Working On The Frontier

Slides:



Advertisements
Similar presentations
Nishidh, CISSP. To comply with Sarbanes oxley and other legislations To comply with industry standards and business partner requirements To protect.
Advertisements

OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
Global Marketing Overview of Supply Chain Security Assurance Certification/membership in supply chain security programs –Different programs focus on particular.
IT Server Receiving Dock Compactor Employee Entrance Cash Office Power, Water & HVAC Controls Identity Theft Contact Hilco For An Enterprise Exposure Check-Up.
FORENSIC ACCOUNTING - BA124 - Spring 2005Slide 4-1 Today’s Topics n Preventing Fraud-Part II n Eliminating opportunities for fraud n Dealing with Fraud.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Implementing and Auditing Ethics Programs
FORENSIC ACCOUNTING - BA124 – Fall 2010Slide 5-1 Today’s Topics n Preventing Fraud-Part II n Eliminating opportunities for fraud n Dealing with Fraud.
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Online Reputation Management
1 Work Health Safety Presented by Mitch Bates. 2 What is WHS? The WHS Act 2011 replaced the Occupational Health and Safety Act 2000… WHS came into legislation.
XIX World Congress on Safety and Health at Work A Regulator’s Journey to Harmonisation 14 September 2011 John Watson General Manager Work Health and Safety.
TERRORISM / POLITICAL VIOLENCE SOLUTIONS FAIR International Insurance Conference on "Political Violence" April 2010 – Karachi Daniel O’Connell
WE PUT YOU BACK IN CONTROL OF YOUR BUSINESS. SACS CONSULTING & INVESTIGATIVE SERVICES.
Human Rights Training Tool. Develop a better understanding of the corporate responsibility to respect human rights relevant for the oil and gas industry.
Protecting Schools and Staff in a Volatile World: An Essential Guide to Safety and Risk Management Presenter: Ricardo Urbina.
Corporate Travel Risk Management 101 DeAnne Dale Chief Sales Officer.
Fraud Examination, 3E Chapter 4: Preventing Fraud
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
StaySafe Corporate Overview (January 2015) © Safe Apps Limited, StaySafe and the StaySafe Logo are registered trade-marks of Safe Apps Limited.
PROTECTIVE SERVICES MANAGEMENT SYSTEMS The PSMS course was created by our operational management team to fill an identified skill gap in the protective.
Presenting The Broker-Dealer Certification Tool The Compliance Department Inc. Broker Dealer Compliance Consultants Compliance SCORE Powered by Keane BRMS.
The Life Insurance Audit Brett Lotspeich
Implementing and Auditing Ethics Programs
What is it? Why it is so important?
Travel Risk Management Today’s Challenges in a Risky Environment (C) iJET International, Inc. All rights reserved.
& C ORPORATE A UDIT & S ECURITY. Who We Are A Snapshot of BANK ONE & CORPORATE AUDIT & SECURITY.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
WORKPLACE VIOLENCE SEMINAR SEATTLE FEDERAL EXECUTIVE BOARD ASSOCIATES PROGRAM Update 3/9/1999.
COMMUNITY AWARENESS / EMERGENCY RESPONSE BEST PRACTICE EXAMPLES AND TOOLS David Sandidge Director, Responsible Care American Chemistry Council May 31,
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Unit 6 Scenario Question 1 You are the HR Director and your organization is revamping their Safety Policy. Addressing the General Duty Clause write a brief.
OPTIONS FOR ACTION – BLUEPRINT FOR ACTION. Executive (CEO) Engagement MAKING THE BUSINESS CASE Legal mandates Liability Employee engagement Corporate.
Control Risks Group w w w. c r g. c o m CR G Managing Risks in Africa to Maximise Opportunity Matthew Durdy Director, EMEA Control Risks Group
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
The Third Annual Medical Device Regulatory, Reimbursement and Compliance Congress How to establish a Compliance Program that will Minimize the Impact of.
Northern Trust Company Global Risk Management
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
August Mr. Mike Finley, CISSP Senior Security Engineer Computer Science Corporation.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Custom Corporate Consulting and Training Fraud: Detecting and Preventing Presented October 30, 2010 To University of Texas at Arlington Executive MBA Students.
N Preventing Fraud-Part II n Eliminating opportunities for fraud n Comprehensive Fraud Fighting Model n Not the simplified “Club” diagram n Symptoms of.
Implementing an Effective Global Anti-Bribery Program Implementing an Effective Global Anti-Bribery Program Elaine Murphy, MBA Director Health Care Compliance.
Scott Charney Cybercrime and Risk Management PwC.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
HRG Security Suite™. Why have we created HRG Security Suite? To enhance our global security proposition Help clients with compliance to CSR policy Encourage.
CASE STUDIES: A MODEL RESPONSE TO DOMESTIC VIOLENCE CIGNA CORPORATION Marjorie Stein, CIGNA Corp. Director of Employee Relations Tom Healy, CIGNA Corp.
IVMS: In-Vehicle Monitoring Systems What’s it in for You? Disclaimer: These safety materials, resources and PowerPoint ® presentations are not intended.
What is Travel Risk Management?
S AFETY & S ECURITY : I T ’ S EVERYONE ’ S B USINESS.
TNK-BP:Fraud Risk management process International Business Leaders Forum Feb 28, 2007.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
LHS46 - Safeguarding and protection of vulnerable adults EDUC8TIONS LTD.
Surveillance and Security Systems Cyber Security Integration.
Draft - Enterprise Risk Management Risk Universe
Cyber Insurance Risk Transfer Alternatives
Risk Management and the Treasury Function
Inter Partner Assistance (IPA)
HEALTH & SAFETY MANAGEMENT MODEL (HSG-65)
Implementing and Auditing Ethics Programs
Safety Accountabilities
People Responsible For Health and Safety
General Counsel and Chief Privacy Officer
Four Corners Safety Network March 04 , 2010
ROB PROW MIPI/MCMI ALTERNATIVE SOLUTIONS LIMITED
Pillars of HR Governance
Governance and Audit Oversight for Capital Market
Neil Kirton and Zoë Newman
UDTSecure TM.
Management commitment and responsibility Safety accountability of managers Appointment of key safety personnel SMS Implementation Plan Coordination.
Presentation transcript:

Working On The Frontier Jake Stratton Control Risks

A world of opportunity?

Identifying the risks Political volatility Policy stability Partnership risk Security of assets Employee safety Forewarned is forearmed!

Scenarios, signposts, flashpoints and triggers Political volatility Scenarios, signposts, flashpoints and triggers

Politics and business Clearly very uncertain political climate – uncertain operating conditions for foreign business: 26 national elections, plus many at local level (Niger just had first round of local elections) Impact on business from contract risk (Guinea – Pres Condé vet opp leader) Cote d’Ivoire - Pres Outtara since ouster of Laurent Gbagbo DRC – Pres Joseph Kabila Extremism (Nigeria – Pres Goodluck Jonathan) RSA – ANC factional tensions, Pres Jacob Zuma / ANC Youth League Pres Julius Malema. Pressure from the ANC's left-wing allies in the tripartite alliance and more radical ANC members such as Malema: tensions over policy direction. Madagascar - Ravalomanana replaced by Rajoelina in 2009 Kenya – Pres Kibaki (Kikuyu tribe), succeeded Daniel arap Moi (‘78-’02) As if political/security risk on land not enough, note grey patches on map – maritime security threats (of which more later) YET huge potential: extractives (traditional key markets like Nigeria, Tanzania, DRC, but new kids on the block: Liberia [corruption problem] and Mozambique) Other sectors: financial services, infrastructure, consumer goods, food and agriculture. 26 PRESIDENTIAL AND/OR LEGISLATIVE ELECTIONS IN AFRICA IN 2012 26 April 2017

Partnership risk How is the partner company connected? Political connections: asset or liability? Managing the culture

Securing your business Proprietary information Corporate integrity Business continuity Physical assets Employees

Securing your employees A variety of measures enable companies to fulfill their duty of care and engender confidence: Corporate policies and procedures (specific allocation of responsibility, incident management teams etc) Information (country and city-specific security information, real-time travel alerts and advisories, hotlines etc) Technology (Travel tracking, e-learning tools) Training and orientation (hostile environments, incident management, travel security etc) Vulnerability surveys (residential, workplace, travel) Physical protection

Systematic risk management Due Diligence Security Policy & Training Country Risk Analysis Fraud Risk Management Planning Implementing Crisis Planning Contingency Planning Market & Competitor Analysis IT Security 24-Hour Support Pre-Employment Screening Monitoring Risks Investigations Responding Managing Corporate responsibility Crisis Response Security audits & Training Forensic Services