How to better protect the business - Introduction based on findings of SUPPORT Delft, May 9, 2012 Henk van Unnik Senior advisor, Securitas Maritime & Logistics.

Slides:



Advertisements
Similar presentations
Chapter 3 E-Strategy.
Advertisements

HR SCORECARD Presented By ADEEL TARIQ MOBASHIR ALI.
WELCOME GHANAHR TRAINING. OUR VISION & MISSION OUR VISION To be the recognised Consultancy Firm with the highest ethical standard that delivers unrivalled.
HR Manager – HR Business Partners Role Description
IMFO Audit & Risk Indaba June 2012
 Capacity Development; National Systems / Global Fund Summary of the implementation capacities for National Programs and Global Fund Grants For HIV /TB.
TRANSPORTATION AND CARGO SECURITY Presented by : Aysar Naserallah.
1 Introduction to Workforce Planning and Development in State of Alaska Executive Branch Departments.
Organizational Change and Development. Overview Sources of change Systems view of change Sources of resistance to change Overcoming resistance Lewin’s.
Human Resources Training and Individual Development
Buffalo State College Internal Control Program Presented to: Buffalo State College Line Staff Delivered by: BSC IC Program & Department Managers.
Procurement Strategic Planning Process Transformation Procurement Risks and Opportunities Procurement Process Capabilities & Interdependencies Key Strategic.
Chapter 2 Strategic Training
Introduction to Hospitality, 6e
Workshop Summary ISPS Drills & Exercises Workshop Port Moresby 2006.
Corporate Management. Requirements Candidates need to display a knowledge of the language of corporate or strategic management and have an understanding.
HUMAN RESOURCE MANAGEMENT Introduction Human Resource Strategy Human Resource Planning Recruitment and Selection Training and Development Performance Management.
HRD MANAGER: ROLES AND COMPETENCIES Jayendra Rimal.
Information Technology Audit
TRAINING AND COUNTINUOUS DEVELOPMENT
Internal Auditing and Outsourcing
Strategic HR Management
Consultancy.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
LITTLEBRIDGE NIGERIA LIMITED MARKETING | BRANDING | PROPERTIES | TRAINING Training Packages.
 This presentation looks at: › What is risk management › How to identify risks › How to implement an effective risk management policy to increase your.
1 There are a number of organization designs, including many combinations or hybrids of models. Seven designs are shown below: Process Centered Front End.
The U. S. National Strategy for Global Supply Chain Security Neema Khatri Office of International Affairs U.S. Department of Homeland Security.
Organizational competence in harnessing IS/IT
Logistics and supply chain strategy planning
Simplified Strategic Planning Taking Control, Involving Employees & Linking Systems Joseph Raible Senior Consultant 1The Millennium Group International,
Enterprise Risk Management Expectations Outpacing Capabilities and The Audit Committee’s Role July 30, 2013 Presented by: Suzette E. Ramsden (B.Sc., CISA,
Marketing Ethics and Social Responsibility
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Performance Management. Concept Performance management can be defined as a strategic and integrated approach to sustained success to organizations by.
Copyright ©2005 by South-Western, a division of Thomson Learning. All rights reserved Chapter 10 1 Organizational Design MANAGEMENT Meeting and Exceeding.
1 SMALL BUSINESS MANAGEMENT Chapter 4 The Business Plan.
Security Challenges Facing Seaport Operations Day 1 - Module 3.
Jump to first page 1 Theoretical Foundations Concept & definition Strategy & Strategic Planning Planning & SBU HR Planning.
INTELLIGENCE SERVICES. The Stratfor Advantage As the world’s leading private intelligence company, Stratfor is able to analyze and deliver timely, accurate.
PROFESSIONAL TRADING RELATIONSHIP Advisory Group – May 24, 2005.
CHAPTER 2 Supply Chain Management. Copyright © 2001 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin 2-2 Supply Chain Management.
Aligning HR & Business Strategy. “The long-held notion that HR would become a truly strategic function is finally being realized.”
06 May 2011 Building a Culture of Integrity in DNV Cecilie Hultmann, senior consultant, Det Norske Veritas (DNV)
PARTNERING for your INTERESTS Companies invest in security to protect their people, property and information. In doing so, they are also protecting the.
Quick Recap of Lecture 11. The growing importance of SHRD The competitive and volatile environment within which businesses operate is prompting senior.
Placing Information Security within an Organization
Strategic Implementation
Chapter 8 Management, Leadership, and Internal Organization Learning Goals Define management and the skills necessary for managerial success. Explain the.
Kathy Corbiere Service Delivery and Performance Commission
Socially Sustainable Development, May 2002 Responsive, Reliable, Resilient Social Aspects of Sustainable Development Steen Lau Jørgensen Social Development.
Definition: According to E. Geister , “ Manpower planning is the process including forecasting, developing and controlling by which a firm ensures that.
Identify, Develop and Retain High Performers
Organisational structure. Internal organisation of firms In small firms: Each worker may undertake a range of roles The structure may be informal and.
Human Resource Management Gaining a Competitive Advantage
CHAPTER 4: The Evolving/Strategic Role of Human Resource Management
Global Dialogue on Customs Capacity Building 04 April 2007 © 2007 IBM Corporation Benefits of Supply Chain Security and Trade Facilitation: The IBM Experience.
Chapter 1 Market-Oriented Perspectives Underlie Successful Corporate, Business, and Marketing Strategies.
Physical Security Governance Model
Core Competencies Training for Supervisors
Chris Lintern Co-operative Financial Services
Core Competencies Training for Supervisors
Building Better IT Leaders from the Bottom Up
Operations, Competitiveness, and Strategy
Strategic Human Resource Management
Women, Peace and Security
12 Changing role of management Changing role of management
The Organizational Context
Articulate how the practice of management has evolved
Strategy and Human Resources Planning
Presentation transcript:

How to better protect the business - Introduction based on findings of SUPPORT Delft, May 9, 2012 Henk van Unnik Senior advisor, Securitas Maritime & Logistics Security Solutions

Introduction Picture of crime and terror What has influenzed the corporate invironment Risks related to Ports and Port facilities What drives Crime and what drives Terror SUPPORT´s 11 points of attention How is Security perceived and organized to day How can SUPPORT improve this A proposed Model

Picture of Crime and Terror Corruption and bribe Infiltration through joint ventures Growth in violence Underworld interwoven with the overworld Loss of integrity in the business climate Loss of a Ports reliability Damage to supply chain, economy, and the rule of law

What has influenced the Stakeholders Changes at Corporate level structure and pace of corporate life and - security more global trade and - economy new business practices risks more complex interdependence between risk and business higher security profile

A Port is vulnerable to crime due to concentration of valuable goods limited number of people present during night time poor control over stocks and data poor awareness of risks lack of transparency and inspections of corporate processes blind faith in people, insufficient recruitment processes too much confidence in social control between employees The option of a Toolkit that can create a PFSP is an important step Risks related to a Port

Risks related to a Port facility A Port Operator is extra vulnerable to crime due to: placing too much trust in people and effectiveness 80 – 20 rule lack of awareness lack of efficient security procedures weak systems of internal control inadequate pre- employment and background checks inadequate protection of information and IT systems lack of business partner requirements shift in norms and values

What drives Crime Mechanisms that drives crime Demand driven by:Supply driven by: Greed Own use Global disease Crime as profession shift in norms / values NeedCrime opportunities by created by PR & sales activitiesineffective and insufficient processess, procedures, Poverty risk perception and mitigation exploitation /exclusion / culture Can demand be influenzedCan supply be influenzed Little to nothingBy reducing vulnerabilities throug adequate security management

Mechanisms that drives terror Selecting a terror object is based on the circle of 3 V’s Visibility of an object Value of an object Vulnerability of an object The only V that can be influenzed to break this circle is Vulnerability What drives Terror

Managing security (WP2) (WP5) (manual 2) Threat and vulnerability assessments and control measures (WP4) Access control Inspections at access control Screening of staff Standards for fencing, alarm systems and CCTV (WP3) Monitoring and surveillance performances (WP3) Handling of cargo in cooperation with Customs Checking of personnel at the facility Training and awareness programs High resilience concepts (WP5) 11 points of attention

From a business perspective A defensive approach focused on protection and `loss prevention` stopping people to do their jobs instead of enabling the business to function and grow. From a security perspective Only two components are considered to be addressed the most important components are hidden, leading to a wrong risk perception, a wrong risk coverage and ineffective risk methods. Physical security Process and procedure How is security perceived

Characteristics of alignment Convince colleagues that the role is to deliver security to support every day decisions Initiate the view that security is also there to improve management Help the organization by taking and mitigate risks Make sure that security developments respond to market developments Help departments to align strategic and operational activities from a security perspective Emphasize that legitimacy of security not only comes from expert knowledge but also from –Business understanding –Skills of people –Management ability and –Communication expertise How to align perception and development

Security performance of an organization is as good as its processes and procedures To create a model we looked at two different approaches -one, a top down approach where the top management is responsible for security and instigator and facilitator of a model like Corporate Security Management OR -two, a bottom up approach where the PFSO / PSO supported by instruments, that enables him to do so, takes the initiative for Process Improvement Management Improvements by SUPPORT

Provide the PFSO / PSO, based on the provisions of the ISPScode, the AEO guide lines, the IMO`s “ Guide to Maritime Security and the ISPScode” and other best practices with a TOOLKIT that makes it possible to: Monitor risks related to crime and terror Monitor risks related to corporate processes and procedures Monitor an instigate education and training Prepare and execute drills and exercises A process improvement model

Identify risks related to crime and terror based on example procedures best practices and a cost calculation model Identify risks related to organizational processes and procedures and measures how to mitigate or improve them based on example procedures and process risk matrix Provide standards for education, training, drills & exercises based on best practices and examples how to implement them Recommend changes and implement improvements, by a clear statement why change is necessary, a clear vision how this will affect the organization, an implementation strategy, communication planning Model, work in progress

Questions?