SlideShare a Scribd company logo
Table of Contents
2Copyright Crest Advisory Africa (Pty) Ltd: 2018
• Introduction
• Definitions
• Internal and External Stakeholders
• Clashes with Stakeholders (Case Study)
• Human rights and Risk Management (ERM & Security)
• Use of force
• Subcontractor management (Anti Corruption)
• Internal audit of Security environment
• Questions
Introduction: Nico snyman
3Copyright Crest Advisory Africa (Pty) Ltd: 2018
• Was a high ranking policemen, serving in the pre-apartheid regime within the
Policing Intelligence services (Covert Operations) and in 1998 was appointed as
Brigadier in the Meadowlands area of Soweto (Overt Policing). Managing a
community of over 500 000 people
• In 2007 I was appointed as the Executive (Risk and Security) for the Gautrain
Construction project, the biggest project globally between 2007 and 2011.
• In 2009 I was appointed the Executive for Risk and Security to Operate this Rapid
Transport system till 2013
• 2014 established Crest Advisory Services, specialising in Risk (ISO 31000), Internal
Audit (ISO 19011), Compliance (ISO 19600), Business Continuity (ISO 22301) and
Quality (ISO 9001)
Definitions
4Copyright Crest Advisory Africa (Pty) Ltd: 2018
• Security (ISO 18788)
• condition of being protected against hazards, threats, risks (3.50), or loss
• Risk (ISO 73, 31000)
• effect of uncertainty on objectives (3.33)
• Objectives (ISO 18788)
• result to be achieved
Internal Context (ISO 73)
5Copyright Crest Advisory Africa (Pty) Ltd: 2018
Internal environment in which the organization seeks to achieve its objectives
• governance, organizational structure, roles and accountabilities;
• policies, objectives, and the strategies that are in place to achieve them;
• the capabilities, understood in terms of resources and knowledge (e.g. capital,
time, people, processes, systems and technologies);
• information systems, information flows and decision- making processes (both
formal and informal);
• relationships with, and perceptions and values of internal stakeholders;
• the organization's culture;
external Context (ISO 73)
6Copyright Crest Advisory Africa (Pty) Ltd: 2018
External environment in which the organization seeks to achieve its objectives
NOTE: External context can include:
• the cultural, social, political, legal, regulatory, financial, technological, economic,
natural and competitive environment, whether international, national, regional or
local;
• key drivers and trends having impact on the objectives of the organization; and
• relationships with, and perceptions and values of external stakeholders
Security and enterprise risk
7Copyright Crest Advisory Africa (Pty) Ltd: 2018
Clashes with Stakeholders
• Marikana (South Africa)
• North Mara (Tanzania)
– Clashes
– Deaths
– Killings (Research)
• Hospitals
– Shocking robbery at health center
– Emergency Services
8Copyright Crest Advisory Africa (Pty) Ltd: 2018
Investors Confidence
• Barrick investors find it tough to stay positive
– Commercial Export Ban on all gold concentrate out of Tanzania
– Localization
• Marikana
– Violent scenes at the Lonmin Marikana mine could shake investor
confidence. Analysts are warning that if it's not nipped in the bud, long
term implications for the economy will be bad. (You Tube)
– 18% decrease in share prices, billions lost
9Copyright Crest Advisory Africa (Pty) Ltd: 2018
Human rights protection (1)
• establish and maintain a transparent governance and management
framework in order to deter, detect, monitor, address ,and prevent the
occurrence and recurrence of incidents that have adverse impacts on
human rights and fundamental freedoms;
• identify and operate in accordance with applicable international, national
and local laws and regulations;
• conduct comprehensive internal and external risk assessments
associated with safety, security and human rights risks;
• implement risk control measures that support the rule of law, respect
human rights of stakeholders, protect the interests of
10Copyright Crest Advisory Africa (Pty) Ltd: 2018
Human rights protection (2)
• the organization and its clients, and provide professional services;
• ensure suitable and sufficient operational controls based on identified
risks are implemented and managed to enhance the occupational health
and safety and the welfare of persons working on behalf of the
organization;
• effectively with public and private stakeholders; communicate and
consult
• conduct effective screening and training of persons working on the
organizations behalf;
11Copyright Crest Advisory Africa (Pty) Ltd: 2018
Human rights protection (3)
• ensure that the use of force is reasonably necessary, proportional and
lawful;
• conduct performance evaluations of services rendered and the
achievement of objectives;
• develop and implement systems for reporting and investigating
allegations of violations of international law, local law or human rights, as
well as mitigating and remedying the consequences of undesirable or
disruptive events.
12Copyright Crest Advisory Africa (Pty) Ltd: 2018
7 Indicators of Voluntary principles
on security & Human Rights (VRSHR)
13Copyright Crest Advisory Africa (Pty) Ltd: 2018
Cat Description
1 Labor and working conditions
2 Indigenous peoples (Localization)
3 Economic, social and cultural rights
4 Environment and health and safety
5 Land rights
6 Security
7 Anti-corruption
Recommendations from VPSHR
• Due diligence, including human rights–related due diligence, on new and
renewing vendors, and self-certification of a Supplier Code of Ethics;
• Investigations and audits of contractors where complaints are lodged
(including complaints by contractor employees);
• Dismissing contractors who fail to comply with the policies or the law;
• A risk assessment in the supply chain;
• Environmental monitoring, along with policies, procedures and a
management system that includes audits and assessments; and
• Enhanced human resources policies, procedures and training related to
sexual harassment and discrimination more generally.
14Copyright Crest Advisory Africa (Pty) Ltd: 2018
Use of force continuum
15Copyright Crest Advisory Africa (Pty) Ltd: 2018
Use of Force Continuum (1)
16Copyright Crest Advisory Africa (Pty) Ltd: 2018
Force
Option
Description Defence and Control Technique
1 Officer presence in
Uniform
2 Verbal
commands/cooperativ
e controls
• Compliance Holds
• Pressure Point Control Tactics
• Escort Technique
• Light Subject Control
• Above Could be applied with or without Tonfa Baton or other
Impact Instruments
3 Empty-hand
submission techniques
• PPCT – Pressure Point Control Tactics, Control Tactics,
techniques – a level of force that has a low probability of
causing soft connective tissue damage or bone fractures. This
would include joint manipulation techniques, applying
pressure to pressure points and normal application of hand-
cuffs
Use of Force Continuum (2)
17Copyright Crest Advisory Africa (Pty) Ltd: 2018
Force
Optio
n
Description Defence and Control Technique
4 Hard control
Techniques/Agressive
response techniques
• the amount of force that has a probability of causing soft
connective tissue damage or bone fractures or irritation of the
skin, eyes, and mucus membranes. This would include kicks,
punches, stuns and use of aerosol sprays such as oleoresin
capsicum (OC) pepper spray. Some models split these techniques
between empty hand, soft control and intermediate weapon
techniques but only include 5 levels of the continuum
5 Intermediate weapons • an amount of force that would have a high probability of causing
soft connective tissue damage or bone fractures. (e.g. expandable
baton, baton, pepper spray, Taser, beanbag rounds, rubber fin
stabilized ammunition, Mace (spray), police dogs, etc.)
Intermediate weapon techniques are designed to impact muscles,
arms and legs, and intentionally using an intermediate weapon
on the head, neck, groin, knee caps, or spine would be classified
as deadly or lethal force
6 Lethal force /
Deadly force
• a force with a high probability of causing death or serious bodily
injury. Serious bodily injury includes unconsciousness, protracted
or obvious physical disfigurement, or protracted loss of or
impairment to the function of a bodily member, organ, or the
mental faculty. A firearm is the most widely recognized lethal or
deadly force weapon, however, an automobile or weapon of
opportunity could also be defined as a deadly force utility
Supply Chain Contractor Mapping
18Copyright Crest Advisory Africa (Pty) Ltd: 2018
Enables to ask the right questions
19Copyright Crest Advisory Africa (Pty) Ltd: 2018
Reporting with confidence
20Copyright Crest Advisory Africa (Pty) Ltd: 2018
Competency and training
21Copyright Crest Advisory Africa (Pty) Ltd: 2018
Risk based Internal audit on security
operations
22Copyright Crest Advisory Africa (Pty) Ltd: 2018
• Critical competence on security
• Need to know:
• Technical environment
• Knowledge and skills regarding the range of systems
available for implementation
• Security Technology is the fastest growing industry globally,
keep current and relevant.
• Operational Environment (Context)
• Security Principles
• Crime Prevention through Environmental design (CPTED)
• Zero Tolerance Approach
• Broken Window Principle
ISO 31000
Training Courses
• ISO 31000 Introduction
1 Day Course
• ISO 31000 Foundation
2 Days Course
• ISO 31000 Risk Manager
3 Days Course
• ISO 31000 Lead Risk Manager
5 Days Course
Exam and certification fees are included in the training price.
www.pecb.com/en/education-and-certification-for-individuals/iso-31000
www.pecb.com/events
THANK YOU
?
nico@crestadvisoryafrica.com
www.crestadvisoryafrica.com
linkedin.com/in/nico-snyman-43b820a4

More Related Content

What's hot

The secret of a successful Crisis Management & Continuity Plan
The secret of a successful Crisis Management & Continuity PlanThe secret of a successful Crisis Management & Continuity Plan
The secret of a successful Crisis Management & Continuity Plan
PECB
 
Understanding disaster
Understanding disasterUnderstanding disaster
Understanding disaster
Samarth Sojitra
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State University
Atlantic Training, LLC.
 
Islamic finance
Islamic finance Islamic finance
Islamic finance
Asif Jamal
 
Monthly Khazina-e-Ruhaniyaat October'23 (Vol.14, Issue 6)
Monthly Khazina-e-Ruhaniyaat October'23 (Vol.14, Issue 6)Monthly Khazina-e-Ruhaniyaat October'23 (Vol.14, Issue 6)
Monthly Khazina-e-Ruhaniyaat October'23 (Vol.14, Issue 6)
Darul Amal Chishtia
 
Q&A about quality control management
Q&A about quality control managementQ&A about quality control management
Q&A about quality control management
Izzah Noah
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
ishan parikh production
 
Operations Risk Management
Operations Risk ManagementOperations Risk Management
Operations Risk Management
Medlin Rozario
 
ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
H Contrex
 
TAKAFUL (ISLAMIC INSURANCE) vs CONVENTIONAL INSURANCE
TAKAFUL (ISLAMIC INSURANCE) vs CONVENTIONAL INSURANCETAKAFUL (ISLAMIC INSURANCE) vs CONVENTIONAL INSURANCE
TAKAFUL (ISLAMIC INSURANCE) vs CONVENTIONAL INSURANCE
Nurul Shareena Misran
 

What's hot (10)

The secret of a successful Crisis Management & Continuity Plan
The secret of a successful Crisis Management & Continuity PlanThe secret of a successful Crisis Management & Continuity Plan
The secret of a successful Crisis Management & Continuity Plan
 
Understanding disaster
Understanding disasterUnderstanding disaster
Understanding disaster
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State University
 
Islamic finance
Islamic finance Islamic finance
Islamic finance
 
Monthly Khazina-e-Ruhaniyaat October'23 (Vol.14, Issue 6)
Monthly Khazina-e-Ruhaniyaat October'23 (Vol.14, Issue 6)Monthly Khazina-e-Ruhaniyaat October'23 (Vol.14, Issue 6)
Monthly Khazina-e-Ruhaniyaat October'23 (Vol.14, Issue 6)
 
Q&A about quality control management
Q&A about quality control managementQ&A about quality control management
Q&A about quality control management
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
 
Operations Risk Management
Operations Risk ManagementOperations Risk Management
Operations Risk Management
 
ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
 
TAKAFUL (ISLAMIC INSURANCE) vs CONVENTIONAL INSURANCE
TAKAFUL (ISLAMIC INSURANCE) vs CONVENTIONAL INSURANCETAKAFUL (ISLAMIC INSURANCE) vs CONVENTIONAL INSURANCE
TAKAFUL (ISLAMIC INSURANCE) vs CONVENTIONAL INSURANCE
 

Similar to The Impact of Security Operations Management in Risk Management

The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
Chinatu Uzuegbu
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
Trilateral Research
 
Cyber Risk in the Energy Industry
Cyber Risk in the Energy IndustryCyber Risk in the Energy Industry
Cyber Risk in the Energy Industry
Tim Christ Executive Leadership
 
Fastest Income Opportunity
Fastest Income OpportunityFastest Income Opportunity
Fastest Income Opportunity
sudhirmuddu
 
What are the Voluntary Principles on Security and Human Rights?
What are the Voluntary Principles on Security and Human Rights?What are the Voluntary Principles on Security and Human Rights?
What are the Voluntary Principles on Security and Human Rights?
Ethical Sector
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Shawn Tuma
 
Nastec Corporate Profile
Nastec Corporate ProfileNastec Corporate Profile
Nastec Corporate Profile
Millicent Agoncillo-Obregon
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and Controls
Rd. R. Agung Trimanda
 
U0501.pdf
U0501.pdfU0501.pdf
U0501.pdf
sandy735877
 
Titas Global Ltd
Titas Global LtdTitas Global Ltd
Titas Global Ltd
Andrew Newcombe
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
TrustArc
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
Jacqueline Fick
 
Intelligence-Led Political & Security Risk Management in Africa
Intelligence-Led Political & Security Risk Management in AfricaIntelligence-Led Political & Security Risk Management in Africa
Intelligence-Led Political & Security Risk Management in Africa
David Barske
 
Spengler chap03
Spengler chap03Spengler chap03
Spengler chap03
medinajg
 
Cyber Security Risk Management
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk Management
Shaun Sloan
 
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTESINITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
May Martinsen
 
Thomson Reuters Third Party Risk Solutions
Thomson Reuters Third Party Risk SolutionsThomson Reuters Third Party Risk Solutions
Thomson Reuters Third Party Risk Solutions
Paul Authachinda
 
MCRB Presents on Child Labour Issues at the Launch of Report on the Myanmar F...
MCRB Presents on Child Labour Issues at the Launch of Report on the Myanmar F...MCRB Presents on Child Labour Issues at the Launch of Report on the Myanmar F...
MCRB Presents on Child Labour Issues at the Launch of Report on the Myanmar F...
Ethical Sector
 
GROUP-1-PPT.pptx
GROUP-1-PPT.pptxGROUP-1-PPT.pptx
GROUP-1-PPT.pptx
JOSHUABALLESTEROS4
 
Doculabs 2014 risk and compliance practice introduction finance
Doculabs 2014   risk and compliance practice introduction financeDoculabs 2014   risk and compliance practice introduction finance
Doculabs 2014 risk and compliance practice introduction finance
Scott Swanson , CFE, CFCI
 

Similar to The Impact of Security Operations Management in Risk Management (20)

The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
Cyber Risk in the Energy Industry
Cyber Risk in the Energy IndustryCyber Risk in the Energy Industry
Cyber Risk in the Energy Industry
 
Fastest Income Opportunity
Fastest Income OpportunityFastest Income Opportunity
Fastest Income Opportunity
 
What are the Voluntary Principles on Security and Human Rights?
What are the Voluntary Principles on Security and Human Rights?What are the Voluntary Principles on Security and Human Rights?
What are the Voluntary Principles on Security and Human Rights?
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
 
Nastec Corporate Profile
Nastec Corporate ProfileNastec Corporate Profile
Nastec Corporate Profile
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and Controls
 
U0501.pdf
U0501.pdfU0501.pdf
U0501.pdf
 
Titas Global Ltd
Titas Global LtdTitas Global Ltd
Titas Global Ltd
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Intelligence-Led Political & Security Risk Management in Africa
Intelligence-Led Political & Security Risk Management in AfricaIntelligence-Led Political & Security Risk Management in Africa
Intelligence-Led Political & Security Risk Management in Africa
 
Spengler chap03
Spengler chap03Spengler chap03
Spengler chap03
 
Cyber Security Risk Management
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk Management
 
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTESINITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
 
Thomson Reuters Third Party Risk Solutions
Thomson Reuters Third Party Risk SolutionsThomson Reuters Third Party Risk Solutions
Thomson Reuters Third Party Risk Solutions
 
MCRB Presents on Child Labour Issues at the Launch of Report on the Myanmar F...
MCRB Presents on Child Labour Issues at the Launch of Report on the Myanmar F...MCRB Presents on Child Labour Issues at the Launch of Report on the Myanmar F...
MCRB Presents on Child Labour Issues at the Launch of Report on the Myanmar F...
 
GROUP-1-PPT.pptx
GROUP-1-PPT.pptxGROUP-1-PPT.pptx
GROUP-1-PPT.pptx
 
Doculabs 2014 risk and compliance practice introduction finance
Doculabs 2014   risk and compliance practice introduction financeDoculabs 2014   risk and compliance practice introduction finance
Doculabs 2014 risk and compliance practice introduction finance
 

More from PECB

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 

More from PECB (20)

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 

Recently uploaded

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 

Recently uploaded (20)

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 

The Impact of Security Operations Management in Risk Management

  • 1.
  • 2. Table of Contents 2Copyright Crest Advisory Africa (Pty) Ltd: 2018 • Introduction • Definitions • Internal and External Stakeholders • Clashes with Stakeholders (Case Study) • Human rights and Risk Management (ERM & Security) • Use of force • Subcontractor management (Anti Corruption) • Internal audit of Security environment • Questions
  • 3. Introduction: Nico snyman 3Copyright Crest Advisory Africa (Pty) Ltd: 2018 • Was a high ranking policemen, serving in the pre-apartheid regime within the Policing Intelligence services (Covert Operations) and in 1998 was appointed as Brigadier in the Meadowlands area of Soweto (Overt Policing). Managing a community of over 500 000 people • In 2007 I was appointed as the Executive (Risk and Security) for the Gautrain Construction project, the biggest project globally between 2007 and 2011. • In 2009 I was appointed the Executive for Risk and Security to Operate this Rapid Transport system till 2013 • 2014 established Crest Advisory Services, specialising in Risk (ISO 31000), Internal Audit (ISO 19011), Compliance (ISO 19600), Business Continuity (ISO 22301) and Quality (ISO 9001)
  • 4. Definitions 4Copyright Crest Advisory Africa (Pty) Ltd: 2018 • Security (ISO 18788) • condition of being protected against hazards, threats, risks (3.50), or loss • Risk (ISO 73, 31000) • effect of uncertainty on objectives (3.33) • Objectives (ISO 18788) • result to be achieved
  • 5. Internal Context (ISO 73) 5Copyright Crest Advisory Africa (Pty) Ltd: 2018 Internal environment in which the organization seeks to achieve its objectives • governance, organizational structure, roles and accountabilities; • policies, objectives, and the strategies that are in place to achieve them; • the capabilities, understood in terms of resources and knowledge (e.g. capital, time, people, processes, systems and technologies); • information systems, information flows and decision- making processes (both formal and informal); • relationships with, and perceptions and values of internal stakeholders; • the organization's culture;
  • 6. external Context (ISO 73) 6Copyright Crest Advisory Africa (Pty) Ltd: 2018 External environment in which the organization seeks to achieve its objectives NOTE: External context can include: • the cultural, social, political, legal, regulatory, financial, technological, economic, natural and competitive environment, whether international, national, regional or local; • key drivers and trends having impact on the objectives of the organization; and • relationships with, and perceptions and values of external stakeholders
  • 7. Security and enterprise risk 7Copyright Crest Advisory Africa (Pty) Ltd: 2018
  • 8. Clashes with Stakeholders • Marikana (South Africa) • North Mara (Tanzania) – Clashes – Deaths – Killings (Research) • Hospitals – Shocking robbery at health center – Emergency Services 8Copyright Crest Advisory Africa (Pty) Ltd: 2018
  • 9. Investors Confidence • Barrick investors find it tough to stay positive – Commercial Export Ban on all gold concentrate out of Tanzania – Localization • Marikana – Violent scenes at the Lonmin Marikana mine could shake investor confidence. Analysts are warning that if it's not nipped in the bud, long term implications for the economy will be bad. (You Tube) – 18% decrease in share prices, billions lost 9Copyright Crest Advisory Africa (Pty) Ltd: 2018
  • 10. Human rights protection (1) • establish and maintain a transparent governance and management framework in order to deter, detect, monitor, address ,and prevent the occurrence and recurrence of incidents that have adverse impacts on human rights and fundamental freedoms; • identify and operate in accordance with applicable international, national and local laws and regulations; • conduct comprehensive internal and external risk assessments associated with safety, security and human rights risks; • implement risk control measures that support the rule of law, respect human rights of stakeholders, protect the interests of 10Copyright Crest Advisory Africa (Pty) Ltd: 2018
  • 11. Human rights protection (2) • the organization and its clients, and provide professional services; • ensure suitable and sufficient operational controls based on identified risks are implemented and managed to enhance the occupational health and safety and the welfare of persons working on behalf of the organization; • effectively with public and private stakeholders; communicate and consult • conduct effective screening and training of persons working on the organizations behalf; 11Copyright Crest Advisory Africa (Pty) Ltd: 2018
  • 12. Human rights protection (3) • ensure that the use of force is reasonably necessary, proportional and lawful; • conduct performance evaluations of services rendered and the achievement of objectives; • develop and implement systems for reporting and investigating allegations of violations of international law, local law or human rights, as well as mitigating and remedying the consequences of undesirable or disruptive events. 12Copyright Crest Advisory Africa (Pty) Ltd: 2018
  • 13. 7 Indicators of Voluntary principles on security & Human Rights (VRSHR) 13Copyright Crest Advisory Africa (Pty) Ltd: 2018 Cat Description 1 Labor and working conditions 2 Indigenous peoples (Localization) 3 Economic, social and cultural rights 4 Environment and health and safety 5 Land rights 6 Security 7 Anti-corruption
  • 14. Recommendations from VPSHR • Due diligence, including human rights–related due diligence, on new and renewing vendors, and self-certification of a Supplier Code of Ethics; • Investigations and audits of contractors where complaints are lodged (including complaints by contractor employees); • Dismissing contractors who fail to comply with the policies or the law; • A risk assessment in the supply chain; • Environmental monitoring, along with policies, procedures and a management system that includes audits and assessments; and • Enhanced human resources policies, procedures and training related to sexual harassment and discrimination more generally. 14Copyright Crest Advisory Africa (Pty) Ltd: 2018
  • 15. Use of force continuum 15Copyright Crest Advisory Africa (Pty) Ltd: 2018
  • 16. Use of Force Continuum (1) 16Copyright Crest Advisory Africa (Pty) Ltd: 2018 Force Option Description Defence and Control Technique 1 Officer presence in Uniform 2 Verbal commands/cooperativ e controls • Compliance Holds • Pressure Point Control Tactics • Escort Technique • Light Subject Control • Above Could be applied with or without Tonfa Baton or other Impact Instruments 3 Empty-hand submission techniques • PPCT – Pressure Point Control Tactics, Control Tactics, techniques – a level of force that has a low probability of causing soft connective tissue damage or bone fractures. This would include joint manipulation techniques, applying pressure to pressure points and normal application of hand- cuffs
  • 17. Use of Force Continuum (2) 17Copyright Crest Advisory Africa (Pty) Ltd: 2018 Force Optio n Description Defence and Control Technique 4 Hard control Techniques/Agressive response techniques • the amount of force that has a probability of causing soft connective tissue damage or bone fractures or irritation of the skin, eyes, and mucus membranes. This would include kicks, punches, stuns and use of aerosol sprays such as oleoresin capsicum (OC) pepper spray. Some models split these techniques between empty hand, soft control and intermediate weapon techniques but only include 5 levels of the continuum 5 Intermediate weapons • an amount of force that would have a high probability of causing soft connective tissue damage or bone fractures. (e.g. expandable baton, baton, pepper spray, Taser, beanbag rounds, rubber fin stabilized ammunition, Mace (spray), police dogs, etc.) Intermediate weapon techniques are designed to impact muscles, arms and legs, and intentionally using an intermediate weapon on the head, neck, groin, knee caps, or spine would be classified as deadly or lethal force 6 Lethal force / Deadly force • a force with a high probability of causing death or serious bodily injury. Serious bodily injury includes unconsciousness, protracted or obvious physical disfigurement, or protracted loss of or impairment to the function of a bodily member, organ, or the mental faculty. A firearm is the most widely recognized lethal or deadly force weapon, however, an automobile or weapon of opportunity could also be defined as a deadly force utility
  • 18. Supply Chain Contractor Mapping 18Copyright Crest Advisory Africa (Pty) Ltd: 2018
  • 19. Enables to ask the right questions 19Copyright Crest Advisory Africa (Pty) Ltd: 2018
  • 20. Reporting with confidence 20Copyright Crest Advisory Africa (Pty) Ltd: 2018
  • 21. Competency and training 21Copyright Crest Advisory Africa (Pty) Ltd: 2018
  • 22. Risk based Internal audit on security operations 22Copyright Crest Advisory Africa (Pty) Ltd: 2018 • Critical competence on security • Need to know: • Technical environment • Knowledge and skills regarding the range of systems available for implementation • Security Technology is the fastest growing industry globally, keep current and relevant. • Operational Environment (Context) • Security Principles • Crime Prevention through Environmental design (CPTED) • Zero Tolerance Approach • Broken Window Principle
  • 23. ISO 31000 Training Courses • ISO 31000 Introduction 1 Day Course • ISO 31000 Foundation 2 Days Course • ISO 31000 Risk Manager 3 Days Course • ISO 31000 Lead Risk Manager 5 Days Course Exam and certification fees are included in the training price. www.pecb.com/en/education-and-certification-for-individuals/iso-31000 www.pecb.com/events

Editor's Notes

  1. Marikana On 16 August 2012, the South African Police Service (SAPS) opened fire on a crowd of striking mineworkers at Marikana, in the North West Province.  The police killed 34 mineworkers, and left 78 seriously injured. Following the open fire assault - 250 of the miners were arrested. North Mara Police killed 65, injured 270 at Barrick mine in Tanzania, inquiry hears Deadly clashes continue at African Barrick gold mine Brussels On the morning of 22 March 2016, three coordinated suicide bombingsoccurred in Belgium: two at Brussels Airport in Zaventem, and one at Maalbeek metro station in central Brussels.[11] Thirty-two civilians and three perpetrators were killed, and more than 300 people were injured. Another bomb was found during a search of the airport. Islamic State of Iraq and the Levant (ISIL) claimed responsibility for the attacks.[12] The perpetrators belonged to a terrorist cell which had been involved in the November 2015 Paris attacks. The Brussels bombings happened shortly after a series of police raids targeting the group. The bombings were the deadliest act of terrorism in Belgium's history. The Belgian government declared three days of national mourning. Hospitals SICK people were held up at gunpoint and robbed by assailants pretending to be patients at the Hanover Park Community Health Centre
on Monday night. The Department of Health has now asked the community for assistance to ensure a safe environment at its facilities. Patients at the hospital were robbed of their belongings at gunpoint by suspects who pretended to be seeking medical attention. The department said four security personnel were on duty – at the main entrance, patrolling the fence and surrounding areas – when five people came in for medical attention. They were searched and no weapons were found. Shortly thereafter a witness, who asked not to be named, said the suspects, one of them with a gun, ran through the waiting room robbing people. Provincial Health Department spokesperson Monique Johnstone said the CCTV footage showed an unidentified object being thrown over the wall. Johnstone said the department viewed criminal attacks on staff and clients as an extremely serious matter, and extensive engagements were ongoing with police, Community Police Forums (CPF) and other safety organisations. “We cannot confirm how many people were robbed at the time or what items were stolen during the incident as we are waiting on the police report,” she said. Johnstone said the hospital had experienced a similar incident in August 2015. “The facility does not turn away people seeking health care, and it is most unfortunate and disturbing that criminals prey on those who are in real need of the service,” she said. The incident came hours after Health MEC Nomafrench Mbombo launched the Operation Khuseleka campaign at Tygerberg Hospital, which encourages co-operation among residents, the police, safety organisations and CPFs.
  2. https://icoca.ch/en/get-involved International Code of Conduct Organisation
  3. Voluntary Principles on Security and Human Rights (VRSHR) The third-party assessments tool used covers all potentially relevant human rights and hundreds of individual indicators.  The tool focuses on seven (7) categories where extractive companies commonly face the prospect of causing, contributing to or being linked to negative human rights impacts:  labor and working conditions; indigenous peoples; economic, social and cultural rights; environment and health and safety; land rights; security; and anti-corruption. Issues related to supply chain, third parties, and vulnerable peoples also are embedded throughout these seven categories.  Each of the categories includes several sub-categories, composed of multiple individual indicators, which feed into a three-part question for the sub-category. These questions are:  does management have a procedure to address the risk? What actions demonstrate that the procedure has been followed? Do stakeholders believe the company is respecting the human right at issue?
  4. Clause 4.1.4, ISO 18788