SlideShare a Scribd company logo
1 of 38
Supply Chain Security:
A Maturity Model for Loss Prevention
          Anthony Lee, CPP
           6 February 2007
Agenda

Security Threats and Risks
Supply Chain Security Guidelines
Major Security Challenges
Loss Prevention Maturity Model
Supply Chain Security

Supply chain security management is the application
  of policies, procedures, and technology to protect
 supply chain assets (product, facilities, equipment,
 information and personnel) from theft, damage, or
     terrorism, and to prevent the introduction of
unauthorised contraband, people or weapons of mass
           destruction into the supply chain.
International Trade

International trade is a key driver of global economic
growth
80% of general cargo is transported in containers
18 million containers daily across 7 oceans
Global cargo supply chains are complex and involve
many parties
Global trading system cannot afford the
consequences of a catastrophic attack
Security Threats

Terrorism
Organised Crime and Cargo Theft
Hijacking and Piracy
Drug/human smuggling
Illegal weapons
Counterfeit goods
Illegal exports of licensed materials/technology
Cargo Theft

US$40 Billion stolen worldwide annually (2000
report)
CIA reported as much as 50% due to organised
crime
Majority of thefts (80% +) due to collusion with
employees
High value items that are easily disposed are main
targets
Cargo Theft

Internal thefts of high value items within warehouse
Thefts in cargo warehouses along supply chain
Exit facility in loaded vehicle using fraudulent
paperwork
Hijack of cargo trucks
Piracy of sea shipments
Armed robbery at warehouses
People are the weakest link
Supply Chain Security Programs

WCO Framework of Standards
ISO/PAS 28000 Outlines Security Mgmt. for Supply
Chain
ICAO Annex 17 for Regulated Agents Regime
TAPA Freight Security Requirements
Customs-Trade Partnership against Terrorism
 (CTPAT)
Supply Chain Security Guidelines

Singapore will launch Secure Trade Partnership in
mid 2007
Consistent with other key international supply chain
security guidelines
Holistic stance bolsters entire network
Goals… not prescriptive specific measures
Voluntary national program
Key Objectives of Supply Chain
          Security Guidelines
To make it difficult for terrorists to make use of the
supply chain
To emphasise the importance of a total supply chain
security approach to cargo security
To help local companies gain a source of
competitive advantage
To profile SGP as a secure transport and trading hub
To encourage companies to secure their own
processes within supply chains
Players in the Supply Chain

Suppliers
Manufacturers
Warehouse Operators and Owners
Transporters
Terminal Operators
Sea and Air Freight Operators
Players in the Supply Chain

1. Suppliers
      Includes parties engaged in import, export,
      trading, wholesale activity and retail
2. Manufacturers
      Includes parties engaged in processing,
      assembly, manufacturing and provision of
      other value-added activities to manufactured
      goods
Players in the Supply Chain

3. Warehouse Operators and Owners
     Includes users of warehouse space, distribution
     centres, freight forwarders who own or operate
     warehouse facilities, and cargo consolidators
4. Transporters
     Includes road and rail hauliers, parties who own
     or operate vehicles involved in road or rail
     haulage and freight forwarders providing land
     transport services
Players in the Supply Chain

5. Terminal Operators
     Includes airport operators, ground handlers,
     marine terminal operators, stevedores, and
     operators of cargo consolidation points
6. Sea and Air Freight Operators
     Includes shipping lines, air cargo carriers, non-
     vessel-operating common carriers (NVOCC)
     and agents for such entities
Supply Chain Security

ALL players have to be involved
It involves securing every node and link along the
chain
A chain is only as strong as its weakest link
Start with safe/secure packing of a shipment from
point of origin to final point of deconsolidation
It is about secure custodian of cargo at every point
along the supply chain
12 Elements of Supply Chain
           Security Guidelines
Physical Security
Risk Analysis
Access Control
Conveyance Security
Business Partner Security
Incident Management/Investigations
Crisis Management and Disaster Recovery
Education and Training Awareness
Documentation Processing Security
Information Security
Personnel Security
Procedural Security
Implementation of Guidelines

Inline with requirement of WCO certification of
“Authorised Economic Operator” status
Phased approach – Start as voluntary program
Companies to engage in self-assessment process
against the security guidelines
Customs will administer a validation and
certification process
Does not exempt companies from complying with
existing regulations and legislation
Major Security Challenges

Supply Chain involves many players
Multiple modes of transport
Various types of intermediaries
Several government agencies globally
Complexity of the system leads to challenges
Security Directors need C-suite support…
The Human element…
Typical Business Priorities

Achieve profitable growth
Increase gross margin
Reduce operating cost and improve balance
sheet metrics
Justify Capex by ROI
Create a high performance culture
Supply Chain Performance
Efficiency
 The system’s core capability measured in terms of speed, cost and volume of
 shipments
Shipment Reliability
 Ensures that goods arrive within a specified timeframe with a minimum of loss
 from theft and accident
Shipment Transparency
 Ensure that cargo is legitimately represented to authorities and legal for transport
Fault Tolerance
 The system’s ability to respond to disruptions and failures of isolated components
 to ensure business continuity
Resilience
 Ability to return to normal operating conditions quickly after disruption of service
Supply Chain Security –
                       Collateral Benefits
   Efficiency                                       Visibility
    Reduced inspections                              Improved asset visibility
    Increased automated handling                     More timely shipping information
    Less process deviation                           Reduced inaccurate shipping data
    Shorter transit time

   Resiliency                                       Inventory Management & Customer
    Shorter problem resolution time                 Relations
    Quicker response to a problem                    Reduced theft/loss/pilferage
    Reduced time to identify a problem               Decreased tampering
                                                     Less Customer attrition




Source: Masssachusetts Institute of Technology, White Paper, May 2005
Benefit of Supply Chain Security

Study by Stanford University’s Manufacturing Institute
 11 manufacturers and 3 third-party logistics providers
 14 companies got more than a return on their security
 investments in supply chain security
 Reduce cargo inspections by 48% average
 Reduce transit times by 29% average
 Delivery times fell by 28%
 Theft, loss of freight and tampering fall by 90%
 Damages reduced by 50%

Source: Traffic World, 7 Aug 2006
The Human Element

 Security relies on people
 People perpetrate criminal and terrorist acts
 People are key to preventive measures

But to make Security work, people have to be
 engaged, be supportive and willing, and see
 and feel the benefits
Management of Cargo Area

Poor physical working environment
People who write Procedures and Processes
rarely do the job
Staff have little knowledge of:
   Airport and Freight Company requirements
   Company policies
   Procedures and Processes
   Emergency Procedures
Why Staff Violate Procedures

If followed to the letter, job wouldn’t get done
Staff are not aware that procedure exists
Staff prefer to rely on own skills and experience
Use of informal procedures (black books)
In recent studies, 67% of all human performance
problems have been traced to bad procedures
(incorrect, absent or unworkable)
Situational Factors

Time pressure
High workload
Unworkable procedures
Inadequate equipment
Bad working conditions
Supervisors turn blind eye
What are the solutions?

Risk management… to add value in long term
Safety and Security Culture
Proper management control of operations
Staff have to see benefits – ‘feel safer’
Monitoring mustn’t seem like punishment
Focus groups – staff are key; they know the weak
links in the processes
Top management has to set examples
Loss Prevention Maturity Model

                                                         Synergy

                                    Process Compliance

                 Security Culture


Basic Security
Level 1: Basic Security

Measures             Maturity Indicators at Level 1 - Adhoc
Security Leader      Lack of standards or measurements
CCTV                 Lack best practice or industry models
Access Control       Inconsistent/spotty controls
Alarm System         Loose accountability
Security Screening   Undetectable and unmeasured losses
Guarding
Physical Barriers
Level 1: Basic Security

Major emphasis in preventing external thefts
Deterrence against internal thefts
Local Security Champion to drive initiatives
Basic physical security infrastructure
Access control and CCTV surveillance
Security guarding and response
Metal detector screening
Depth in depth
Level 2: Security Behaviour

Measures                 Maturity Indicators at Level 2 – Repeatable
Losses Metrics           Standards applied with consistency but
Education & Awareness    lack best practice or industry models
Photo ID Badges          Poor organizational accountability
Security Committee       Poor efficiencies/limited metrics
Audits and Self Checks   Tactical remediations
Security Procedures      Vertical organizational communication/
Background Checks        little sharing
Level 2: Security Behaviour

Major focus in preventing external/internal thefts
Deterrence against inventory damages and
shipment losses
Improved documentation of security procedures
Security training and awareness program
Develop a loss prevention mindset
Self-driven security program
Security metrics and measurement
Level 3: Process Compliance

Measures                      Maturity Indicators at Level 3 - Managed
Security Controls             Organizational accountability
Check and Balances            Broad organizational communication
Segregation of Duties         and sharing
Transport security language   Use of best practice standards
Contract Review               Strategic remediations
Investigations                Controlled/forecasted lossses
IT Security Best Practices    Formal metrics/cost efficiencies
Level 3: Process Compliance

Major emphasis in thefts, shipment losses and
inventory damages
Deterrence against fraud and conspiracy
Optimise loss compensation
Enforcement of security and inventory controls
Quality control of operational processes
Segregation of duties for accountability
Security language in transport contracts
Level 4: Synergy

Measures              Maturity Indicators at Level 4 - Optimised
Trend Analysis        Balanced protection with business needs
Fraud Prevention      Continuous improvement program
Source Development    Horizontal and vertical communication
Reward Program        Best practice modelling
Benchmarking          Cost optimization based on metrics
Security Standards    Executive sponsorship
Integrated Security
Level 4: Synergy

Loss prevention is part of normal business
Detailed security metrics and measurement
Prevention and detection of losses and fraud
Security focus to meet customer expectations and
to maximise profits
“3S” culture – Service, Safety and Security
Security involvement at all levels
Summary of Maturity Model

Risk management approach…add value
Business solutions for business issues
Progressive security portfolio
Flexibility in budget planning
Grow a self-directed security environment
Maturity indicators of progress
Thank You



      Supply Chain Security:
A Maturity Model for Loss Prevention

More Related Content

What's hot

Risk Management in the Supply Chain
Risk Management in the Supply ChainRisk Management in the Supply Chain
Risk Management in the Supply ChainBravoSolution
 
Supply Chain Risk Management (guest lecture Tilburg University March 2010)
Supply Chain Risk Management (guest lecture Tilburg University March 2010)Supply Chain Risk Management (guest lecture Tilburg University March 2010)
Supply Chain Risk Management (guest lecture Tilburg University March 2010)Robbert Janssen
 
Freight forwarding presentation
Freight forwarding presentationFreight forwarding presentation
Freight forwarding presentationDanna
 
Warehouse management and operations. How to increase eirther the performances...
Warehouse management and operations. How to increase eirther the performances...Warehouse management and operations. How to increase eirther the performances...
Warehouse management and operations. How to increase eirther the performances...Andrea Payaro
 
Presentation On Warehousing
Presentation On WarehousingPresentation On Warehousing
Presentation On WarehousingRRChandran
 
Logistics management
Logistics managementLogistics management
Logistics managementAziza Faryal
 
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain SecurityCustoms-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain SecurityLivingston International
 
An introduction to supply chain management and role of transportataion
An introduction to supply chain management and role of transportataionAn introduction to supply chain management and role of transportataion
An introduction to supply chain management and role of transportataionBehzad Behdani
 
Standard operating process in freight forwarding
Standard operating process in freight forwardingStandard operating process in freight forwarding
Standard operating process in freight forwardingNITIN RAJAN
 

What's hot (20)

Risk Management in the Supply Chain
Risk Management in the Supply ChainRisk Management in the Supply Chain
Risk Management in the Supply Chain
 
Logistics Management
Logistics ManagementLogistics Management
Logistics Management
 
Risk management of supply chain
Risk management of supply chainRisk management of supply chain
Risk management of supply chain
 
Supply Chain Risk Management
Supply Chain Risk ManagementSupply Chain Risk Management
Supply Chain Risk Management
 
What is C-TPAT?
What is C-TPAT? What is C-TPAT?
What is C-TPAT?
 
Supply Chain Risk Management (guest lecture Tilburg University March 2010)
Supply Chain Risk Management (guest lecture Tilburg University March 2010)Supply Chain Risk Management (guest lecture Tilburg University March 2010)
Supply Chain Risk Management (guest lecture Tilburg University March 2010)
 
Freight forwarding presentation
Freight forwarding presentationFreight forwarding presentation
Freight forwarding presentation
 
Warehouse management and operations. How to increase eirther the performances...
Warehouse management and operations. How to increase eirther the performances...Warehouse management and operations. How to increase eirther the performances...
Warehouse management and operations. How to increase eirther the performances...
 
Cargo logistics management ppt
Cargo logistics management pptCargo logistics management ppt
Cargo logistics management ppt
 
Presentation On Warehousing
Presentation On WarehousingPresentation On Warehousing
Presentation On Warehousing
 
Logistics management
Logistics managementLogistics management
Logistics management
 
Risk management in supply chain
Risk management in supply chain Risk management in supply chain
Risk management in supply chain
 
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain SecurityCustoms-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
 
Use of technology in logistics
Use of technology in logisticsUse of technology in logistics
Use of technology in logistics
 
Logistics
LogisticsLogistics
Logistics
 
An introduction to supply chain management and role of transportataion
An introduction to supply chain management and role of transportataionAn introduction to supply chain management and role of transportataion
An introduction to supply chain management and role of transportataion
 
Supply Chain Risk Management
Supply Chain Risk ManagementSupply Chain Risk Management
Supply Chain Risk Management
 
Container loading inspection
Container loading inspectionContainer loading inspection
Container loading inspection
 
Logistics definition
Logistics definitionLogistics definition
Logistics definition
 
Standard operating process in freight forwarding
Standard operating process in freight forwardingStandard operating process in freight forwarding
Standard operating process in freight forwarding
 

Viewers also liked

Supply chain security
Supply chain securitySupply chain security
Supply chain securitylogteach
 
Supply Chain Security & Disruptions
Supply Chain Security & DisruptionsSupply Chain Security & Disruptions
Supply Chain Security & DisruptionsHofstra University
 
Supply Chain Security: The Challenges Ahead
Supply Chain Security: The Challenges AheadSupply Chain Security: The Challenges Ahead
Supply Chain Security: The Challenges AheadECR Community
 
Global Supply Chain Integration
Global Supply Chain IntegrationGlobal Supply Chain Integration
Global Supply Chain IntegrationMondher Ben-Hamida
 
Supply Chain Risk Management
Supply Chain Risk ManagementSupply Chain Risk Management
Supply Chain Risk ManagementAnand Subramaniam
 
Building an Effective Supply Chain Security Program
Building an Effective Supply Chain Security ProgramBuilding an Effective Supply Chain Security Program
Building an Effective Supply Chain Security ProgramPriyanka Aash
 
Work flow automation
Work flow automationWork flow automation
Work flow automationjozefjames89
 
Manufacturing & operations management
Manufacturing & operations managementManufacturing & operations management
Manufacturing & operations managementVaibhav Govindjiwala
 
Global Supply Chain Management
Global Supply Chain ManagementGlobal Supply Chain Management
Global Supply Chain ManagementHammaduddin
 
Materials handling
Materials handlingMaterials handling
Materials handlingRohit Verma
 
INTERNATIONAL SUPPLY CHAIN MANAGEMENT
INTERNATIONAL SUPPLY CHAIN MANAGEMENTINTERNATIONAL SUPPLY CHAIN MANAGEMENT
INTERNATIONAL SUPPLY CHAIN MANAGEMENTSreenath Hacko
 
Security In The Supply Chain
Security In The Supply ChainSecurity In The Supply Chain
Security In The Supply ChainJohn Gilligan
 
Subpart Q Concrete Written
Subpart Q   Concrete   WrittenSubpart Q   Concrete   Written
Subpart Q Concrete WrittenFFSafety
 
Take a Stand and Deliver – Proactive Security Defeats Organized Criminals
Take a Stand and Deliver – Proactive Security Defeats Organized CriminalsTake a Stand and Deliver – Proactive Security Defeats Organized Criminals
Take a Stand and Deliver – Proactive Security Defeats Organized CriminalsSchneider National, Inc.
 
BOHS_Occupational Health in-construction-sector
BOHS_Occupational Health in-construction-sectorBOHS_Occupational Health in-construction-sector
BOHS_Occupational Health in-construction-sectorDr. Divyang Shah
 
8 integrating the supply chain
8 integrating the supply chain8 integrating the supply chain
8 integrating the supply chainbramali
 
Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...Ollie Whitehouse
 
Unit 2 government and trade general
Unit 2 government and trade generalUnit 2 government and trade general
Unit 2 government and trade generalFredrick Smith
 
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussionRussell Publishing
 

Viewers also liked (20)

Supply chain security
Supply chain securitySupply chain security
Supply chain security
 
Supply Chain Security & Disruptions
Supply Chain Security & DisruptionsSupply Chain Security & Disruptions
Supply Chain Security & Disruptions
 
Supply Chain Security: The Challenges Ahead
Supply Chain Security: The Challenges AheadSupply Chain Security: The Challenges Ahead
Supply Chain Security: The Challenges Ahead
 
Global Supply Chain Integration
Global Supply Chain IntegrationGlobal Supply Chain Integration
Global Supply Chain Integration
 
Supply Chain Risk Management
Supply Chain Risk ManagementSupply Chain Risk Management
Supply Chain Risk Management
 
Mba may 2008 sem1,2,34
Mba may 2008 sem1,2,34Mba may 2008 sem1,2,34
Mba may 2008 sem1,2,34
 
Building an Effective Supply Chain Security Program
Building an Effective Supply Chain Security ProgramBuilding an Effective Supply Chain Security Program
Building an Effective Supply Chain Security Program
 
Work flow automation
Work flow automationWork flow automation
Work flow automation
 
Manufacturing & operations management
Manufacturing & operations managementManufacturing & operations management
Manufacturing & operations management
 
Global Supply Chain Management
Global Supply Chain ManagementGlobal Supply Chain Management
Global Supply Chain Management
 
Materials handling
Materials handlingMaterials handling
Materials handling
 
INTERNATIONAL SUPPLY CHAIN MANAGEMENT
INTERNATIONAL SUPPLY CHAIN MANAGEMENTINTERNATIONAL SUPPLY CHAIN MANAGEMENT
INTERNATIONAL SUPPLY CHAIN MANAGEMENT
 
Security In The Supply Chain
Security In The Supply ChainSecurity In The Supply Chain
Security In The Supply Chain
 
Subpart Q Concrete Written
Subpart Q   Concrete   WrittenSubpart Q   Concrete   Written
Subpart Q Concrete Written
 
Take a Stand and Deliver – Proactive Security Defeats Organized Criminals
Take a Stand and Deliver – Proactive Security Defeats Organized CriminalsTake a Stand and Deliver – Proactive Security Defeats Organized Criminals
Take a Stand and Deliver – Proactive Security Defeats Organized Criminals
 
BOHS_Occupational Health in-construction-sector
BOHS_Occupational Health in-construction-sectorBOHS_Occupational Health in-construction-sector
BOHS_Occupational Health in-construction-sector
 
8 integrating the supply chain
8 integrating the supply chain8 integrating the supply chain
8 integrating the supply chain
 
Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...
 
Unit 2 government and trade general
Unit 2 government and trade generalUnit 2 government and trade general
Unit 2 government and trade general
 
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussion
 

Similar to Supply Chain Security

Human Factors in a Safety Management System - Breaking the Chain
Human Factors in a Safety Management System - Breaking the ChainHuman Factors in a Safety Management System - Breaking the Chain
Human Factors in a Safety Management System - Breaking the ChainSAMTRAC International
 
Transport Security 201507 lin
Transport Security 201507 linTransport Security 201507 lin
Transport Security 201507 linDanie Schoeman
 
The challenge of ensuring secure clinics and hospitals for patients and staff
The challenge of ensuring secure clinics and hospitals for patients and staffThe challenge of ensuring secure clinics and hospitals for patients and staff
The challenge of ensuring secure clinics and hospitals for patients and staffDanie Schoeman
 
Good To Go Safety Iosh 2010
Good To Go Safety   Iosh 2010Good To Go Safety   Iosh 2010
Good To Go Safety Iosh 2010Graham Halliday
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 linDanie Schoeman
 
A Conceptual Model For Crime Prevention In Supply Chain Management
A Conceptual Model For Crime Prevention In Supply Chain ManagementA Conceptual Model For Crime Prevention In Supply Chain Management
A Conceptual Model For Crime Prevention In Supply Chain ManagementJoshua Gorinson
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?Lumension
 
Sia Presentation100808
Sia Presentation100808Sia Presentation100808
Sia Presentation100808baratta44
 
8 steps to an efficient sms
8 steps to an efficient sms8 steps to an efficient sms
8 steps to an efficient smsbobtrevelyan
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...stuimrozsm
 
Creating a secure supply chain
Creating a secure supply  chainCreating a secure supply  chain
Creating a secure supply chainRezgar Mohammad
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Ollie Whitehouse
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirementsgurneyhal
 
Strengthening Transportation Logistic Facility Security.pdf
Strengthening Transportation Logistic Facility Security.pdfStrengthening Transportation Logistic Facility Security.pdf
Strengthening Transportation Logistic Facility Security.pdfDigitalMarketing166846
 

Similar to Supply Chain Security (20)

Human Factors in a Safety Management System - Breaking the Chain
Human Factors in a Safety Management System - Breaking the ChainHuman Factors in a Safety Management System - Breaking the Chain
Human Factors in a Safety Management System - Breaking the Chain
 
Werner Schierschmidt
Werner SchierschmidtWerner Schierschmidt
Werner Schierschmidt
 
Transport Security 201507 lin
Transport Security 201507 linTransport Security 201507 lin
Transport Security 201507 lin
 
Breach response
Breach responseBreach response
Breach response
 
The challenge of ensuring secure clinics and hospitals for patients and staff
The challenge of ensuring secure clinics and hospitals for patients and staffThe challenge of ensuring secure clinics and hospitals for patients and staff
The challenge of ensuring secure clinics and hospitals for patients and staff
 
Good To Go Safety Iosh 2010
Good To Go Safety   Iosh 2010Good To Go Safety   Iosh 2010
Good To Go Safety Iosh 2010
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 lin
 
OHMC 201509 lin
OHMC 201509 linOHMC 201509 lin
OHMC 201509 lin
 
A Conceptual Model For Crime Prevention In Supply Chain Management
A Conceptual Model For Crime Prevention In Supply Chain ManagementA Conceptual Model For Crime Prevention In Supply Chain Management
A Conceptual Model For Crime Prevention In Supply Chain Management
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
 
Sia Presentation100808
Sia Presentation100808Sia Presentation100808
Sia Presentation100808
 
CTPAT-MSR.pptx- Presentation Slides for trainees
CTPAT-MSR.pptx- Presentation Slides for traineesCTPAT-MSR.pptx- Presentation Slides for trainees
CTPAT-MSR.pptx- Presentation Slides for trainees
 
8 steps to an efficient sms
8 steps to an efficient sms8 steps to an efficient sms
8 steps to an efficient sms
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 
Creating a secure supply chain
Creating a secure supply  chainCreating a secure supply  chain
Creating a secure supply chain
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
Strengthening Transportation Logistic Facility Security.pdf
Strengthening Transportation Logistic Facility Security.pdfStrengthening Transportation Logistic Facility Security.pdf
Strengthening Transportation Logistic Facility Security.pdf
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 

Recently uploaded

TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfShashank Mehta
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHelp Desk Migration
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Features of a Call Recorder Spy App for Android.pdf
Features of a Call Recorder Spy App for Android.pdfFeatures of a Call Recorder Spy App for Android.pdf
Features of a Call Recorder Spy App for Android.pdfOne Monitar
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Jiastral oracle
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesAurelien Domont, MBA
 
How do I Check My Health Issues in Astrology.pdf
How do I Check My Health Issues in Astrology.pdfHow do I Check My Health Issues in Astrology.pdf
How do I Check My Health Issues in Astrology.pdfshubhamaapkikismat
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 

Recently uploaded (20)

TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your Business
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Features of a Call Recorder Spy App for Android.pdf
Features of a Call Recorder Spy App for Android.pdfFeatures of a Call Recorder Spy App for Android.pdf
Features of a Call Recorder Spy App for Android.pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and Templates
 
How do I Check My Health Issues in Astrology.pdf
How do I Check My Health Issues in Astrology.pdfHow do I Check My Health Issues in Astrology.pdf
How do I Check My Health Issues in Astrology.pdf
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 

Supply Chain Security

  • 1. Supply Chain Security: A Maturity Model for Loss Prevention Anthony Lee, CPP 6 February 2007
  • 2. Agenda Security Threats and Risks Supply Chain Security Guidelines Major Security Challenges Loss Prevention Maturity Model
  • 3. Supply Chain Security Supply chain security management is the application of policies, procedures, and technology to protect supply chain assets (product, facilities, equipment, information and personnel) from theft, damage, or terrorism, and to prevent the introduction of unauthorised contraband, people or weapons of mass destruction into the supply chain.
  • 4. International Trade International trade is a key driver of global economic growth 80% of general cargo is transported in containers 18 million containers daily across 7 oceans Global cargo supply chains are complex and involve many parties Global trading system cannot afford the consequences of a catastrophic attack
  • 5. Security Threats Terrorism Organised Crime and Cargo Theft Hijacking and Piracy Drug/human smuggling Illegal weapons Counterfeit goods Illegal exports of licensed materials/technology
  • 6. Cargo Theft US$40 Billion stolen worldwide annually (2000 report) CIA reported as much as 50% due to organised crime Majority of thefts (80% +) due to collusion with employees High value items that are easily disposed are main targets
  • 7. Cargo Theft Internal thefts of high value items within warehouse Thefts in cargo warehouses along supply chain Exit facility in loaded vehicle using fraudulent paperwork Hijack of cargo trucks Piracy of sea shipments Armed robbery at warehouses People are the weakest link
  • 8. Supply Chain Security Programs WCO Framework of Standards ISO/PAS 28000 Outlines Security Mgmt. for Supply Chain ICAO Annex 17 for Regulated Agents Regime TAPA Freight Security Requirements Customs-Trade Partnership against Terrorism (CTPAT)
  • 9. Supply Chain Security Guidelines Singapore will launch Secure Trade Partnership in mid 2007 Consistent with other key international supply chain security guidelines Holistic stance bolsters entire network Goals… not prescriptive specific measures Voluntary national program
  • 10. Key Objectives of Supply Chain Security Guidelines To make it difficult for terrorists to make use of the supply chain To emphasise the importance of a total supply chain security approach to cargo security To help local companies gain a source of competitive advantage To profile SGP as a secure transport and trading hub To encourage companies to secure their own processes within supply chains
  • 11. Players in the Supply Chain Suppliers Manufacturers Warehouse Operators and Owners Transporters Terminal Operators Sea and Air Freight Operators
  • 12. Players in the Supply Chain 1. Suppliers Includes parties engaged in import, export, trading, wholesale activity and retail 2. Manufacturers Includes parties engaged in processing, assembly, manufacturing and provision of other value-added activities to manufactured goods
  • 13. Players in the Supply Chain 3. Warehouse Operators and Owners Includes users of warehouse space, distribution centres, freight forwarders who own or operate warehouse facilities, and cargo consolidators 4. Transporters Includes road and rail hauliers, parties who own or operate vehicles involved in road or rail haulage and freight forwarders providing land transport services
  • 14. Players in the Supply Chain 5. Terminal Operators Includes airport operators, ground handlers, marine terminal operators, stevedores, and operators of cargo consolidation points 6. Sea and Air Freight Operators Includes shipping lines, air cargo carriers, non- vessel-operating common carriers (NVOCC) and agents for such entities
  • 15. Supply Chain Security ALL players have to be involved It involves securing every node and link along the chain A chain is only as strong as its weakest link Start with safe/secure packing of a shipment from point of origin to final point of deconsolidation It is about secure custodian of cargo at every point along the supply chain
  • 16. 12 Elements of Supply Chain Security Guidelines Physical Security Risk Analysis Access Control Conveyance Security Business Partner Security Incident Management/Investigations Crisis Management and Disaster Recovery Education and Training Awareness Documentation Processing Security Information Security Personnel Security Procedural Security
  • 17. Implementation of Guidelines Inline with requirement of WCO certification of “Authorised Economic Operator” status Phased approach – Start as voluntary program Companies to engage in self-assessment process against the security guidelines Customs will administer a validation and certification process Does not exempt companies from complying with existing regulations and legislation
  • 18. Major Security Challenges Supply Chain involves many players Multiple modes of transport Various types of intermediaries Several government agencies globally Complexity of the system leads to challenges Security Directors need C-suite support… The Human element…
  • 19. Typical Business Priorities Achieve profitable growth Increase gross margin Reduce operating cost and improve balance sheet metrics Justify Capex by ROI Create a high performance culture
  • 20. Supply Chain Performance Efficiency The system’s core capability measured in terms of speed, cost and volume of shipments Shipment Reliability Ensures that goods arrive within a specified timeframe with a minimum of loss from theft and accident Shipment Transparency Ensure that cargo is legitimately represented to authorities and legal for transport Fault Tolerance The system’s ability to respond to disruptions and failures of isolated components to ensure business continuity Resilience Ability to return to normal operating conditions quickly after disruption of service
  • 21. Supply Chain Security – Collateral Benefits Efficiency Visibility Reduced inspections Improved asset visibility Increased automated handling More timely shipping information Less process deviation Reduced inaccurate shipping data Shorter transit time Resiliency Inventory Management & Customer Shorter problem resolution time Relations Quicker response to a problem Reduced theft/loss/pilferage Reduced time to identify a problem Decreased tampering Less Customer attrition Source: Masssachusetts Institute of Technology, White Paper, May 2005
  • 22. Benefit of Supply Chain Security Study by Stanford University’s Manufacturing Institute 11 manufacturers and 3 third-party logistics providers 14 companies got more than a return on their security investments in supply chain security Reduce cargo inspections by 48% average Reduce transit times by 29% average Delivery times fell by 28% Theft, loss of freight and tampering fall by 90% Damages reduced by 50% Source: Traffic World, 7 Aug 2006
  • 23. The Human Element Security relies on people People perpetrate criminal and terrorist acts People are key to preventive measures But to make Security work, people have to be engaged, be supportive and willing, and see and feel the benefits
  • 24. Management of Cargo Area Poor physical working environment People who write Procedures and Processes rarely do the job Staff have little knowledge of: Airport and Freight Company requirements Company policies Procedures and Processes Emergency Procedures
  • 25. Why Staff Violate Procedures If followed to the letter, job wouldn’t get done Staff are not aware that procedure exists Staff prefer to rely on own skills and experience Use of informal procedures (black books) In recent studies, 67% of all human performance problems have been traced to bad procedures (incorrect, absent or unworkable)
  • 26. Situational Factors Time pressure High workload Unworkable procedures Inadequate equipment Bad working conditions Supervisors turn blind eye
  • 27. What are the solutions? Risk management… to add value in long term Safety and Security Culture Proper management control of operations Staff have to see benefits – ‘feel safer’ Monitoring mustn’t seem like punishment Focus groups – staff are key; they know the weak links in the processes Top management has to set examples
  • 28. Loss Prevention Maturity Model Synergy Process Compliance Security Culture Basic Security
  • 29. Level 1: Basic Security Measures Maturity Indicators at Level 1 - Adhoc Security Leader Lack of standards or measurements CCTV Lack best practice or industry models Access Control Inconsistent/spotty controls Alarm System Loose accountability Security Screening Undetectable and unmeasured losses Guarding Physical Barriers
  • 30. Level 1: Basic Security Major emphasis in preventing external thefts Deterrence against internal thefts Local Security Champion to drive initiatives Basic physical security infrastructure Access control and CCTV surveillance Security guarding and response Metal detector screening Depth in depth
  • 31. Level 2: Security Behaviour Measures Maturity Indicators at Level 2 – Repeatable Losses Metrics Standards applied with consistency but Education & Awareness lack best practice or industry models Photo ID Badges Poor organizational accountability Security Committee Poor efficiencies/limited metrics Audits and Self Checks Tactical remediations Security Procedures Vertical organizational communication/ Background Checks little sharing
  • 32. Level 2: Security Behaviour Major focus in preventing external/internal thefts Deterrence against inventory damages and shipment losses Improved documentation of security procedures Security training and awareness program Develop a loss prevention mindset Self-driven security program Security metrics and measurement
  • 33. Level 3: Process Compliance Measures Maturity Indicators at Level 3 - Managed Security Controls Organizational accountability Check and Balances Broad organizational communication Segregation of Duties and sharing Transport security language Use of best practice standards Contract Review Strategic remediations Investigations Controlled/forecasted lossses IT Security Best Practices Formal metrics/cost efficiencies
  • 34. Level 3: Process Compliance Major emphasis in thefts, shipment losses and inventory damages Deterrence against fraud and conspiracy Optimise loss compensation Enforcement of security and inventory controls Quality control of operational processes Segregation of duties for accountability Security language in transport contracts
  • 35. Level 4: Synergy Measures Maturity Indicators at Level 4 - Optimised Trend Analysis Balanced protection with business needs Fraud Prevention Continuous improvement program Source Development Horizontal and vertical communication Reward Program Best practice modelling Benchmarking Cost optimization based on metrics Security Standards Executive sponsorship Integrated Security
  • 36. Level 4: Synergy Loss prevention is part of normal business Detailed security metrics and measurement Prevention and detection of losses and fraud Security focus to meet customer expectations and to maximise profits “3S” culture – Service, Safety and Security Security involvement at all levels
  • 37. Summary of Maturity Model Risk management approach…add value Business solutions for business issues Progressive security portfolio Flexibility in budget planning Grow a self-directed security environment Maturity indicators of progress
  • 38. Thank You Supply Chain Security: A Maturity Model for Loss Prevention