Page 1
Page 2
Page 3
Page 4
Page 5
Page 6
Page 7
Page 8
Page 9
Page 10
Page 11
Page 12
Page 13
Page 14
Page 15
Page 16
Page 17
Page 18
Page 19
Page 20
Page 21
Page 22
Page 23
Page 24
Page 25
Page 26
Page 27
Page 28
Page 29
Page 30
Page 31
Page 32
june 2015 FOGHORN 23 By Jen Wilk Director Public Affairs and Development HOw pVa bENEFiTs you PVA Working For You Security Issues Update 1910 Unruh Court New Albany IN 47150 Tel 812.945.8988 13705 Gainesville St. Houston TX 77015 Tel 713.330.8200 WATER LUBRICATED MARINE BEARINGS SLEEVE AND FLANGED CONFIGURATIONS IN STOCK AT TIMCO DURABLE LONG LASTING EASY TO INSTALL www.TIMCOMARINE.com R ecently PVAs Regulatory Affairs Consultant Peter Lauridsen and I attended the U.S. Coast Guards Alternative Security Plan User Group meeting in Washington D.C. This event featured experts from Coast Guard Transportation Security Administration TSA and industry groups. The industry organizations represented are those that have a segment-specific and Coast Guard- approved Alternative Security Plan. PVAs ongoing participation in this group is important because it gives you a seat at the table when talking about national maritime security policy. PVA is your voice when it comes to proposed rules policy changes and the issues that impact security. Coast Guard utilizes this group somewhat like an unof- ficial advisory board a composite of the nations major stakeholders in maritime security and an opportunity for dialogue on current issues. Coast Guard Admiral Paul Thomas welcomed the attendees and discussed headquarters priorities for security policy. He also mentioned the value and credibility of this dedicated stakeholder group. Admiral Thomas asked industry about their concerns and areas of emphasis on security issues looking forward. He spent con- siderable time listening and address- ing these areas. Coast Guard Captain Drew Tucci briefed the group on cyber security. He suggested the final rule would likely be released later in the summer and will focus on high-level frame- works for managing risk similar to what is already suggested by the Department of Homeland Securitys National Institute of Standards and Technology NIST and the U.S. Computer Emergency Readiness Team CERT www.nist.govcyber- framework. These will also assist in conducting vulnerability assessments