Supply Chain Services and Solutions

Size: px
Start display at page:

Download "Supply Chain Services and Solutions"

Transcription

1 Supply Chain Services and Solutions BSI Risk Management and Intelligence Approach Emmanuel Herve Copyright 2016 BSI. All rights reserved. 1

2 Objectives Introduction Supply Chain Concerns and Risks Supply Chain Risk Exposure and Evaluation Network (SCREEN) Overview Cargo Theft Supply chain disruptions 2

3 A truly global brand Founded in Regional Hubs 73 Offices 182 Countries 80,000 clients 37,384 standards published Experienced: The world first National Standards body founding member of ISO Thought Leaders: Shaped world s most adopted standards including ISO 9001, ISO 14001, OHSAS Copyright 2015 BSI. All rights reserved.

4 BSI Supply Chain Services and Solutions Intelligence Audit Platform Audit Advisory - QRS Supply Chain Risk Analysis Customizable Assessments 73 offices worldwide Financial Risk Modeling Global Risk Maps Incident Reporting Country Risk Reports Corrective Action Plans Supplier Risk Ratings & Reports Global Supplier Mapping Audit Management Platform Supply Chain Security Quality Corporate Social Responsibility Business Continuity Security Countermeasure Cost Analysis Quantifying Security Spending Over or Under-spending on Security? 4

5 Government Partnerships - INTELLIGENCE For 6 years, BSI Supply Chain Solutions has been the one source used by Department for Homeland Security (DHS), CBP, and AEO for supply chain and cargo risk intelligence BSI provides annual security and threat awareness training to the government as well as specialized reports around specific supply chain incidents and trends Canada CBSA and PIP program uses BSI intelligence to quantify risk and BSI provides supply chain security and exposure training to PIP officers BSI Intelligence is used in over 40 countries by U.S. Customs Attaché officers including 80% of AEO countries (including Japan) UK Freight Crime Police Division data sharing agreement and co-reporting Copyright 2015 BSI. All rights reserved 5

6 TAPA EMEA and BSI Audit Risk Management Platform TAPA Member Company locations seeking certification will be uploaded into the TAPA EMEA audit report tool, provided by BSI TAPA will send a self-certification assessment (FSR C 2014 or TSR ) to Member Companies through the TAPA EMEA audit report tool, provided by BSI TAPA Member Companies will complete the selfcertification assessment and waiver process through the TAPA EMEA audit report tool, provided by BSI Automated management and facilitation of results Tracking of completion progress and macro collation of data will be easier and more streamlined through the TAPA EMEA audit report tool, provided by BSI 6

7 Today s Risks In the Global Supply Chain 7

8 Top Global Supply Chain Concerns 100.0% What Are Your Top Supply Chain Concerns? 68.3% 50.0% 41.4% 56.1% 48.8% 53.7% 36.6% 46.3% 0.0% Social Responsibilities Brand protection including counterfeiting, intellectual property rights & unmanifested cargo Government compliance including C-TPAT, AEO, PIP Supplier risk assessment Business continuity (including natural disasters, labor strikes/port outages) Political Instability Financial risks including cargo thefts, counterfeits, insurance increases as well as transport security costs 2.4% Other (specify) Survey of 310 C-TPAT, PIP or AEO Certified Companies Copyright 2013 BSI. All rights reserved. 8

9 Top Global Supply Chain Concerns Copyright 2013 BSI. All rights reserved. 9

10 Security Compliance Government Compliance to include C-TPAT, PIP and AEO Keeping goods moving efficiently across borders is more important than ever Compliance with government programs is a business necessity, not a nice to have Managing programs are time and manpower intensive Unverified supplier information could lead to loss of government certifications Copyright 2013 BSI. All rights reserved. 10

11 In-Transit Risk Direct result of theft, insurance increases, transport security costs and counterfeit goods entering the global supply chain The weakest point in the supply chain while freight is moving The use of a legitimate supply chain to introduce contraband, people or harmful materials Chain of Custody is very important Know your contractors and subcontractors Copyright 2013 BSI. All rights reserved. 11

12 Brand Protection Increased threats to include counterfeiting, intellectual property rights and corporate social responsibility You must know your supplier s labor practices in today s market Visibility into supplier s environmental practices is important Quality of the facility and products needs to be inspected to ensure there aren t any issues Your suppliers must have processes and security measures in place to protect your IP Exposure in any one of these areas can damage your reputation and your companies brand Copyright 2013 BSI. All rights reserved. 12

13 Business Continuity Man-made supply chain shutdowns as a result of political / labor instability, along with the threat of natural disasters in the region Having complete, up-to-date intelligence on your supplier locations is imperative to mitigate supply chain disruptions Having a back-up plan in case of a natural or man-made disaster is key Knowing if your redundant suppliers are really redundant or just a agents for a single manufacturer is critical Copyright 2013 BSI. All rights reserved. 13

14 Supply Chain Security Risk Management Best Practice Approach Copyright 2016 BSI. All rights reserved. 14

15 LOSSES Reasons to Model Risk We need to spend more Can we spend better? Can we safely spend less? SPENDING 15

16 Avoid the Security Spending Pendulum Reactive Low losses, pull spending High losses, increase spending Reactive Acceptable losses, Efficient security Proactive responses to predictable risks 16

17 BSI s Supply Chain Risk Management Framework Smart Resource Allocation This integrated supply chain risk management solution in delivered in three distinct risk components Probability Vulnerability Impact Risk Index Compliance with TAPA TSR/FSR Standards Company Business Risk Variables i.e- critical commodity, high spend with supplier, high volume of transport Likelihood of supply chain disruption events occurring in your global operations How vulnerable are you to an event happening due to policy/procedural compliance How consequential would the event be to your business if it happened in your supply chain? 17

18 Copyright 2016 BSI. All rights reserved. Probability of Disruption BSI SCREEN Country Risk Intelligence 18

19 SCREEN-Supply Chain Risk Exposure Evaluation Network BSI combines a variety of risk factors, quantifies them, and produces threat ratings for 203 countries Countries are rated on a five-panel scale Low Guarded Elevated High Severe Intelligence is gathered from a wide range of sources: Proprietary incident database Information from auditors around the world In-depth analysis and synthesis of local news sources Information from governments, NGOs, and industry A dedicated team of analysts is constantly updating and refining our intelligence, making sure our risk ratings reflect the situation on the ground 19

20 BSI Country Intelligence BSI Proprietary Geographic Risk Intelligence Components Security Business Continuity Social Responsibility Human Rights Environmental Cargo Disruption Cargo Theft Natural Disaster Exposure Business Impact of Natural Disaster Overall Human Rights Child Labour Overall Environment Air Pollution Hijacking Political Stability Women s Rights CO2 Emissions Illicit Smuggling Social Unrest Discrimination Water Pollution Counterfeiting Economic and Financial Stability Working Conditions Stringency of regulations Supply Chain Terrorism Man-made Disruptionstrikes, labour unrest Freedom of Association/Collective Bargaining Enforcement of Regulations Sea Piracy Civil Liberties Political Rights 20

21 COPYRIGHT BSI

22 Cargo Theft Trends in Malaysia Copyright 2016 BSI. All rights reserved. 22

23 Malaysia Cargo Theft Trends Threat of cargo theft in Malaysia remains, but new data suggest a downward trend Both median and average loss values have seen significant reductions Mirrors trend of overall crime rate, which has dropped by as much as 13 percent, according to Royal Police Law enforcement efforts are helping improve security situation for cargo transporters Includes task forces designed to combat organized criminal groups and vehicle theft (includes cargo and personal vehicles) Country still lacks task forces specifically focused on reducing cargo theft Police in Malaysia recover a stolen cargo truck 23

24 Malaysia Cargo Theft Trends Average and median theft values declined into : $198,600 (median); $234,059 (avg.) 2015: $53,800 (median); $74,389 (avg.) BSI also notes increasing diversity among commonly targeted goods Movement away from electronic goods thefts Base metals, consumer goods, and food and beverage items continue to be targeted Other causes of downward-trending risk include Lower-value commodities being increasingly targeted, suggesting diversification in targeted goods Reduction of Mamak Gang and other organized groups role in Malaysian cargo theft 24

25 Cargo Theft in Malaysia Reduced cargo-related activity by Mamak Gang members likely contributor Multiple deaths and arrests of gang members Remaining Mamak Gang members appear engaged in non-cargo crimes Theft of luxury personal vehicles Bank robberies Some pharmacy robberies No evidence to suggest pharmacy robberies will transition to targeting of pharmaceutical cargo shipments 25

26 Cargo Theft Trends in Indonesia Copyright 2016 BSI. All rights reserved. 26

27 Cargo Theft Trends in Indonesia The risk of cargo theft in Indonesia remains Cargo trucks targeted for most thefts, though warehouses increasingly targeted Hijackings remain a concern, particularly for West Java province Data from past two years show a shift towards a more even distribution among modalities Warehouses targeted in more than 23% of thefts over past two years; BSI rarely recorded warehouse thefts prior to

28 Warehouse Thefts in Indonesia BSI has noted a distinct rise in the number of warehouses being targeted for theft Commodities targeted in warehouse thefts largely mirror overall cargo theft trends in Indonesia Agricultural products and other food items most commonly targeted (36%) Industrial goods also heavily targeted (27%) Warehouse thefts often small in scope and value (avg. loss value is $26,790) 28

29 Cargo Theft Trends in China Copyright 2016 BSI. All rights reserved. 29

30 Moving Truck Thefts in China BSI has recorded a number of thefts from moving trucks throughout China Most prominently in Guangdong Province Known locally as kaitianchuang ( 开天窗 ) open sunroof thefts Soft-sided trailers are targeted more often Hole is usually cut on top rather than opening from the back as seen in other countries Electronics and pharmaceuticals have both been targeted in these thefts 30

31 Cargo Theft in Guangdong Province Guangdong Province is one of the few places BSI sees thefts by highly-organized cargo theft gangs High-risk highways G4 (JingGang Ao) highway between Huadu and Shaoguan north of Guangzhou G45 highway north of Guangzhou More thefts occur during the summer Jurisdictional issues harm investigations 31

32 Copyright 2016 BSI. All rights reserved. Cargo Theft Trends in India 32

33 India Cargo Theft Increasing in Sophistication BSI has recorded a rise in sophisticated cargo theft techniques over the past two years Threat of cargo theft in India is Theft groups targeting shipments after customs seals placed on container, prior to container reaching port Shipments diverted to group-controlled warehouses where paneling is removed Customs seals often left intact, delaying discovery until after shipment reaches customer First instance of a theft from a moving truck in July 33

34 India Cargo Theft Increasing in Sophistication Occurrence has been geographically dispersed New Delhi, Navi Mumbai, and Chennai Supply chain employees integral parts of these criminal groups Multiple high-profile cases of supply chain employee thefts in 2016 Implications for cargo integrity: Incidents underscore gaps in security and tampering detection in India Ability to counterweight consignments exposes capacity for UMC introduction into export shipments Criminals ability to break into shipments without breaking customs seal poses major UMC risk due to seeming legitimacy/verification of shipments Background security checks a must for supply chain employees/contractors 34

35 Terrorism and the Supply Chain Copyright 2016 BSI. All rights reserved. 35

36 Copyright 2016 BSI. All rights reserved. 36

37 Terrorist Extortion of the Supply Chain Leading groups for supply chain terrorism attacks are also most likely to extort or exploit the supply chain Groups often perpetrate attacks to threaten or intimidate businesses into paying extortion fees Extortion can increase as revenue from other sources declines ISIS tax on trucks reached as high as $4,000 per vehicle in 2015, up from $200 in 2014 Revenue from the extortion of local businesses is a major financing source for terrorist groups Other supply chain concerns Contraband introductions Smuggling for supplies, revenue February 2016 case in Spain Hijacking and cargo theft Group FARC New People s Army ISIS PKK MEND AQAP Communist Party of India - Maoist Leading Supply Chain Terrorism Groups Often Exploit the Supply Chain Supply Chain Exploitation Tactic Extortion, Kidnapping, Illegal taxes, Drug smuggling Extortion Extortion, Kidnapping, Illegal taxes Extortion, Hijacking, Drug smuggling Kidnapping Explosives introduction, Oil smuggling Kidnapping, Cargo Theft Supply Chain Terrorism Attacks ( ) 37

38 Increasing Terrorism Risk to Commercial Supply Chains Terrorists targeted a wider range of industries and cargo transport modalities in 2015 than any other recent year Increased targeting of industries associated with private/corporate supply chains rather than stateowned infrastructure since 2013 Agriculture/food and beverage attacks more than tripled Attacks on industrial/manufacturing materials and pharmaceuticals more than doubled, metals nearly doubled Portion of fossil fuels targeted dropped from 75% to 51% Decline in previous hotspots for targeting of government supply chain One cargo truck attack in Afghanistan in 2015 compared to average of nearly four annually over past decade Leading Industries and Modalities Targeted for Supply Chain Terrorism Attacks ( ) Fossil Fuels/Minerals Agriculture/Food and Beverage Industrial/Manufacturing Materials Base Metals Pharmaceuticals/Chemical Pipeline Production/Processing Facility Truck Storage Facility Worker 38

39 Increased Terrorist Targeting of the Supply Chain Supply chain terrorism activity increased by virtually every metric in Proportion of supply chain terrorism attacks grew 16% from 2014 Geographic distribution increased 38% to a record of 33 countries Top 10 countries for supply chain terrorism exported $664 billion $96 billion exported to the United States Highlights significant volume of international trade at risk of disruption by terrorist groups 39

40 Asia Factory Labor Unrest Copyright 2016 BSI. All rights reserved. 40

41 Labor Unrest in China Q Update Factory Strikes in China by Grievance Average Major protest in Dongguan in late May highlighted increasing concern of protests over factory closures and relocations Portion of relocation-related factory strikes in China has increased significantly over the past year Absolute number of strikes over relocation issues has also risen dramatically Protest numbers likely to continue rising as operational costs in China escalate Relocation Wage Arrears Factory Strikes in China by Grievance 2016 (YTD) Other Grievance Relocation Wage Arrears Other Grievance Copyright 2016 BSI. All rights reserved. 41

42 Copyright 2016 BSI. All rights reserved. Factory Unrest in Asia Other countries in Asia have witnessed protests over grievances seen in China Timely payment of wages, factory closures, and contract employment vs. physical working conditions, higher pay Most demonstrations in the garment manufacturing industry Cambodia Recent protests over factory closures Industry representatives blame closures on rising operational costs, especially increasing wage rates Bangladesh Officials identified nearly 360 factories vulnerable to protests over wage non-payment, holiday bonuses Likely an increasing concern as factory investment continues rising in these areas 35% 30% 25% 20% 15% 10% 5% 0% -5% -10% -15% Growth in FDI and Wages in Cambodia Foreign Direct Investment Growth Minimum Wage Growth 42

43 Copyright 2016 BSI. All rights reserved. Vulnerability and Compliance Infusion of Probability with TAPA standards 43

44 Strategic Program Design with Operational Program Toolbox An integrated approach to managing organizational risk, adhering to compliance objectives & instilling knowledge Social Responsibility Environment Supply Chain Corruption Political Stability Cargo Theft Counterfeiting Supply Chain Terrorism Natural Disaster Exposure Legal Compliance Ethical Trading Hijacking Illicit Smuggling TAPA FSR/TSR Standards Logistics Security Site Security Physical Access Controls Personnel Security IT Security Questions are weighted Business Impact Variables Business Specific Components Volume of Throughput Criticality of Commodity Security countermeasure spend % of site production on site Probability Vulnerability Impact Risk Index 44

45 Risk-Based Results Lead to Smart Audit Strategy Continuous Improvement Financial spend 45

46 Contact Information Emmanuel Herve BSI Supply Chain Services and Solutions 46

Customs Trade Partnership Against Terrorism An Introduction

Customs Trade Partnership Against Terrorism An Introduction Customs Trade Partnership Against Terrorism An Introduction WHO WE ARE Securing the Borders of the United States while simultaneously facilitating the flow of legitimate trade & travel It s a challenging

More information

Creating a Secure Supply Chain

Creating a Secure Supply Chain Creating a Secure Supply Chain Sponsored by: On behalf of: Conducted by: Background For many manufacturers and distributors, the supply chain is the cornerstone to their business operations. It serves

More information

Security Management. How do we implement the Regulations? Marc Volders - MAY 31, 2006

Security Management. How do we implement the Regulations? Marc Volders - MAY 31, 2006 Security Management How do we implement the Regulations? Marc Volders - MAY 31, 2006 Theme Security in the supply chain How do we as a logistics service provider need to prepare ourselves as well as our

More information

Supply Chain Security IGTLC

Supply Chain Security IGTLC Supply Chain Security IGTLC CONVERGENCE: CARGO-CYBER CRIME Mix of Physical and Cyber Tactics to Set-up Fraudulent Pick-ups Phone spoofing Criminals calling airlines to gather intelligence on freight arrival

More information

TCO INVOLVEMENT IN NON-DRUG CRIME

TCO INVOLVEMENT IN NON-DRUG CRIME UNCLASSIFIED//FOUO OF TCO INVOLVEMENT IN NON-DRUG CRIME Group Members: Eliasz Krawczuk Crumpton Group, LLC Emily Woodard Fiat Chrysler Automobiles Erin M. DHS Kevin P. DHS Mariko Kawaguchi Element Case,

More information

10 REASONS WHY YOU SHOULD INVEST IN RESILIENCY

10 REASONS WHY YOU SHOULD INVEST IN RESILIENCY 10 REASONS WHY YOU SHOULD INVEST IN RESILIENCY 10 Reasons Why You Should Invest in Resiliency 1 Prevent Cargo and Inventory Loss Know where to invest in risk mitigation 6 Avoid Lost Sales Leverage network

More information

Special Focus On Transportation and Cargo Friday, June 15, 2007

Special Focus On Transportation and Cargo Friday, June 15, 2007 1 of 6 6/15/2007 3:11 PM Special Focus On Transportation and Cargo Friday, June 15, 2007 Assessing Cargo Supply Risk By Dan Purtell and James B. Rice, Jr. A study of supply line risk in 45 countries finds

More information

3.5 Advanced Inspection Technologies (AIT)

3.5 Advanced Inspection Technologies (AIT) 3.5 Advanced Inspection Technologies (AIT) Before inspection technologies can be further discussed, a baseline definition must be established for the three types of inspections that are commonly used when

More information

Corporate Risk Management Services. Pinkerton is a leading provider of risk management services and solutions for organizations around the globe.

Corporate Risk Management Services. Pinkerton is a leading provider of risk management services and solutions for organizations around the globe. Corporate Risk Management Pinkerton is a leading provider of risk management services and solutions for organizations around the globe. New threats arise every day. Is your business fully protected? Manage

More information

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment Proactive Approaches To Minimize Supply Chain Security Breaches in the Rail, Air, Ocean and Land Environment Top Eight Rail Principles Track and monitor pulls on a 24 hour basis to determine location and

More information

Foreign Manufacturer Eligibility Requirements

Foreign Manufacturer Eligibility Requirements Foreign Manufacturer Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Foreign Manufacturer must meet the following eligibility requirements: 1. Be an active Manufacturer incorporated

More information

Secure container transport: challenges & barriers in the complete stakeholder chain

Secure container transport: challenges & barriers in the complete stakeholder chain Secure container transport: challenges & barriers in the complete stakeholder chain Theodoros Theodoropoulos (SEAbility Ltd) 1 st Training Workshop 19 November 2014, Valencia, Spain Overview Introduction

More information

Global Supply Chain Redesign

Global Supply Chain Redesign INTEGRATED Global Supply SUPPLY Chain CHAIN NETWORKS Management Global Supply Chain Redesign N. Viswanadham Computer Science and Automation Indian Institute of Science Bangalore- 560012 n.viswanadham@gmail.com

More information

Minimum-Security Criteria for C-TPAT Foreign Manufacturers

Minimum-Security Criteria for C-TPAT Foreign Manufacturers Minimum-Security Criteria for C-TPAT Foreign Manufacturers These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

Secure Trade Partnership: Singapore s Authorized Economic Operator Programme

Secure Trade Partnership: Singapore s Authorized Economic Operator Programme 2010/SOM3/CTI/WKSP/014 Secure Trade Partnership: Singapore s Authorized Economic Operator Programme Submitted by: Singapore Ease of Doing Business Workshop on Trading Across Borders Sendai, Japan 18-19

More information

Building A Holistic and Risk-Based Insider Threat Program

Building A Holistic and Risk-Based Insider Threat Program Building A Holistic and Risk-Based Insider Threat Program An Approach to Preventing, Detecting and Responding to Insider Threats Michael G. Gelles, Psy.D March 2015 Insider Threat Types & Drivers Insider

More information

Customs and the use of technology to secure global supply chain

Customs and the use of technology to secure global supply chain Customs and the use of technology to secure global supply chain European Commission Directorate General for Wil van Heeswijk Unit B2 Risk management and Security 1 Facts & Figures 119.000 control officers

More information

Beyond Cost Reduction

Beyond Cost Reduction Beyond Cost Reduction Measuring How Procurement Creates Business Value By Alex Brown, Kyle Appell and Meghan Truchan Over the past decade, successful businesses have proactively developed strategies that

More information

Air Cargo & Air Supply Chain Security : Perspective From Integrators

Air Cargo & Air Supply Chain Security : Perspective From Integrators Air Cargo & Air Supply Chain Security : Perspective From Integrators Introduction The September 11 terrorist attacks in the US in 2001 has changed the whole concept of Aviation Security and has affected

More information

The online counterfeit economy: consumer electronics

The online counterfeit economy: consumer electronics The online counterfeit economy: consumer electronics The digital world is filled with various ways for counterfeiters to attack your brand and turn a profit for themselves, all while under the cloak of

More information

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE APPENDIX TO ANNEX 1 SEAL INTEGRITY PROGRAMME FOR SECURE CONTAINER SHIPMENTS INTRODUCTION Importance

More information

ICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION

ICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION ICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION 1 MODULE 7 RISK MANAGEMENT MODELS 2 Module Objective Present Risk Management models used by ICAO and WCO 3 DEFINITIONS 4 Threat ICAO The probability

More information

To effectively manage risks to supply chain performance, a public health supply chain manager should understand the following: THE LOGISTICS CYCLE

To effectively manage risks to supply chain performance, a public health supply chain manager should understand the following: THE LOGISTICS CYCLE 12 12 CHAPTER 12 SUPPLY CHAIN RISK MANAGEMENT FIGURE 11-1. THE LOGISTICS CYCLE Serving Customers WHAT A SUPPLY CHAIN MANAGER NEEDS TO KNOW: As detailed in this handbook, making health commodities available

More information

Locking Down the Supply Chain

Locking Down the Supply Chain Locking Down the Supply Chain September 14, 2016 Orlando, Florida ASIS Supply Chain & Transportation Security Council SCSC Laura Hains Vicki Nichols Dennis Blass Locking Down the Supply Chain What s New!

More information

IoT Business Brief Industrial Manufacturing Business

IoT Business Brief Industrial Manufacturing Business IoT Brief Industrial Manufacturing picture: shutterstock.com/de POWERING THE SMART FACTORY To secure a smarter future for manufacturing, the disconnects between OT and IT must be bridged. Selecting the

More information

Food Defense: Background and Global Importance

Food Defense: Background and Global Importance Food Defense: Background and Global Importance Protecting the Food Supply Food Safety the efforts to prevent accidental (unintentional) contamination of food products Food Defense the efforts to prevent

More information

C-TPAT Minimum Security Requirements Importers

C-TPAT Minimum Security Requirements Importers Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Prepared by Prep4Audit, LLC Version 2: August, 2014 www.prep4audit.com

More information

Using Standards to Cost- Effectively Manage Risk

Using Standards to Cost- Effectively Manage Risk Using Standards to Cost- Effectively Manage Risk Georgia Logistics Summit Atlanta, Georgia May 2011 Steve O Malley - ISO Ship & Supply Chain Security Standards Coordinator Motivators* Fear Guilt Government

More information

Barriers to Global Maritime Trade

Barriers to Global Maritime Trade to Global Maritime Business Perspectives on and Frictions in the Pacific Rim University of Southern California Marshall School of Business Busan, Korea November 15, 2005 Exponential growth initiates potential

More information

ISO INTERNATIONAL STANDARD

ISO INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO 28001 First edition 2007-10-15 Security management systems for the supply chain Best practices for implementing supply chain security, assessments and plans Requirements and

More information

PSAA - PUBLIC SERVICE & ADMIN

PSAA - PUBLIC SERVICE & ADMIN PSAA - Public Service & Admin 1 PSAA - PUBLIC SERVICE & ADMIN PSAA 601 Foundations of Public Service Different perspectives on management and leadership in public service; provides overview of how public

More information

CARGO THEFT AND SMUGGLING

CARGO THEFT AND SMUGGLING CARGO THEFT AND SMUGGLING Zhongcheng SUN 1 and Hong Yan 2 1. Port Captain, Fleet Management Department, Orient Overseas Container Line Limited 2. Department of Logistics and Maritime Studies, The Hong

More information

FILLING THE GAPS IN YOUR SUPPLY CHAIN AN IOT APPROACH

FILLING THE GAPS IN YOUR SUPPLY CHAIN AN IOT APPROACH FILLING THE GAPS IN YOUR SUPPLY CHAIN T O TA L S U P P LY C H A I N V I S I B I L I T Y : AN IOT APPROACH J U N E 2 0 17 End-to-end visibility into your supply chain is more important now than ever before,

More information

Importing to the U.S.: Key requirements you need to be aware of

Importing to the U.S.: Key requirements you need to be aware of Importing to the U.S.: Key requirements you need to be aware of Eight areas of the importing process you should familiarize yourself with before you ship your goods to the U.S. If you re new to international

More information

PHARMACEUTICALS. Forensic Services. Helping to protect your business from fraud, misconduct and non-compliance ADVISORY

PHARMACEUTICALS. Forensic Services. Helping to protect your business from fraud, misconduct and non-compliance ADVISORY PHARMACEUTICALS Forensic Services Helping to protect your business from fraud, misconduct and non-compliance ADVISORY 1 Helping to protect your business from fraud, misconduct and non-compliance Introduction

More information

STATE OF THE ASIA-PACIFIC PHARMACEUTICAL INDUSTRY 2013: EXECUTIVE SUMMARY

STATE OF THE ASIA-PACIFIC PHARMACEUTICAL INDUSTRY 2013: EXECUTIVE SUMMARY STATE OF THE ASIA-PACIFIC PHARMACEUTICAL INDUSTRY 2013: EXECUTIVE SUMMARY State of the Asia-Pacific Pharmaceutical Industry The pharmaceutical industry in the Asia-Pacific region has recently been besieged

More information

Low Cost Country Sourcing. A Canadian Pharmaceutical Perspective

Low Cost Country Sourcing. A Canadian Pharmaceutical Perspective Low Cost Country Sourcing A Canadian Pharmaceutical Perspective Low Cost Country Sourcing: A Canadian Pharmaceutical Perspective This publication is also available electronically on the World Wide Web

More information

Securing Intel s External Online Presence

Securing Intel s External Online Presence IT@Intel White Paper Intel IT IT Best Practices Information Security May 2011 Securing Intel s External Online Presence Executive Overview Overall, the Intel Secure External Presence program has effectively

More information

Non-Asset Based. Multi-Modal. Diverse Commodities.

Non-Asset Based. Multi-Modal. Diverse Commodities. more operationally efficient by streamlining processes and implementing technology to increase their productivity, thereby, allowing the agents to focus on business development and delivering outstanding

More information

Apple Supplier Code of Conduct

Apple Supplier Code of Conduct Apple Supplier Code of Conduct Apple is committed to the highest standards of social and environmental responsibility and ethical conduct. Apple s suppliers are required to provide safe working conditions,

More information

North America s SuperCorridor Coalition, Inc. Tri-national, non-profit, multi-modal trade and transportation coalition for the efficient and secure

North America s SuperCorridor Coalition, Inc. Tri-national, non-profit, multi-modal trade and transportation coalition for the efficient and secure North America s SuperCorridor Coalition, Inc. Tri-national, non-profit, multi-modal trade and transportation coalition for the efficient and secure movement of freight NASCO s Mission & Purpose Mission:

More information

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum-Security Criteria Importers Importers must conduct a comprehensive assessment of their international supply chains, based upon the following

More information

www.savinodelbene.com! THE COMPANY Savino Del Bene, whose name is homonymous of its founder, started up in Florence, Italy at the beginning of the 1900 s. The company s early focus was to develop freight

More information

C-TPAT Security Standards. Importers

C-TPAT Security Standards. Importers C-TPAT Security Standards Importers Importers must conduct a comprehensive self-assessment of their international supply chains based upon the following C-TPAT security standards. Appropriate security

More information

2008 BUSINESS RESILIENCY SURVEY RESULTS:

2008 BUSINESS RESILIENCY SURVEY RESULTS: ijet/wp0010-06 2008 BUSINESS RESILIENCY SURVEY RESULTS: An Insider's Look at the Current State of Risk Management, Continuity and Resiliency in Multinational Organizations July 2008 ABOUT THE RESEARCH

More information

Globalization of crime

Globalization of crime Globalization of crime Environmental resources Jakarta, 23/06/2010 Globalization of crime: chapter 7 Wildlife from Africa and South-East Asia to Asia Timber from South-East Asia to the European Union and

More information

Safety & Security. Introduction. Chemical transportation. Chemical transportation risk management. Resources. Chemical Transportation

Safety & Security. Introduction. Chemical transportation. Chemical transportation risk management. Resources. Chemical Transportation Introduction Chemical Transportation Safety & Security Chemical transportation Safety risks Security risks Chemical transportation risk management SAND No. 2011-0547C Sandia is a multi-program laboratory

More information

Anti-Slavery & Human Trafficking Report

Anti-Slavery & Human Trafficking Report PHOENIX Group UK Anti-Slavery & Human Trafficking Report Who we are The PHOENIX Pan European Group is one of the leading pharmaceutical distribution companies in Europe employing approximately 34,000 people.

More information

C-TPAT Expectations for Agents, Vendors & Manufacturers

C-TPAT Expectations for Agents, Vendors & Manufacturers BEALL s, INC. C-TPAT Expectations for Agents, Vendors & Manufacturers For Distribution to all new and existing Beall s import related Business Partners Last Updated: 1/27/2009 TABLE OF CONTENTS INTRODUCTION.

More information

Securing Global Transportation Networks: A Total Security Management Approach

Securing Global Transportation Networks: A Total Security Management Approach 1 of 5 3/4/2007 9:10 AM Securing Global Transportation Networks: A Total Security Management Approach Posted: February 1, 2007 With the dangers of disruption so real, the best precaution is to defend the

More information

Frequently Asked Questions About LS&Co. Global Sourcing Practices

Frequently Asked Questions About LS&Co. Global Sourcing Practices Frequently Asked Questions About LS&Co. Global Sourcing Practices 1. How many factories do you own? How many suppliers do you outsource to or contract with? 2. When did you release the names of your suppliers?

More information

Importers: C-TPAT Minimum Security Requirements

Importers: C-TPAT Minimum Security Requirements Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Restatement and Document Preparation by Prep4Audit, LLC 1 of 16 Suggested

More information

The State of Fraud in Government

The State of Fraud in Government Public and private organizations employ tools and applications for data analysis and predictive analytics to battle both the rising incidence of fraud and improper payments and the increasing cost of detecting

More information

IT/BPO. Forensic services. Helping to protect your business from fraud, misconduct and non-compliance ADVISORY. kpmg.com/in

IT/BPO. Forensic services. Helping to protect your business from fraud, misconduct and non-compliance ADVISORY. kpmg.com/in IT/BPO Forensic services Helping to protect your business from fraud, misconduct and non-compliance ADVISORY kpmg.com/in IT and ITeS companies face acute price competition, high attrition rates, consolidations

More information

THE UNDERESTIMATED VALUE OF

THE UNDERESTIMATED VALUE OF THE UNDERESTIMATED VALUE OF DOCK SCHEDULING Beneath the automated schedules, communications features, and web portals lies a hidden feature that will transform your business. WHITE PAPER By Gregory Braun,

More information

ANTI-MONEY LAUNDERING: GET CLUED BEFORE IT'S LATE NEED FOR SOLUTIONS TO EVOLVE TO KEEP FINANCIAL CRIME AT BAY

ANTI-MONEY LAUNDERING: GET CLUED BEFORE IT'S LATE NEED FOR SOLUTIONS TO EVOLVE TO KEEP FINANCIAL CRIME AT BAY WWW.WIPRO.COM ANTI-MONEY LAUNDERING: GET CLUED BEFORE IT'S LATE NEED FOR SOLUTIONS TO EVOLVE TO KEEP FINANCIAL CRIME AT BAY Sriram Kannan, Practice Partner - CXO Services, Wipro Analytics Table of Contents

More information

DISRUPTIVE OPPORTUNITIES

DISRUPTIVE OPPORTUNITIES CHALLENGING TIMES, DISRUPTIVE OPPORTUNITIES The Indian logistics industry is rife with fragmentation, inefficiencies and hence, the opportunities for disruption. Inferior management practices, a high level

More information

GOVERNMENT SECURITY SOLUTIONS SECURE MARKING, AUTHENTICATION, TRACKING AND TRACING TO ASSIST CUSTOMS. Christophe Renard. WCO IT Conference Brisbane

GOVERNMENT SECURITY SOLUTIONS SECURE MARKING, AUTHENTICATION, TRACKING AND TRACING TO ASSIST CUSTOMS. Christophe Renard. WCO IT Conference Brisbane GOVERNMENT SECURITY SOLUTIONS SECURE MARKING, AUTHENTICATION, TRACKING AND TRACING TO ASSIST CUSTOMS Christophe Renard WCO IT Conference Brisbane May 2014 SICPA Security Solutions May 2014 - n 2 CASE STUDIES

More information

TRANSPORTATION MANHATTAN ACTIVE. A Comprehensive Solution for Complex Logistics Networks. With Manhattan Active Transportation you can:

TRANSPORTATION MANHATTAN ACTIVE. A Comprehensive Solution for Complex Logistics Networks. With Manhattan Active Transportation you can: MANHATTAN ACTIVE TRANSPORTATION A Comprehensive Solution for Complex Logistics Networks LOGISTICS COMPLEXITIES AND SERVICE-LEVEL EXPECTATIONS have increased dramatically in today s world. Supply chains

More information

Please complete the questionnaire and fax it to

Please complete the questionnaire and fax it to Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One

More information

ISO Revisions. ISO 9001 Whitepaper. The importance of risk in quality management. Approaching change

ISO Revisions. ISO 9001 Whitepaper. The importance of risk in quality management. Approaching change ISO Revisions ISO 9001 Whitepaper The importance of risk in quality management Approaching change Background and overview to the ISO 9001:2015 revision As an International Standard, ISO 9001 is subject

More information

Workplace Violence. Workplace Violence. Work Safe: Preventing Injuries and Workplace Violence. Gene R. La Suer Davis Brown Law Firm

Workplace Violence. Workplace Violence. Work Safe: Preventing Injuries and Workplace Violence. Gene R. La Suer Davis Brown Law Firm Work Safe: Preventing Injuries and Gene R. La Suer Davis Brown Law Firm What is workplace violence? Workplace violence is any act or threat of physical violence, harassment, intimidation, or other threatening

More information

Risk Advisory Services Developing your organisation s governance for competitive advantage

Risk Advisory Services Developing your organisation s governance for competitive advantage Advisory Services Developing your organisation s governance for competitive advantage The Deloitte Advisory Platform of Services can help you to govern your strategic plan to guide your operations measure

More information

HOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2015, Lockheed Martin Corporation. All rights reserved 0000.PPT 1/5/2016 1

HOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2015, Lockheed Martin Corporation. All rights reserved 0000.PPT 1/5/2016 1 HOW TO DO BUSINESS WITH Lockheed Martin Copyright 2015, Lockheed Martin Corporation. All rights reserved 0000.PPT 1/5/2016 1 Vision Lockheed Martin is the Leading Aerospace and Global Security Company,

More information

Trade Transformation. CBP Initiatives for 21 st Century Trade. September 2012

Trade Transformation. CBP Initiatives for 21 st Century Trade. September 2012 Trade Transformation CBP Initiatives for 21 st Century Trade September 2012 1 Evolving our Mission 2 A Day at the U.S. Border CBP protects more than: 5,000 miles of border with Canada 1,900 miles of border

More information

FAQ. From: Christine Curtis Director of Security GOM. REF: Request to Clarify Contactor Background Screen. Date: October 31, 2014

FAQ. From: Christine Curtis Director of Security GOM. REF: Request to Clarify Contactor Background Screen. Date: October 31, 2014 FAQ From: Christine Curtis Director of Security GOM REF: Request to Clarify Contactor Background Screen Date: October 31, 2014 What is the reason/objective for this request? The BP Background Screening

More information

Leveraging Risk Assessments to Raise Funding for Your Security Program

Leveraging Risk Assessments to Raise Funding for Your Security Program Leveraging Risk Assessments to Raise Funding for Your Security Program Shawn Reilly, CPP, PSP, CHPA, CPD 1 Sources of Information ASIS Facilities Physical Security Measures Guideline Design and Evaluation

More information

Global Security Verification Report

Global Security Verification Report Measured Performance - Improved Security Global Security Verification Report Camino Industrial (Huizhou) Company Limited Registration Number : A5046-142191 Company : Date of Verification : 16-Nov-2016

More information

Effective implementation of COSO s new anti-fraud guidance

Effective implementation of COSO s new anti-fraud guidance Effective implementation of COSO s new anti-fraud guidance In September 2016, the Committee of Sponsoring Organizations of the Treadway Commission (COSO) published a new Fraud Risk Management Guide (Anti-fraud

More information

DEPUTY CHIEF OF POLICE RECRUITMENT PACKAGE

DEPUTY CHIEF OF POLICE RECRUITMENT PACKAGE The Bradford West Gwillimbury and the Town of Innisfil Police Services Board DEPUTY CHIEF OF POLICE RECRUITMENT PACKAGE TABLE OF CONTENTS Description Page No. Letter from the Chief of Police Designate

More information

CBTC(Customs Border Targeting Center) Korea Customs Service

CBTC(Customs Border Targeting Center) Korea Customs Service CBTC(Customs Border Targeting Center) Korea Customs Service RISK If there is a risk of something unpleasant, there is a possibility that it will happen Risk = Threat +Vulnerabilities +Consequence

More information

How to Source Successfully from China

How to Source Successfully from China How to Source Successfully from China Evaluating suppliers Negotiating Managing production and QC Protecting your IP www.globalsources.com/mobileelectronics How to Source Successfully from China From supplier

More information

Intuit Supplier Code of Conduct

Intuit Supplier Code of Conduct Intuit Supplier Code of Conduct At Intuit we simplify the business of life. We invent solutions to important problems. We innovate. This is what we strive for every day, and we truly value the role our

More information

2018 AI Global Sourcing Survey

2018 AI Global Sourcing Survey 2018 AI Global Sourcing Survey This 2018 edition of the AI Global Sourcing Survey was conducted in December 2017 by AsiaInspection, a leading quality control and compliance provider. It analyzes sourcing,

More information

Labeling Best Practice in a Challenging Manufacturing Landscape A survival guide for pharmaceutical companies

Labeling Best Practice in a Challenging Manufacturing Landscape A survival guide for pharmaceutical companies Labeling Best Practice in a Challenging Manufacturing Landscape A survival guide for pharmaceutical companies White Paper www.nicelabel.com/pharma 1 1 Executive summary The number of challenges for the

More information

Proposal for Improving the Business Environment in Lao PDR - Based on a JETRO survey on business needs -

Proposal for Improving the Business Environment in Lao PDR - Based on a JETRO survey on business needs - Proposal for Improving the Business Environment in Lao PDR - Based on a JETRO survey on business needs - July 4, 2015 Japan External Trade Organization (JETRO) Promote Good Connectivity with Neighboring

More information

HIJACKING HAVENS The Challenges of Transporting Goods in Mexico and Brazil

HIJACKING HAVENS The Challenges of Transporting Goods in Mexico and Brazil David A. Jones, CPP, CFI VP Global Security Lead Supply Chain HIJACKING HAVENS The Challenges of Transporting Goods in Mexico and Brazil September 9, 2015 Agenda Hijacking Risk Levels National Statistics

More information

Combating illegal logging

Combating illegal logging Combating illegal logging Lessons from the EU FLEGT Action Plan A summary In this summary of the publication Lessons from the EU FLEGT Action Plan, we look at the Action Plan s impact in the 10 years since

More information

IBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights

IBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights IBM Security Data Sheet IBM QRadar SIEM Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights Use IBM QRadar Security Information and Event Management, powered by the

More information

IoT Business Brief Energy & Oil Business DRIVING SOCIETY FORWARD

IoT Business Brief Energy & Oil Business DRIVING SOCIETY FORWARD IoT Brief Energy & Oil picture: shutterstock.com/de DRIVING SOCIETY FORWARD Power and transport keep the world moving. With the right infrastructure platform, IoT can enable greater speed and efficiency

More information

Optimized for Growth:

Optimized for Growth: The Fifth Annual Change in the (Supply) Chain Survey Optimized for Growth: High-Tech Executives Adapt to Meet Global Demands INTRODUCTION Optimized for Growth: High-Tech Executives Adapt to Meet Global

More information

Optimised for Growth:

Optimised for Growth: The Fifth Annual Change in the (Supply) Chain Survey REGIONAL SUMMARY: ASIA PACIFIC Optimised for Growth: High-Tech Executives Adapt to Meet Global Demands INTRODUCTION Optimised for Growth: High-Tech

More information

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT Schweitzer Engineering Laboratories, Inc. Delivering Quality Products by Managing Supply Chain Risk INTERVIEWS Senior Management from Quality; Manufacturing;

More information

FERRIBY MARINE SHIP SECURITY ASSESSMENT AUDIT CHECKLIST

FERRIBY MARINE SHIP SECURITY ASSESSMENT AUDIT CHECKLIST SHIP SECURITY ASSESSMENT AUDIT CHECKLIST SHIP SECURITY ASSESSMENT AUDIT CHECKLIST 1. A Ship Security Assessment (SSA) is a process that identifies weaknesses in physical structures, personnel protection

More information

Supplier Oversight PQRI. September Steven Lynn, MS, CMQ/OE Vice President Global Quality Compliance Mylan

Supplier Oversight PQRI. September Steven Lynn, MS, CMQ/OE Vice President Global Quality Compliance Mylan Supplier Oversight September 2014 PQRI Steven Lynn, MS, CMQ/OE Vice President Global Quality Compliance Mylan Agenda Mylan Background Setting the Stage with a Scenario Current State Thinking Supplier Qualification

More information

Logistics and ICT 4.0 / Digitalization

Logistics and ICT 4.0 / Digitalization January 2017 White Paper Logistics and ICT 4.0 / Digitalization Introduction The last decades transportation, supply chain management, warehousing are more and more depending on software. Efficiency has

More information

Top 5 US Export and Import Commodities

Top 5 US Export and Import Commodities WWW.IBISWORLD.COM Special Report Month 2012 1 Follow on head on Master page A Special Report July 2012 Top 5 US Export and Import Commodities By Josh McBee and Justin Waterman Dominated by oil, cars and

More information

Introduction to Yangshan Bonded Pore Area and Yangshan Customs

Introduction to Yangshan Bonded Pore Area and Yangshan Customs Introduction to Yangshan Bonded Pore Area and Yangshan Customs Yangshan Customs May 2011 The 1st bonded port area approved by the State Council in this country Started operations on Dec. 10, 2005. And

More information

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) (04/24/2006) C-TPAT Qualifications for Air Freight Consolidators,

More information

Diversified Services. Our Diversified Services include:

Diversified Services. Our Diversified Services include: Diversified Services GRC s innovative approach to risk management entails consistent development of new services to better serve our clients. By continuously striving to meet our clients' needs, GRC's

More information

European Road Freight Transport 2017 Sample

European Road Freight Transport 2017 Sample European Road Freight Transport 2017 Sample CONTENTS Introduction 6 1 European Road Freight Market Fundamentals 7 1.1 KEY FINDINGS 7 1.2 MARKET STRUCTURE 8 1.3 EUROPEAN ROAD FREIGHT SUPPLY SIDE ISSUES

More information

Sports League Fights Sophisticated Criminals with a Combination of Online Intelligence and Rogue Website Litigation

Sports League Fights Sophisticated Criminals with a Combination of Online Intelligence and Rogue Website Litigation Sports League Fights Sophisticated Criminals with a Combination of Online Intelligence and Rogue Website Litigation Industry: Sports League Solution: MarkMonitor Brand Protection MarkMonitor Professional

More information

AEO program. (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan

AEO program. (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan AEO program (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan International background The global trading system is vulnerable to terrorist exploitation while the international

More information

International and Transorganizational Information Flow of Tracking Data

International and Transorganizational Information Flow of Tracking Data International and Transorganizational Information Flow of Tracking Data JOUNI VIITANEN, MARKUS HAPPONEN, PASI PATAMA & JYRI RAJAMÄKI Laurea Leppävaara Laurea University of Applied Sciences Vanha maantie

More information

Security intelligence for service providers

Security intelligence for service providers Security Thought Leadership White Paper July 2015 Security intelligence for service providers Expanded capabilities for IBM Security QRadar including multi-tenancy, unified management and SaaS 2 Security

More information

SUPPLIER CODE OF CONDUCT

SUPPLIER CODE OF CONDUCT SUPPLIER CODE OF CONDUCT FOREWORD AND SUPPLIER CERTIFICATION CTS Corporation ( CTS ), founded in 1896, has built its reputation by producing quality products as well as by adhering to the highest ethical,

More information

PREVENTING FRAUD. Take-and-Use Guidelines for Chubb Crime Insurance Customers

PREVENTING FRAUD. Take-and-Use Guidelines for Chubb Crime Insurance Customers PREVENTING FRAUD Take-and-Use Guidelines for Chubb Crime Insurance Customers PREVENTING FRAUD Take-and-Use Guidelines For Chubb Crime Insurance Customers Prepared for The Chubb Group of Insurance Companies

More information

Online brand protection: further down the rabbit hole we go

Online brand protection: further down the rabbit hole we go Contributing firm Online brand protection: further down the rabbit hole we go Author Stephen Ward Online brand enforcement sounds like a strong term, but what does it really mean? How do you know when

More information

Strengthening Forest Law Enforcement and Governance (FLEG) Presentation to the PROFISH Steering Committee, May 17, 2007 Tapani Oksanen,, WB FLEG TTL

Strengthening Forest Law Enforcement and Governance (FLEG) Presentation to the PROFISH Steering Committee, May 17, 2007 Tapani Oksanen,, WB FLEG TTL Strengthening Forest Law Enforcement and Governance (FLEG) Presentation to the PROFISH Steering Committee, May 17, 2007 Tapani Oksanen,, WB FLEG TTL Scope of Forest Crime US$10 billion annual losses in

More information

Information Systems and Organizations

Information Systems and Organizations 1.4.2 ICT Supply Chain Risk ICT supply chain risks include insertion of counterfeits, unauthorized production, tampering, theft, insertion of malicious software and hardware (e.g., GPS tracking devices,

More information