, which is especially important in the midst of the current budgetary uncertainty in Washington. In this study, we first present our definitions of the three indicators, an overview of the 18 sectors of critical infrastructure and commonalities and characteristics of their operating systems, a brief review of the literature on cyber security to date, and, of course a thorough discussion of the intricacies of how our methodology works. Outline of the Problem Over the past few years, computers and the Internet have become an omnipresent force within the American economy. Industries considered to be vital to the nation's well being rely increasingly technology to improve their day-to-day functions. Greater dependency on cyber assets has also opened up many industries to numerous vulnerabilities that can be manipulated through accidental or malicious intent. The Federal Government has acknowledged the problem of cyber-attacks that could arise because of these vulnerabilities in the system.
    [Show full text]
  • Protecting the Water Sector's Critical
    Protecting the Water Sector’s Critical Infrastructure Information Analysis of State Laws Ideal crop marks create jobs 51/shutterstock.com jobs create Dedicated to the World’s Most Important Resource ® Gorodenkoff/shutterstock.com Acknowledgements The research for this report was supported by policy interns in AWWA’s Government Affairs Office in Washington, DC, including Gabriela Rossner and Erin Ress and managed by Kevin Morley, AWWA Federal Relations Manager. Disclaimer This report includes excerpts of statutory text addressing the protections provided to information that may be included in a risk and resilience assessment and/or emergency response plan prepared by a community water system in compliance with §2013 of Americas Water Infrastructure Act of 2018. This report is provided for reference purposes only and does not represent an official legal opinion. Legal counsel should be consulted when exercising these information protections. © Copyright 2020 American Water Works Association | 3 SUMMARY: merica’s Water Infrastructure Act (AWIA) of 2018 requires community water systems that serve 3,300 or more persons to 1) conduct a risk and resilience Aassessment (RRA) and 2) prepare or revise an emergency response plan (ERP). In recognition of the security sensitive information developed by state and local entities, many states have taken steps to exempt this information from public release. Thirty- four states currently have disclosure exemption laws that specifically address the type of information a utility would be required to develop and prepare in compliance with AWIA. The remaining states have some protections that may, or may not, apply to critical infrastructure information. This report is a review and summary of the protections available for the information developed by a water utility per AWIA at the state level.
    [Show full text]
  • Cybersecurity Recommendations for Critical Infrastructure Using Video
    For more information, please visit cisa.gov/telework CYBERSECURITY RECOMMENDATIONS FOR CRITICAL INFRASTRUCTURE USING VIDEO CONFERENCING This videoconferencing product is for executives charged with securing critical infrastructure networks, and for critical infrastructure employees to help them think through related cybersecurity and physical issues. RAPID INCREASE IN ADOPTION AND DEPLOYMENT OF VIDEO CONFERENCING American companies and government agencies are increasingly adopting workplace flexibilities such as telework. Advances in information technology, such as the increased availability of video conferencing software and video conferencing capabilities incorporated into other products like collaboration software, facilitate telework. Users are likely to need video conferencing and other collaboration solutions to stay connected as they telework. It is critical that cybersecurity requirements and risk exposure for products be counterbalanced appropriately against remote access product benefits such as convenience, usability, speed, and stability. The following advisory guidance is intended to support the incorporation of cybersecurity considerations when adopting or expanding the use of video conferencing software and related collaboration tools. The guidance also includes suggestions for individuals using these tools to host and attend meetings—information that is particularly critical as organizations increasingly broadcast sensitive discussions over these platforms. As the authority for securing telework, the Cybersecurity and
    [Show full text]
  • Security Industry Monitor March 2014
    Security Industry Monitor March 2014 For additional information on our Security Team, please contact: John E. Mack III Co-head, Investment Banking Group Head of Mergers and Acquisitions (310) 246-3705 [email protected] Michael McManus Managing Director, Investment Banking Group (310) 246-3702 [email protected] PLEASE SEE IMPORTANT DISCLOSURES ON LAST PAGE About Imperial Capital, LLC Imperial Capital is a full-service investment bank offering a uniquely integrated platform of comprehensive services to institutional investors and middle market companies. We offer sophisticated sales and trading services to institutional investors and a wide range of investment banking advisory, capital markets and restructuring services to middle market corporate clients. We also provide proprietary research across an issuer’s capital structure, including bank debt, debt securities, hybrid securities, preferred and common equity and special situations claims. Our comprehensive and integrated service platform, expertise across the full capital structure, and deep industry sector knowledge enable us to provide clients with superior advisory services, capital markets insight, investment ideas and trade execution. We are quick to identify opportunities under any market conditions and we have a proven track record of offering creative, proprietary solutions to our clients. Imperial Capital’s expertise includes the following sectors: Aerospace, Defense & Government Services, Airlines & Transportation, Business Services, Consumer, Energy (Clean Energy and Traditional Energy), Financial Services, Gaming & Leisure, General Industrials, Healthcare, Homebuilding & Real Estate, Media & Telecommunications, Security & Homeland Security and Technology. Imperial Capital has three principal businesses: Investment Banking, Institutional Sales & Trading and Institutional Research. For additional information, please visit our Web site at www.imperialcapital.com.
    [Show full text]
  • Gao-14-459, Maritime Critical Infrastructure Protection
    United States Government Accountability Office Report to the Chairman, Committee on Commerce, Science, and Transportation, U.S. Senate June 2014 MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS Needs to Better Address Port Cybersecurity GAO-14-459 June 2014 MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS Needs to Better Address Port Cybersecurity Highlights of GAO-14-459, a report to the Chairman, Committee on Commerce, Science, and Transportation, U.S. Senate Why GAO Did This Study What GAO Found U.S. maritime ports handle more than Actions taken by the Department of Homeland Security (DHS) and two of its $1.3 trillion in cargo annually. The component agencies, the U.S. Coast Guard and Federal Emergency operations of these ports are Management Agency (FEMA), as well as other federal agencies, to address supported by information and cybersecurity in the maritime port environment have been limited. communication systems, which are • susceptible to cyber-related threats. While the Coast Guard initiated a number of activities and coordinating Failures in these systems could strategies to improve physical security in specific ports, it has not conducted degrade or interrupt operations at a risk assessment that fully addresses cyber-related threats, vulnerabilities, ports, including the flow of commerce. and consequences. Coast Guard officials stated that they intend to conduct Federal agencies—in particular DHS— such an assessment in the future, but did not provide details to show how it and industry stakeholders have would address cybersecurity. Until the Coast Guard completes a thorough specific roles in protecting maritime assessment of cyber risks in the maritime environment, the ability of facilities and ports from physical and stakeholders to appropriately plan and allocate resources to protect ports cyber threats.
    [Show full text]