Why Hire a Security Consultant

Size: px
Start display at page:

Download "Why Hire a Security Consultant"

Transcription

1 Why Hire a Security Consultant Everyone is familiar with the statement Consultants are people with briefcases who do not know our business and who, for a fee, will tell us what we already know. That statement, which dismisses the value of consultants across the board, may engender some smiles, but it certainly is not a philosophy by which to manage an organization. Consultants can make important contributions to the success of an organization. This paper will discuss those contributions based on the organization s functional sophistication. As a security professional and consultant in the area of protecting people, property and information, the examples will relate to the security function. The information presented, however, will also be valid for other functional disciplines (e.g., aviation, safety, public relations, etc). The information will cover four stages of sophistication of the security function: No Function, New Function, Established Function and Sophisticated Function. No Function The vast majority of organizations do not have a formal security function 1. Generally, this is due to the size of the organization. A small organization, for example, will likely never have one. On an informal basis, management simply does what needs to be done vis-à-vis security. They can contract with an alarm company for a security system; have a locksmith install the proper locks; etc. This concept is employed because the security risk exposure for the organization is extremely low and/or the revenue stream cannot support a formal security function. The downside to this approach is: Management in small organizations wear many hats and likely does not have the time to deal with security unless it is creating significant pain; Management generally has no securityrelated knowledge or skills, so security efforts may not be as effective or efficient as desired; and There may be holes in the organization s security program that are not obvious, but which have the potential to result in risks/losses. A consultant can provide value to this type organization by conducting assessments of the existing security program and of the risks/vulnerabilities faced by the organization. These activities can identify ongoing losses, the potential for loss and liability exposure, and gaps in the program. A consultant can also be a valuable resource for the occasional security question. It can prove to be extremely useful for an organization to have a subject-matter-expert on-call when the occasional security question/issue arises, especially when there is no cost for such an arrangement unless the service is used. As an example, if a small business owner decides an alarm system is necessary, a security consultant can provide the owner with an opinion as to whether the system, as proposed, will meet the owner s objectives and do it at a reasonable cost. New Function As organizations grow in size and complexity, there comes a point where the management handles security concept becomes unworkable and the need for a security function becomes apparent. When this organizational inflection point is reached, the most frequent approach is to formally assign security responsibilities to someone who is managing another functional area (e.g., Human Resources, Facilities, etc.). When security functions are first established, it is typically in response to a specific problem, and it is common to see the security efforts address that 1

2 one need. As other security problems arise, they too will be addressed in the same manner. The tendency to reactively address each new problem as it comes along can result in an inefficient hodgepodge of security processes and procedures. Exacerbating that problem will be the fact that the manager in charge of security will likely have no security expertise. The solutions and processes they develop will sometimes be by trial and error. Other times they will reach out to a security equipment or services provider for guidance. That approach has the potential to be more effective than a trial and error approach, but it is useful to remember the saying To a hammer everything looks like a nail. With that in mind, it is not difficult to imagine what might be a key part of a solution envisioned by a company that sells security cameras, or by a company that is in the guard business. It is not that equipment/services vendors cannot provide value, but rather that they have a perspective that may be influenced by the products or services they offer. This is where a consultant can make a contribution. An independent consultant (i.e., one that is not affiliated with companies providing products or services) will not have a bias in their approach to developing solutions. They will also be familiar with the tendency to approach security in a reactive manner and the inefficiencies of that approach, and will be able to provide guidance that will permit the organization to develop their program in a proactive manner. A consultant can inject the wisdom gained from years of experience with a variety of organizations. As a result, they can envision where the function will likely need to be in the future and can recommend a course of action and program components that will meet the organization s current needs and also be scalable and positioned to meet future needs. Simply stated, a consultant will be able to get the organization on the road to success without having to experience a steep learning curve littered with the cost and pain of a trial and error approach. It is a matter of the organization availing itself of the consultant s skills, knowledge and experience to be as efficient and effective as possible right out of the gate. Established Function The established function 2 stage is where many formal security functions reside, and where they can become stuck. In this stage, the organization is comfortable with the services provided by the function and the manner in which they are provided. Security staff has processes and a routine in place and is comfortable in what they are doing and how they are doing it. Unlike most other business functions, senior management likely knows little or nothing about what the security function should be doing and how it should be doing it. That results in a lack of critical oversight that other functions enjoy. It boils down to this: The security function has been around a number of years, they generally seem to have things under control, and management is content if there are no major incidents. In this organizational environment, because there are no security events of a magnitude that warrant senior management involvement, there are important questions relating to security that may not be asked, such as: Does the security function have a good handle on the business of the organization and the most critical security risks it faces? What does security see as the most critical security risks, why has it classified them as the most critical, and does senior management concur with their assessment? Is security focusing on the most critical risks and mitigating them in an effective and efficient manner? Does the security staff have the necessary knowledge and skill sets, and is there an effective process in place to ensure they continue to upgrade their knowledge and skills? Does the security function have the correct touch points in the organization to keep 2

3 abreast of changes in the business, the business environment and the risk picture? Are the security processes accurate, reliable, repeatable, scalable, documented, and followed? Are metrics in place to allow management to measure the effectiveness of the function and to identify anomalies that need to be addressed? This is where a consultant can make important contributions through an assessment of the risks faced by the organization and an assessment of the security function itself. The value of using a consultant for such a review falls into a few broad areas: 1. An important part of the assessment process is the gathering and analysis of information regarding management s views of the organization s security risks, and of the effectiveness, support and services provided by the security function. It is generally easier and more effective for management to have that discussion with a consultant rather than with members of the security function. 2. The security function, having been in place for a number of years, may have a parochial view of their world, whereas a consultant would view the organization, their risks and the function with a fresh set of eyes. 3. A consultant will likely have a broader range of experience (e.g., experience with more organizations, more industries, more security situations and solutions, etc.) then the members of the security function, and may visualize risks and opportunities not apparent to management of the function. 4. Because a consultant does not have a stake in the outcome of the assessment, their findings and recommendations will focus on what is in the best interests of the organization, not the best interests of specific individuals or functions. Sophisticated Function The sophisticated function 3 stage is generally found in very large and complex organizations. In this type of organization, senior management likely has an understanding of the key services provided by the security function and will consider the function to be a contributor to the success of the organization. Security functions operating at this level will be in a constant state of refinement and will engage in activities such as: Maintaining vigilance for new and/or evolving risks; Thinking proactively about, and assessing the potential for, risks that have not yet manifested themselves; Revising processes and methods to ensure they are effective and efficient; Providing recurring training to staff to upgrade knowledge and skills; Reallocating staff to meet new challenges; and Upgrading/replacing technology as needed. A security function operating at this stage will typically use a consultant for such things as: Providing services that are infrequently needed and that require highly specialized knowledge, skills and/or equipment; Supplementing security staff during peak periods; Providing assessments the security function cannot provide themselves (e.g., the IRS requires that, under certain circumstances, an independent consultant conduct an assessment of an executive s security risks if the security costs for the executive are 3

4 not to be classified as taxable fringe benefits); or Providing independent evaluations of specific elements of the security function to validate processes. How to Select a Consultant Selecting the right consultant is an important element of success for any consulting engagement. The following points should help to find the right consultant with whom to partner. The points are intended as a guide and are not intended to limit the organization in the processes they normally employ in the evaluation and selection of vendors. An independent consultant (i.e., one that is not part of, or affiliated with, organizations that sells services and/or products) will help to avoid a concern that they may have a divided interest or bias. Professional certifications, the authoring of books or published articles, and/or continuing education will all be indicators they are improving their knowledge/skills on a continuing basis. A broad background (e.g., years in the profession, range of topical experience, experience in a range of industries, etc.) is an indication they have seen and solved a large number of diverse problems. If the issues to be addressed are very specialized in nature, it will be important to find a consultant with experience in that specific area. Sometimes the consulting firm employee with whom the organization is negotiating will not be the individual doing the actual work. As such, it is important to know who will be doing the work, because it is their credentials, experience, demeanor and communication skills that matter. Asking the consultant how they will go about performing their work (i.e., their process) can be useful in developing a level of comfort that the consultant has done similar work before and does follow a defined process. No consultant can do everything. Be suspicious if they say they can. Ask for, and expect to receive, a few examples of assignments they do not have the required knowledge or skills to undertake. Checking references can be valuable. Useful areas of inquiry would be: the value of the services provided by the consultant, the overall quality of the products that were delivered, whether deadlines were met and the consultant was appropriately responsive to the clients needs, how well the consultant interfaced with the clients and others in the clients organizations, etc. Pay attention to the fine points of the initial contacts with the candidate consultants. If s and other written materials are not professional in nature and/or if the consultant s responses to phone calls and s are not prompt, it is reasonable to assume they will not improve if the consultant is retained. A good starting point when searching for a consultant is the International Association of Professional Security Consultants. The bottom line is that the broad range of experience and wealth of specialized knowledge a consultant brings to the table can help organizations improve their effectiveness and efficiency by helping to see the forest for the trees and consider approaches or solutions that had not been previously contemplated. 4

5 End Notes: 1 For the purposes of this paper, the term formal security function is defined as a distinct organizational unit populated by one or more individuals with training/skills specifically relating to the protection of people, property and information and who dedicate the majority of their time to that responsibility. 2 Defined as a function with dedicated staff and defined processes that have been in place for a number of years. A number of processes will be documented, repeatable and providing value-added services. The function may or may not have identified the most critical risks to the organization and may or may not be mitigating them in the most effective and efficient manner. 3 Defined as a function led by a security professional at the executive level in the organization that typically is no more than one reporting level removed from the CEO. Staff is composed of individuals who have robust experience in the security profession, with many holding professional certifications. Processes are well defined, documented and repeatable. The organization s risks are understood and classified as to criticality, there are reliable processes in place to identify and adapt to changes in the risk environment, and metrics are in place to measure performance and highlight anomalies and/or opportunities for improvement. About the Author John Cholewa, CPP, is the owner & principal consultant of Mentor Associates LLC, a Colorado based security management consulting firm. His 35+ years of experience includes servicing as security director for four Fortune 500 companies. He is the recipient of a Bachelor of Science in Law Enforcement from the University of Maryland, a Master of Arts in Business Management from Central Michigan University, and is Board Certified in Security Management. His book, Developing and Managing Physical Security Programs: A Guide for Facilities and Human Resources Managers, is designed to guide non-security professionals charged with implementing and managing physical security programs. 5

Integrators Evolve. Alongside Industry

Integrators Evolve. Alongside Industry Systems Tips for Integrators Evolve to Alongside Industry The face of the security industry continues to grow and evolve into one that resembles a service industry. Systems integrators need to be vigilant

More information

Three types of recruiting

Three types of recruiting By A. Harrison Barnes, Esq. INTRODUCTION Every legal recruiter practices his/her own brand of recruiting, and for the most part, each style has merit. As the head of a national recruiting firm, I speak

More information

get more out of life. It s the value of professional advice.

get more out of life. It s the value of professional advice. get more out of life. It s the value of professional advice. Get more out of life with a financial plan There are more benefits to having a financial plan than you may realize. A comprehensive financial

More information

Sample Pages Alliance Management Guidebook

Sample Pages Alliance Management Guidebook 313 Washington Street, Suite 300 Newton, MA 02458 USA PHONE +1 617.965.4777 FAX +1 617.965.8558 www.rhythmofbusiness.com Sample Pages Management Guidebook Managing Biopharma Strategic s Collaborative Networks

More information

THERE S A REASON WE RE THE NUMBER 1 PROVIDER OF PART-TIME CFOS. How a CFO centre top level part-time CFO can transform your business

THERE S A REASON WE RE THE NUMBER 1 PROVIDER OF PART-TIME CFOS. How a CFO centre top level part-time CFO can transform your business THERE S A REASON WE RE THE NUMBER 1 PROVIDER OF PART-TIME CFOS How a CFO centre top level part-time CFO can transform your business Typical comments we receive from our customers:- The best kept secret

More information

The keys to sustainable pricing execution include a comprehensive

The keys to sustainable pricing execution include a comprehensive Transform Your Pricing Strategy into a For pricing to become a competitive weapon in the corporate arsenal, the pricing strategy must be executed in a manner that is consistent, sustainable, and easily

More information

Insert Client Name Request for Proposal for Security Risk Assessment Services Consulting

Insert Client Name Request for Proposal for Security Risk Assessment Services Consulting Courtesy of the International Association of Professional Security Consultants Distribute your RFP at no cost at https://iapsc.org/rfp/ Insert Client Name Request for Proposal for Security Risk Assessment

More information

RHF Certification Program Prototype

RHF Certification Program Prototype RHF Certification Program Prototype Name of Model Prototype: The Rick Hansen Foundation Certification Program (RHF Certification Program) Name of Model Prototype Leader: Rick Hansen Foundation (RHF) with

More information

How do we assure service availability at levels that make the IT infrastructure function so well it becomes transparent to our business?

How do we assure service availability at levels that make the IT infrastructure function so well it becomes transparent to our business? SOLUTION BRIEF: CA SERVICE AVAILABILITY MANAGEMENT How do we assure service availability at levels that make the IT infrastructure function so well it becomes transparent to our business? The CA Service

More information

Legal Aid Alberta Strategic Plan 2019/ /22

Legal Aid Alberta Strategic Plan 2019/ /22 Making a Difference Everything we do at Legal Aid Alberta (LAA) helps support Albertans as they face some of the most challenging times in their lives. We help to enhance fairness in the justice system.

More information

Guidance Document. Auditing the Cloud Controls Matrix

Guidance Document. Auditing the Cloud Controls Matrix Guidance Document Auditing the Cloud Controls Matrix Release 1: 08/08/2013 2013 Cloud Security Alliance All Rights Reserved. Valid at time of printing. All rights reserved. You may download, store, display

More information

Periodic Comprehensive Review of the External Auditor

Periodic Comprehensive Review of the External Auditor Periodic Comprehensive Review of the External Auditor TOOL FOR AUDIT COMMITTEES January 2014 ENHANCING AUDIT QUALITY AUDIT COMMITTEES iii Table of Contents Introduction 1 1. Determine the scope, timing

More information

Tracking and Measuring Physician Relations

Tracking and Measuring Physician Relations Tracking and Measuring Physician Relations experience. insight. impact. Using Technology For Greater Success By Allison McCarthy, MBA Tracking and measuring the success of physician relations program has

More information

Choosing the Right UX Vendor

Choosing the Right UX Vendor by Eric Schaffer CEO and Founder Human Factors International Many UX vendors are intent on just doing the projects. They don t focus on helping internal staff to learn UX skills or building a UX infrastructure

More information

The Third-Party Process: Waste of Resources or Added Value?

The Third-Party Process: Waste of Resources or Added Value? The Third-Party Process: Waste of Resources or Added Value? Discussing accredited certification at a cocktail party isn t likely to make you the center of attention. But depending on where you work, you

More information

Learning Objectives. Reading Assignment. Supplemental Reading. Unit Lesson. Learning Activities (Non-Graded) Key Terms

Learning Objectives. Reading Assignment. Supplemental Reading. Unit Lesson. Learning Activities (Non-Graded) Key Terms UNIT I STUDY GUIDE Gaining Commitment in a Safety-First Corporate Culture Reading Assignment Introduction: Establishing a Safety-First Corporate Culture Chapter 1: Gain Commitment to a Safety-First Corporate

More information

The Million Dollar Firm

The Million Dollar Firm The Million Dollar Firm How to Start Your Journey M. Darren Root a resource for you from The Million Dollar Firm Choose Your Path with Intention to End Traditional Firm Chaos M.Darren Root President/CEO,

More information

The Critical Role of Talent Analytics in Successful Mergers and Acquisitions

The Critical Role of Talent Analytics in Successful Mergers and Acquisitions The Critical Role of Talent Analytics in Successful Mergers and Acquisitions The art and science of managing human capital to create people-driven synergies Why 70% of M&A transactions don t achieve expected

More information

ebook Reach Your Leadership Potential

ebook Reach Your Leadership Potential ebook Reach Your Leadership Potential Develop skills and qualities to achieve your potential as a business leader Strong leadership is both an inherent and a learned quality. As a business leader, it s

More information

Enhancing customer experience: first, do no harm

Enhancing customer experience: first, do no harm Enhancing customer experience: first, do no harm Few things can cause customers blood pressure to rise more quickly than a bad customer service experience by phone. Frustration builds when they are forced

More information

A CIOview White Paper by Scott McCready

A CIOview White Paper by Scott McCready A CIOview White Paper by Scott McCready 1 Table of Contents How to Craft an Effective ROI Analysis... 3 ROI Analysis is Here to Stay... 3 When is an ROI Analysis Not Necessary?... 3 It s More About the

More information

WHITE PAPER Your Ideal Succession Plan

WHITE PAPER Your Ideal Succession Plan WHITE PAPER Your Ideal Succession Plan A complete strategy for a seamless succession Whether you ve made the decision or a significant life event has occurred, it s time to step away from your business

More information

Control of Documented Information. Integrated Management System Guidance

Control of Documented Information. Integrated Management System Guidance Control of Documented Information Integrated Management System Guidance ISO 9001:2015, ISO 14001:2015 & OHSAS 18001:2007 Table of Contents Integrated Management System Guidance 1 INTRODUCTION... 4 1.1

More information

CORROSION MANAGEMENT MATURITY MODEL

CORROSION MANAGEMENT MATURITY MODEL CORROSION MANAGEMENT MATURITY MODEL CMMM Model Definition AUTHOR Jeff Varney Executive Director APQC Page 1 of 35 TABLE OF CONTENTS OVERVIEW... 5 I. INTRODUCTION... 6 1.1 The Need... 6 1.2 The Corrosion

More information

Seven Key Success Factors for Identity Governance

Seven Key Success Factors for Identity Governance WHITE PAPER Seven Key Success s for Identity Governance Insights and Advice from Real-World Implementations You have been given a high-profile mission: address urgent audit and compliance requirements

More information

2017 Law Firm Marketing Operations Index

2017 Law Firm Marketing Operations Index 2017 Law Firm Marketing Operations Index Executive Summary The rapidly growing discipline of Marketing Operations seeks to increase marketing efficiency and organizational agility, and to measure, in a

More information

WHITE PAPER. The ACL Audit Analytic Capability Model: Leveraging analytics in the fight against fraud

WHITE PAPER. The ACL Audit Analytic Capability Model: Leveraging analytics in the fight against fraud WHITE PAPER The ACL Audit Analytic Capability Model: Leveraging analytics in the fight against fraud CONTENTS INTRODUCTION... 1 THE ANALYTIC CAPABILITY MODEL... 1 LEVEL 1 - BASIC... 3 Characteristics...

More information

GROW YOUR BUSINESS. The Power of Synergy GYB 2014 IN THIS ISSUE: Many Hands Make Light Work - The Value of Mentoring

GROW YOUR BUSINESS. The Power of Synergy GYB 2014 IN THIS ISSUE: Many Hands Make Light Work - The Value of Mentoring The Power of Synergy GYB 2014 GROW YOUR BUSINESS IN THIS ISSUE: Many Hands Make Light Work - The Value of Mentoring Who Is Influencing Your Customers? - How to Listen On Social Media Take Back Your Time

More information

How to Write a Winning RFP for Healthcare Website Redesign

How to Write a Winning RFP for Healthcare Website Redesign How to Write a Winning RFP for Healthcare Website Redesign Helpful tips to guide healthcare marketers before you embark on the RFP process. ccording to recent research, the average healthcare organization

More information

2. Do any of the managers appear to have valid arguments for their beliefs as to why formal project management should not be considered?

2. Do any of the managers appear to have valid arguments for their beliefs as to why formal project management should not be considered? 1. What are some of the major problems facing the management of Hyten in accepting formalized project management? (Include attitude problems/ personality problems.) There are many problems faced by Hyten

More information

Building a Roadmap to Robust Identity and Access Management

Building a Roadmap to Robust Identity and Access Management Building a Roadmap to Robust Identity and Access Management Elevating IAM from Responsive to Proactive From cases involving private retailers to government agencies, instances of organizations failing

More information

Adding insight to audit Transforming Internal Audit through data analytics

Adding insight to audit Transforming Internal Audit through data analytics Adding insight to audit Transforming Internal Audit through data analytics Why analytics? Why now? Traditional internal audit methodologies have served their purpose well for decades. However, as the business

More information

Building a Sustainable Culture of Security

Building a Sustainable Culture of Security Building a Sustainable Culture of Security What is a Sustainable Culture of Security? If asked, the majority of organizations will say that they have one, but when asked to define it, they have difficulty.

More information

Stop Selling Engineering! By David Stone

Stop Selling Engineering! By David Stone Stop Selling Engineering! By David Stone Complaining about low fees and a lack of respect for our profession are frequent topics for editorials and discussions among consulting engineers. Surveys show

More information

ASIC speaks on Improving and Maintaining Audit Quality & The Role of Others

ASIC speaks on Improving and Maintaining Audit Quality & The Role of Others CPA Australia Podcast - Episode 16 - Transcript ASIC speaks on Improving and Maintaining Audit Quality & The Role of Others INTRO: Hello and welcome to the CPA Australia Podcast your source for business,

More information

Identity and Access Management. Program Primer

Identity and Access Management. Program Primer Identity and Access Program Primer Executive Summary The role of identity in the modern enterprise has been steadily growing in importance over the last decade. As the enterprise technology stack continues

More information

Ethics and Financial Reporting: Delivering on the Commitment

Ethics and Financial Reporting: Delivering on the Commitment An address by Bill MacKinnon, FCA Chief Executive, KPMG LLP To the EthicsCentre, Toronto Ontario February 27, 2003 (check against delivery) 1 Thank you The world of auditing and financial reporting has

More information

Is Outsourcing Right for You? Five key questions to answer about your equity plan.

Is Outsourcing Right for You? Five key questions to answer about your equity plan. Is Outsourcing Right for You? Five key questions to answer about your equity plan. Introduction Managing and reporting on a stock plan comes with its fair share of challenges. Manual processes, meeting

More information

Business Development Executive For Revenew International

Business Development Executive For Revenew International Position Specification Business Development Executive For Revenew International Karina Tran Human Resources Business Partner ktran@revenew.net 713.203.4091 281.276.4514 713.583.6809 Revenew International,

More information

Synoptek Managed AWS: Cloud Optimization & Risk Mitigation

Synoptek Managed AWS: Cloud Optimization & Risk Mitigation Synoptek Managed AWS: Cloud Optimization & Risk Mitigation Snap your fingers. If you re among those who think that cloud computing works like that, you ve been watching too many commercials. Like the many

More information

The New Business Value of Call Accounting WHITE PAPER

The New Business Value of Call Accounting WHITE PAPER The New Business Value of Call Accounting WHITE PAPER The New Business Value of Call Accounting How Telecom/UC Managers Utilize Cutting-Edge Call Accounting Software to Drive True Business Value Introduction

More information

Example Approach To Non-Profit Organizations. ExeComp Solutions Compensation Advisory Services May 2014

Example Approach To Non-Profit Organizations. ExeComp Solutions Compensation Advisory Services May 2014 Example Approach To Non-Profit Organizations ExeComp Solutions Compensation Advisory Services May 2014 ExeComp Solutions LLC (ECS) appreciates the opportunity to present our services to The Museum We are

More information

The Power of Thinking Like a CEO...and Unlike One

The Power of Thinking Like a CEO...and Unlike One ARTICLE The Power of Thinking Like a CEO...and Unlike One Ann Herrmann-Nehdi Interview by Michele Molnar, November 1, 2006 Power of Thinking Like a CEO Article: Paper in Brief Discover why thinking is

More information

A Strategic Approach to Cost-effective Marketing for Nonprofits

A Strategic Approach to Cost-effective Marketing for Nonprofits Dina Wolfman Baker Vice President of Communications, Public Health Management Corporation August 2009 Many nonprofit organizations are taking a renewed look at their marketing and communications efforts

More information

Workforce Solutions Guide

Workforce Solutions Guide Workforce Solutions Guide [Innovative Solutions To Everyday Challenges] Part 2 1/15 Control costs. Meet deadlines. Improve productivity. Capitalize on opportunities. Manage resource constraints. Build

More information

ISO 9001 Auditing Practices Group Guidance on:

ISO 9001 Auditing Practices Group Guidance on: International Organization for Standardization International Accreditation Forum Date: 13 January 2016 ISO 9001 Auditing Practices Group Guidance on: What do we mean by adding value? Adding Value We hear

More information

Chief Administrative Officer Position Description

Chief Administrative Officer Position Description Chief Administrative Officer Position Description About Tecumseh Business in Focus Magazine recently dubbed the Town of Tecumseh a small Town that packs a pretty big punch. With a population of just under

More information

INDUSTRIAL DESIGNER POSITION AT TRIG DESIGN INNOVATION MARKETING

INDUSTRIAL DESIGNER POSITION AT TRIG DESIGN INNOVATION MARKETING INNOVATION DESIGN MARKETING INDUSTRIAL DESIGNER POSITION AT TRIG After reviewing this position, please submit your cover letter, resume, and portfolio to /careers No phone calls please LETTER FROM TRIG

More information

GxP Auditing, Remediation, and Staff Augmentation

GxP Auditing, Remediation, and Staff Augmentation GxP Auditing, Remediation, and Staff Augmentation TABLE OF CONTENTS 3 Introduction 4 GxP Auditing 4 GMP Auditing 5 GCP Auditing 6 GLP Auditing 7 Pharmacovigilance Auditing 7 Vendor/Supplier Auditing 8

More information

Need a Security Workforce Management Platform?

Need a Security Workforce Management Platform? Need a Security Workforce Management Platform? A guide to understanding the true costs of in-house software development vs. an outsourced platform Need a Security Workforce Management Platform? 1 If you

More information

REX ENERGY CORPORATION CORPORATE GOVERNANCE GUIDELINES

REX ENERGY CORPORATION CORPORATE GOVERNANCE GUIDELINES REX ENERGY CORPORATION CORPORATE GOVERNANCE GUIDELINES The Board of Directors (the Board ) of Rex Energy Corporation (the Company ) has adopted the following corporate governance guidelines. These guidelines

More information

Revenue Cycle Management for Software Companies

Revenue Cycle Management for Software Companies Revenue Cycle Management for Software Companies Understanding Your Company's Processes and Needs by Bob Scarborough, Tensoft CEO For software companies, the sales, billing and revenue management processes

More information

pwc.co.uk Enterprise Risk Management

pwc.co.uk Enterprise Risk Management pwc.co.uk Enterprise Risk Management Contents What s on your mind? 01 Our point of view 02 What good looks like 04 How we can help 06 What you gain 07 When to act 08 Intelligent Digital 09 What s on your

More information

CLAconnect.com/creditunions. Impact the Future of Credit Unions

CLAconnect.com/creditunions. Impact the Future of Credit Unions CLAconnect.com/creditunions Impact the Future of Credit Unions We Believe Enabling your success means a better world for all of us, but now, more than ever, a greater number of operational, regulatory,

More information

Certified Identity Governance Expert (CIGE) Overview & Curriculum

Certified Identity Governance Expert (CIGE) Overview & Curriculum Overview Identity and Access Governance (IAG) provides the link between Identity and Access Management (IAM) rules and the policies within a company to protect systems and data from unauthorized access,

More information

Chapter 4 Develop Systems

Chapter 4 Develop Systems Chapter 4 Develop Systems By Evan Keller Definition A system is a specified way of doing things. It shows your employees how we do it here. You can develop systems by finding the best way to do things

More information

EVALUATE YOUR ABILITY TO LEAD YOURSELF

EVALUATE YOUR ABILITY TO LEAD YOURSELF EVALUATE YOUR ABILITY TO LEAD YOURSELF STRATEGIC LEADERS KNOW THE SECRET OF LEADING THEMSELVES WELL BY LEYDA ALEMAN, SHRM-SCP 2018 Human Capital Consultants International All Rights Reserved www.hcc-intl.com.

More information

Implementing a Project Infrastructure

Implementing a Project Infrastructure The PROJECT PERFECT White Paper Collection Overview Implementing a Project Infrastructure eville Turbit In working with a client recently, proved an interesting experience. The way in which the organisation

More information

Person Job Match. Selection Report. Name Mr Sample Candidate. Date 18 September

Person Job Match. Selection Report. Name Mr Sample Candidate. Date 18 September Person Job Match Selection Report Name Mr Sample Candidate Date 18 September 2013 www.ceb.shl.com EXECUTIVE SUMMARY This report tells you about Mr Sample Candidate s potential fit to the competency requirements

More information

General Services Administration

General Services Administration General Services Administration Information for Ordering Activities Management, Organizational, and Business Improvement Services (MOBIS) Industrial Group: 874 Industrial Class: 8742 Contract Number: Contract

More information

Risk-Based Environmental Auditing at Bulk Fuel Terminals

Risk-Based Environmental Auditing at Bulk Fuel Terminals Risk-Based Environmental Auditing at Bulk Fuel Terminals Presented at National Institute for Storage Tank Management (NISTM) Houston, TX Presented by Douglas Hileman, P.E., CPEA, CRMA; Douglas Hileman

More information

Adding value through key relationships the Corporate Secretary s unique contribution to the Board process.

Adding value through key relationships the Corporate Secretary s unique contribution to the Board process. Adding value through key relationships the Corporate Secretary s unique contribution to the Board process. By Dirk Schlimm Too often, the Corporate Secretary performs a merely administrative function.

More information

Mind the Agility Gap

Mind the Agility Gap Mind the Agility Gap WHY HR AND LEARNING EXECUTIVES ARE FAILING THEIR ORGANIZATIONS 88% of global HR leaders say building the organization of the future is their biggest challenge. But only 11% say they

More information

GREAT SERVICE NEVER STOPS.

GREAT SERVICE NEVER STOPS. GREAT SERVICE NEVER STOPS. At Tata Communications, we understand that how we do things is every bit as important to our customers as the things that we do. So we re always flexible, always available, and

More information

These are, quite simply, the blueprint for why we are successful at ICE. These competencies tell you what I looked for in

These are, quite simply, the blueprint for why we are successful at ICE. These competencies tell you what I looked for in FROM THE CEO When I founded ICE in 2000, there were nine of us working around the clock and practically living together. We laughed together, struggled together, learned together and ultimately succeeded

More information

I. POLICY FOR INTERNAL ALIGNMENT

I. POLICY FOR INTERNAL ALIGNMENT 1 TABLE OF CONTENTS PHASE I Summary.... 3 I. Internal Alignment.....3 II. Job Structure Evaluation..3 Appendix I. Compensable Families...6 Appendix II. Compensable levels...7 Appendix III Defining Compensable

More information

Connecticut Valve & Fitting Co.

Connecticut Valve & Fitting Co. Connecticut Valve & Fitting Co. 120 Long Hill Cross Road Shelton, CT 06484 Phone 203.929.6341 Fax 203.929.1831 Revision 03 Date of Revision 12/14/2010 Quality Manual Approved by: Greg Hines (President)

More information

Security requirements are changing as threats continue to evolve. For many reasons Security has seen a shift from operational to strategic While

Security requirements are changing as threats continue to evolve. For many reasons Security has seen a shift from operational to strategic While 1 Security requirements are changing as threats continue to evolve. For many reasons Security has seen a shift from operational to strategic While individual security disciplines have their specific concerns

More information

Leveraging Risk Assessments to Raise Funding for Your Security Program

Leveraging Risk Assessments to Raise Funding for Your Security Program Leveraging Risk Assessments to Raise Funding for Your Security Program Shawn Reilly, CPP, PSP, CHPA, CPD 1 Sources of Information ASIS Facilities Physical Security Measures Guideline Design and Evaluation

More information

Create your ideal data quality strategy. Become a more profitable, informed company with better data insight

Create your ideal data quality strategy. Become a more profitable, informed company with better data insight Create your ideal data quality strategy Become a more profitable, informed company with better data insight An Experian Data Quality White Paper March 2015 Introduction...1 The levels of data quality sophistication...2

More information

IPMA-Canada Certification Program

IPMA-Canada Certification Program Program IPMA-CP (In Training) IPMA-CP IPMA-ACP IPMA-EX IPMA-CE International Personnel Management Association Canada 3333 333 Program IPMA-Canada is a national human resource management association whose

More information

Entertainment Business Finance Leadership Portfolio. Patrick Masters. Entertainment Business Finance

Entertainment Business Finance Leadership Portfolio. Patrick Masters. Entertainment Business Finance EBF Leadership Portfolio 1 Entertainment Business Finance Leadership Portfolio Patrick Masters Entertainment Business Finance March 21, 2010 EBF Leadership Portfolio 2 EBF Leadership Portfolio It is important

More information

Identifying, Selecting and Recruiting Members

Identifying, Selecting and Recruiting Members Identifying, Selecting and Recruiting Members To identify, select, and recruit the right county leaders to make up the County Extension Council is of primary importance to the success of the Council. Although

More information

CHARTER OF THE AUDIT, FINANCE AND RISK COMMITTEE OF THE BOARD OF DIRECTORS OF ACE AVIATION HOLDINGS INC.

CHARTER OF THE AUDIT, FINANCE AND RISK COMMITTEE OF THE BOARD OF DIRECTORS OF ACE AVIATION HOLDINGS INC. CHARTER OF THE AUDIT, FINANCE AND RISK COMMITTEE OF THE BOARD OF DIRECTORS OF ACE AVIATION HOLDINGS INC. 1. Structure, Procedure, Qualifications The Audit, Finance and Risk Committee (the Audit Committee

More information

Five Key Themes from the Pulse 2017 Conference

Five Key Themes from the Pulse 2017 Conference Five Key Themes from the Pulse 2017 Conference An Overview by Aman Singh, Senior Associate, and Angeline Liu, Senior Technical Consultant June 2017 Now in its fifth year, Gainsight s Pulse 2017 conference

More information

How Not to Sweat an Oracle Audit

How Not to Sweat an Oracle Audit WHITE PAPER How Not to Sweat an Oracle Audit Abstract An Oracle audit can be time-consuming, expensive, and stressful. This paper describes the best practices, thirdparty expertise, and tools that not

More information

AON ASIA: MITIGATING RISK WITH QLIKVIEW FOR CLEARER PRESENTATION OF SUMMARY FINANCIAL INFORMATION

AON ASIA: MITIGATING RISK WITH QLIKVIEW FOR CLEARER PRESENTATION OF SUMMARY FINANCIAL INFORMATION AON ASIA: MITIGATING RISK WITH QLIKVIEW FOR CLEARER PRESENTATION OF SUMMARY FINANCIAL INFORMATION The beauty is that we can now see exactly where things are performing well and where things have gone wrong.

More information

Leadership Profile and Notice of Search

Leadership Profile and Notice of Search CARLSON CAPITAL MANAGEMENT Leadership Profile and Notice of Search CHIEF WEALTH ADVISOR CARLSON CAPITAL MANAGEMENT INVITES APPLICATIONS AND INQUIRIES FOR THE POSITION OF CHIEF WEALTH ADVISOR The Chief

More information

Effective Mind Maps. Analyses of business mind maps by Chuck Frey, author of the Mind Mapping Software Blog

Effective Mind Maps. Analyses of business mind maps by Chuck Frey, author of the Mind Mapping Software Blog Effective Mind Maps Analyses of business mind maps by Chuck Frey, author of the Mind Mapping Software Blog Type of map: Business owner dashboard map Software used to create: MindManager Source: BiggerPlate

More information

Auxiliary Services Job Family: Retail Progression

Auxiliary Services Job Family: Retail Progression Cornell University Staff Compensation Program Generic Job Profile Summaries Compensation Services 353 Pine Tree Road, East Hill Plaza, Ithaca, NY 14850 (607) 254-8355 compensation@cornell.edu www.hr.cornell.edu

More information

Trusted KYC Data Sharing Framework Implementation

Trusted KYC Data Sharing Framework Implementation July 2017 Trusted KYC Data Sharing Framework Implementation Supporting Document Contents Preface... 3 1 Objective of this Document... 4 2 Evolving Benefits Provided by the Data Sharing Environment... 5

More information

Let s talk: governance

Let s talk: governance EY Center for Board Matters Let s talk: governance March 2014 Issue 3 Getting it right: succession planning for the boardroom and C-Suite Getting it right: succession planning for the boardroom and C-Suite

More information

Conducting an Organizational Health Check Pays Off! Four steps to success

Conducting an Organizational Health Check Pays Off! Four steps to success Conducting an Organizational Health Check Pays Off! Four steps to success By Mark Hordes Mark Hordes Management Consultant, LLC Houston, Texas It s common knowledge that at least once a year you should

More information

Creating a Job Search Program In Your Church, Synagogue Or Community Organization

Creating a Job Search Program In Your Church, Synagogue Or Community Organization Creating a Job Search Program In Your Church, Synagogue Or Community Organization Special Supplement to The Unwritten Rules of the Highly Effective Job Search By Orville Pierson Note: This Special Supplement

More information

Contact Center Professional Certification

Contact Center Professional Certification 2013 Whitepaper Contact Center Professional Certification 8 Key Benefits Contact Center Professional Certification Key Benefits Choosing the contact center certification program that s right for you, your

More information

Seven Keys to Ensuring Successful Mentoring Outcomes

Seven Keys to Ensuring Successful Mentoring Outcomes Seven Keys to Ensuring Successful Mentoring Outcomes By Melanie Wass Page1 Melanie Wass has been conducting Mentoring training since 2003 for numerous government agencies and programs. Much of her mentoring

More information

Must have law firm experience. Where are the new ideas coming from?

Must have law firm experience. Where are the new ideas coming from? Must have law firm experience. Where are the new ideas coming from? Same old same old. Must have previous law firm experience. This has to be the most common phrase to appear on job descriptions for marketing

More information

Managing Change and Complexity with Identity and Access Governance

Managing Change and Complexity with Identity and Access Governance White Paper Access Governance Suite Managing Change and Complexity with Identity and Access Governance Table of Contents Introduction... 1 Making a Change... 2 Definitions... 3 External Drivers of Change

More information

UNIT 5 ERP Implementation Issues

UNIT 5 ERP Implementation Issues UNIT 5 ERP Implementation Issues 1 Syllabus Opportunities and problems in ERP selection and implementation Identifying ERP benefits Team formation Consultant intervention Selection of ERP (package selection)

More information

The Essential Practices:

The Essential Practices: The Essential Practices: Why They Matter ESSENTIAL PRACTICE #1 The authorizer has a published and available mission statement for quality authorizing. A quality authorizer states a clear mission for quality

More information

Service Center Organization

Service Center Organization NewITProb.book Page 13 Thursday, February 1, 2001 2:37 PM Chapter 2 Service Center Organization If you have the luxury of organizing or reorganizing your service center, there are a number of important

More information

TenStep Project Management Process Summary

TenStep Project Management Process Summary TenStep Project Management Process Summary Project management refers to the definition and planning, and then the subsequent management, control, and conclusion of a project. It is important to recognize

More information

Public Housing Revitalization Specialist GS Career Path Guide

Public Housing Revitalization Specialist GS Career Path Guide Public Housing Revitalization Specialist GS-1101 Career Path Guide August 2014 (This page intentionally left blank.) TABLE OF CONTENTS PUBLIC HOUSING REVITALIZATION SPECIALIST... 1 Career Path Guide...

More information

Quality Management System Guidance. ISO 9001:2015 Clause-by-clause Interpretation

Quality Management System Guidance. ISO 9001:2015 Clause-by-clause Interpretation Quality Management System Guidance ISO 9001:2015 Clause-by-clause Interpretation Table of Contents 1 INTRODUCTION... 4 1.1 IMPLEMENTATION & DEVELOPMENT... 5 1.2 MANAGING THE CHANGE... 5 1.3 TOP MANAGEMENT

More information

Our Journey in Creating a Memorable Customer Experience. Vision Mission Values Culture

Our Journey in Creating a Memorable Customer Experience. Vision Mission Values Culture Our Journey in Creating a Memorable Customer Experience Vision Mission Values Culture What s Inside Message from the Chairman......................................... 2 What Customers Bank Stands For...................................

More information

What defines success for a managed travel program?

What defines success for a managed travel program? What defines success for a managed travel program? 1 SATISFACTION Travelers are exposed every day to the best user interfaces and experiences that the Internet and Mobile have to offer. They bring those

More information

Complex Care Program Development: A New Framework for Design and Evaluation

Complex Care Program Development: A New Framework for Design and Evaluation BRIEF MARCH 2017 Complex Care Program Development: A New Framework for Design and Evaluation By David Labby, MD, PhD * IN BRIEF While medical-technological interventions undergo robust research and design

More information

Preparing your board for the future

Preparing your board for the future Preparing your board for the future A guide to succession planning Funded by Getting the basics in place 1 What is succession planning? Succession planning is about ensuring continuity within an organisation,

More information

STEVEN HALL & PARTNERS

STEVEN HALL & PARTNERS STEVEN HALL & PARTNERS E X E C U T I V E C O M P E N S A T I O N C O N S U L T A N T S 212-488-5400 www.shallpartners.com shp@shallpartners.com ABOUT US Steven Hall & Partners ( SH&P ) is an independent

More information

Grow your business 2016 Issue 08

Grow your business 2016 Issue 08 2016 ISSUE 08 CONTENTS Is your business your largest asset? How would you value it to sell? A vital component for sales growth is Quality. Business growth is essential for success How? Is your business

More information