SlideShare a Scribd company logo
1 of 22
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
1
Shawn M. Galloway
President, Chief Operating Officer
ProAct Safety, Inc.
How to Establish a Culture of
Safety Excellence
®
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
2
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
3
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
4
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
5
1. How is
safety
excellence
defined in our
organization?
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
6
Misunderstanding Safety
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
7
The Bridge to Safety Excellence™
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
8
2. What would
be common
when we
achieve safety
excellence?
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
9
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
10
Safety Culture is a Byproduct
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
11
3. What is
the safety
excellence
strategy &
can our
culture carry
it out?
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
12
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
13
Safety Excellence Goal
Means FlowdownSM
Safety Excellence Vision
Transformational Safety
Data (Where We Are Now)
Injury/Accident Prevention
Goals
Strategic Priorities:
Objectives To Close Gap
Initiatives That Support
Objectives
Executive Summary
(Where We Are, Why?)
Balanced Scorecard
Cultural Data (Where We
Are Now)
Culture Enhancement
Goals Focusing on Core
Safety Values & Behaviors
to Close Gap
Strategic Priorities:
Objectives To Close Gap
Initiatives That Support
Objectives
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
14
4. What data
proactively
prioritize
initiatives &
validate
progress?
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
15
As You Get Closer to Zero
Lagging Indicators • Results
Leading Indicators • Desirable
Activities
Transformational
Indicators
• The
Contribution
of Value
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
16
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
17
5. What
do we
need to
stop
doing?
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
18
We
Consider
Stopping
If it…
Distracts
from or
Disrupts
Vision &
Strategy
Doesn’t Add
Value & Isn’t
Necessary
Demotivates
Upsets
Customers
Creates
False Sense
of Security
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
19
Five Key Questions to Shape Your
Safety Culture
1. How is safety
excellence defined in
our organization?
2. What would be
common when we
achieve safety
excellence?
3. What is the safety
excellence strategy
& can our culture
carry it out?
4. What data
proactively prioritize
initiatives & validate
progress?
5. What do we need
to stop doing?
20
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
Shawn M. Galloway
President,
Chief Operating Officer
ProAct Safety Inc.
TEL: 936.273.8700
TF: 1.800.395.1347
info@ProActSafety.com
Weekly Podcasts: www.SafetyCultureExellence.com
Articles and Videos on Demand: www.ProActSafety.com/Insights
www.youtube.com/proactsafety
www.amazon.com/author/shawnmgalloway
www.twitter.com/safetyculture
www.linkedin.com/in/shawngalloway
www.facebook.com/proactsafety
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
21
OHSAS 18001 Training Courses
 OHSAS 18001 Introduction
1 Day Course
 OHSAS 18001 Foundation
2 Days Course
 OHSAS 18001 Lead Implementer
5 Days Course
 OHSAS 18001 Lead Auditor
5 Days Course
Exam and certification fees are included in the training price.
https://pecb.com/ohsas-18001-training-courses| www.pecb.com/events
Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited.
22
?
936.273.8700
info@ProActSafety.com
www.ProActSafety.com/Insights
www.linkedin.com/in/shawngalloway
www.twitter.com/safetyculture
www.facebook.com/proactsafety
THANK YOU

More Related Content

What's hot

Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINAL
Wayne Anderson
 
Building a Safety Culture
Building a Safety CultureBuilding a Safety Culture
Building a Safety Culture
Chris Chaparro
 
Security Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. ComplianceSecurity Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. Compliance
Joshua Berman
 

What's hot (20)

Compliance what does security have to do with it
Compliance what does security have to do with it Compliance what does security have to do with it
Compliance what does security have to do with it
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINAL
 
The Perspective of Today's Information Security Leader
The Perspective of Today's Information Security LeaderThe Perspective of Today's Information Security Leader
The Perspective of Today's Information Security Leader
 
Building a Safety Culture
Building a Safety CultureBuilding a Safety Culture
Building a Safety Culture
 
Doing Safety Better By Doing Less Safety
Doing Safety Better By Doing Less SafetyDoing Safety Better By Doing Less Safety
Doing Safety Better By Doing Less Safety
 
BCM and IT Security
BCM and IT SecurityBCM and IT Security
BCM and IT Security
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
Proactively building resilience
Proactively building resilienceProactively building resilience
Proactively building resilience
 
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
HIPAA HITECH Express Security Privacy Webinar
HIPAA HITECH Express Security Privacy WebinarHIPAA HITECH Express Security Privacy Webinar
HIPAA HITECH Express Security Privacy Webinar
 
Security Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. ComplianceSecurity Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. Compliance
 
Building a Safety Culture
Building a Safety CultureBuilding a Safety Culture
Building a Safety Culture
 
3 reasons why organizations will fail to manage iso 45001
3 reasons why organizations will fail to manage iso 450013 reasons why organizations will fail to manage iso 45001
3 reasons why organizations will fail to manage iso 45001
 
TMHE and EU-OSHA Reflect on Health and Safety Culture
TMHE and EU-OSHA Reflect on Health and Safety CultureTMHE and EU-OSHA Reflect on Health and Safety Culture
TMHE and EU-OSHA Reflect on Health and Safety Culture
 
How to Develop a Positive Safety Culture
How to Develop a Positive Safety CultureHow to Develop a Positive Safety Culture
How to Develop a Positive Safety Culture
 
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersHack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Safety Culture Power Point
Safety Culture Power PointSafety Culture Power Point
Safety Culture Power Point
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive Action
 
Improving Security Metrics
Improving Security MetricsImproving Security Metrics
Improving Security Metrics
 

Viewers also liked

Impact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing RiskImpact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing Risk
PECB
 

Viewers also liked (16)

7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation
 
6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk Management6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk Management
 
Verification Planning of Food Safety System
Verification Planning of Food Safety SystemVerification Planning of Food Safety System
Verification Planning of Food Safety System
 
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?
 
ISO 50001 – Why EnMS is important for organizations?
ISO 50001 – Why EnMS is important for organizations?ISO 50001 – Why EnMS is important for organizations?
ISO 50001 – Why EnMS is important for organizations?
 
Impact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing RiskImpact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing Risk
 
Building Practical Risk Application into your QMS
Building Practical Risk Application into your QMSBuilding Practical Risk Application into your QMS
Building Practical Risk Application into your QMS
 
Leveraging Gap Assessments and Internal Audits in ISO 22301
Leveraging Gap Assessments and Internal Audits in ISO 22301Leveraging Gap Assessments and Internal Audits in ISO 22301
Leveraging Gap Assessments and Internal Audits in ISO 22301
 
Integración entre la ISO 27001 y la certificación en continuidad de negocio I...
Integración entre la ISO 27001 y la certificación en continuidad de negocio I...Integración entre la ISO 27001 y la certificación en continuidad de negocio I...
Integración entre la ISO 27001 y la certificación en continuidad de negocio I...
 
The influence of Deming's 14 points to ISO 9001:2015
The influence of Deming's 14 points to ISO 9001:2015The influence of Deming's 14 points to ISO 9001:2015
The influence of Deming's 14 points to ISO 9001:2015
 
Key considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systemsKey considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systems
 
Risk assessment techniques a critical success factor
Risk assessment techniques a critical success factorRisk assessment techniques a critical success factor
Risk assessment techniques a critical success factor
 
Soluciones para la administración de Riesgos
Soluciones para la administración de RiesgosSoluciones para la administración de Riesgos
Soluciones para la administración de Riesgos
 

Similar to How to Establish a Culture of Safety Excellence

Similar to How to Establish a Culture of Safety Excellence (20)

Voices of Product: Discovery and Framing
Voices of Product: Discovery and FramingVoices of Product: Discovery and Framing
Voices of Product: Discovery and Framing
 
Avoid IT project failure 2017
Avoid IT project failure 2017Avoid IT project failure 2017
Avoid IT project failure 2017
 
Projects Are Evil - AgileCamp Dallas 2017
Projects Are Evil - AgileCamp Dallas 2017Projects Are Evil - AgileCamp Dallas 2017
Projects Are Evil - AgileCamp Dallas 2017
 
Switched on or switched off? What employee disengagement looks, feels and sou...
Switched on or switched off? What employee disengagement looks, feels and sou...Switched on or switched off? What employee disengagement looks, feels and sou...
Switched on or switched off? What employee disengagement looks, feels and sou...
 
DevOps is a Journey, Not an Event
DevOps is a Journey, Not an EventDevOps is a Journey, Not an Event
DevOps is a Journey, Not an Event
 
SnapLogic Culture Deck
SnapLogic Culture DeckSnapLogic Culture Deck
SnapLogic Culture Deck
 
SnapLogic Culture
SnapLogic CultureSnapLogic Culture
SnapLogic Culture
 
New Marketing for Insurance Agents & Brokers
New Marketing for Insurance Agents & BrokersNew Marketing for Insurance Agents & Brokers
New Marketing for Insurance Agents & Brokers
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
Transform Your Team from QA to Test Engineering
Transform Your Team from QA to Test EngineeringTransform Your Team from QA to Test Engineering
Transform Your Team from QA to Test Engineering
 
IDEXX IT’s Agile Journey
IDEXX IT’s Agile JourneyIDEXX IT’s Agile Journey
IDEXX IT’s Agile Journey
 
Fixing Intranet Search
Fixing Intranet SearchFixing Intranet Search
Fixing Intranet Search
 
Workshop Wednesdays: Customer Service Part 2: AMA with Jason and Nick
Workshop Wednesdays: Customer Service Part 2: AMA with Jason and NickWorkshop Wednesdays: Customer Service Part 2: AMA with Jason and Nick
Workshop Wednesdays: Customer Service Part 2: AMA with Jason and Nick
 
Getting to Yes: When No Means Not Yet
Getting to Yes: When No Means Not YetGetting to Yes: When No Means Not Yet
Getting to Yes: When No Means Not Yet
 
Keep Austin Agile 2017: Projects Are Evil
Keep Austin Agile 2017: Projects Are EvilKeep Austin Agile 2017: Projects Are Evil
Keep Austin Agile 2017: Projects Are Evil
 
Boost Business Acumen & Build Your Credibility
Boost Business Acumen & Build Your CredibilityBoost Business Acumen & Build Your Credibility
Boost Business Acumen & Build Your Credibility
 
Innovations in safety richard coleman
Innovations in safety richard colemanInnovations in safety richard coleman
Innovations in safety richard coleman
 
The Future of SaaS is Product Led. Are You Ready?
The Future of SaaS is Product Led. Are You Ready? The Future of SaaS is Product Led. Are You Ready?
The Future of SaaS is Product Led. Are You Ready?
 
Keys toSuccess: Business Intelligence Proven, Practical Strategies That Work
Keys toSuccess: Business Intelligence Proven, Practical Strategies That WorkKeys toSuccess: Business Intelligence Proven, Practical Strategies That Work
Keys toSuccess: Business Intelligence Proven, Practical Strategies That Work
 
Foresight & Entrepreneurship: University of Houston Spring Gathering 04.21.17
Foresight & Entrepreneurship: University of Houston Spring Gathering 04.21.17Foresight & Entrepreneurship: University of Houston Spring Gathering 04.21.17
Foresight & Entrepreneurship: University of Houston Spring Gathering 04.21.17
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

How to Establish a Culture of Safety Excellence

  • 1. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 1 Shawn M. Galloway President, Chief Operating Officer ProAct Safety, Inc. How to Establish a Culture of Safety Excellence ®
  • 2. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 2
  • 3. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 3
  • 4. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 4
  • 5. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 5 1. How is safety excellence defined in our organization?
  • 6. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 6 Misunderstanding Safety
  • 7. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 7 The Bridge to Safety Excellence™
  • 8. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 8 2. What would be common when we achieve safety excellence?
  • 9. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 9
  • 10. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 10 Safety Culture is a Byproduct
  • 11. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 11 3. What is the safety excellence strategy & can our culture carry it out?
  • 12. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 12
  • 13. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 13 Safety Excellence Goal Means FlowdownSM Safety Excellence Vision Transformational Safety Data (Where We Are Now) Injury/Accident Prevention Goals Strategic Priorities: Objectives To Close Gap Initiatives That Support Objectives Executive Summary (Where We Are, Why?) Balanced Scorecard Cultural Data (Where We Are Now) Culture Enhancement Goals Focusing on Core Safety Values & Behaviors to Close Gap Strategic Priorities: Objectives To Close Gap Initiatives That Support Objectives
  • 14. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 14 4. What data proactively prioritize initiatives & validate progress?
  • 15. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 15 As You Get Closer to Zero Lagging Indicators • Results Leading Indicators • Desirable Activities Transformational Indicators • The Contribution of Value
  • 16. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 16
  • 17. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 17 5. What do we need to stop doing?
  • 18. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 18 We Consider Stopping If it… Distracts from or Disrupts Vision & Strategy Doesn’t Add Value & Isn’t Necessary Demotivates Upsets Customers Creates False Sense of Security
  • 19. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 19 Five Key Questions to Shape Your Safety Culture 1. How is safety excellence defined in our organization? 2. What would be common when we achieve safety excellence? 3. What is the safety excellence strategy & can our culture carry it out? 4. What data proactively prioritize initiatives & validate progress? 5. What do we need to stop doing?
  • 20. 20 Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. Shawn M. Galloway President, Chief Operating Officer ProAct Safety Inc. TEL: 936.273.8700 TF: 1.800.395.1347 info@ProActSafety.com Weekly Podcasts: www.SafetyCultureExellence.com Articles and Videos on Demand: www.ProActSafety.com/Insights www.youtube.com/proactsafety www.amazon.com/author/shawnmgalloway www.twitter.com/safetyculture www.linkedin.com/in/shawngalloway www.facebook.com/proactsafety
  • 21. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 21 OHSAS 18001 Training Courses  OHSAS 18001 Introduction 1 Day Course  OHSAS 18001 Foundation 2 Days Course  OHSAS 18001 Lead Implementer 5 Days Course  OHSAS 18001 Lead Auditor 5 Days Course Exam and certification fees are included in the training price. https://pecb.com/ohsas-18001-training-courses| www.pecb.com/events
  • 22. Copyright © 2017, ProAct Safety, Inc., All Rights Reserved. Reproduction Prohibited. 22 ? 936.273.8700 info@ProActSafety.com www.ProActSafety.com/Insights www.linkedin.com/in/shawngalloway www.twitter.com/safetyculture www.facebook.com/proactsafety THANK YOU