Critical Infrastructure Protection & Resilience Asia

Bill Bailey

Bill_Bailey

Bill Bailey

Security Management Consultant

Bill Bailey is currently a security management consultant working in the oil and gas industry predominately in Papua New Guinea. Bill also remains an Adjunct Senior Lecturer with Edith Cowan University, Security Research Centre, Perth, Australia after having taught in the Security Science Department, specialising in: counter insurgency, terrorism and countering terrorism, critical infrastructure protection, security management, physical security, security, health and safety, business continuity, strategic risk and emergency management.

Bill served as an Inspector with the Royal Hong Kong Police, Tactical Unit and was a trained Terrorist Negotiator before becoming a security and risk management specialist in Africa for the Oil and Gas industry. Bill has extensive experience of managing security in hostile and difficult environments having dealt with numerous disaster situations, including coup d’états in Equatorial Guinea 2004, Mauritania in 2004/2005 and a ‘Hi-Jack’ at Hong Kong Airport in 1978. Contracts include: Exxon Mobil in Kenya, Cameroon and Equatorial Guinea; with Woodside Australian Energy in Australia, Mauritania and Senegal. In Algeria: First Calgary Petroleum, BP-Amoco, Bechtel, Halliburton Energy, and Amerada-Hess. Further contracts with: Control Risks Group, Stirling FMC, Triton Energy, Jet Air, Hess Energy; Pride Forasol, Virgin Atlantic, Schlumberger, ABB Group, PTTEP, Oil Search Ltd and Talisman Energy.

Presentation:

Protecting Critical Assets: An Adaptive and Proactive Security Management Process

Protecting critical infrastructure assets is essential to every country, government, organization, business and person. The loss of the vital critical infrastructure can be catastrophic with far reaching unforeseen knock-on effects. To avoid such damaging outcomes requires a wide range of in-built security structures, plans and operating procedures incorporating a multi-layered intelligence gathering capability. Embracing a more adaptive proactive, comprehensive security management process is proposed to: prevent, detect, deter, respond and defeat potential damaging events and incidents. Core to this security planning method is a full understanding of the potential consequences of worst case scenarios. A process driven model is a proactive approach and grounded upon current operational procedures used by major international companies in hostile and dangerous environments. By utilizing a clearly defined comprehensive risk management tool, a more systematic security, threat, risk and vulnerability assessment (STRVA), process can be developed.