Corporate Basel, 2015. Panalpina Security. "Adding value, while ensuring our customers' products are safe and secure"



Similar documents
Risk-Based Approach to Managing Supply Chain Security and Compliance

MSC Security Program Security in the Logistics Supply Chain

How To Protect Your Network From Attack From A Network Security Threat

Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards

Rail Carrier Security Criteria

Trusted Traders Programs Overview

Reputation. Further excellence. business continuity. risk management. Data security

Supply Chain Security Compliance Programs and Third Party Support

Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody

sdv.com DEFENSE & SECURITY

Costs and Benefits of Investing in Supply Chain Security Measures: Case Studies of Successful Experiences by Private Sector

Partners in Protection / C-TPAT Supply Chain Security Questionnaire

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

Supply Chain Security. Greg Stein Global Trade Compliance

Security Criteria for C-TPAT Foreign Manufacturers in English

Intermec Security Letter of Agreement

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Business Partner Program Guide

C-TPAT Executive Summary

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

CVS Pharmacy C-TPAT Requirements For Import Product Suppliers

Global Supply Chain Security Recommendations

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

The PNC Financial Services Group, Inc. Business Continuity Program

Intelligent Data Center Solutions

Kuehne + Nagel Contract Logistics. Finland

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Best Practices C-TPAT 5-Step Risk Assessment Process

SUPPLY CHAIN SECURITY IN THE 21 st CENTURY

Return the attached PPG Supply Chain Security Acknowledgement by , fax, or mail within two weeks from receipt.

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

A concise guide to mirroring your U.S. success in Canada

Managing Risk in the Global Supply Chain

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY

Infusing Technology to Mitigate Risk in the Supply Chain

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

APEC Private Sector. Supply Chain Security Guidelines

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand

CyberSecurity Solutions. Delivering

Third Party Approval & Risk Management

ASSET MANAGEMENT. solutions. smec.com

C-TPAT Importer Security Criteria

AEO program. (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan

Harmonized Risk Scoring-Advance Trade Data Internal Audit Report

Red Hat Cloud, HP Edition:

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Security in Space: Intelsat Information Assurance

Supply Chain Security Training Needs for Law Enforcement Agencies

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

Health Care Solutions

Cisco Security Optimization Service

The Role of the Information Governance & Standards Assurance Directorate Post- IGAR

Best Practice Strategies for Managing and Mitigating Key Cyber Risks. Brendan Saunders, Principal Security Consultant - November 2015

Building a Roadmap to Robust Identity and Access Management

Powering Today and Tomorrow. Energy Solutions

Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks

Framework for Enterprise Risk Management

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

The Authorized Economic Operator and the Small and Medium Enterprise FAQ

2 Gabi Siboni, 1 Senior Research Fellow and Director,

How to build a great compliance program for your U.S. imports

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

ASSET Connect. The next level in Critical Environment Operational Efficiency

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

How To Buy Nitro Security

Addressing the Global Supply Chain Threat Challenge Huawei, a Case Study

Ellipse The Enterprise Asset Management (EAM) solution for asset intensive industries

How To Be A Compliant Customs Organization

The Importance of Cyber Threat Intelligence to a Strong Security Posture

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Information Security Seminar 2013

FFIEC Cybersecurity Assessment Tool

Strengthen security with intelligent identity and access management

The PNC Financial Services Group, Inc. Business Continuity Program

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities

Why you should adopt the NIST Cybersecurity Framework

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

How To Manage An Ip Telephony Service For A Business

Strategies for assessing cloud security

Cyber security in an organization-transcending way

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

New Certified Company Program (NEEC) Reinforcing Supply Chain Security in Mexico NEEC Profile

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

Cyber Security & Compliance Briefing

Information Security Management System for Microsoft s Cloud Infrastructure

Implement a unified approach to service quality management.

Joint statement on supply-chain security

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

RSA ARCHER OPERATIONAL RISK MANAGEMENT

KNOW YOUR THIRD PARTY

Audit & Inspection Management. Enterprise Cloud Audit & Inspection Management Solution

Transcription:

Corporate Panalpina Security "Adding value, while ensuring our customers' products are safe and secure"

2 Corporate security mission & objective Panalpina Corporate Security has the primary goal to provide strategies that help identify, respond, and mitigate security risks throughout the supply chain. It is our team s mission to work closely with our customers and business partners to understand their needs and to deliver a solid foundation for current and future business ventures. - Kevin Johnson, Corporate Head of Security

3 Security team and organization Team and Commitment Organizational Structure Our Security team: Possess solid experience within applicable fields of supply chain/logistics, law enforcement, military, and government industries Maintain extensive engagement in national and international organizations and government sponsored programs This experience and influence allows the team to provide: A commitment to deliver robust and adaptable security solutions to meet our customers needs, and The flexibility to adapt to the ever-changing security environment Regional Head of Asia Pacific Manager Global Key Accounts Global Head of Function Regional Head of Europe Security Managers Regional Head of Middle East, Africa & CIS Risk Manager Regional Head of Americas Led by Corporate Security, a decentralized structure ensures alignment with organizational policies, while ensuring that each region of the world is appropriately managed for security * Panalpina Global Security team is available for emergency response 24/7

4 Security approach and methodology Approach Provide a balanced approach to security through customizable supply chain security measures that incorporate customer needs, applicable regulatory requirements, and industry standards (i.e. AEO, C-TPAT, TAPA, etc.) Develop and maintain strong partnerships with our customers through routine/frequent communications and collaborative working relationships to instill effective and feasible security Methodology Align and imbed security in contractual and daily business/ operational processes Continuous analysis and assessment of: The risk and security posture of our supply chain network Existing security processes (procedures, guidance documents, subcontractor performance, etc.) Implementation of new technology solutions to increase efficiencies and streamline security operations Outcome Combining our customer focused approach with our high level security methodology Equates to: Value added solutions that enhance supply chain security

5 Applying our customer focused approach and methodology to produce effective security solutions and initiatives Our solutions and initiatives focus on mitigating supply chain loss through proactive procedures and policies, coupled with robust investigative measures: Participation and compliance with government requirements and programs Loss prevention initiatives that strengthen the handling of shipments throughout the supply chain (i.e. Highly Vulnerable Cargo program, Driver security guidelines, physical security protocols, gap analysis/risk assessment, etc.) Automation of supply chain risk assessment processes and security incident management tracking/reporting In-depth security awareness for employees, contractors, and subcontractors Interactive consultation with customers to proactively remedy security issues/incidents Analysis and dissemination of security intelligence information to our network

Degree of working partnership with customers Corporate Security 6 Security in the customer business model Reactive security Involve security only after incident occurs Mitigation measures occur as a result of incident Manage incident while or after incident occurs Potential loss: Very High Proactive security Supply Chain Security engaged early in tender/ RFQ process Maintain compliance with security requirements (per contract/sow) Develop and employ appropriate security and communications protocols Planned response protocol for security incidents in place Potential loss: Moderate-High Integrated security Security processes are embedded in daily operations (execution, monitoring, reporting) HVC shipments are securely transported/stored (per SOP, guidelines and SOW/contract) Supply Chain Security is routinely consulted/ engrained in your business strategy Response protocols are continuously evaluated Communications with customer are routinely used Resiliency established Potential loss: Low Degree of security effectiveness

7 Security portfolio Policy Documented Security Plans Standard Operating Procedures & Guidelines Global Security Organization & Resources Awareness Education & Training Industry Best Practices Security Pre-alert Program Customer Updates Risk Mitigation Identify & Prevent incidents Risk Assessments (Facility, Route, End-to-End Supply Chain) High Vulnerable Cargo (HVC) security Mitigation Strategies Physical Security Access Controls Intrusion Detection & Alarm Systems Digital Video Recording systems/cctv Cargo/Vehicle Tracking Drivers Rules & Guidance Personnel Security Background Checks Information Security Controls Restricted Access to Controlled Areas Incident Management Global Incident Reporting Incident Notification & Escalation Procedures Incident Response & Investigations Customer Communication Compliance Subcontractor Management Compliance Audits Government Security & Regulatory Compliance Programs (AEO, BASC, C-TPAT, STP, TSA, etc.)

8 Participation in government regulatory initiatives & public/private sector programs Panalpina participates and holds certifications in international government and industry sponsored security and customs programs, to include, but not limited to: World Customs Organization (WCO): Authorized Economic Operator (AEO) Business Alliance for Secure Commerce (BASC): Latin America U.S. Customs & Border Protection: Customs-Trade Partnership Against Terrorism (C-TPAT) U.S. Transportation Security Administration (TSA): Indirect Air Carrier Standard Security Program (IACSSP) and Certified Cargo Screening Facility (CCSF) Canada Border Services Agency (CBSA): Partners in Protection (PIP) Singapore Customs: Secure Trade Partnership (STP) Transported Asset Protection Association (TAPA): FSR certified warehouses

9 Summary Our focus is to ensure the safe and secure handling of our customers products throughout the supply chain network Under the current economic environment, vulnerabilities from criminal activity and terrorism continue to pose a risk and threat Panalpina is committed to combating these security issues, while providing value to our customers through security enhancements, such as: Employing a risk management approach, that incorporates security and intelligence information with customizable solutions Continuously re-evaluating procedures and programs to ensure applicability and effectiveness for the changing security environment Enhancing security vigilance and awareness within our supply chain network Automating existing processes to streamline security operations and enhance reporting and communications

10 Thank you for your attention Key contact information PANALPINA Erik Jensen Corporate Security Manager Global Key Accounts erik.jensen@panalpina.com Kevin Johnson Corporate Head of Security kevin.johnson@panalpina.com