thank you
play

Thank You Where Does Location Matter in Port Security? Nate Johnson - PowerPoint PPT Presentation

Thank You Where Does Location Matter in Port Security? Nate Johnson US Maritime Ports Purpose Help you develop a location strategy for your port - Where location matters in port security - What is a location strategy - How develop a location


  1. Thank You Where Does Location Matter in Port Security? Nate Johnson US Maritime Ports

  2. Purpose Help you develop a location strategy for your port - Where location matters in port security - What is a location strategy - How develop a location strategy

  3. Examples • Port of Long Beach • Port of Rotterdam • Port of Tampa • Port of San Diego

  4. Security Mission Uses • Daily Operations • Event Planning • Incident Response • Business Continuity

  5. Security Mission Uses • Daily Operations • Event Planning • Incident Response • Business Continuity

  6. Security Mission Uses • Daily Operations • Event Planning • Incident Response • Business Continuity

  7. Security Mission Uses • Daily Operations • Event Planning • Incident Response • Business Continuity

  8. End User Applications Contributed Foundational Information Information Dynamic Utilities Information Lease Areas Federal Jurisdictions Vessels State Nautical Charts Weather Local Roads Social Private Imagery Media Facilities News Berths Video Land Ownership… Sensors…

  9. What is a Location Strategy? • A document that guides how location will be leveraged to serve the port mission. • It is aligned with priorities to support objectives.

  10. 5 Pillars of a Location Strategy • People • Applications • Data • IT Environment • Policy / Procedures

  11. People Can’t Always Get What You Want… - Starts at the Top - All Divisions - Division Leadership - Partners/External Organizations - Understand Workflows and Define Location Needs - Apply Location - Staffing and Staff Augmentation …but… sometimes you…you get what you need

  12. Applications Time is on my side… - Understand Workflows - Define Data - Interfaces - Access - Identity - Priorities …you’ll come running back

  13. Applications Time is on my side… $$$ - Implement Incrementally $ Time …you’ll come running back

  14. Data 19th Nervous Breakdown - Basemaps - Dynamic - Operational …Better stop and look around

  15. Data Need and Source Matrix (example) 19th Nervous Breakdown Layers Security Engineering Real Estate Environmental Other Imagery x O x x Leases x x O x x Roads x O x x Buildings x x O x Cameras O x x x Utilities x O x x Bathymetry x x x x O Charts x x x x O Drainage x O x x x Pavement O …… x O …stop and look around

  16. Data 19th Nervous Breakdown • • 3D Mapping of Buildings Utilities Investment ( Time and Dollars ) • Pipelines - Match Data High Development To App Priorities • • Weather Basemap • • Vessel Traffic Address Locations (berths, wharfs, • Road Traffic building…) • Low Camera Locations • Lease Boundaries • Security Assets • Imagery • Project Locations Low High Benefit (Use Across Port Enterprise)

  17. Information Technology Architecture Get off my cloud… - Hybrid - Identity - Access Management - Documented API’s …Hey You!

  18. Information Technology Architecture Get off my cloud… - Disaster Recovery

  19. Policy and Procedures Under My Thumb… • Steering Groups - Executive (Annually or Semi-Annual) - Division Leadership (Quarterly) - Technical Steering Groups (Monthly) • Define Data Ownership and Update Responsibilities • Make Location Capabilities a Part of Exercises and After Action Reviews • Specify Location Requirements in RFP’s • Create a Digital Submission Standard • Change Management …Change Has Come

  20. What is a Location Strategy? • A document that guides how location will be leveraged to serve the port mission. • It is aligned with priorities to support objectives. • Incremental Implementation

  21. Nate Johnson njohnson@esri.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend