45
An Introduction to Emergency Preparedness

Introduction to Emergency Preparedness

Embed Size (px)

Citation preview

Page 1: Introduction to Emergency Preparedness

An Introduction to Emergency

Preparedness

Page 2: Introduction to Emergency Preparedness

Michigan SBDC Customer Groups

Four customer groups are served by the SBDC:

• New ventures • Existing businesses • Growth companies • Advanced technology companies

Page 3: Introduction to Emergency Preparedness

Michigan SBDC Services

Four core services are provided by the SBDC:

• No cost 1:1 consulting • Business education • Information based planning through (secondary) market research• Technology commercialization

Page 4: Introduction to Emergency Preparedness

Michigan SBDC Teams

Four teams of consultants provide services for the SBDC:

• Small Business Team• Business Growth Team• Export Assistance Team• Technology Commercialization Team

Page 5: Introduction to Emergency Preparedness

Michigan SBDC Business EducationTake advantage of these learning opportunities for Entrepreneurs. Whether online or at your local MISBDC office, the following trainings are presented by experienced professionals who can help you start and grow your business. Select from the range of topics where and when you need them. Registration is easy: www.SBDCMichigan.org

• Starting a Business• Business Plan• Financial and Accounting• Customer Relations• Government Contracting• Internet and Social Media• Legal• Management• Marketing and Sales

Page 6: Introduction to Emergency Preparedness

The Michigan SBDC is funded through a cooperative agreement with the U.S. Small Business Administration (SBA), the Michigan

Economic Development Corporation (MEDC) and matching funds from Local Network partners in each region.

The Michigan SBDC

Michigan SBDC State Lead CenterGrand Valley State UniversitySeidman College of Business

Ian Rogers – Training Managerwww.SBDCMichigan.org

Page 7: Introduction to Emergency Preparedness

Jerry BeckerDirector CCEMHSD Background/Bio

• 1979 – 2008 Police Officer/ Sheriff’s Deputy/ Deputy Marshal Michigan, Texas, Colorado. Retired 2015.

• 1989 – 2010 Fire Marshal, Captain – Retired 2010. Fire/Haz Mat/ Emergency Vehicle Driving Instructor – MFFTC/ Current.

• 2009 – Present Clare County Emergency Management/Homeland Security Director, Director Clare County Broadband Network Users Group, Oversee Clare County Public Safety Communications Systems.

• FEMA NIMS Certified, MICIMS WEBEOC Instructor/ PEM Professional Emergency Manager EMHSD – MSP, Local RIC Intelligence Officer R6, Vice Chair Region 6 Homeland Security Division , Member of West Michigan Cyber Security Consortium.

Page 8: Introduction to Emergency Preparedness

Emergency Management:Who we are and what we do

Page 9: Introduction to Emergency Preparedness

The Five Phases of Emergency Management

1. Protection (Prevention)2. Preparedness3. Response4. Recovery5. Mitigation

Page 10: Introduction to Emergency Preparedness

Emergency Management BasicsA Snapshot

• (No Two EM Programs are identical).• Develops and maintains the counties EAG/EOP or

Emergency Action Plan.• Responsible for Administration, Planning, Coordination

and operation of all Emergency Preparedness activities in Jurisdiction.

• Liaison with State (MSP District Homeland Security Division, and Federal DHS and other agencies.

• Coordinates training countywide, recruitment and training of volunteers.

Page 11: Introduction to Emergency Preparedness

Emergency Management Basics

• Coordinate Public education, Preparedness activities, Which may include Business Planning assistance, And Including school drills, HB4713.

• Conduct Exercises and Drills to test capabilities and identify gaps and THIRA (Threat Hazard Identification and Risk Assessment).

• Conduct the activity of all other public and private agencies engaged in any emergency or disaster and relief programs.

• Negotiate and establish buildings and facilities for disaster relief efforts such as shelters etc.

• Coordinate and issue alerts and public notification including emergency services agencies.

• Be responsible for administration of any Homeland Security Activities that affect local jurisdiction.

Page 12: Introduction to Emergency Preparedness

EM Authorities; P.A. 390 of 1976• State of Michigan Emergency Management Act.• Formally established Emergency Management.• Clare County Established Emergency Management

formally by Resolution on September 04, 1979 and Amended December 20, 1982 Section 402.

• Formerly known as “Civil Defense”.• Pub 102 “The Michigan Emergency Management Act”

Requires that any municipality of 25,000 or more shall appoint an

Page 13: Introduction to Emergency Preparedness

P.A. 390 continued• EM coordinator, Further any community with

a population of 10,000 or more may appoint an Emergency Management Coordinator,

• Or A municipality of 10,000 or more may also choose to operate under the Counties Plan and operating procedures.

• A Public College or University with a combined average population of 25,000 shall appoint an EM coordinator.

• Then in 2001 the world and the U.S. Changed..

Page 14: Introduction to Emergency Preparedness

9/11

Page 15: Introduction to Emergency Preparedness

Or This in 2005

Page 16: Introduction to Emergency Preparedness

Disaster Facts• Hurricane Katrina; August 29th, 2005.

• 175MPH + winds.• 1,833 Deaths, 108 + Billion dollars damage, 80% New Orleans

flooded.• Joplin Mo. EF5 Tornado 200-322 MPH Winds; May 22nd 2011,

5:34P.M. est., 160+ Deaths, $2.8 Billion damage, 75% Joplin Damaged or destroyed, 7000 Homes, Including Medical center.

• 911 Terrorist attacks; September 11th 2001, 8:46 A.M. est. 2,996 Deaths, $Billions in damage.

• HSPD-8 Homeland Security/ National Preparedness Directive.• Post-Katrina Emergency Management Reform Act of 2006

(PKEMRA)

Page 17: Introduction to Emergency Preparedness

The Biggest Threats

• Floods and Weather are the biggest threats currently.

• Floods/Related kill more people and cause more property damage worldwide each year than any other event!

• The average U.S. Annual flood losses in the past 10 years were more than $2.9+ Billion.

• Terrorist Attacks either HVE’s or International.• CYBER ATTACK!

Page 18: Introduction to Emergency Preparedness

Michigan’s Disaster History Declarations since 1990.• 42+ Governor declared disasters and

emergencies.• 13+ Presidential, (9) Major, 4 Emergencies.• (1) Fire Suppression.• Virtually every county in Michigan has

experienced a disaster event!• Unfortunately it is not if, but when.

Page 19: Introduction to Emergency Preparedness

In A Distaster• The Emergency Management Director;• Advises the CEO for local declaration “State of

Emergency”.• Activates the EOC.• Prepares and forwards request for “State

declaration” to the Governor.• Finally if needed coordinates with Governor and

other public officials to obtain via the Governor a “Presidential Disaster Declaration”.

• All these processes begin mobilization of Material and financial resources to name a few, to help our communities recover.

Page 20: Introduction to Emergency Preparedness

The Declaration Process in Brief

1. Local incident occurs, PDA - 72 hours takes place, Local officials notified.2. Local EM/CEO coordinate and issue “State of Emergency” and request State and Federal assistance.3. State analyzes data, etc. pushes up to Governor to “Issue State of Emergency” “State of Disaster”.4. Governor pushes up to FEMA Region V and makes request/recommendation to President.5. President either declares or denies.

Page 21: Introduction to Emergency Preparedness

ARE YOU PREPARED?Section# 2 COOP & COG

Page 22: Introduction to Emergency Preparedness

Today's Security Threats1. Cyber attack from within U.S. or Outside.2. “Lone Wolf” HVE’s Active Threats or Bombers.3. Terrorism U.S. Grown or Outside Self Radicalized.4. Intellectual or Economic Theft, and or corporate espionage.

Page 23: Introduction to Emergency Preparedness

Cybersecurity: A definitionCybersecurity is the body of technologies, processes, andpractices designed to protect networks, computers, programs,and data from attack, damage, or unauthorized access.

CybercrimeCybercrime is any violation of federal, state, or local statuteor malicious or suspicious activity in which a computer, anetwork, or a device is an integral component of the violation.

Page 24: Introduction to Emergency Preparedness

DATA BREACHES BY TYPE:• Identity Theft remains the primary type of breach, accounting for

75% of all records compromised and slightly more than half 53% of data breaches in the first half of 2015.

• Government and Healthcare sectors accounted for about two thirds of compromised data records (31% and 34% respectively), Healthcare accounted for 21%Retail accounted for 4%.

• Your Credit Card data is worth about >$1.85, Your Personal Medical/Health Record is worth as much as <$300.00 per copy.

• The U.S. Accounted for (76%) of data breaches.• Configger/Conficker Virus in XP machines/Networks.• The Deep Web – The Dark Web.

Page 25: Introduction to Emergency Preparedness

Examples: Cyber/Breach Events• Staples Hack - The data breach at the Staples office-

supply chain may have affected roughly 1.16 million payment cards as criminals deployed malware to point-of-sale systems at 115 stores.

• Home Depot Hack - As Home Depot continues to assess the damage caused by a security breach that gave hackers access to 56 million credit and debit cards, tech experts say large retailers should turn their attention to addressing breaches quickly instead of trying to prevent all of them On February 4, 2015, *

• Anthem, Inc., the nation’s second-largest health insurer, reported hackers broke into and stole a database containing the personal information of approximately 80 million customers and employees.1 Although industry watchers do not believe that this incident resulted in the loss of personal health information, 5-8Mil.

• Yahoo Data Breach 2014 Revealed 2016 1+Bil. Passwords and personal information stolen.

POS SYSTEMS

Page 26: Introduction to Emergency Preparedness

What is phishing?Phishing is the act of sending an e-mail to a userfalsely claiming to be a legitimate enterprise in anattempt to scam the user into surrendering privateinformation that could be used for identity theft.

Beware of Phishing Schemes

Page 27: Introduction to Emergency Preparedness

Dear Webmail User, Your webmail account quota has exceeded storage limit; to avoid the blockage of your webmail account you are to re-validate your webmail account to upgrade your webmail quota for unlimited usage re-validate here Failure to do this, will result in limited access to your mailbox. Sincerely Web Administrator. White House Help Desk P.S.: This is an auto-generated message. Please do not reply to this email.

Webmail Administrator <[email protected]>

Page 28: Introduction to Emergency Preparedness
Page 29: Introduction to Emergency Preparedness

43 percent of companies were immediately put out of business by a “major loss” of computer records, and another 51 percent permanently closed their doors within two years — leaving a mere six percent “survival”.

Page 30: Introduction to Emergency Preparedness

What Can I Do To Protect Myself?

• Task 1 Practice Good online safety and security. Dispose of equipment such as Hard drives and data appropriately. (Good Housekeeping). “Backups”.

• Task 2 Keep updates and software patches current, Don’t download anything you are unsure or suspect of. When using Social Media Sites; Remember ANYTHING YOU POST IS POTENTIALLY AVAILABLE TO EVERYONE! (Pictures & Location Information) *Watering Holes.

• Task 3 Maintain Malware, Spyware, and Anti-Virus Programs (Up to Date) On All Devices. Practice Safe Internet!

Task 1

Task 2

Task 3

Page 31: Introduction to Emergency Preparedness

Business Continuity Planning

Emergencies are unplanned events that can cause significant injury, or even death, to employees, customers, or the public, disrupt or close down operations, cause physical or environmental damage, or harm the organization’s public image. The changing threat paradigm and recent emergencies, including acts of nature, technological emergencies, civil disturbances, and terrorist incidents have shifted public awareness, most importantly, business owners and managers, to the need for an all hazards emergency plan or continuity of operations (COOP) plan. A COOP plan addresses emergencies from an all hazards approach. The COOP plan is designed to establish policy and guidance to ensure the execution of mission essential functions and to direct the relocation of personnel and resources to an alternate facility capable of supporting operations. The plan should develop procedures for alerting, notifying, activating and deploying employees; identify mission essential functions; establish an alternate facility; and roster personnel with authority and knowledge of functions.

Page 32: Introduction to Emergency Preparedness

COOP Primary ElementsCore Components of Plan (many of these will be a separate annex in the plan) 1. Plans and Procedures2. Mission Essential Functions3. Delegations of Authority4. Orders of Succession5. Alternate Facilities6. Interoperable Communications7. Vital Records and Databases8. Logistics and Administration9. Personnel Issues and Coordination10. Security11. Testing, Training and Exercising12. Program Management

Page 33: Introduction to Emergency Preparedness

Additional Cyber/Personal Security Information Sites

• www.stcguide.com• www.dhs.gov/stopthinkconnect• www.uscert.com• www.infragard.org• www.michiganicac.com• https://smallbusinessbigthreat.com/ • www.merit.edu/cyberrange

http://www.dhs.gov/publication/isc-occupant-emergency-programs-guide

Run, Hide, Fight video with closed captioning option: http://www.fbi.gov/about-us/cirg/active-shooter-and-mass-casualty-incidents/run-hide-fight-video

To report a computer security incident, either contact US-CERT at 888-282-0870, or go to https://forms.uscert.gov/report/ and complete the US-CERT Incident Reporting System form.

Page 34: Introduction to Emergency Preparedness

Additional Resources• www.ready.gov• www.preparemybusiness.org/• www.clareco.net/emergency_services/• www.noaa.gov• www.smart911.com • www.do1thing.com• www.michiganicac.com

Page 35: Introduction to Emergency Preparedness

ARE YOU PREPARED?Section #2 Active Threat/Shooter

Page 36: Introduction to Emergency Preparedness
Page 37: Introduction to Emergency Preparedness

An “Active Shooter” is an individual actively engaging in killing or attempting to kill people in a confined and populated area; in most cases, active shooters use firearm(s) and there is no pattern or method to their selection of victims.

Active Shooter situations are unpredictable and evolve quickly.

Typically, the immediate deployment of Law Enforcement is required to stop the shooting and mitigate harm to victims. Because Active Shooter incidents are often over within 5-15 minutes, before Law Enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation.

PROFILE OF AN ACTIVE SHOOTER

Page 38: Introduction to Emergency Preparedness

11 Million Seriously Mentally ill in America as of 2015

Page 39: Introduction to Emergency Preparedness

James Holmes 24 killed 12 people and injured more than 70 others when he opened fire on a midnight showing of The Dark Knight Rises at a Century 16 multiplex in Aurora, Colorado on July 20, 2012

“He was a bit of a prodigy. After he finished his assignments in fifth grade, he and a classmate filled the time writing code and building a website for the school. His teacher, impressed, called him a Renaissance child."

Page 40: Introduction to Emergency Preparedness
Page 41: Introduction to Emergency Preparedness

Active Threat TERMINOLOGY FOR EMERGENCY MODES

OUTSIDE THREAT MODE (DANGER IS OUTSIDE BUILDING)

1. Outside Threat Mode is announced. If outside, enter building immediately. 2. Staff, make sure all exterior doors and windows are closed and locked. 3. Do not let anyone in or out of the building. 4. Continue business as usual inside the building. 5. Staff may use phones to contact the office if anything suspicious is noticed. 6. This mode will end when the office is notified by Law Enforcement to give the All Clear over the PA, Radio or in Person.

LOCKDOWN MODE (DANGER IS INSIDE BUILDING)

1. Lockdown Mode is announced. If you are outside, do not enter the building. 2. Staff, quickly check the hall for visitors. 3. Lock and close your door. (barricade if possible) 4. Turn lights off if possible and close windows and blinds. 5. Hide out of sight and be quiet. 6. Phones should not be used other than by staff to receive emergency text

messages from Public Safety. 7. Do not open door for anyone. Wait until Law Enforcement enters your room

and places you into Secure Mode (outlined below).

SECURE MODE (LAW ENFORCEMENT IS STILL CLEARING BUILDING)

1. Secure Mode shall be announced to each room by Law Enforcement. 2. Lights can be turned on. 3. Classroom instruction may resume if possible. 4. Doors will remain locked. 5. Nobody shall be roaming the halls.

Listen for All Clear to be given over the PA, Radio or in Person.

Page 42: Introduction to Emergency Preparedness

Active Threat Conclusions

1. Make a plan, Work with local agencies.2. Train your people.3. Drill/Exercise, No “Got Ya” Moments4. Take it seriously.5. Be flexible and willing to adapt your plan as the

need arises and conditions change.6. STAY SAFE!

Page 43: Introduction to Emergency Preparedness

On Guard• Local Law Enforcement

• Mi-OC Michigan Intelligence Center• DHS Department of Homeland security• Local Emergency Management/EMHSD• FBI• NSA• Secret Service• Michigan State Police

Page 44: Introduction to Emergency Preparedness

Contact Information• Jerry Becker – Clare County Emergency

Management Director.• Clare County Emergency Management 225 West

Main Street Harrison, MI 48625.• Office Phone: 989-539-6161.• Email: [email protected]/ Website:

http://www.clareco.net/emergency_services/

Page 45: Introduction to Emergency Preparedness

Thank You!

Questions and Answers