lastID = -290433
Skip to main content Skip to top navigation Skip to site search
Top of page
  • My citations options
    Web Back (from Web)
    Chicago Back (from Chicago)
    MLA Back (from MLA)
Close action menu

You need to login to use this feature.

Please wait a moment…
Please wait while we update your results...
Please wait a moment...
Description: Access Water
Context Menu
Description: Book cover
BEYOND VULNERABILITY – WHAT YOU SHOULD BE DOING (AND NOT DOING) NOW!
  • Browse
  • Compilations
    • Compilations list
  • Subscriptions
Tools

Related contents

Loading related content

Workflow

No linked records yet

X
  • Current: 2020-01-31 20:26:25 Administrator
  • 2020-01-31 20:26:24 Administrator
Description: Access Water
  • Browse
  • Compilations
  • Subscriptions
Log in
0
Accessibility Options

Base text size -

This is a sample piece of body text
Larger
Smaller
  • Shopping basket (0)
  • Accessibility options
  • Return to previous
Description: Book cover
BEYOND VULNERABILITY – WHAT YOU SHOULD BE DOING (AND NOT DOING) NOW!

BEYOND VULNERABILITY – WHAT YOU SHOULD BE DOING (AND NOT DOING) NOW!

BEYOND VULNERABILITY – WHAT YOU SHOULD BE DOING (AND NOT DOING) NOW!

  • New
  • View
  • Details
  • Reader
  • Default
  • Share
  • Email
  • Facebook
  • Twitter
  • LinkedIn
  • New
  • View
  • Default view
  • Reader view
  • Data view
  • Details

This page cannot be printed from here

Please use the dedicated print option from the 'view' drop down menu located in the blue ribbon in the top, right section of the publication.

screenshot of print menu option

Description: Book cover
BEYOND VULNERABILITY – WHAT YOU SHOULD BE DOING (AND NOT DOING) NOW!
Abstract
Since 9/11, utilities have done the obvious things to position themselves and improve their security. They have assessed their vulnerability, they have built the appropriate fences and barriers, they have documented scenarios about what could happen, they have improved their security practices, and they have executed training. All of these things have been done by all utilities. The question that remains–is this enough, or is this too much?This presentation shows the current situation after 18 months of vulnerability assessments for the wastewater industry. This presentation will highlight the state of the wastewater industry in terms of vulnerability and will present the top ten strengths and the top five weaknesses that were documented as a result of training over 100 organizations and executing over 20 vulnerability assessments throughout the country.The Catch-22 will be fully explained and documented in the presentation. What it means is achieving the delicate balance between spending whatever it takes to avoid a terrorist catastrophe and the need to be effective, efficient, and always getting better. These are sometimes mutually exclusive and need to be carefully balanced.Effective, efficient solutions maximize the value of your investment, and can help resist the political pressure for the dramatic and costly response that creates a permanent bureaucracy. Of course utilities must be secure, but in prudent and reasonable ways.Rather than adding a new bureaucracy of people, utilities can use technology as the main strategy for security, using it first to deter and detect, and then, if necessary, to react and respond. Use technology as the lever to contain costs, yet assure safe and secure facilities and operations.The impact of these findings on the wastewater community is significant particularly with today's shrinking budgets. Doing all that you can with technology (that keeps improving every day in price/performance) makes the best investment sense for both safety and the utility's future.
Since 9/11, utilities have done the obvious things to position themselves and improve their security. They have assessed their vulnerability, they have built the appropriate fences and barriers, they have documented scenarios about what could happen, they have improved their security practices, and they have executed training. All of these things have been done by all utilities. The question that...
Author(s)
John K. Jack JacobsAlan Manning
SourceProceedings of the Water Environment Federation
SubjectSession 81 Management: Security
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2003
ISSN1938-6478
SICI1938-6478(20030101)2003:5L.581;1-
DOI10.2175/193864703784606927
Volume / Issue2003 / 5
Content sourceWEFTEC
First / last page(s)581 - 591
Copyright2003
Word count318

Purchase price $11.50

Get access
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'BEYOND VULNERABILITY – WHAT YOU SHOULD BE DOING (AND NOT DOING) NOW!'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: Book cover
BEYOND VULNERABILITY – WHAT YOU SHOULD BE DOING (AND NOT DOING) NOW!
Pricing
Non-member price: $11.50
Member price:
-290433
Get access
-290433
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'BEYOND VULNERABILITY – WHAT YOU SHOULD BE DOING (AND NOT DOING) NOW!'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.

Details

Description: Book cover
BEYOND VULNERABILITY – WHAT YOU SHOULD BE DOING (AND NOT DOING) NOW!
Abstract
Since 9/11, utilities have done the obvious things to position themselves and improve their security. They have assessed their vulnerability, they have built the appropriate fences and barriers, they have documented scenarios about what could happen, they have improved their security practices, and they have executed training. All of these things have been done by all utilities. The question that remains–is this enough, or is this too much?This presentation shows the current situation after 18 months of vulnerability assessments for the wastewater industry. This presentation will highlight the state of the wastewater industry in terms of vulnerability and will present the top ten strengths and the top five weaknesses that were documented as a result of training over 100 organizations and executing over 20 vulnerability assessments throughout the country.The Catch-22 will be fully explained and documented in the presentation. What it means is achieving the delicate balance between spending whatever it takes to avoid a terrorist catastrophe and the need to be effective, efficient, and always getting better. These are sometimes mutually exclusive and need to be carefully balanced.Effective, efficient solutions maximize the value of your investment, and can help resist the political pressure for the dramatic and costly response that creates a permanent bureaucracy. Of course utilities must be secure, but in prudent and reasonable ways.Rather than adding a new bureaucracy of people, utilities can use technology as the main strategy for security, using it first to deter and detect, and then, if necessary, to react and respond. Use technology as the lever to contain costs, yet assure safe and secure facilities and operations.The impact of these findings on the wastewater community is significant particularly with today's shrinking budgets. Doing all that you can with technology (that keeps improving every day in price/performance) makes the best investment sense for both safety and the utility's future.
Since 9/11, utilities have done the obvious things to position themselves and improve their security. They have assessed their vulnerability, they have built the appropriate fences and barriers, they have documented scenarios about what could happen, they have improved their security practices, and they have executed training. All of these things have been done by all utilities. The question that...
Author(s)
John K. Jack JacobsAlan Manning
SourceProceedings of the Water Environment Federation
SubjectSession 81 Management: Security
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2003
ISSN1938-6478
SICI1938-6478(20030101)2003:5L.581;1-
DOI10.2175/193864703784606927
Volume / Issue2003 / 5
Content sourceWEFTEC
First / last page(s)581 - 591
Copyright2003
Word count318

Actions, changes & tasks

Outstanding Actions

Add action for paragraph

Current Changes

Add signficant change

Current Tasks

Add risk task

Connect with us

Follow us on Facebook
Follow us on Twitter
Connect to us on LinkedIn
Subscribe on YouTube
Powered by Librios Ltd
Powered by Librios Ltd
Authors
Terms of Use
Policies
Help
Accessibility
Contact us
Copyright © 2024 by the Water Environment Federation
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: WWTF Digital Boot 180x150
WWTF Digital (180x150)
Created on Jul 02
Websitehttps:/­/­www.wef.org/­wwtf?utm_medium=WWTF&utm_source=AccessWater&utm_campaign=WWTF
180x150
John K. Jack Jacobs# Alan Manning. BEYOND VULNERABILITY – WHAT YOU SHOULD BE DOING (AND NOT DOING) NOW!. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Web. 6 Jun. 2025. <https://www.accesswater.org?id=-290433CITANCHOR>.
John K. Jack Jacobs# Alan Manning. BEYOND VULNERABILITY – WHAT YOU SHOULD BE DOING (AND NOT DOING) NOW!. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Accessed June 6, 2025. https://www.accesswater.org/?id=-290433CITANCHOR.
John K. Jack Jacobs# Alan Manning
BEYOND VULNERABILITY – WHAT YOU SHOULD BE DOING (AND NOT DOING) NOW!
Access Water
Water Environment Federation
December 22, 2018
June 6, 2025
https://www.accesswater.org/?id=-290433CITANCHOR