Good afternoon. It is fortuitous that I am the final presenter at

Size: px
Start display at page:

Download "Good afternoon. It is fortuitous that I am the final presenter at"

Transcription

1 [Session: Modeling and Risk Assessment] A Predictive Modeling and Decision-Making Tool to Facilitate Government and Industry Response to an Intentional Contamination of the Food Supply DR. ANDREW JAINE BT SAFETY, LLC Good afternoon. It is fortuitous that I am the final presenter at this session, as the presentations started off with Col. Hoffman describing a method for evaluates the risk associated with a food contamination incident as the product of three components: the threat to the food target, the vulnerability of the food, and the consequences of any ensuing incident. The previous speakers addressed various aspects of the threat and vulnerability of the target, and in this presentation I will describe a system for evaluating and managing the last of these three components: the consequences of food contamination incidents. This system is a predictive model designed to help government and industry improve their ability to respond to food contamination events. We started developing it about 4 years ago, soon after 9/11, when one of my partners in BTSafety became concerned about how a bioterrorism attack on the food supply could affect the several produce companies that he owns. After looking into the available approaches to reduce the vulnerability of these companies to this type of risk, he decided that no effective approaches were available and so we started designing an approach. Fairly early in that process we realized that we needed some detailed information about the agents that are the most likely to be involved in a food event, so we approached some areas of the federal government for this information. Those initial conversations led to them becoming interested in what we were doing, and which eventually led us to start working with them to develop a system based on those designs. Over the last 4 y this development has grown considerably; now there are a wide range of people from different backgrounds involved: from the scientific community, the Food and Drug Administration, Homeland Security (through the National Center for Food Protection and Defense ), and also other agencies like the Centers for Disease Control, the USDA, from industry, and many others. And much of the work is now funded in part by the FDA and in part by Homeland Security though the National Center for Food Protection and Defense, although some is still privately funded. As I said, the intent of the system is to enable those involved in responding to food contamination events to understand the potential consequences of these types of incidents and then to manage and improve the speed and effectiveness of their responses. The main thing that differentiates our system from other models is that it puts all the factors that influence the consequences of a food event together into a single model that models the entire evolution of a food event, starting at the point of food production (for example the farm) and following it through to the conclusion and an evaluation of the ultimate consequences for example, the impact that it has on all of the various affected stakeholders, like consumers, the Public Health System, industry, and so on. When we started to study the consequences of food contamination incidents we realized fairly quickly that the magnitude and type of consequences of an incident may vary greatly depending on many of the specific incident characteristics, such as the type of food product, the nature of the contaminating agent, how much product is contaminated, and so on. For example, the impact of an E. coli O157:H7 contamination of lettuce may well be very different from the impact of an E. coli O157:H7 contamination of ground beef. So to get the required accuracy in each different event scenario we cannot develop a single model that accommodates all foods and all agents, but instead have to model each combination of agent and food in which we are interested separately. So our model must be very focused and specific. We are not trying to provide a model for every possible food event that may break out; we are trying to answer specific, well defined questions. But there are many such questions, because there are many foods of interest produce, seafood, meat products, etc., and also many agents of interest, E. coli O157:H7, Clostridium botulinum toxin, Salmonella, Enterobacter sakazakii, and so on. So there are an enormous number of possible combinations. And to develop unique models for even a small subset of these would be prohibitively time-consuming and expensive. To overcome this we are developing a generalized system that will accommodate all types of event involving any types of agent and food. We do this by decomposing each event into the entire set of distinct phases that have a significant affect on the event s consequences, and then decompose each phase into its distinct characteristics. It is probably easiest to explain this by drawing a parallel with building a house. There are, of course, an enormous number of different types of houses, with different appearances, contents, prices, etc. However, almost all houses share the same basic parts. They all have bathrooms, bedrooms, closets, living rooms, and so on. And, while many of these rooms may look quite different, the things that go into each room are largely the same. For example: all rooms have floors, walls, and so on. There are some things that are specific to any given type of room, for example, bathrooms have faucets, baths, mirrors, etc., whereas dining rooms don t. But even then most of the items that are unique to a specific type of room are the same for all rooms of that type. So, if you were a house builder, how would these similarities affect the way you would build a new house? First, and most importantly, you must decide on the objectives for the house. Do you want to build single-family houses which would be Proceedings of the Institute of Food Technologists First Annual Food Protection and Defense Conference

2 A predictive modeling and decision-making tool... appropriate for many different types of family, or specific, custom homes, for example a home for a person who loves open spaces and wants the whole house to be one big room? The way that you approach your project will be quite different depending on these choices. And you have very similar considerations when you start to build a computerized modeling system; you have to accurately define your objectives. So when we started building this predictive modeling system, which we call the Consequence Management System (CMS), the first thing that we did was to establish a very specific set of objectives for it. The most important of these objectives is that the CMS must be able to accurately predict the ultimate consequences of any type of food contamination incident, including the effects of any interventions, and to present those predictions in a form that is easily understood by the average user. So our objective, to use our home construction analogy, was to build a model that is the equivalent of the multi-purpose, single family home ; not the equivalent of a custom home that would only meet the needs of one buyer. And, continuing with this analogy, when you have established the objectives for the home, then the next step is to develop a detailed architectural plan for the construction of the home that will ensure that the development will meet your defined objectives and that all of the components will integrate seamlessly into the whole. By developing the plans first you can get an accurate estimate of the tools and building materials you will need, and also, if you are planning to build several houses, or a subdivision, then you can get additional benefits and save a lot of money by using this planning process to find the ways in which the homes that you want to build are similar, and then capitalizing on these similarities by mass-purchasing or mass-producing those modules. This will enable you to get economies of scale while still making sure that each home is unique in the ways that are most important to the buyer: color, number of rooms, size of the dining room, décor, or whatever. Similarly, after defining our objectives for the CMS we then designed an overall architectural plan for how to develop it to meet those needs. And because we wanted to be able to model all types of event, we created an architecture that enables us to get all the possible economies of scale by taking advantage of the similarities between events. We do this by decomposing all different types of food event into a set of phases, where each phase represents a step in the evolution of the event that has a significant impact on the consequences; and then integrating all these phases together into a single model of the entire event. We have currently identified fourteen such phases, for example: food sourcing, food distribution; agent characteristics; agent-food interaction; agent dose response, and so on, however this list is still increasing. Back to our home construction analogy: when you have finished your plans and you know exactly the design for the home or homes that you want to build, then the next thing that you have to do is collect together the resources that you need for the construction. To build a home the resources are a crew and the right set of tools. Some of these resources are for specific purposes, for example if you are going to have tile floors then you need a tiler and a set of tiling tools, to install the plumbing you need a plumber and a set of plumbing tools; etc. And then you need general resources, like laborers and general use tools like hammers and screwdrivers. However, while you may need many different types of resource, the resources required for each room of the house, and for each different house, generally remain the same. For example, due to aesthetic or other differences you may use a different type of tile in different rooms, but the tiling resources will apply all the tile, regardless of type. Similarly the plumbing resources are used for all the plumbing in the house; and the general use resources are used throughout the house. So you do not need to put together different sets of resources for different rooms, or even for different houses. Instead, if you get the right resources to start with you can use them over and over for different rooms in the same house and for other, houses. So if you are going to build a subdivision you get really good resources, as they will last. In our case, as I said earlier, we decompose food events into phases, which in our analogy loosely correspond to the various rooms of a house. And in the same way that the various rooms have different sets of components, most of which can be built with similar resources, so, similarly, the various phases of an event can have different sets of characteristics, but most of these characteristics can be modeled with similar resources. So, as a part of our planning for CMS we identified all the different types of model construction resources that we need to build the various event phases, and, like with our house construction, sometimes unique resources are required to model a specific characteristic of a phase, but in most cases the resources are applicable across all types of phases. We then built these resources into CMS. So, the CMS is like a collection of resources that enable you to model the various phases of food events, some of these enable you to model how a food is sourced, others enable you to model how it is distributed; others help you model agents, how an agent interacts with a human to make them ill, how the Public Health System will respond when an ill person enters the system, and so on. But I expect that by now you are thinking that this sounds a very complicated system, and this is true of some of the internal workings of CMS. It has to be, because the internal workings of some phases of the evolution of a food outbreak are pretty complicated. However, you may recall that I said that one of our fundamental objectives is to be able to present the results in a form that are easily understood by the average user. So, while we work very hard to make sure that that the internal workings of the system are a science-based, accurate reflection of the real life evolution, we try equally hard to take all of that complexity and implement it in an interface that shows the effects of the evolving simulation to the user in an impactful, real-time, and visual way. Those of you who were at Dr. Offutt s presentation this morning may recall that she said you can put up lots and lots of data, but if you give them a map to look at, they like it and understand it. We agree with that completely. So, one of the ways in which we show the results of our simulations is as a map of the United States that changes in real time to show how the simulated event progresses geographically over time. And to show the temporal progress of various stages of the event, the CMS output also has a set of bar charts that depict the number of cases that are present at each stage of the event at each point in the simulation. To implement all of the required complexity in a system that runs in real time requires a huge amount of flexibility from our modeling environment, and unfortunately none of the existing off-the-shelf modeling toolkits provides that amount of flexibility, so we are developing CMS in original program code. In this way we can ensure that can support all types of event, from small, unintentional events like the illness that results when a bird flies over a field and deposits some E-coli O157:H7 on several heads of lettuce, up to large, intentional events, like one that would occur if bioterrorists crop dusted a field with some nasty agent. And CMS can model any number of different phases for each event, and any of those phases can be modeled using any of a wide range of possible characteristics, each of which is available to any phase. And because CMS is written in original program code, when we run into a unique characteristic that we have not seen before we can build it into the CMS ourselves. And we expected this to happen frequently, in part because we are constantly moving on to new foods and agents that we make new demands, but also because the current knowledge of many existing bioterrorism agents is still changing rapidly, which often requires new capabilities. Because we expected this, we have structured CMS specifically to make sure that it is easy to incorporate these types of change. So, with this design any new scenario that does not involve a totally different type of characteristic can be modeled by simply adding Proceedings of the Institute of Food Technologists First Annual Food Protection and Defense Conference

3 A predictive modeling and decision-making tool... the new data to the system, and any that requires new characteristics can be modeled by adding the required new characteristics to CMS. Finally, to go back to our home construction analogy one last time, when you have set the objectives, developed the plans, put together the required development resources and you are ready to start actually building the house, then you need the building materials. And in most cases the purchaser has very specific likes and dislikes about the color, size, texture, etc. that they want, so many of the materials must be selected specifically for each house. But again, if you are building a subdivision, you can save a lot of cost and time by giving the purchaser some alternatives to select from, and then buying the materials in bulk. Similarly, our building materials are the data that we collect about each agent, product, etc. And we find that, to meet our objective of getting the sort of accuracy that we need in the predictions of the ultimate consequences of each incident, we must model each agent/food combination individually. So, while we decompose all events into a set of similar phases, we then have to collect the data and models to inform each of these phases separately for each combination of agent and product. But in many cases we can get economies of scale, because the same food manufacturer that makes food X also makes food Y, so when we go in to talk to them, we can collect at the same time the information for all the products that they produce that are of interest to us. But accurately modeling a food incident often requires a lot of data. For example, for each selected food we must collect detailed data to build a model of the entire movement of the food through its distribution chain, both geographically and temporally, from production to consumption, that is, where does the food go and how long does it take to get there? These data must be very specific. So take, for example, lettuce sourcing. Lettuce is, of course, a seasonal product. So if you buy your lettuce in summer it will probably come from Salinas, California. If you buy it in the fall it could still come from Salinas, but also could come from Huron, California. However, if you buy it in the winter it will probably come from Yuma, Arizona because Yuma has the largest winter production. So we must collect data from all those sources. And a similar level of data is required about each of the stages of the distribution system, such as the movement of the product from the field to the retail store, the characteristics of how it is received and handled in the back room of the store before it comes onto the shelf, how long it takes the consumer to go in and buy it and take it home, and so on. Next we need consumption information, and this includes items such as how long it takes the consumer to eat the product after they take it home, how much of the product they eat over what period of time, how that consumption varies with demographic profile, and so on. Next, a similar level of data collection is required for each agent that we need to support, such as how consumers in each demographic segment would respond to consumption of various levels of the agent, what levels of contamination of the agent in the food could reasonably be encountered, and so on. Then we need to collect data to inform models of how many of the consumers of the contaminated product would get ill, how ill they would get, and what they would do about that illness, for example, would they seek medical attention? Then we need to collect data to inform models of how the various patients would interact with the Public Health system, by modeling the range of likely actions on the part of the medical system (which of course depends on the type of contaminating agent, the extent of the contamination, and so on). We call this phase Public Health Response and it is one of the areas in which we are investing a considerable amount of time. Once an event happens and people around the country start getting ill; it describes how long we would expect it to take for our Public Health System to receive reports of the various illnesses, then to pick out the related illnesses from the noise of all the other illnesses that are occurring at the same time, so that they can relate these various illnesses together and identify the outbreak, then to get the information and the authority they need to decide on and initiate appropriate response. In this area we are working very closely with a group from the National Center for Food Protection and Defense led by Dr. Don Schaffner to build a model of that entire process to be integrated with the CMS. And so we collect data and build models to follow the event through all of its phases until we reach its ultimate conclusion, and at that point we model the impact of the event on consumers, the Public Health system, and the economic impact on industry and the country, etc. However, hopefully, before that ultimate conclusion, somewhere along this evolution the information about the unfolding event will stimulate someone to initiate some mitigating intervention. For example, the Public Health System receives enough reports to enable them to recognize that an outbreak is actually happening and they decide to intervene. Or affected consumers call an 800-number hotline to the company that produced the product and the company recognizes the outbreak and decides to intervene, and so on. So, we also model this aspect of the event by collecting data to build models of the processes that lead up to the recognition of the outbreak, the various intervention alternatives that are available at each point in the simulation, and the probable effectiveness of each type of intervention. And, when we have collected together all these data and models, we use the resources built into the CMS to build the data into a comprehensive model of a wide range of various scenarios for potential events, for example events with the same agent and product but with different points of contamination in the food distribution chain, or with various levels of contamination, different quantities of contaminated food, different demographic subgroups, etc. So our development program has a very intensive set of data collection activities, and in those activities we try very hard to collect real hard data to inform the model wherever possible. Some phases of the event, for some foods and agents, are very rich in data. For example, we have data that we have sourced from lettuce industry on every shipment of lettuce made during the last four years by several lettuce companies, so the food distribution for that product can be modeled to a high degree of accuracy using these data. However, other phases, such as the characteristics of the response of the Public Health system, are less rich in data, so the existing data must be supplemented with statistical models. In other cases, like the dose/response curve for several potential bioterrorism agents, the data pathway is very sparse, so these parts of the CMS must be informed almost entirely by computerized models. So our data collection process is sometimes going out to various data sources and obtaining the available data, in other cases it means going out and collecting existing statistical models, and in yet other cases, where neither data nor models exist, we must build new statistical models. Occasionally during this data collection process we find that there are several different data sources for a particular characteristic of a phase, and in some cases these different data are in conflict, with some people believing one data set, and others believing other data sets. In these situations our job, we believe, is not to select between those data and models, but to provide a system that will accommodate all of those variations and let the user select which variant they prefer, and to change between variants, and even, if they prefer, to put in their own model. To achieve that, the CMS supports different, user selectable alternative models for most phases, and comes with a data entry system and a complete statistical modeling subsystem that enables experienced users to even write their own formulae for complex statistical distributions. So, there are large amounts of data and models to collect and build. But we are not trying to do this collection alone; we are working cooperatively through relationships with a large number of external entities. We are receiving considerable help from a number of groups at the National Center for Food Protection and Defense and from FDA, CDC Proceedings of the Institute of Food Technologists First Annual Food Protection and Defense Conference

4 A predictive modeling and decision-making tool... (who are holding expert elicitations at our request on some of the agents that we re working on), USDA, ERS, a large number of industry partners, and the scientific community. Plus, we are of course filling in the gaps with our own teams of experts in the various fields. And all of this is leading to CMS becoming a very data rich environment. So, you may wonder what a user sees in an actual simulation run with the CMS. Well, to start a simulation using the CMS, the user must first select the specific characteristics of the outbreak to be simulated, such as the food and agent involved, the point at which the product is contaminated, the quantity of product contaminated, the level of contamination, and so on. CMS helps in this selection by suggesting reasonable values. For example, if you select the point of contamination as the field, then it will suggest the quantity of product based on the average field size, but the user can then change that selection at will. As the simulation runs it clicks off the hours since the simulated contamination happened on an elapsed time counter, and at each of those simulated hours it shows the output in three distinct displays: The first display is a map of the United States that shows the geographic location of the product as it moves through the distribution channel. As the event moves through the different phases at a specific geographic location it shows the progress by displaying a symbol at the location that is colored to indicate the current state of the event there. So, for example, when the product first arrives at a retail store at the new location a colored symbol appears on the map at that location. As the food at that location then moves to the home the color changes, and the color continues to change to show when it first gets consumed, then when the first consumer at that location gets ill, and so on. The second display is a bar chart that shows the quantity of product at each stage of distribution at the specific point in time in the simulation. So, for example, bars on the chart represent the quantity of product that remains in the field, on the truck, at retail, and so on. Following consumption, the bars indicate the quantity of product consumed, the number of resulting illnesses, and so on. Then subsequent bars show the number of people who have received medical attention through the Public Health System, and mortality if that occurs. The third display mechanism is a set of textual displays that show the current state of epidemiologic knowledge surrounding the event and the current evaluation of the event impact. The first of these text displays shows each significant change in the known epidemiologic information about the event, such as when the first illness occurs, when the first report is made to the PHS, when the PHS would identify the agent, and so on. The second text display shows the system s evaluation of the total impact of the event at the current time using the user selected impact metric. The system will support a range of different impact metrics, including Quality Adjusted Life Years (the impact on the quality of life of each of the patients with distinct forms of disease presentation), the economic impact on various sectors of the economy, and so on, and the user can select which impact metric they prefer to see. But part of the power of the system is that, in addition to showing the consequences of the event itself, it also demonstrates the effects of implementing mitigating interventions, and the effects changes in the timing of those interventions. At any time during the simulation the user can click a button to indicate that they want to invoke an intervention, and in response CMS will display a list of the interventions that are feasible at that point in time. The feasible interventions are selected by CMS based on what epidemiologic information is known at the time the user requests the intervention. So if, for example, the user initiates an intervention prior to the time when the epidemiologic models indicate that the outbreak would be recognized by the Public Health System, then the system indicates that the only interventions that are available are those that would be appropriate if you have received some advance warning of a pending or ongoing outbreak (for example a phone-in threat). If that is not the case then the user can click a button to allow the simulation to proceed. If they initiate an intervention at a later time, for example when the epidemiologic models indicate that the outbreak would be recognized, and the agent identified, but not the product, then it will show a list of the interventions that are appropriate to that specific level of epidemiologic knowledge, and so on throughout the entire life-cycle of the outbreak. And so, throughout the entire event evolution, every hour the CMS shows graphically how many locations it estimates are involved; how widely they are geographically dispersed; the quantities of product or people at each stage of distribution, consumption or morbidity; and a summary of the total impact of the event to that point, in the user s chosen impact metric. And based on what they see, the user can select to invoke any interventions that may be available, and if they do then the evolution of the event is changed, to reflect the changes that would result from that intervention, and the impact would also change accordingly. So, CMS allows the user to assess the likely consequences of a food contamination event, and also to assess how changing the parameters of various phases of the event, for example by increasing the level of contamination of the agent, or by intervening in the event by making a public announcement, would impact the entire consequence of the event. So, how can this information be used? Well, I think Col. Hoffman articulated the answer to that far better than I could when he said that in order to evaluate the risk associated with a specific food event you must be able to evaluate the consequences of the event, and that is what CMS helps you do. So, the consequence evaluations that it provides are useful in advance of any event for planning, to evaluate what product/agent combinations are of greatest potential impact, and how we would expect to see those events evolve. But the CMS can also be useful during an event, because they give an understanding of how fast products move, how fast events evolve, and how quickly we have to intervene for the intervention to be effective, and so on. And, another obvious use of the CMS is in training in food safety and food defense, for table-top exercises and other similar activities. In conclusion, I have described the process that we are using to build the CMS, and that the process requires extensive cooperation from many sectors of government and industry. And I have described a little of the excellent cooperation that we are receiving from many areas of government including the FDA, the Dept. of Homeland Security, CDC, USDA, CDC the Public Health System, and many others. But probably one of the most important areas of CMS is the way that it characterizes the distribution system for a food, and often to do this we require the collection of confidential data from industry. To ensure that we can maintain a very high level of confidentiality of such data we have spent the last year and a half with our lawyers working with the lawyers for FDA, for the National Center for Food Protection and Defense and with lawyers representing various sectors of private industry to work out a contractual arrangement under which we can, as a private company, collect data from other private companies while fully protecting their interests. Under this agreement, when we gather confidential data it is totally anonymized, and all such data is incorporated into the CMS solely in aggregation with data from other sources through statistical averages that prevent the individual data source from being identifiable. Then, when we have completed our processing of the data the original data are destroyed. Further, since BTSafety is a private entity, we are not subject to discovery through the Freedom of Information act. So these contractual arrangements give us the ability to collect all the data that we need, while providing the companies that provide the data with the assurances that the confidentiality of their data is totally protected. Finally, our thanks to the many agencies, universities, companies and individuals who are collaborating with us on this project, and a special thanks to the Food and Drug Administration, to the Dept. of Homeland Security and to the National Center for Food Protection and Defense for providing funding for this work. Proceedings of the Institute of Food Technologists First Annual Food Protection and Defense Conference

5 Consequence Management System Andy Jaine, BTSafety, LLC

6 Consequence Management System (CMS) A predictive modeling tool to help enhance government and industry response to contaminations of the food system

7 What does CMS do? Models the entire evolution of food events Quantify the timing and consequences of the event Consumer exposure and outcome Impact on public health infrastructure Impact on the economy, business, public, etc. Effect of different interventions Containment and remediation Integrates and builds on the results of stage models

8 What can CMS be used for?... What-If scenario planning Quantify morbidity, mortality, economic impact Identify impacts on affected constituencies (consumers, general public, health care, food industry, government) nt) Assist in decision making and priority setting Facilitate allocation of resources Training Consequence assessment Helps weigh the cost/benefit of various policy and intervention decisions Illustrates the time frames that would maximize the effectiveness of policies and actions Food system, agents, crisis management Table top exercises

9 Structure of CMS A tool that enables modeling of the evolution of all types of food event temporally and geographically Data-centric - reflects real data and real prior incidents Visual - easily visualize and assess the impact of decisions Flexible - accommodates all reasonable scenarios Practical operates when some attributes are unknown or imprecise Extensible facilitates easy enhancement to include improved data and models as they become available

10 CMS System U.S. Patent

11 The Consequence Management System has resulted in a collaborative program involving FDA, DHS, USDA, CDC and EPA. Government recognizes a public/private partnership is critical for defense of the U.S. food supply. I applaud and encourage continued collaboration by the private sector in the development of the CMS. NCFPD Industry Workgroup July 12, 2005 Lester Crawford Former Commissioner of FDA July 11, 2005

12 Protection of Confidential Data Secure server installed at BT Safety used exclusively for data storage (no internet connection) Password protected and limited access Companies have the option of customized confidentiality agreements Data sanitized of all company references Company participation acknowledged only if permission is granted by the company

13 Data Confidentiality Original data destroyed or returned Whenever possible, aggregate data used in the model As a private entity, data collected by BTSafety is not discoverable through Freedom of Information

14 The project is a collaboration of a number of agencies, universities and companies

15 National Center for Food Protection and Defense Industry Workgroup

16 We gratefully acknowledge funding by the following organizations:

Thank you everybody for attending this session. What I want to

Thank you everybody for attending this session. What I want to [Session: Public Health and Response Coordination] Public Health and Response Coordination: the State of the Art DR. CRAIG HEDBERG UNIV. OF MINNESOTA Thank you everybody for attending this session. What

More information

Vulnerability Assessment. U.S. Food Defense Team

Vulnerability Assessment. U.S. Food Defense Team Vulnerability Assessment U.S. Food Defense Team Vulnerability A weakness in a processing, handling or storage facility or operation that would allow for intentional contamination of a food product Vulnerability

More information

Methodology Primer for the Foodborne Illness Risk Ranking Model

Methodology Primer for the Foodborne Illness Risk Ranking Model )RRG6DIHW\5HVHDUFK&RQVRUWLXP Methodology Primer for the Foodborne Illness Risk Ranking Model Background A MULTI-DISCIPLINARY COLLABORATION TO IMPROVE PUBLIC HEALTH The goal of the (FSRC) is to improve

More information

From Farm to Fork - How to Improve Surveillance of the Food Supply Chain. Prof. Dr. Dr. Andreas Hensel

From Farm to Fork - How to Improve Surveillance of the Food Supply Chain. Prof. Dr. Dr. Andreas Hensel FEDERAL INSTITUTE FOR RISK ASSESSMENT From Farm to Fork - How to Improve Surveillance of the Food Supply Chain Prof. Dr. Dr. Andreas Hensel What can we do in the face of terrorist threats to food? 1. Improve

More information

Self-Service Business Intelligence

Self-Service Business Intelligence Self-Service Business Intelligence BRIDGE THE GAP VISUALIZE DATA, DISCOVER TRENDS, SHARE FINDINGS Solgenia Analysis provides users throughout your organization with flexible tools to create and share meaningful

More information

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

2. Aims (tasks, milestones, deliverables) addressed in this progress report (May Aug, 2011)

2. Aims (tasks, milestones, deliverables) addressed in this progress report (May Aug, 2011) Project Title: Food Product Tracing Technology Capabilities and Interoperability PI: Dr. Jennifer Cleveland McEntire Project Start Date: September 2010 End Date: August 2012 Period covered in this report:

More information

Food Traceability Best Practices in the Age of Big Data

Food Traceability Best Practices in the Age of Big Data in the Age of Big Data Increasing regulations and big data are compelling food manufacturers to adopt automated traceability solutions as part of their quality programs. 1 InfinityQS International, Inc.

More information

THE HIGH COST OF A PRODUCT RECALL

THE HIGH COST OF A PRODUCT RECALL WHITE PAPER THE HIGH COST OF A PRODUCT RECALL USING PROCESS ANALYTICS SOFTWARE TO MAXIMIZE SAFETY, PRODUCTIVITY AND PROFITS BY CRAIG GUNTHER CONTENTS Introduction 2 Recall Considerations 2 Self Regulation

More information

I-Track Software. A state of the art production and warehouse management system designed for Food and Beverage Manufacturers. Overview 2.

I-Track Software. A state of the art production and warehouse management system designed for Food and Beverage Manufacturers. Overview 2. Overview 2 Features 3 Benefits 4 I-Track Software A state of the art production and warehouse management system designed for Food and Beverage Manufacturers Site Assessment 5 Integrated Plant Floor Execution

More information

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. rok.bojanc@zzi.si Abstract: The paper presents a mathematical model to improve our knowledge of information security and

More information

PUBLIC HEALTH OPTOMETRY ECONOMICS. Kevin D. Frick, PhD

PUBLIC HEALTH OPTOMETRY ECONOMICS. Kevin D. Frick, PhD Chapter Overview PUBLIC HEALTH OPTOMETRY ECONOMICS Kevin D. Frick, PhD This chapter on public health optometry economics describes the positive and normative uses of economic science. The terms positive

More information

Enhancing Sales and Operations Planning with Forecasting Analytics and Business Intelligence WHITE PAPER

Enhancing Sales and Operations Planning with Forecasting Analytics and Business Intelligence WHITE PAPER Enhancing Sales and Operations Planning with Forecasting Analytics and Business Intelligence WHITE PAPER Table of Contents Introduction... 1 Analytics... 1 Forecast cycle efficiencies... 3 Business intelligence...

More information

Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge

Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge This paper will present a case study of Lumeta s participation in an open

More information

Understanding and Selecting Geospatial Analytics Tools

Understanding and Selecting Geospatial Analytics Tools Understanding and Selecting Geospatial Analytics Tools A Practical Example COLLABORATIVE WHITEPAPER SERIES Geospatial Business Intelligence (BI) has been in the conversation related to BI now for quite

More information

How to Get from Scans to a Vulnerability Management Program

How to Get from Scans to a Vulnerability Management Program How to Get from Scans to a Vulnerability Management Program Gary McCully Any views or opinions presented are solely those of the author and do not necessarily represent those of SecureState LLC. Synopsis

More information

Managing Workflow Tracking in Discovery Efforts How a proactive solution can help you

Managing Workflow Tracking in Discovery Efforts How a proactive solution can help you Managing Workflow Tracking in Discovery Efforts How a proactive solution can help you As used in this document, Deloitte means Deloitte Financial Advisory Services LLP, which provides forensic, dispute,

More information

Cloud Self Service Mobile Business Intelligence MAKE INFORMED DECISIONS WITH BIG DATA ANALYTICS, CLOUD BI, & SELF SERVICE MOBILITY OPTIONS

Cloud Self Service Mobile Business Intelligence MAKE INFORMED DECISIONS WITH BIG DATA ANALYTICS, CLOUD BI, & SELF SERVICE MOBILITY OPTIONS Cloud Self Service Mobile Business Intelligence MAKE INFORMED DECISIONS WITH BIG DATA ANALYTICS, CLOUD BI, & SELF SERVICE MOBILITY OPTIONS VISUALIZE DATA, DISCOVER TRENDS, SHARE FINDINGS Analysis extracts

More information

The National Antimicrobial Resistance Monitoring System (NARMS)

The National Antimicrobial Resistance Monitoring System (NARMS) The National Antimicrobial Resistance Monitoring System (NARMS) Strategic Plan 2012-2016 Table of Contents Background... 2 Mission... 3 Overview of Accomplishments, 1996-2011... 4 Strategic Goals and Objectives...

More information

How To Do A Deal With A Computer Program

How To Do A Deal With A Computer Program Part 2 A day in the life of an organized agent CRM in real life We will now walk through a scenario made possible by using a CRM solution to its maximum potential. It is important to note that there are

More information

TSC WEBSITE HELP GUIDE

TSC WEBSITE HELP GUIDE TSC WEBSITE HELP GUIDE Whether you have been working with TSC for years or you re a new client of ours, we want to make things as easy as possible for you. The following document is a break down of our

More information

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business. S 2 ERC Project: A Review of Return on Investment for Cybersecurity Author: Joe Stuntz, MBA EP 14, McDonough School of Business Date: 06 May 2014 Abstract Many organizations are looking at investing in

More information

Preparedness in the Southwest

Preparedness in the Southwest Preparedness in the Southwest Risk Assessment and Hazard Vulnerability Developed by The Arizona Center for Public Health Preparedness Cover Art www.azcphp.publichealth.arizona.edu Chapter 1 Importance

More information

Enhancing Sales and Operations Planning with Forecasting Analytics and Business Intelligence WHITE PAPER

Enhancing Sales and Operations Planning with Forecasting Analytics and Business Intelligence WHITE PAPER Enhancing Sales and Operations Planning with Forecasting Analytics and Business Intelligence WHITE PAPER SAS White Paper Table of Contents Introduction.... 1 Analytics.... 1 Forecast Cycle Efficiencies...

More information

Intelligence Reporting Standard Reports

Intelligence Reporting Standard Reports Intelligence Reporting Standard Reports Sage 100 ERP (formerly Sage ERP MAS 90 and 200) Intelligence Reporting empowers you to quickly and easily gain control and obtain the information you need from across

More information

The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program. Version 1.0 March 2005

The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program. Version 1.0 March 2005 The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program March 2005 Legal and Copyright Notice The Chemical Industry Data Exchange (CIDX) is a nonprofit corporation, incorporated in the

More information

Scaling Up For Regional Markets Grading Standards and Wholesale Glossary of Terms

Scaling Up For Regional Markets Grading Standards and Wholesale Glossary of Terms Scaling Up For Regional Markets Grading Standards and Wholesale Glossary of Terms Wholesale food markets often use terms and phrases unique to the industry. To understand a market report, communicate with

More information

IBM Cognos Enterprise: Powerful and scalable business intelligence and performance management

IBM Cognos Enterprise: Powerful and scalable business intelligence and performance management : Powerful and scalable business intelligence and performance management Highlights Arm every user with the analytics they need to act Support the way that users want to work with their analytics Meet

More information

Project Time Management

Project Time Management Project Time Management Plan Schedule Management is the process of establishing the policies, procedures, and documentation for planning, developing, managing, executing, and controlling the project schedule.

More information

Building The Business Case For Launching an App Store

Building The Business Case For Launching an App Store Building The Business Case For Launching an App Store Why Telcos and ISPs are perfectly positioned to become the SaaS channel for their SMB customers This paper is intended to help ISPs and Telcos realize

More information

The Challenge of Managing On-line Transaction Processing Applications in the Cloud Computing World

The Challenge of Managing On-line Transaction Processing Applications in the Cloud Computing World The Challenge of Managing On-line Transaction Processing Applications in the Cloud Computing World Marcia Kaufman, COO and Principal Analyst Sponsored by CloudTran The Challenge of Managing On-line Transaction

More information

Deploying an Information Sharing Solution that Promotes Cross-Enterprise Collaboration without Compromise

Deploying an Information Sharing Solution that Promotes Cross-Enterprise Collaboration without Compromise Deploying an Information Sharing Solution that Promotes Cross-Enterprise Collaboration without Compromise October 2010 V I J A Y T A K A N T I V I C E P R E S I D E N T, S E C U R I T Y & C O L L A B O

More information

Fresh Business Practices for Food & Beverage to Meet Today s Top 3 Issues

Fresh Business Practices for Food & Beverage to Meet Today s Top 3 Issues to Meet Today s Top 3 Issues Prepared exclusively for Sage Software by Industry Directions, Inc. www.industrydirections.com Table of Contents Intro...3 Appealing and Fresh... 3 Compliant and Safe... 4

More information

Improving on a Good Idea from Employee Survey to Measurecom tm

Improving on a Good Idea from Employee Survey to Measurecom tm Improving on a Good Idea from Employee Survey to Measurecom tm Theresa M. Welbourne, Ph.D. Associate Professor of Organization Behavior and Human Resource Management University of Michigan Business School

More information

HIPAA Security Rule Toolkit

HIPAA Security Rule Toolkit California Office of Health Information Integrity (CalOHII) HIPAA Security Rule Toolkit User Guide Version 1.0 2/1/2012 Table of Contents 1.0 - HIPAA Security Rule Background... 0 2.0 Purpose... 1 3.0

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

Beyond the Click : The B2B Marketer s Guide to Display Advertising

Beyond the Click : The B2B Marketer s Guide to Display Advertising Beyond the Click : The challenge In B2B marketing, the ultimate objective of any campaign is to generate the most qualified leads possible, convert these leads into new opportunities that fill the sales

More information

The PCI Dilemma. COPYRIGHT 2009. TecForte

The PCI Dilemma. COPYRIGHT 2009. TecForte The PCI Dilemma Today, all service providers and retailers that process, store or transmit cardholder data have a legislated responsibility to protect that data. As such, they must comply with a diverse

More information

The Emergence of Security Business Intelligence: Risk

The Emergence of Security Business Intelligence: Risk The Emergence of Security Business Intelligence: Risk Management through Deep Analytics & Automation Mike Curtis Vice President of Technology Strategy December, 2011 Introduction As an industry we are

More information

Third-Party Risk Management for Life Sciences Companies

Third-Party Risk Management for Life Sciences Companies April 2016 Third-Party Risk Management for Life Sciences Companies Five Leading Practices for Data Protection By Mindy Herman, PMP, and Michael Lucas, CISSP Audit Tax Advisory Risk Performance Crowe Horwath

More information

WHITEPAPER PROACTIVE SECURITY INTELLIGENCE RETURN ON INVESTMENT

WHITEPAPER PROACTIVE SECURITY INTELLIGENCE RETURN ON INVESTMENT WHITEPAPER PROACTIVE SECURITY INTELLIGENCE RETURN ON INVESTMENT Table of Contents Introduction...3 Business Case...3 Real-World ROI...4 Measured Annual ROI...4 ROI Analysis...5 ROI Calculations...6 ROI

More information

FROM HERE. Make all of your dreams come true. It s All Possible With The Duraclean Franchise System

FROM HERE. Make all of your dreams come true. It s All Possible With The Duraclean Franchise System FROM HERE Make all of your dreams come true. It s All Possible With The Duraclean Franchise System OFFICES WORLDWIDE SINCE 1930 Dare to live the life you have dreamed for yourself. Go forward and make

More information

Rt Hon Andrew Smith MP: Resolution Letter

Rt Hon Andrew Smith MP: Resolution Letter 1 Complaints not upheld 2009-10 Rt Hon Andrew Smith MP: Resolution Letter Letter to Mr John Baker from the Commissioner, 9 July 2009 I have now completed my inquiries into the complaint you sent me on

More information

Pandemic Risk Assessment

Pandemic Risk Assessment Research Note Pandemic Risk Assessment By: Katherine Hagan Copyright 2013, ASA Institute for Risk & Innovation Keywords: pandemic, Influenza A, novel virus, emergency response, monitoring, risk mitigation

More information

4 Critical Risks Facing Microsoft Office 365 Implementation

4 Critical Risks Facing Microsoft Office 365 Implementation 4 Critical Risks Facing Microsoft Office 365 Implementation So, your organization has chosen to move to Office 365. Good choice. But how do you implement it AND deal with the following issues: Keep email

More information

FOOD FACILITIES REGISTRATION OF. Protecting the U.S. Food Supply. What You Need to Know About

FOOD FACILITIES REGISTRATION OF. Protecting the U.S. Food Supply. What You Need to Know About U.S. Food and Drug Administration Protecting the U.S. Food Supply U.S. Department of Health and Human Services What You Need to Know About REGISTRATION OF FOOD FACILITIES FDA Food Security Information

More information

INCORPORATING SMALL PRODUCERS INTO FORMAL RETAIL SUPPLY CHAINS SOURCING READINESS CHECKLIST 2016

INCORPORATING SMALL PRODUCERS INTO FORMAL RETAIL SUPPLY CHAINS SOURCING READINESS CHECKLIST 2016 INCORPORATING SMALL PRODUCERS INTO FORMAL RETAIL SUPPLY CHAINS SOURCING READINESS CHECKLIST 2016 LSteinfield/Bentley University Authors: Ted London Linda Scott Colm Fay This report was produced with the

More information

ERP for Food Manufacturing

ERP for Food Manufacturing WHITE PAPER ERP for Food Manufacturing ABSTRACT The food industry involves the commercial movement of food from field to fork. The modern food industry is the result of technological and cultural changes

More information

CHOICES The magazine of food, farm, and resource issues

CHOICES The magazine of food, farm, and resource issues CHOICES The magazine of food, farm, and resource issues 4th Quarter 2005 20(4) A publication of the American Agricultural Economics Association Logistics, Inventory Control, and Supply Chain Management

More information

Big Data Services From Hitachi Data Systems

Big Data Services From Hitachi Data Systems SOLUTION PROFILE Big Data Services From Hitachi Data Systems Create Strategy, Implement and Manage a Solution for Big Data for Your Organization Big Data Consulting Services and Big Data Transition Services

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts A PHASED APPROACH TO PROVIDE A COMPLETE AND COMPLIANT CHEMICAL HAZARD ANALYSIS OF YOUR INCOMING INGREDIENTS The NFL White Paper Series

More information

Product Tracing in Food Systems:

Product Tracing in Food Systems: Product Tracing in Food Systems: Developing a Product Tracing Plan Using Critical Tracking Events and Key Data Elements 2011 Institute of Food Technologists (IFT). All rights reserved. Product Tracing

More information

USING SECURITY METRICS TO ASSESS RISK MANAGEMENT CAPABILITIES

USING SECURITY METRICS TO ASSESS RISK MANAGEMENT CAPABILITIES Christina Kormos National Agency Phone: (410)854-6094 Fax: (410)854-4661 ckormos@radium.ncsc.mil Lisa A. Gallagher (POC) Arca Systems, Inc. Phone: (410)309-1780 Fax: (410)309-1781 gallagher@arca.com USING

More information

Developing and maintaining good relations with your

Developing and maintaining good relations with your 6 Maintaining Positive Relations with Vendors This chapter will enable you to: Be aware of the role of the manager and the market in the success of vendors. Be aware of actions you can take to maintain

More information

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

Pastel Evolution Business Intelligence Centre

Pastel Evolution Business Intelligence Centre Get 12 ready-to-use reports that give you immediate insight into and across your business. Delivered in the familiar environment of Microsoft Excel, the reports are fully customisable, and flexible with

More information

A Capability Model for Business Analytics: Part 2 Assessing Analytic Capabilities

A Capability Model for Business Analytics: Part 2 Assessing Analytic Capabilities A Capability Model for Business Analytics: Part 2 Assessing Analytic Capabilities The first article of this series presented the capability model for business analytics that is illustrated in Figure One.

More information

(KPIs) featuring a nancial analysis and Top 5

(KPIs) featuring a nancial analysis and Top 5 Sage ERP Accpac Sage ERP Accpac Intelligence Standard Reports Sage ERP Accpac Intelligence empowers you to quickly and easily gain control and obtain the information you need from across your business.

More information

HPAI Response HPAI Response Goals November 18, 2015

HPAI Response HPAI Response Goals November 18, 2015 HPAI Response HPAI Response Goals November 18, 2015 Please note: These may be revised as the situation continues to change. USDA APHIS will work to achieve these goals for critical activities in a highly

More information

Cyber Security Metrics Dashboards & Analytics

Cyber Security Metrics Dashboards & Analytics Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics

More information

Challenges in Developing a Small Business Tax payer Burden Model

Challenges in Developing a Small Business Tax payer Burden Model Challenges in Developing a Small Business Tax payer Burden Model Authors: Don DeLuca Arnold Greenland Audrey Kindlon Michael Stavrianos Presented at the 2003 IRS Research Conference I. Introduction In

More information

FULFILLING EXPECTATIONS: THE HEART OF OMNICHANNEL RETAILING

FULFILLING EXPECTATIONS: THE HEART OF OMNICHANNEL RETAILING FULFILLING EXPECTATIONS: THE HEART OF OMNICHANNEL RETAILING Creating the supply chain visibility, accuracy, control and flexibility retailers need to meet the demanding fulfillment expectations of the

More information

Real-time Power Analytics Software Increasing Production Availability in Offshore Platforms

Real-time Power Analytics Software Increasing Production Availability in Offshore Platforms Real-time Power Analytics Software Increasing Production Availability in Offshore Platforms Overview Business Situation The reliability and availability of electrical power generation and distribution

More information

NCCIC CYBER INCIDENT SCORING SYSTEM OVERVIEW

NCCIC CYBER INCIDENT SCORING SYSTEM OVERVIEW NCCIC CYBER INCIDENT SCORING SYSTEM OVERVIEW Many incident taxonomies and classification schemes provide excellent guidance within the scope of a single enterprise s security operations center (SOC). However,

More information

Track and Trace in the Pharmaceutical Supply Chain

Track and Trace in the Pharmaceutical Supply Chain Track and Trace in the Pharmaceutical Supply Chain Edmund W. Schuster Visiting Operations Researcher Robin Koh Associate Director Auto-ID Labs Massachusetts Institute of Technology Cambridge, MA husetts

More information

Metrics: (1) Poorly (2) Adequately (3) Well (4) Very Well (5) With Distinction

Metrics: (1) Poorly (2) Adequately (3) Well (4) Very Well (5) With Distinction Core Competencies Faculty name Student name Metrics: Very 1. Communication and Informatics Collect, manage and organize data to produce information and meaning that is exchanged by use of signs and symbols.

More information

Four distribution strategies for extending ERP to boost business performance

Four distribution strategies for extending ERP to boost business performance Infor ERP Four distribution strategies for extending ERP to boost business performance How to evaluate your best options to fit today s market pressures Table of contents Executive summary... 3 Distribution

More information

A Visualization is Worth a Thousand Tables: How IBM Business Analytics Lets Users See Big Data

A Visualization is Worth a Thousand Tables: How IBM Business Analytics Lets Users See Big Data White Paper A Visualization is Worth a Thousand Tables: How IBM Business Analytics Lets Users See Big Data Contents Executive Summary....2 Introduction....3 Too much data, not enough information....3 Only

More information

The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D.

The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D. Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada Purpose: This document provides

More information

Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices

Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner, Ontario, Canada Purpose: This document

More information

National Antimicrobial Resistance Monitoring System - Enteric Bacteria. A program to monitor antimicrobial resistance in humans and animals

National Antimicrobial Resistance Monitoring System - Enteric Bacteria. A program to monitor antimicrobial resistance in humans and animals National Antimicrobial Resistance Monitoring System - Enteric Bacteria A program to monitor antimicrobial resistance in humans and animals Antimicrobial resistance in foodborne pathogens is an important

More information

PARADIGMS THAT DRIVE COSTS IN MANUFACTURING. The whole purpose of a business enterprise is pretty simple to make a profit by selling

PARADIGMS THAT DRIVE COSTS IN MANUFACTURING. The whole purpose of a business enterprise is pretty simple to make a profit by selling PARADIGMS THAT DRIVE COSTS IN MANUFACTURING The whole purpose of a business enterprise is pretty simple to make a profit by selling products or services to persons who desire those particular goods or

More information

CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool

CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool INL/CON-07-12810 PREPRINT CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool ISA Expo 2007 Kathleen A. Lee January 2008 This is a preprint of a paper intended for publication in a journal

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

Overcoming Five Critical Cybersecurity Gaps

Overcoming Five Critical Cybersecurity Gaps Overcoming Five Critical Cybersecurity Gaps How Active Threat Protection Addresses the Problems that Security Technology Doesn t Solve An esentire White Paper Copyright 2015 esentire, Inc. All rights reserved.

More information

Interagency Statement on Pandemic Planning

Interagency Statement on Pandemic Planning Interagency Statement on Pandemic Planning PURPOSE The FFIEC agencies 1 are jointly issuing guidance to remind financial institutions that business continuity plans should address the threat of a pandemic

More information

The Complete Guide to CUSTOM FIELD SERVICE APPLICATIONS

The Complete Guide to CUSTOM FIELD SERVICE APPLICATIONS The Complete Guide to CUSTOM FIELD SERVICE APPLICATIONS Copyright 2014 Published by Art & Logic All rights reserved. Except as permitted under U.S. Copyright Act of 1976, no part of this publication may

More information

Delivering new insights and value to consumer products companies through big data

Delivering new insights and value to consumer products companies through big data IBM Software White Paper Consumer Products Delivering new insights and value to consumer products companies through big data 2 Delivering new insights and value to consumer products companies through big

More information

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Effective Threat Management. Building a complete lifecycle to manage enterprise threats. Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive

More information

Health and Homeland Alert Network Alert Level License Training

Health and Homeland Alert Network Alert Level License Training Health and Homeland Alert Network Alert Level License Training The Health and Homeland Alert Network (HHAN) provides secure web-based communication and information sharing capabilities to the Commonwealth

More information

FDA 50-State Conference Call OIG Early Alert on FDA s Voluntary Food Recall Initiation Process. June 10, 2016 2:30 pm EDT

FDA 50-State Conference Call OIG Early Alert on FDA s Voluntary Food Recall Initiation Process. June 10, 2016 2:30 pm EDT Page 1 FDA 50-State Conference Call OIG Early Alert on FDA s Voluntary Food Recall Initiation Process June 10, 2016 2:30 pm EDT Operator: Welcome and thank you for standing by. At this time, all lines

More information

Food Safety vs. Food Defense: Differences and Similarities

Food Safety vs. Food Defense: Differences and Similarities Food Safety vs. Food Defense: Differences and Similarities Protecting the Middle East Food Supply from Intentional Contamination MEPI January 29-31, 2008 Cairo, Egypt Dr. Carol Maczka, Ph.D. Assistant

More information

Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose

Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose SPONSORED BY WhatWorks is a user-to-user program in which security managers who have implemented effective Internet security

More information

Maintenance Service 1.1 ANNUAL PREVENTIVE MAINTENANCE 1.2 ON-SITE REMEDIAL SERVICES

Maintenance Service 1.1 ANNUAL PREVENTIVE MAINTENANCE 1.2 ON-SITE REMEDIAL SERVICES Maintenance Service Statement of Work 1.0 Executive Summary - 1 - UPS/PDU Advantage Ultra UPS/PDU Advantage Ultra Service Service Table of Contents 1.0 Executive Summary 2.0 Features & Benefits 3.0 Details

More information

32 Benefits of Pipeliner CRM

32 Benefits of Pipeliner CRM SLIDE DECK: 32 Benefits of r CRM www.pipelinersales.com 32 Benefits of r CRM r originally was designed as a tool for sales empowerment. With its newest release r meets the highest requirements for enterprise

More information

Things to take into consideration when choosing a Market Research company

Things to take into consideration when choosing a Market Research company white paper Things to take into consideration when choosing a Market Research company Market Research; What is it? 1-2 What s it for? 3 What do you do with it and how do you do it? 4-6 Which agency should

More information

Meeting the Omni-Channel Challenge with In-Store Fulfillment for Retailers

Meeting the Omni-Channel Challenge with In-Store Fulfillment for Retailers Meeting the Omni-Channel Challenge with In-Store Fulfillment for Retailers ABOUT THE AUTHOR CHUCK FUERST DIRECTOR OF PRODUCT STRATEGY Chuck Fuerst is the director of product strategy at HighJump. He has

More information

FDA-iRISK 2.0 A Comparative Risk Assessment Tool March 11, 2015

FDA-iRISK 2.0 A Comparative Risk Assessment Tool March 11, 2015 Welcome to the Webinar FDA-iRISK 2.0 A Comparative Risk Assessment Tool March 11, 2015 Today s Speakers Dr. Sherri Dennis, FDA Jane Van Doren, FDA Yuhuan Chen, FDA Greg Paoli, RSI Acknowledgements: Susan

More information

CRISIS MANAGEMENT PLAN

CRISIS MANAGEMENT PLAN CRISIS MANAGEMENT PLAN Table of Contents Introduction... 3 Purpose... 3 Objectives... 3 Types & Levels of a Crisis... 4 Plan Activation... 6 Crisis Management Team (CMT) Structure... 6 CMT Responsibilities...

More information

risks in the software projects [10,52], discussion platform, and COCOMO

risks in the software projects [10,52], discussion platform, and COCOMO CHAPTER-1 INTRODUCTION TO PROJECT MANAGEMENT SOFTWARE AND SERVICE ORIENTED ARCHITECTURE 1.1 Overview of the system Service Oriented Architecture for Collaborative WBPMS is a Service based project management

More information

INTEGRATED ERP FOR FOOD MANUFACTURING. A Strategic Weapon for a Competitive Environment

INTEGRATED ERP FOR FOOD MANUFACTURING. A Strategic Weapon for a Competitive Environment INTEGRATED ERP FOR FOOD MANUFACTURING A Strategic Weapon for a Competitive Environment A Strategic Weapon for a Competitive Environment INTRODUCTION Today, food manufacturers face significant challenges.

More information

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC Welcome to Modulo Risk Manager Next Generation Solutions for GRC THE COMPLETE SOLUTION FOR GRC MANAGEMENT GRC MANAGEMENT AUTOMATION EASILY IDENTIFY AND ADDRESS RISK AND COMPLIANCE GAPS INTEGRATED GRC SOLUTIONS

More information

(Refer Slide Time: 01:52)

(Refer Slide Time: 01:52) Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This

More information

FlyntGroup.com. Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk

FlyntGroup.com. Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk 2012 The Flynt Group, Inc., All Rights Reserved FlyntGroup.com Enterprise Risk Management and Business

More information

Keeping up with the KPIs 10 steps to help identify and monitor key performance indicators for your business

Keeping up with the KPIs 10 steps to help identify and monitor key performance indicators for your business Keeping up with the KPIs 10 steps to help identify and monitor key performance indicators for your business KNOW YOUR KPI A key performance indicator (KPI) is a performance measure (metric) designed to

More information

Management Information System Prof. Biswajit Mahanty Department of Industrial Engineering & Management Indian Institute of Technology, Kharagpur

Management Information System Prof. Biswajit Mahanty Department of Industrial Engineering & Management Indian Institute of Technology, Kharagpur Management Information System Prof. Biswajit Mahanty Department of Industrial Engineering & Management Indian Institute of Technology, Kharagpur Lecture - 02 Introduction Part II Welcome to all of you

More information

Organizational Structure and Policies

Organizational Structure and Policies Organizational Structure and Policies I. Introduction The purpose of this document is to describe the organizational structure and development process for the Stewardship Index for Specialty Crops. The

More information