© MIT 2002 Supply Chain Response to Global Terrorism: Synthesis of Feedback Potential MIT Roles December 6, 2002.

Slides:



Advertisements
Similar presentations
Engaging the Donor Community The MERIT Experience Dr. David Rogers, Health and Climate Foundation.
Advertisements

Introduction. 1.Who is Guardian Insurance brokers? 2.Risk Identification and Solutions 3.Professional Industry bodies 4.Financial Capacity to pay claims.
Daylight Savings Time Transition Planning. The Daylight Savings Operational Risks Affect on transaction cash flow? Affect on service delivery? Affect.
William Solecki City University of New York – Hunter College
Greg Shaw How do we turn private sector preparedness into an investment rather than a cost of doing.
Leading Corporate Citizens McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc., All Rights Reserved. In the Global Village Chapter 9 Ecological Thinking.
Leslie W Kennedy Director RUTGERS Newark. Sponsored by the Rutgers School of Criminal Justice, Center for Global Change and Governance, College of Nursing.
Risk Management Strategies in an Uncertain World April 12-13, 2002 Objectives of Roundtable Agenda for Roundtable.
ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6
Implementing an effective risk management strategy based upon knowledge Peter Scott.
1. Michael R. Levin Building an Ethical Supply Chain November 24, 2008 “ Consumers, investors, business partners, regulators, and media organizations.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Field Operations U.S. Customs and Border Protection Customs-Trade Partnership Against Terrorism (C-TPAT) Texas Broker and Freight Forwarder Conference.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Confidential 1 Risk assessment in the supply chain Supply Chain Risk Leadership Council Developments in Insurance January Confidential – Do Not.
Horizon 2020 Secure Societies Security Research and Industry DG Enterprise and Industry 2013.
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
T H U N D E R B I R D International Supply Chain Management: The Direct & Indirect Impact of Homeland Security Dr. John O’Connell C.V. Starr Professor.
AIGS – PG Department For students PG (M.com and MFA)
International Textile Ltd. 1 5 October September 2012 Corporate Social & Environmental Responsibility 1.
IWRM as a Tool for Adaptation to Climate Change Introduction to IWRM and Climate Change.
Regional Flood Plain Management Council April 15, 2015 H-GAC December 2nd.
Assurance Case Approach TECNALIA Inspiring Business Novara November, 2013 TRIAL WS.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Greening beyond the firm: improving environmental performance through the supply relationship Dayna Simpson PhD Candidate University of Melbourne Supervisors:
Industrial Control Security & Access Control Facilities Management UNECE International Forum on Trade Facilitation Geneva, Switzerland May
Managing Risks, Countering Threats: Protecting Critical National Infrastructure Against Terrorism Martin Rudner Canadian Centre of Intelligence and Security.
Chapter 6.  Identify the main elements of supply chain management and their relationship to the value chain and value networks  Assess the potential.
2010 Virginia RIMS and PRIMA Conference October 5, 2010 Business Impact Analysis: The Road Map to Managing Risks.
Dr. Benjamin Khoo New York Institute of Technology School of Management.
Cyber Security & Fraud – The impact on small businesses.
Fiscal and other Policies to Leverage Private Sector Finance.
1 Jim Devlin Comptroller of the Currency November 5, 2009 Data Breaches in Payments Systems -- Roles and Best Practices for the Public and Private Sector.
Proposed Supply Chain Risk Management Process Flow Supply Chain Risk Leadership Council 20 April 2009 DRAFT.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Interdependence between Critical Infrastructures Broadening the definition of infrastructure: from transport to logistics.
WORKSHOP Laredo 28 th May OBJECTIVES To provide an interactive forum to discuss the developments of Logistics Cities To share experiences – good,
Recap Chapter 1 & 2. CHAPTER 1 The 3 Basic Functions of Business Organizations Operations Finance Marketing Organization.
Diversifications by CSD in China Progress and Initiatives Member Presentation for the ACG 14 General Meeting December 3, 2010 Mumbai, India SHEN Bing China.
Introduction to Information Security
Agenda for Session Compliance in Clinical Research
International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson THE LINK BETWEEN.
MARSH XI Seminário Internacional de GERÊNCIA DE RISCO E SEGUROS 26 Outubro 2015.
Responding to the risk of flooding Andrew Watkinson School of Environmental Sciences University of East Anglia
Business Crisis and Continuity Management (BCCM) Class Session
Business Development RESEARCH & DEVELOPMENT CONTRIBUTION TO POLICY DEVELOPMENT Lerato Mmutlana CSIR Strategic Business & Relationship Manager: Government.
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
CSE CST Anti-Terrorism and Privacy, One Year After Nancy Y. Cheng, FCA Associate Deputy Chief, IT Security Communications Security Establishment November.
The Norwegian Climate Change Vulnerability and Adaptation Assessment The role of local government.
Context for Central Government (with DWP as an example) Richard Fountain Head of Sustainable Development Dept for Work and Pensions.
The Importance of Corporate Social Responsibility (CSR) for Small and Medium Enterprises in Bulgaria Kai Bethke 12 June 2007.
A firm’s “vulnerability” can be viewed as a combination of the likelihood of a disruption and its potential severity. Vulnerability can be caused by:
1 INTERNATIONAL NETWORK ON FINANCIAL MANAGEMENT OF LARGE-SCALE CATASTROPHES Global Conference on Insurance and Reinsurance for Natural Catastrophe Risk.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
DARSHANA RAGHU MANAGEMENT. Risk Management Risk management is the identification, assessment, and prioritization of risks followed by coordinated and.
The process of identifying and controlling the risks is called Risk Management.
Global Dialogue on Customs Capacity Building 04 April 2007 © 2007 IBM Corporation Benefits of Supply Chain Security and Trade Facilitation: The IBM Experience.
Draft - Enterprise Risk Management Risk Universe
Michael Edgerton, CPP Good Harbour International, LLC Abu Dhabi, UAE
and Security Management: ISO 28000
April 21, 2017 Workshop Overview
Personal Introduction
به نام خداوند بخشنده و مهربان.
John M. Felker Director, NCCIC.
Compliance Advisor/Ombudsman (CAO)
Data Ownership & Tokenization of Healthcare
A Blueprint to safeguard Europe’s Water Resources
Sparks of Innovation Steve Cotter Linz, Austria
Presentation transcript:

© MIT 2002 Supply Chain Response to Global Terrorism: Synthesis of Feedback Potential MIT Roles December 6, 2002

© MIT 2002 What can you see MIT’s role? Research Assessment of Risk Response – Corporations Response – Industry Level Integrator Industry – Government Facilitator/Honest Broker for informing operational response

© MIT 2002 Research Focus Areas Assessment of Risk Overreaction The Threat: Probability & impact of threat Identification of the risks Correlation of the risks defined and the Insurance Industry response Response – Corporations How to respond Flexibility & redundancy in SC design Development of measures & incentives for orgzn support Developing the business case Quantifying the collateral benefit Response – Industry Level Role of technology (various applications: tracking, security checking) Economics (business case) at an industry level Role of government & industry-government partnerships Building & protecting the infrastructure Identifying the recovery plan post-disruption