lastID = -291252
Skip to main content Skip to top navigation Skip to site search
Top of page
  • My citations options
    Web Back (from Web)
    Chicago Back (from Chicago)
    MLA Back (from MLA)
Close action menu

You need to login to use this feature.

Please wait a moment…
Please wait while we update your results...
Please wait a moment...
Description: Access Water
Context Menu
Description: Book cover
Integrating Security into Utility's Management Portfolio A Case Summary
  • Browse
  • Compilations
    • Compilations list
  • Subscriptions
Tools

Related contents

Loading related content

Workflow

No linked records yet

X
  • Current: 2022-05-06 20:12:39 Adam Phillips
  • 2022-05-06 20:12:38 Adam Phillips
  • 2020-03-27 02:12:27 Adam Phillips
  • 2020-02-01 00:38:12 Administrator
  • 2020-02-01 00:38:11 Administrator
Description: Access Water
  • Browse
  • Compilations
  • Subscriptions
Log in
0
Accessibility Options

Base text size -

This is a sample piece of body text
Larger
Smaller
  • Shopping basket (0)
  • Accessibility options
  • Return to previous
Description: Book cover
Integrating Security into Utility's Management Portfolio A Case Summary

Integrating Security into Utility's Management Portfolio A Case Summary

Integrating Security into Utility's Management Portfolio A Case Summary

  • New
  • View
  • Details
  • Reader
  • Default
  • Share
  • Email
  • Facebook
  • Twitter
  • LinkedIn
  • New
  • View
  • Default view
  • Reader view
  • Data view
  • Details

This page cannot be printed from here

Please use the dedicated print option from the 'view' drop down menu located in the blue ribbon in the top, right section of the publication.

screenshot of print menu option

Description: Book cover
Integrating Security into Utility's Management Portfolio A Case Summary
Abstract
Since 9/11, utilities have done the obvious things to position themselves and improve their security. They have assessed their vulnerability, built appropriate fences and barriers, documented scenarios about what could happen, improved their security practices, and trained staff members. The question that remains is: Is it enough?In this age of terrorism, there is only one certainty: Utilities are vulnerable to virtually any kind of attack. A terrorist with even the most limited knowledge of utility systems, coupled with skills in using guns, explosives, and contaminants, can do much harm.Through vulnerability assessments, utilities may discover areas within their existing security systems that are ineffective, including the lack of proper equipment and preparation by state and local law enforcement to stop the most modest of terrorists. Choosing where and how a utility should spend precious financial resources is essential to addressing any security problem. As it is today, security spending varies dramatically and utilities should approach spending in a uniform way. Doing all that can be done with technology makes the best sense for both the utility's safety and financial viability by leveraging the utility's workforce effectively.This paper is based the result of two years of work training with more than 100 organizations, executing more than 30 vulnerability assessments, and developing many solutions for water/wastewater and electric utilities to reduce their risks from terrorism. This paper highlights the state of the utility industry in terms of vulnerability and will present the top 10 strengths and the top five weaknesses that were documented in the work.The paper discusses strategies a utility can use to overcome and manage the risks associated with security needs today as well as prepare for a changing future. A utility's key strategy is to make the best use of the utility's response capabilities to stop the terrorist from accomplishing their objective. Utilities can do a lot today with the resources they have to prevent or reduce the impact of a terrorist's acts and this work also can provide other benefits. By focusing on response, utilities can understand what they should and should not do.
Since 9/11, utilities have done the obvious things to position themselves and improve their security. They have assessed their vulnerability, built appropriate fences and barriers, documented scenarios about what could happen, improved their security practices, and trained staff members. The question that remains is: Is it enough?In this age of terrorism, there is only one certainty: Utilities are...
Author(s)
Jack JacobsKevin Johnson
SourceProceedings of the Water Environment Federation
SubjectSession 24: Security
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2004
ISSN1938-6478
SICI1938-6478(20040101)2004:2L.865;1-
DOI10.2175/193864704784342514
Volume / Issue2004 / 2
Content sourceUtility Management Conference
First / last page(s)865 - 872
Copyright2004
Word count355

Purchase price $11.50

Get access
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'Integrating Security into Utility's Management Portfolio A Case Summary'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: Book cover
Integrating Security into Utility's Management Portfolio A Case Summary
Pricing
Non-member price: $11.50
Member price:
-291252
Get access
-291252
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'Integrating Security into Utility's Management Portfolio A Case Summary'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.

Details

Description: Book cover
Integrating Security into Utility's Management Portfolio A Case Summary
Abstract
Since 9/11, utilities have done the obvious things to position themselves and improve their security. They have assessed their vulnerability, built appropriate fences and barriers, documented scenarios about what could happen, improved their security practices, and trained staff members. The question that remains is: Is it enough?In this age of terrorism, there is only one certainty: Utilities are vulnerable to virtually any kind of attack. A terrorist with even the most limited knowledge of utility systems, coupled with skills in using guns, explosives, and contaminants, can do much harm.Through vulnerability assessments, utilities may discover areas within their existing security systems that are ineffective, including the lack of proper equipment and preparation by state and local law enforcement to stop the most modest of terrorists. Choosing where and how a utility should spend precious financial resources is essential to addressing any security problem. As it is today, security spending varies dramatically and utilities should approach spending in a uniform way. Doing all that can be done with technology makes the best sense for both the utility's safety and financial viability by leveraging the utility's workforce effectively.This paper is based the result of two years of work training with more than 100 organizations, executing more than 30 vulnerability assessments, and developing many solutions for water/wastewater and electric utilities to reduce their risks from terrorism. This paper highlights the state of the utility industry in terms of vulnerability and will present the top 10 strengths and the top five weaknesses that were documented in the work.The paper discusses strategies a utility can use to overcome and manage the risks associated with security needs today as well as prepare for a changing future. A utility's key strategy is to make the best use of the utility's response capabilities to stop the terrorist from accomplishing their objective. Utilities can do a lot today with the resources they have to prevent or reduce the impact of a terrorist's acts and this work also can provide other benefits. By focusing on response, utilities can understand what they should and should not do.
Since 9/11, utilities have done the obvious things to position themselves and improve their security. They have assessed their vulnerability, built appropriate fences and barriers, documented scenarios about what could happen, improved their security practices, and trained staff members. The question that remains is: Is it enough?In this age of terrorism, there is only one certainty: Utilities are...
Author(s)
Jack JacobsKevin Johnson
SourceProceedings of the Water Environment Federation
SubjectSession 24: Security
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2004
ISSN1938-6478
SICI1938-6478(20040101)2004:2L.865;1-
DOI10.2175/193864704784342514
Volume / Issue2004 / 2
Content sourceUtility Management Conference
First / last page(s)865 - 872
Copyright2004
Word count355

Actions, changes & tasks

Outstanding Actions

Add action for paragraph

Current Changes

Add signficant change

Current Tasks

Add risk task

Connect with us

Follow us on Facebook
Follow us on Twitter
Connect to us on LinkedIn
Subscribe on YouTube
Powered by Librios Ltd
Powered by Librios Ltd
Authors
Terms of Use
Policies
Help
Accessibility
Contact us
Copyright © 2024 by the Water Environment Federation
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: WWTF Digital Boot 180x150
WWTF Digital (180x150)
Created on Jul 02
Websitehttps:/­/­www.wef.org/­wwtf?utm_medium=WWTF&utm_source=AccessWater&utm_campaign=WWTF
180x150
Jack Jacobs# Kevin Johnson. Integrating Security into Utility's Management Portfolio A Case Summary. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Web. 28 Sep. 2025. <https://www.accesswater.org?id=-291252CITANCHOR>.
Jack Jacobs# Kevin Johnson. Integrating Security into Utility's Management Portfolio A Case Summary. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Accessed September 28, 2025. https://www.accesswater.org/?id=-291252CITANCHOR.
Jack Jacobs# Kevin Johnson
Integrating Security into Utility's Management Portfolio A Case Summary
Access Water
Water Environment Federation
December 22, 2018
September 28, 2025
https://www.accesswater.org/?id=-291252CITANCHOR