Why Hire a Security Consultant
|
|
- Griselda Young
- 6 years ago
- Views:
Transcription
1 Why Hire a Security Consultant Everyone is familiar with the statement Consultants are people with briefcases who do not know our business and who, for a fee, will tell us what we already know. That statement, which dismisses the value of consultants across the board, may engender some smiles, but it certainly is not a philosophy by which to manage an organization. Consultants can make important contributions to the success of an organization. This paper will discuss those contributions based on the organization s functional sophistication. As a security professional and consultant in the area of protecting people, property and information, the examples will relate to the security function. The information presented, however, will also be valid for other functional disciplines (e.g., aviation, safety, public relations, etc). The information will cover four stages of sophistication of the security function: No Function, New Function, Established Function and Sophisticated Function. No Function The vast majority of organizations do not have a formal security function 1. Generally, this is due to the size of the organization. A small organization, for example, will likely never have one. On an informal basis, management simply does what needs to be done vis-à-vis security. They can contract with an alarm company for a security system; have a locksmith install the proper locks; etc. This concept is employed because the security risk exposure for the organization is extremely low and/or the revenue stream cannot support a formal security function. The downside to this approach is: Management in small organizations wear many hats and likely does not have the time to deal with security unless it is creating significant pain; Management generally has no securityrelated knowledge or skills, so security efforts may not be as effective or efficient as desired; and There may be holes in the organization s security program that are not obvious, but which have the potential to result in risks/losses. A consultant can provide value to this type organization by conducting assessments of the existing security program and of the risks/vulnerabilities faced by the organization. These activities can identify ongoing losses, the potential for loss and liability exposure, and gaps in the program. A consultant can also be a valuable resource for the occasional security question. It can prove to be extremely useful for an organization to have a subject-matter-expert on-call when the occasional security question/issue arises, especially when there is no cost for such an arrangement unless the service is used. As an example, if a small business owner decides an alarm system is necessary, a security consultant can provide the owner with an opinion as to whether the system, as proposed, will meet the owner s objectives and do it at a reasonable cost. New Function As organizations grow in size and complexity, there comes a point where the management handles security concept becomes unworkable and the need for a security function becomes apparent. When this organizational inflection point is reached, the most frequent approach is to formally assign security responsibilities to someone who is managing another functional area (e.g., Human Resources, Facilities, etc.). When security functions are first established, it is typically in response to a specific problem, and it is common to see the security efforts address that 1
2 one need. As other security problems arise, they too will be addressed in the same manner. The tendency to reactively address each new problem as it comes along can result in an inefficient hodgepodge of security processes and procedures. Exacerbating that problem will be the fact that the manager in charge of security will likely have no security expertise. The solutions and processes they develop will sometimes be by trial and error. Other times they will reach out to a security equipment or services provider for guidance. That approach has the potential to be more effective than a trial and error approach, but it is useful to remember the saying To a hammer everything looks like a nail. With that in mind, it is not difficult to imagine what might be a key part of a solution envisioned by a company that sells security cameras, or by a company that is in the guard business. It is not that equipment/services vendors cannot provide value, but rather that they have a perspective that may be influenced by the products or services they offer. This is where a consultant can make a contribution. An independent consultant (i.e., one that is not affiliated with companies providing products or services) will not have a bias in their approach to developing solutions. They will also be familiar with the tendency to approach security in a reactive manner and the inefficiencies of that approach, and will be able to provide guidance that will permit the organization to develop their program in a proactive manner. A consultant can inject the wisdom gained from years of experience with a variety of organizations. As a result, they can envision where the function will likely need to be in the future and can recommend a course of action and program components that will meet the organization s current needs and also be scalable and positioned to meet future needs. Simply stated, a consultant will be able to get the organization on the road to success without having to experience a steep learning curve littered with the cost and pain of a trial and error approach. It is a matter of the organization availing itself of the consultant s skills, knowledge and experience to be as efficient and effective as possible right out of the gate. Established Function The established function 2 stage is where many formal security functions reside, and where they can become stuck. In this stage, the organization is comfortable with the services provided by the function and the manner in which they are provided. Security staff has processes and a routine in place and is comfortable in what they are doing and how they are doing it. Unlike most other business functions, senior management likely knows little or nothing about what the security function should be doing and how it should be doing it. That results in a lack of critical oversight that other functions enjoy. It boils down to this: The security function has been around a number of years, they generally seem to have things under control, and management is content if there are no major incidents. In this organizational environment, because there are no security events of a magnitude that warrant senior management involvement, there are important questions relating to security that may not be asked, such as: Does the security function have a good handle on the business of the organization and the most critical security risks it faces? What does security see as the most critical security risks, why has it classified them as the most critical, and does senior management concur with their assessment? Is security focusing on the most critical risks and mitigating them in an effective and efficient manner? Does the security staff have the necessary knowledge and skill sets, and is there an effective process in place to ensure they continue to upgrade their knowledge and skills? Does the security function have the correct touch points in the organization to keep 2
3 abreast of changes in the business, the business environment and the risk picture? Are the security processes accurate, reliable, repeatable, scalable, documented, and followed? Are metrics in place to allow management to measure the effectiveness of the function and to identify anomalies that need to be addressed? This is where a consultant can make important contributions through an assessment of the risks faced by the organization and an assessment of the security function itself. The value of using a consultant for such a review falls into a few broad areas: 1. An important part of the assessment process is the gathering and analysis of information regarding management s views of the organization s security risks, and of the effectiveness, support and services provided by the security function. It is generally easier and more effective for management to have that discussion with a consultant rather than with members of the security function. 2. The security function, having been in place for a number of years, may have a parochial view of their world, whereas a consultant would view the organization, their risks and the function with a fresh set of eyes. 3. A consultant will likely have a broader range of experience (e.g., experience with more organizations, more industries, more security situations and solutions, etc.) then the members of the security function, and may visualize risks and opportunities not apparent to management of the function. 4. Because a consultant does not have a stake in the outcome of the assessment, their findings and recommendations will focus on what is in the best interests of the organization, not the best interests of specific individuals or functions. Sophisticated Function The sophisticated function 3 stage is generally found in very large and complex organizations. In this type of organization, senior management likely has an understanding of the key services provided by the security function and will consider the function to be a contributor to the success of the organization. Security functions operating at this level will be in a constant state of refinement and will engage in activities such as: Maintaining vigilance for new and/or evolving risks; Thinking proactively about, and assessing the potential for, risks that have not yet manifested themselves; Revising processes and methods to ensure they are effective and efficient; Providing recurring training to staff to upgrade knowledge and skills; Reallocating staff to meet new challenges; and Upgrading/replacing technology as needed. A security function operating at this stage will typically use a consultant for such things as: Providing services that are infrequently needed and that require highly specialized knowledge, skills and/or equipment; Supplementing security staff during peak periods; Providing assessments the security function cannot provide themselves (e.g., the IRS requires that, under certain circumstances, an independent consultant conduct an assessment of an executive s security risks if the security costs for the executive are 3
4 not to be classified as taxable fringe benefits); or Providing independent evaluations of specific elements of the security function to validate processes. How to Select a Consultant Selecting the right consultant is an important element of success for any consulting engagement. The following points should help to find the right consultant with whom to partner. The points are intended as a guide and are not intended to limit the organization in the processes they normally employ in the evaluation and selection of vendors. An independent consultant (i.e., one that is not part of, or affiliated with, organizations that sells services and/or products) will help to avoid a concern that they may have a divided interest or bias. Professional certifications, the authoring of books or published articles, and/or continuing education will all be indicators they are improving their knowledge/skills on a continuing basis. A broad background (e.g., years in the profession, range of topical experience, experience in a range of industries, etc.) is an indication they have seen and solved a large number of diverse problems. If the issues to be addressed are very specialized in nature, it will be important to find a consultant with experience in that specific area. Sometimes the consulting firm employee with whom the organization is negotiating will not be the individual doing the actual work. As such, it is important to know who will be doing the work, because it is their credentials, experience, demeanor and communication skills that matter. Asking the consultant how they will go about performing their work (i.e., their process) can be useful in developing a level of comfort that the consultant has done similar work before and does follow a defined process. No consultant can do everything. Be suspicious if they say they can. Ask for, and expect to receive, a few examples of assignments they do not have the required knowledge or skills to undertake. Checking references can be valuable. Useful areas of inquiry would be: the value of the services provided by the consultant, the overall quality of the products that were delivered, whether deadlines were met and the consultant was appropriately responsive to the clients needs, how well the consultant interfaced with the clients and others in the clients organizations, etc. Pay attention to the fine points of the initial contacts with the candidate consultants. If s and other written materials are not professional in nature and/or if the consultant s responses to phone calls and s are not prompt, it is reasonable to assume they will not improve if the consultant is retained. A good starting point when searching for a consultant is the International Association of Professional Security Consultants. The bottom line is that the broad range of experience and wealth of specialized knowledge a consultant brings to the table can help organizations improve their effectiveness and efficiency by helping to see the forest for the trees and consider approaches or solutions that had not been previously contemplated. 4
5 End Notes: 1 For the purposes of this paper, the term formal security function is defined as a distinct organizational unit populated by one or more individuals with training/skills specifically relating to the protection of people, property and information and who dedicate the majority of their time to that responsibility. 2 Defined as a function with dedicated staff and defined processes that have been in place for a number of years. A number of processes will be documented, repeatable and providing value-added services. The function may or may not have identified the most critical risks to the organization and may or may not be mitigating them in the most effective and efficient manner. 3 Defined as a function led by a security professional at the executive level in the organization that typically is no more than one reporting level removed from the CEO. Staff is composed of individuals who have robust experience in the security profession, with many holding professional certifications. Processes are well defined, documented and repeatable. The organization s risks are understood and classified as to criticality, there are reliable processes in place to identify and adapt to changes in the risk environment, and metrics are in place to measure performance and highlight anomalies and/or opportunities for improvement. About the Author John Cholewa, CPP, is the owner & principal consultant of Mentor Associates LLC, a Colorado based security management consulting firm. His 35+ years of experience includes servicing as security director for four Fortune 500 companies. He is the recipient of a Bachelor of Science in Law Enforcement from the University of Maryland, a Master of Arts in Business Management from Central Michigan University, and is Board Certified in Security Management. His book, Developing and Managing Physical Security Programs: A Guide for Facilities and Human Resources Managers, is designed to guide non-security professionals charged with implementing and managing physical security programs. 5
Integrators Evolve. Alongside Industry
Systems Tips for Integrators Evolve to Alongside Industry The face of the security industry continues to grow and evolve into one that resembles a service industry. Systems integrators need to be vigilant
More informationThree types of recruiting
By A. Harrison Barnes, Esq. INTRODUCTION Every legal recruiter practices his/her own brand of recruiting, and for the most part, each style has merit. As the head of a national recruiting firm, I speak
More informationget more out of life. It s the value of professional advice.
get more out of life. It s the value of professional advice. Get more out of life with a financial plan There are more benefits to having a financial plan than you may realize. A comprehensive financial
More informationSample Pages Alliance Management Guidebook
313 Washington Street, Suite 300 Newton, MA 02458 USA PHONE +1 617.965.4777 FAX +1 617.965.8558 www.rhythmofbusiness.com Sample Pages Management Guidebook Managing Biopharma Strategic s Collaborative Networks
More informationTHERE S A REASON WE RE THE NUMBER 1 PROVIDER OF PART-TIME CFOS. How a CFO centre top level part-time CFO can transform your business
THERE S A REASON WE RE THE NUMBER 1 PROVIDER OF PART-TIME CFOS How a CFO centre top level part-time CFO can transform your business Typical comments we receive from our customers:- The best kept secret
More informationThe keys to sustainable pricing execution include a comprehensive
Transform Your Pricing Strategy into a For pricing to become a competitive weapon in the corporate arsenal, the pricing strategy must be executed in a manner that is consistent, sustainable, and easily
More informationInsert Client Name Request for Proposal for Security Risk Assessment Services Consulting
Courtesy of the International Association of Professional Security Consultants Distribute your RFP at no cost at https://iapsc.org/rfp/ Insert Client Name Request for Proposal for Security Risk Assessment
More informationRHF Certification Program Prototype
RHF Certification Program Prototype Name of Model Prototype: The Rick Hansen Foundation Certification Program (RHF Certification Program) Name of Model Prototype Leader: Rick Hansen Foundation (RHF) with
More informationHow do we assure service availability at levels that make the IT infrastructure function so well it becomes transparent to our business?
SOLUTION BRIEF: CA SERVICE AVAILABILITY MANAGEMENT How do we assure service availability at levels that make the IT infrastructure function so well it becomes transparent to our business? The CA Service
More informationLegal Aid Alberta Strategic Plan 2019/ /22
Making a Difference Everything we do at Legal Aid Alberta (LAA) helps support Albertans as they face some of the most challenging times in their lives. We help to enhance fairness in the justice system.
More informationGuidance Document. Auditing the Cloud Controls Matrix
Guidance Document Auditing the Cloud Controls Matrix Release 1: 08/08/2013 2013 Cloud Security Alliance All Rights Reserved. Valid at time of printing. All rights reserved. You may download, store, display
More informationPeriodic Comprehensive Review of the External Auditor
Periodic Comprehensive Review of the External Auditor TOOL FOR AUDIT COMMITTEES January 2014 ENHANCING AUDIT QUALITY AUDIT COMMITTEES iii Table of Contents Introduction 1 1. Determine the scope, timing
More informationTracking and Measuring Physician Relations
Tracking and Measuring Physician Relations experience. insight. impact. Using Technology For Greater Success By Allison McCarthy, MBA Tracking and measuring the success of physician relations program has
More informationChoosing the Right UX Vendor
by Eric Schaffer CEO and Founder Human Factors International Many UX vendors are intent on just doing the projects. They don t focus on helping internal staff to learn UX skills or building a UX infrastructure
More informationThe Third-Party Process: Waste of Resources or Added Value?
The Third-Party Process: Waste of Resources or Added Value? Discussing accredited certification at a cocktail party isn t likely to make you the center of attention. But depending on where you work, you
More informationLearning Objectives. Reading Assignment. Supplemental Reading. Unit Lesson. Learning Activities (Non-Graded) Key Terms
UNIT I STUDY GUIDE Gaining Commitment in a Safety-First Corporate Culture Reading Assignment Introduction: Establishing a Safety-First Corporate Culture Chapter 1: Gain Commitment to a Safety-First Corporate
More informationThe Million Dollar Firm
The Million Dollar Firm How to Start Your Journey M. Darren Root a resource for you from The Million Dollar Firm Choose Your Path with Intention to End Traditional Firm Chaos M.Darren Root President/CEO,
More informationThe Critical Role of Talent Analytics in Successful Mergers and Acquisitions
The Critical Role of Talent Analytics in Successful Mergers and Acquisitions The art and science of managing human capital to create people-driven synergies Why 70% of M&A transactions don t achieve expected
More informationebook Reach Your Leadership Potential
ebook Reach Your Leadership Potential Develop skills and qualities to achieve your potential as a business leader Strong leadership is both an inherent and a learned quality. As a business leader, it s
More informationEnhancing customer experience: first, do no harm
Enhancing customer experience: first, do no harm Few things can cause customers blood pressure to rise more quickly than a bad customer service experience by phone. Frustration builds when they are forced
More informationA CIOview White Paper by Scott McCready
A CIOview White Paper by Scott McCready 1 Table of Contents How to Craft an Effective ROI Analysis... 3 ROI Analysis is Here to Stay... 3 When is an ROI Analysis Not Necessary?... 3 It s More About the
More informationWHITE PAPER Your Ideal Succession Plan
WHITE PAPER Your Ideal Succession Plan A complete strategy for a seamless succession Whether you ve made the decision or a significant life event has occurred, it s time to step away from your business
More informationControl of Documented Information. Integrated Management System Guidance
Control of Documented Information Integrated Management System Guidance ISO 9001:2015, ISO 14001:2015 & OHSAS 18001:2007 Table of Contents Integrated Management System Guidance 1 INTRODUCTION... 4 1.1
More informationCORROSION MANAGEMENT MATURITY MODEL
CORROSION MANAGEMENT MATURITY MODEL CMMM Model Definition AUTHOR Jeff Varney Executive Director APQC Page 1 of 35 TABLE OF CONTENTS OVERVIEW... 5 I. INTRODUCTION... 6 1.1 The Need... 6 1.2 The Corrosion
More informationSeven Key Success Factors for Identity Governance
WHITE PAPER Seven Key Success s for Identity Governance Insights and Advice from Real-World Implementations You have been given a high-profile mission: address urgent audit and compliance requirements
More information2017 Law Firm Marketing Operations Index
2017 Law Firm Marketing Operations Index Executive Summary The rapidly growing discipline of Marketing Operations seeks to increase marketing efficiency and organizational agility, and to measure, in a
More informationWHITE PAPER. The ACL Audit Analytic Capability Model: Leveraging analytics in the fight against fraud
WHITE PAPER The ACL Audit Analytic Capability Model: Leveraging analytics in the fight against fraud CONTENTS INTRODUCTION... 1 THE ANALYTIC CAPABILITY MODEL... 1 LEVEL 1 - BASIC... 3 Characteristics...
More informationGROW YOUR BUSINESS. The Power of Synergy GYB 2014 IN THIS ISSUE: Many Hands Make Light Work - The Value of Mentoring
The Power of Synergy GYB 2014 GROW YOUR BUSINESS IN THIS ISSUE: Many Hands Make Light Work - The Value of Mentoring Who Is Influencing Your Customers? - How to Listen On Social Media Take Back Your Time
More informationHow to Write a Winning RFP for Healthcare Website Redesign
How to Write a Winning RFP for Healthcare Website Redesign Helpful tips to guide healthcare marketers before you embark on the RFP process. ccording to recent research, the average healthcare organization
More information2. Do any of the managers appear to have valid arguments for their beliefs as to why formal project management should not be considered?
1. What are some of the major problems facing the management of Hyten in accepting formalized project management? (Include attitude problems/ personality problems.) There are many problems faced by Hyten
More informationBuilding a Roadmap to Robust Identity and Access Management
Building a Roadmap to Robust Identity and Access Management Elevating IAM from Responsive to Proactive From cases involving private retailers to government agencies, instances of organizations failing
More informationAdding insight to audit Transforming Internal Audit through data analytics
Adding insight to audit Transforming Internal Audit through data analytics Why analytics? Why now? Traditional internal audit methodologies have served their purpose well for decades. However, as the business
More informationBuilding a Sustainable Culture of Security
Building a Sustainable Culture of Security What is a Sustainable Culture of Security? If asked, the majority of organizations will say that they have one, but when asked to define it, they have difficulty.
More informationStop Selling Engineering! By David Stone
Stop Selling Engineering! By David Stone Complaining about low fees and a lack of respect for our profession are frequent topics for editorials and discussions among consulting engineers. Surveys show
More informationASIC speaks on Improving and Maintaining Audit Quality & The Role of Others
CPA Australia Podcast - Episode 16 - Transcript ASIC speaks on Improving and Maintaining Audit Quality & The Role of Others INTRO: Hello and welcome to the CPA Australia Podcast your source for business,
More informationIdentity and Access Management. Program Primer
Identity and Access Program Primer Executive Summary The role of identity in the modern enterprise has been steadily growing in importance over the last decade. As the enterprise technology stack continues
More informationEthics and Financial Reporting: Delivering on the Commitment
An address by Bill MacKinnon, FCA Chief Executive, KPMG LLP To the EthicsCentre, Toronto Ontario February 27, 2003 (check against delivery) 1 Thank you The world of auditing and financial reporting has
More informationIs Outsourcing Right for You? Five key questions to answer about your equity plan.
Is Outsourcing Right for You? Five key questions to answer about your equity plan. Introduction Managing and reporting on a stock plan comes with its fair share of challenges. Manual processes, meeting
More informationBusiness Development Executive For Revenew International
Position Specification Business Development Executive For Revenew International Karina Tran Human Resources Business Partner ktran@revenew.net 713.203.4091 281.276.4514 713.583.6809 Revenew International,
More informationSynoptek Managed AWS: Cloud Optimization & Risk Mitigation
Synoptek Managed AWS: Cloud Optimization & Risk Mitigation Snap your fingers. If you re among those who think that cloud computing works like that, you ve been watching too many commercials. Like the many
More informationThe New Business Value of Call Accounting WHITE PAPER
The New Business Value of Call Accounting WHITE PAPER The New Business Value of Call Accounting How Telecom/UC Managers Utilize Cutting-Edge Call Accounting Software to Drive True Business Value Introduction
More informationExample Approach To Non-Profit Organizations. ExeComp Solutions Compensation Advisory Services May 2014
Example Approach To Non-Profit Organizations ExeComp Solutions Compensation Advisory Services May 2014 ExeComp Solutions LLC (ECS) appreciates the opportunity to present our services to The Museum We are
More informationThe Power of Thinking Like a CEO...and Unlike One
ARTICLE The Power of Thinking Like a CEO...and Unlike One Ann Herrmann-Nehdi Interview by Michele Molnar, November 1, 2006 Power of Thinking Like a CEO Article: Paper in Brief Discover why thinking is
More informationA Strategic Approach to Cost-effective Marketing for Nonprofits
Dina Wolfman Baker Vice President of Communications, Public Health Management Corporation August 2009 Many nonprofit organizations are taking a renewed look at their marketing and communications efforts
More informationWorkforce Solutions Guide
Workforce Solutions Guide [Innovative Solutions To Everyday Challenges] Part 2 1/15 Control costs. Meet deadlines. Improve productivity. Capitalize on opportunities. Manage resource constraints. Build
More informationISO 9001 Auditing Practices Group Guidance on:
International Organization for Standardization International Accreditation Forum Date: 13 January 2016 ISO 9001 Auditing Practices Group Guidance on: What do we mean by adding value? Adding Value We hear
More informationChief Administrative Officer Position Description
Chief Administrative Officer Position Description About Tecumseh Business in Focus Magazine recently dubbed the Town of Tecumseh a small Town that packs a pretty big punch. With a population of just under
More informationINDUSTRIAL DESIGNER POSITION AT TRIG DESIGN INNOVATION MARKETING
INNOVATION DESIGN MARKETING INDUSTRIAL DESIGNER POSITION AT TRIG After reviewing this position, please submit your cover letter, resume, and portfolio to /careers No phone calls please LETTER FROM TRIG
More informationGxP Auditing, Remediation, and Staff Augmentation
GxP Auditing, Remediation, and Staff Augmentation TABLE OF CONTENTS 3 Introduction 4 GxP Auditing 4 GMP Auditing 5 GCP Auditing 6 GLP Auditing 7 Pharmacovigilance Auditing 7 Vendor/Supplier Auditing 8
More informationNeed a Security Workforce Management Platform?
Need a Security Workforce Management Platform? A guide to understanding the true costs of in-house software development vs. an outsourced platform Need a Security Workforce Management Platform? 1 If you
More informationREX ENERGY CORPORATION CORPORATE GOVERNANCE GUIDELINES
REX ENERGY CORPORATION CORPORATE GOVERNANCE GUIDELINES The Board of Directors (the Board ) of Rex Energy Corporation (the Company ) has adopted the following corporate governance guidelines. These guidelines
More informationRevenue Cycle Management for Software Companies
Revenue Cycle Management for Software Companies Understanding Your Company's Processes and Needs by Bob Scarborough, Tensoft CEO For software companies, the sales, billing and revenue management processes
More informationpwc.co.uk Enterprise Risk Management
pwc.co.uk Enterprise Risk Management Contents What s on your mind? 01 Our point of view 02 What good looks like 04 How we can help 06 What you gain 07 When to act 08 Intelligent Digital 09 What s on your
More informationCLAconnect.com/creditunions. Impact the Future of Credit Unions
CLAconnect.com/creditunions Impact the Future of Credit Unions We Believe Enabling your success means a better world for all of us, but now, more than ever, a greater number of operational, regulatory,
More informationCertified Identity Governance Expert (CIGE) Overview & Curriculum
Overview Identity and Access Governance (IAG) provides the link between Identity and Access Management (IAM) rules and the policies within a company to protect systems and data from unauthorized access,
More informationChapter 4 Develop Systems
Chapter 4 Develop Systems By Evan Keller Definition A system is a specified way of doing things. It shows your employees how we do it here. You can develop systems by finding the best way to do things
More informationEVALUATE YOUR ABILITY TO LEAD YOURSELF
EVALUATE YOUR ABILITY TO LEAD YOURSELF STRATEGIC LEADERS KNOW THE SECRET OF LEADING THEMSELVES WELL BY LEYDA ALEMAN, SHRM-SCP 2018 Human Capital Consultants International All Rights Reserved www.hcc-intl.com.
More informationImplementing a Project Infrastructure
The PROJECT PERFECT White Paper Collection Overview Implementing a Project Infrastructure eville Turbit In working with a client recently, proved an interesting experience. The way in which the organisation
More informationPerson Job Match. Selection Report. Name Mr Sample Candidate. Date 18 September
Person Job Match Selection Report Name Mr Sample Candidate Date 18 September 2013 www.ceb.shl.com EXECUTIVE SUMMARY This report tells you about Mr Sample Candidate s potential fit to the competency requirements
More informationGeneral Services Administration
General Services Administration Information for Ordering Activities Management, Organizational, and Business Improvement Services (MOBIS) Industrial Group: 874 Industrial Class: 8742 Contract Number: Contract
More informationRisk-Based Environmental Auditing at Bulk Fuel Terminals
Risk-Based Environmental Auditing at Bulk Fuel Terminals Presented at National Institute for Storage Tank Management (NISTM) Houston, TX Presented by Douglas Hileman, P.E., CPEA, CRMA; Douglas Hileman
More informationAdding value through key relationships the Corporate Secretary s unique contribution to the Board process.
Adding value through key relationships the Corporate Secretary s unique contribution to the Board process. By Dirk Schlimm Too often, the Corporate Secretary performs a merely administrative function.
More informationMind the Agility Gap
Mind the Agility Gap WHY HR AND LEARNING EXECUTIVES ARE FAILING THEIR ORGANIZATIONS 88% of global HR leaders say building the organization of the future is their biggest challenge. But only 11% say they
More informationGREAT SERVICE NEVER STOPS.
GREAT SERVICE NEVER STOPS. At Tata Communications, we understand that how we do things is every bit as important to our customers as the things that we do. So we re always flexible, always available, and
More informationThese are, quite simply, the blueprint for why we are successful at ICE. These competencies tell you what I looked for in
FROM THE CEO When I founded ICE in 2000, there were nine of us working around the clock and practically living together. We laughed together, struggled together, learned together and ultimately succeeded
More informationI. POLICY FOR INTERNAL ALIGNMENT
1 TABLE OF CONTENTS PHASE I Summary.... 3 I. Internal Alignment.....3 II. Job Structure Evaluation..3 Appendix I. Compensable Families...6 Appendix II. Compensable levels...7 Appendix III Defining Compensable
More informationConnecticut Valve & Fitting Co.
Connecticut Valve & Fitting Co. 120 Long Hill Cross Road Shelton, CT 06484 Phone 203.929.6341 Fax 203.929.1831 Revision 03 Date of Revision 12/14/2010 Quality Manual Approved by: Greg Hines (President)
More informationSecurity requirements are changing as threats continue to evolve. For many reasons Security has seen a shift from operational to strategic While
1 Security requirements are changing as threats continue to evolve. For many reasons Security has seen a shift from operational to strategic While individual security disciplines have their specific concerns
More informationLeveraging Risk Assessments to Raise Funding for Your Security Program
Leveraging Risk Assessments to Raise Funding for Your Security Program Shawn Reilly, CPP, PSP, CHPA, CPD 1 Sources of Information ASIS Facilities Physical Security Measures Guideline Design and Evaluation
More informationCreate your ideal data quality strategy. Become a more profitable, informed company with better data insight
Create your ideal data quality strategy Become a more profitable, informed company with better data insight An Experian Data Quality White Paper March 2015 Introduction...1 The levels of data quality sophistication...2
More informationIPMA-Canada Certification Program
Program IPMA-CP (In Training) IPMA-CP IPMA-ACP IPMA-EX IPMA-CE International Personnel Management Association Canada 3333 333 Program IPMA-Canada is a national human resource management association whose
More informationEntertainment Business Finance Leadership Portfolio. Patrick Masters. Entertainment Business Finance
EBF Leadership Portfolio 1 Entertainment Business Finance Leadership Portfolio Patrick Masters Entertainment Business Finance March 21, 2010 EBF Leadership Portfolio 2 EBF Leadership Portfolio It is important
More informationIdentifying, Selecting and Recruiting Members
Identifying, Selecting and Recruiting Members To identify, select, and recruit the right county leaders to make up the County Extension Council is of primary importance to the success of the Council. Although
More informationCHARTER OF THE AUDIT, FINANCE AND RISK COMMITTEE OF THE BOARD OF DIRECTORS OF ACE AVIATION HOLDINGS INC.
CHARTER OF THE AUDIT, FINANCE AND RISK COMMITTEE OF THE BOARD OF DIRECTORS OF ACE AVIATION HOLDINGS INC. 1. Structure, Procedure, Qualifications The Audit, Finance and Risk Committee (the Audit Committee
More informationFive Key Themes from the Pulse 2017 Conference
Five Key Themes from the Pulse 2017 Conference An Overview by Aman Singh, Senior Associate, and Angeline Liu, Senior Technical Consultant June 2017 Now in its fifth year, Gainsight s Pulse 2017 conference
More informationHow Not to Sweat an Oracle Audit
WHITE PAPER How Not to Sweat an Oracle Audit Abstract An Oracle audit can be time-consuming, expensive, and stressful. This paper describes the best practices, thirdparty expertise, and tools that not
More informationAON ASIA: MITIGATING RISK WITH QLIKVIEW FOR CLEARER PRESENTATION OF SUMMARY FINANCIAL INFORMATION
AON ASIA: MITIGATING RISK WITH QLIKVIEW FOR CLEARER PRESENTATION OF SUMMARY FINANCIAL INFORMATION The beauty is that we can now see exactly where things are performing well and where things have gone wrong.
More informationLeadership Profile and Notice of Search
CARLSON CAPITAL MANAGEMENT Leadership Profile and Notice of Search CHIEF WEALTH ADVISOR CARLSON CAPITAL MANAGEMENT INVITES APPLICATIONS AND INQUIRIES FOR THE POSITION OF CHIEF WEALTH ADVISOR The Chief
More informationEffective Mind Maps. Analyses of business mind maps by Chuck Frey, author of the Mind Mapping Software Blog
Effective Mind Maps Analyses of business mind maps by Chuck Frey, author of the Mind Mapping Software Blog Type of map: Business owner dashboard map Software used to create: MindManager Source: BiggerPlate
More informationAuxiliary Services Job Family: Retail Progression
Cornell University Staff Compensation Program Generic Job Profile Summaries Compensation Services 353 Pine Tree Road, East Hill Plaza, Ithaca, NY 14850 (607) 254-8355 compensation@cornell.edu www.hr.cornell.edu
More informationTrusted KYC Data Sharing Framework Implementation
July 2017 Trusted KYC Data Sharing Framework Implementation Supporting Document Contents Preface... 3 1 Objective of this Document... 4 2 Evolving Benefits Provided by the Data Sharing Environment... 5
More informationLet s talk: governance
EY Center for Board Matters Let s talk: governance March 2014 Issue 3 Getting it right: succession planning for the boardroom and C-Suite Getting it right: succession planning for the boardroom and C-Suite
More informationConducting an Organizational Health Check Pays Off! Four steps to success
Conducting an Organizational Health Check Pays Off! Four steps to success By Mark Hordes Mark Hordes Management Consultant, LLC Houston, Texas It s common knowledge that at least once a year you should
More informationCreating a Job Search Program In Your Church, Synagogue Or Community Organization
Creating a Job Search Program In Your Church, Synagogue Or Community Organization Special Supplement to The Unwritten Rules of the Highly Effective Job Search By Orville Pierson Note: This Special Supplement
More informationContact Center Professional Certification
2013 Whitepaper Contact Center Professional Certification 8 Key Benefits Contact Center Professional Certification Key Benefits Choosing the contact center certification program that s right for you, your
More informationSeven Keys to Ensuring Successful Mentoring Outcomes
Seven Keys to Ensuring Successful Mentoring Outcomes By Melanie Wass Page1 Melanie Wass has been conducting Mentoring training since 2003 for numerous government agencies and programs. Much of her mentoring
More informationMust have law firm experience. Where are the new ideas coming from?
Must have law firm experience. Where are the new ideas coming from? Same old same old. Must have previous law firm experience. This has to be the most common phrase to appear on job descriptions for marketing
More informationManaging Change and Complexity with Identity and Access Governance
White Paper Access Governance Suite Managing Change and Complexity with Identity and Access Governance Table of Contents Introduction... 1 Making a Change... 2 Definitions... 3 External Drivers of Change
More informationUNIT 5 ERP Implementation Issues
UNIT 5 ERP Implementation Issues 1 Syllabus Opportunities and problems in ERP selection and implementation Identifying ERP benefits Team formation Consultant intervention Selection of ERP (package selection)
More informationThe Essential Practices:
The Essential Practices: Why They Matter ESSENTIAL PRACTICE #1 The authorizer has a published and available mission statement for quality authorizing. A quality authorizer states a clear mission for quality
More informationService Center Organization
NewITProb.book Page 13 Thursday, February 1, 2001 2:37 PM Chapter 2 Service Center Organization If you have the luxury of organizing or reorganizing your service center, there are a number of important
More informationTenStep Project Management Process Summary
TenStep Project Management Process Summary Project management refers to the definition and planning, and then the subsequent management, control, and conclusion of a project. It is important to recognize
More informationPublic Housing Revitalization Specialist GS Career Path Guide
Public Housing Revitalization Specialist GS-1101 Career Path Guide August 2014 (This page intentionally left blank.) TABLE OF CONTENTS PUBLIC HOUSING REVITALIZATION SPECIALIST... 1 Career Path Guide...
More informationQuality Management System Guidance. ISO 9001:2015 Clause-by-clause Interpretation
Quality Management System Guidance ISO 9001:2015 Clause-by-clause Interpretation Table of Contents 1 INTRODUCTION... 4 1.1 IMPLEMENTATION & DEVELOPMENT... 5 1.2 MANAGING THE CHANGE... 5 1.3 TOP MANAGEMENT
More informationOur Journey in Creating a Memorable Customer Experience. Vision Mission Values Culture
Our Journey in Creating a Memorable Customer Experience Vision Mission Values Culture What s Inside Message from the Chairman......................................... 2 What Customers Bank Stands For...................................
More informationWhat defines success for a managed travel program?
What defines success for a managed travel program? 1 SATISFACTION Travelers are exposed every day to the best user interfaces and experiences that the Internet and Mobile have to offer. They bring those
More informationComplex Care Program Development: A New Framework for Design and Evaluation
BRIEF MARCH 2017 Complex Care Program Development: A New Framework for Design and Evaluation By David Labby, MD, PhD * IN BRIEF While medical-technological interventions undergo robust research and design
More informationPreparing your board for the future
Preparing your board for the future A guide to succession planning Funded by Getting the basics in place 1 What is succession planning? Succession planning is about ensuring continuity within an organisation,
More informationSTEVEN HALL & PARTNERS
STEVEN HALL & PARTNERS E X E C U T I V E C O M P E N S A T I O N C O N S U L T A N T S 212-488-5400 www.shallpartners.com shp@shallpartners.com ABOUT US Steven Hall & Partners ( SH&P ) is an independent
More informationGrow your business 2016 Issue 08
2016 ISSUE 08 CONTENTS Is your business your largest asset? How would you value it to sell? A vital component for sales growth is Quality. Business growth is essential for success How? Is your business
More information