Aleksandar Pašagić General Security d.o.o., Zagreb, CROATIA, Aleksandar Pašagić General Security d.o.o., Zagreb, CROATIA,

Slides:



Advertisements
Similar presentations
DEFENSE BASE ACT. Defense Base Act Defense Base Act (DBA) s History & Purpose s Where does it apply? s Who is covered? s Zone of Special Danger s War.
Advertisements

Raising Entrepreneurial Capital
Reliability of the electrical service Business Continuity Management Business Impact Analysis (BIA) Critical ITC Services Minimum Business Continuity Objective.
Special Operations Center of Excellence
To What Extent Should We Embrace Internationalism?
Labor market and social protection in Slovakia Project „EU Enlargement and its Impact on the Social Policy and Labor Markets of Accession and Non-Accession.
Aleksandar Pašagić General Security d.o.o., Zagreb, CROATIA, Aleksandar Pašagić General Security d.o.o., Zagreb, CROATIA,
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 6 SLIDE Becoming an Entrepreneur Small Business.
Risk Identification.  IDENTIFY RISKS  How can you identify the causes and effects of the risks in your company?  What can happen?  In this first.
Political and Regulatory Climate
Occupation Law ATHA Specialized Training on International Humanitarian Law May 31, 2010 Stockholm, Sweden.
PMI - SFBAC 19 April 2007Alison Wellsfry Project Rescue Crisis Management to Project Success Alison Wellsfry, PMP 19 April 2007.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Session 2.3: IASC OPERATIONAL GUIDELINES ON THE PROTECTION OF PERSONS IN SITUATIONS OF NATURAL DISASTERS Human Rights and Protection in Natural Disasters.
“Guidance on rescue during working at height” & their role within the “Working at height regulations 2005 Delivered by Daniel McNess Abseil Inspector /
Defense Base Act (DBA) Insurance Overview of DBA And Pitfalls of DBA: Why you want to supplement DBA as well…
Army Doctrine Publication (ADP) 3-37; and Army
GHANA’S AGENDA FOR SHARED GROWTH AND DEVELOPMENT,
Crisis Management Planning Employee Health Safety and Security Expertise Panel · Presenter Name · 2008.
Care Home Forum 19 th May 2015 Sarah Chittock – Merton Civil Contingencies Officer Taryn Milton – Emergency Planning Manager – Epsom St. Helier.
Making Business Continuity Child’s Play Solutions Ltd Business Continuity Management Contact details: Contact : Mick O’Regan Mobile :
Conostix S.A. Sensible defence.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Preparing to Survive International Facility Management Association New Mexico Chapter, September 14, 2010 Valli Wasp, IAEM CEM Preparedness Unit Manager.
World Trade Center in Retrospect  Hind Sight is 20/20  Security Challenges  A Look At the Facility  Reconsider Risk  Critical Infrastructure  Keep.
The role of private security in the protection of critical infrastructures Veerle Pashley Free University of Brussels Department of Criminology.
Assuring Public Safety and Assessing Risk Across Sectors The Essence of Regulatory Focus John Paterson University of Aberdeen.
Association of Defense Communities June 23, 2015
Building capacity in Central Asia to utilize trade policy for human development (Uzbekistan report) Dilshod Akbarov Research Coordinator, UNDP Uzbekistan.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Chapter 12 Project Risk Management
Global Supply Chain Threats: Impacts to Multinational Corporations.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
Part 2 Support Activities Chapter 3: Planning McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc., All Rights Reserved.
PEST ANALYSIS These factors affect a business and are beyond the control of the business P olitical E conomic S ocial T echnological.
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
M4 – S1 FUNCTION 4 – ‘ ADVOCACY ’:. 2 What is advocacy? Why is it important? How to do it? Advocacy…
Business Continuity Planning MIKE FAITHFULL MBCI Corporate Continuity Manager Information Management Division.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
Migrant Worker Health Dr Richard (Dick) Hooper Global Health Advisor
International Strategic Management Strategic Formulation and Implementation.
UNCLASSIFIED As of W Mar 08 Mr. Scott A. Weidie, J722 1 Multinational Planning Augmentation Team (MPAT) 04 March 2008 Governments and Crises: Roles.
Energy Security and future of US National Security NS4053 week 10.
International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson THE LINK BETWEEN.
Resilience as a Service CAP as the foundation for Situational Intelligence PRESENTATIO N September 2015.
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
Security and Defence Policy of the State Security and defence as functions and attributes of the state.
© Plan Plan’s Security Framework – A Refresher. © Plan Understanding Ourselves Values - Child Rights, Impartial, Neutral, Sensitive Mandate - Child Centred,
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
 The benefits of interior lines could be gained either by central position or superior lateral communications.
© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Cuban Missile Crisis Analysis of the Negotiations Which Led to Nuclear War Being Averted.
Toward a Comprehensive Approach Challenges, Common Ground, Distinctions.
1 FBIIC/FSSCC Pandemic Flu Exercise October 24, 2007 Media Briefing.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Center of Excellence PEACE OPERATIONS COMMAND & CONTROL AND COMMAND & CONTROL AND TRANSITION ISSUES Lt Col (R) John Derick Osman Center of Excellence in.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
The conflict in Donbas region: challenges, solutions Olga Reznikova, PHd Head of the National Security Research Department The National Institute for Strategic.
APICS Update Mid-Atlantic District Meeting Board Meeting Update May 14, 2016.
18. Sustainable Marketing in the Global Marketplace.
Unemployment By: Nouf AlQAhtani Shahad Al-Oqli
Disaster and Emergency Management
Critical Infrastructure in Varna
BUSINESS CONTINUITY BY HUI ZHENG.
Lessons for the 21st Century
SEC 240 Education on your terms/tutorialrank.com.
Chapter 7: The Operational Dimension
Inspection of social outcome in Norway?....
Unit 4: Area Command.
Presentation transcript:

Aleksandar Pašagić General Security d.o.o., Zagreb, CROATIA, Aleksandar Pašagić General Security d.o.o., Zagreb, CROATIA, Zaštita na radu i zaštita zdravlja Zadar 2010 Zaštita na radu i zaštita zdravlja Zadar 2010

 identification and protection of critical business processes and resources  preparation of procedures to ensure the survival of the organization in times of business disruption  business continuity plan

 motivation for doing business in HR areas

 opportunity-rich environment due to changing nature of warfare  initiation of rebuilding operations before completion of stability operations

 HR (high risk)  HE (hostile environment)  areas of operation (AO) where a business is exposed to significant risk of direct or indirect hostile actions by local population or by some other group carrying out aggressive activities in that area

 HE vs other elevated risk considerations

 key to HE business operations success – proper planning  asking proper questions

 supply chain between home country and AO  supply chain within the AO

 relations home country – AO  stability/permissiveness in AO  laws currently in effect  specific/temporary laws  consequences of political shift

 attitude towards the type of business and employee nationalities  availability of real-time relevant intelligence  ratio of local population vs imported labor  local vs foreign client structure

 level of control of the AO by friendly military forces  proximity of nearest area controlled by hostile elements  probability of open conflicts extending to the AO  sustainability level of business in case of significant shift in strategic situation

 frequency of occurrence for civil unrests  impact of civil unrests  level of crime in AO  exposure to crime - employees as individuals and operations as a whole

 level of available additional security  rules of engagement for private security contractors  availability of support from friendly military elements

 how does the nature of business operations affect the level of risk exposure  percentage of mobile operations and what is the security level of the terrain traversed  can critical infrastructure and manpower be relocated  evacuation options and acceptable losses

 short and long-term planning  objective: securing a place in the economy after stabilization  regular testing and updating  coordination with security element

 security planning - prevention of hostile actions towards the infrastructure and the workforce up to the level which can be dealt with by private security elements  upper limit of hardening determined by current laws

 security planning – prevention  business continuity planning – containment and recovery  BC provides options for situations where primary security measures have failed, or situations where private security elements cannot be reasonably expected to resolve the problem

 direct action threats - all acts of violence directly and intentionally targeting the business or any of its segments

 IED/VBIED threats

 kidnap/ransom threats and hostage situations

 sabotage

 riots and civil unrests

 loss of control over territory

 negative-impact change in legislation

 media considerations

 significant business opportunities to be found in unstable countries  requirement: accepting the reality of the situation  creation of environment-specific scenarios  attention to detail

Aleksandar Pašagić Aleksandar Pašagić