The Change in Value: What will you protect? Mick O’Neill Operations Manager Health, Safety & Injury Management Division Vedior Asia Pacific.

Slides:



Advertisements
Similar presentations
Business Law Objective 7.02 State and Local Energy and Environmental Regulation Agencies and Laws.
Advertisements

Hedge Fund Vs Mutual Fund – By Prof. Simply Simple
Safety & ORM *Water Safety*. Safety The condition of being safe from undergoing or causing hurt, injury or loss The condition of being safe from undergoing.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Promote and maintain health, safety and quality standards in the fleet Maintain alignment of catching capacity with available resources Promote.
Derek Eaton Division of Technology, Industry & Economics Economics & Trade Branch Geneva, Switzerland “Designing the Green Economy” Centre for International.
The Threat of Cyber War The Issue of Cyber Security.
Social and Environmental Purchasing Guidelines Antigua, Guatemala, April 5, 2002 STARBUCKS COFFEE COMPANY MARY WILLIAMS, SVP, COFFEE.
OSHA Long Term Care Worker Protection Train the Trainer Program Part 1: Introduction.
Safety and Loss Control
Chapter 18. Read page 296 The beginnings of an industry Australia is about 20 th on the list of world exporters of chemicals, with annual trade worth.
Course 2150A: Designing a Secure Microsoft Windows 2000 Network.
Services Tailored Around You® Business Contingency Planning Overview July 2013.
Staying Healthy and Safe Make Safety Your Business
GROCERY INDUSTRY, PRIVATE BRANDS AND ITS EVOLUTION Joe McKie, Vice President, Private Brands Food Marketing Institute.
Secure disposal and recycling Service and competitive pricing Service.
AUDITING INFORMATION SYSTEMS SECURITY. AUDIT OF LOGICAL ACCESS USE OF TECHNIQUES FOR TESTING SECURITY USE OF INVESTIGATION TECHNIQUES.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
1 Safety Training for Supervisors. What We’ll Cover Safety program objectives The importance strong leadership The responsibility of management The role.
Steve Jones, SHEQ Manager (Emergency & Critical Services)
 This presentation looks at: › What is risk management › How to identify risks › How to implement an effective risk management policy to increase your.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Hewlett Packard (HP) Open.
Unit 4: Ensuring safe environments in Health and Social Care
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Healthful Living Lesson 9 Accidents and Water Safety Mrs. Hannah’s 2 nd & 3 rd Level Super Stars.
Management Commitment to Safety The management of DeBusk Services Group, LLC is dedicated to providing the active leadership and support necessary to develop.
Safety Induction to the Lift & Escalator Industry
The Environment. The business environment  The critical infrastructure business environment has changed Information Technology offers opportunity for.
The Occuptaional Safety and Health Act (OSHA) -- Drafted in the year The Amendment years started in April 15 th of 1981 with every new amendment.
SMEs: Why Information Assurance is Important Richard Henson Worcester Business School November 2012.
CBI Adaptation Methodology Dave Proctor CBI Wales.
M O V E – Management – Of – Vibration – Emissions/Exposure.
1 Sustainable Investment in China. 2 About me Studied Business – but no interest in finance In China for 8 years – started in NGOs Now working at BSR.
© 2008 by Prentice Hall11-1 Human Resource Management 10 th Edition Chapter 11 A SAFE AND HEALTHY WORK ENVIRONMENT.
Responsible Care® Health & Safety Task Force – 06 H&S.
© Module 4—Hazard Prevention and Control Safety Management Worksite Analysis Management Commitment and Employee Involvement Hazard Prevention and.
Energy topic Presentation by working group September 2015 Joint US/EU Conference.
AQUACULTURE PRODUCTION REQUIREMENTS - Chapter 9 [objectives] Explain feasibility considerations List and distinguish between ways of doing business Describe.
1 Book Cover Here Copyright © 2015, Elsevier Inc. All rights Reserved Chapter #1 What Is Asset Protection? Security Supervision and Management Theory and.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force Integrating Air Force Environmental Programs into Core Business Practices.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
HOWARD HANSON DAM EMERGENCY MANAGEMENT REGIONAL AND LOCAL PLANNING.
Presented by Environmental, Health and Safety Services Zack Adams, PE, CSP, CIH.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
Sustainability in the Supply Chain 5 © 2014 Pearson Education, Inc. SUPPLEMENT.
Best 20 jobs jobs sites.
Figure 1. Current Threat Landscape Sentiment From: ESG Research Report: Cyber Supply Chain Security Revisited. Source: Enterprise Strategy Group, 2015.
Corporate Concerns on Cloud Services Environment กษิภัท ธนิตธนาคุณ คอลัมนิสต์ “IT Auditing” นิตยสาร ELEADER กรรมการผู้จัดการ บริษัท เคที ไอที โซลูชั่น.
Figure 1. Current Threat Landscape Sentiment
The Business Case for Disaster Risk Reduction 30 March 2017
Business Risk Marketing Co-op.
7.00 Understand marketing and business management.
GUIDE TO GREEN SUSTAINABLE PROCUREMENT
BUSINESS CONTINUITY BY HUI ZHENG.
Information Technology Sector
Safety and Health Technology Center Hsinchu, Chinese Taipei
7.00 Understand marketing and business management.
7.00 Understand marketing and business management
Understanding the State of Play Regarding Corporate Water Stewardship in Agricultural Supply Chains Jason Morrison Stockholm World Water Week September.
7.00 Understand marketing and business management.
Business Contingency Planning
DISCUSSION ON IMPLEMENTATION ON DCS TURNAROUND STRATEGY THEMES
Provisioning C4I Systems with IoT Technology
Chapter 16 Government’s Role in Our Economy
The Occupational Safety and Health act
Risk Management Division.
Mark Byard Health Safety and Wellbeing Director
Presentation transcript:

The Change in Value: What will you protect? Mick O’Neill Operations Manager Health, Safety & Injury Management Division Vedior Asia Pacific

Key points  What do you need to protect?  Logic makes you think, emotion creates value  Security is about compromise and evaluating risk - you already know how to do this  The landscape is changing…

Social Network Sites  Identity  Raking up the past  Who owns the information?  What can you control?

Employee sentiment  People are different – so is loyalty  They don’t protect their own stuff, why would they protect yours?  You can’t make me!

Environmental performance  The high cost of being green, or less black or whatever  Your risks have changed  Public companies need to be ahead of the game – how could you be harmed?

BCP of supply chain/critical infrastructure providers  Who do you rely on?  Risk management is an oxymoron in this world  Who can be hurt by hurting you?

Job hopping (especially Govt to Private and return)  The pool is shallow so the water is recycled  Remote access, backdoors and ‘security workarounds’  Regulators

Review  Look beyond physical assets  Apply your security model to what you want to protect and take action – a risk management approach  Keep vigilant about the changing nature of value and worth