SlideShare a Scribd company logo
Auditing Security Management Systems and the
           Supply Chain: ISO28000
ASIS International 3rd Asia-Pacific Conference
 Wednesday 4 February 2009 11.50 - 12.35


                Dr. Marc Siegel
              ASIS International
           ISO/TC 8 Delegation Head

                                                 © 2008
Promoting Security in the Supply Chain
  Supplier – Manufacturer – Distributor – Retailer – Logistics




         Continuity in the supply chain is a key
       component of today's global marketplace
                                                                 © 2008
Globalization of Supply Chains
Disruption of the Supply Chain a Rising Threat

  •   Just-in-time manufacturing
  •   Outsourcing
  •   Global sourcing
  •   Specialized factories
  •   Centralized distribution
  •   Supply consolidation
  •   Reduction of the supplier base
  •   Volatility of demand
  •   Lack control procedures
                                                 © 2008
So What Could Happen?

 •   Human trafficking
 •   Contraband smuggling
 •   Theft
 •   Cyber-crime
 •   Internal sabotage
 •   Industrial sabotage
 •   Terrorism
 •   Counterfeiting
 •   Insurgency
 •   Bio-terrorism
 •   Wholesale and retail supply loss
 •   Organized crime
 •   WMD in containers
 •   Political disruptions
 •   $$$ Damages


                                        © 2008
What are the Consequences of an Incident?

  • Damage to tangibles:
     – Human and physical assets – property, products,
       infrastructure, personnel and the environment

  • Damage to intangibles:
     – Non-physical assets - reputation, market position, goodwill

  • The harm to the organization may include;
     –   Injury or serious harm to persons and property
     –   Business integrity
     –   Reputation
     –   Clients property
     –   Standing in industry community
     –   Regulatory issues

                                                                     © 2008
ISO 28000 to the Rescue




                          © 2008
The 28000 Series

  • Developed in response to demand from industry
    against a background of varying international security
    regimes.

  • Generic management specification to improve the
    security in supply chains.

  • Requires organizations to:
     – assess the security environment in which it operates
     – determine if adequate security measures are in place
     – improve performance

  • Designed to be a sound foundation for complying
    efficiently with other international, national and sector
    based security requirements and schemes.

                                                                © 2008
The ISO 28000 Series
Standards and codes of practice for supply chain security
• The 28000 series was developed to compliment the
  various international initiatives to facilitate uniform
  implementation worldwide.

 • ISO 28000 - Supply chain security
   management
    –   Published Sept. 2007
    –   Risked based model
    –   Plan, Do, Check, Act principles
    –   Designed for 1st, 2nd & 3rd party auditing

 • Certification Standard, similar to:
    – ISO 14001, OHSAS 18001, ISO 27001
                                                            © 2008
ISO 28000 Enables an Organization to:


 • Establish, implement, maintain and improve a
   security management system

 • Assure conformity with security management policy

 • Demonstrate such conformity

 • Seek certification/registration of conformity by an
   accredited third party organization

 • Make a self-determination and self-declaration of
   conformity


                                                         © 2008
Meet the Family




                  © 2008
ISO 28000 Series of Standards

 • ISO 28000:2007
   – Specification for security management systems for the supply
     chain
 • ISO 28001:2007
   – Security management systems for the supply chain -- Best
     practices for implementing supply chain security, assessments
     and plans -- Requirements and guidance
 • ISO 28003:2007
   – Security management systems for the supply chain --
     Requirements for bodies providing audit and certification of
     supply chain security management systems
 • ISO 28004:2007
   – Security management systems for the supply chain --
     Guidelines for the implementation of ISO 28000


                                                                     © 2008
What Does the ISO 28000 Address?

• ISO 28000 requires the organization to consider the
  likelihood of an event and all of its consequences
  including:

   – Physical failure threats and risks, such as functional failure,
     incidental damage, malicious damage or terrorist or criminal
     action

   – Operational threats and risks, including the control of the
     security, human factors and other activities which affect the
     organizations performance, condition or safety

   – Natural environmental events (storm, floods, etc.), which may
     render security measures and equipment ineffective

   – Factors outside of the organization's control, such as failures in
     externally supplied equipment and services


                                                                          © 2008
Built to Be Business Friendly

 • Suitable for all sizes and types of organizations that
   are involved in purchasing, manufacturing, service,
   storage, transportation and/or sales processes

 • Aligned with the globally accepted standards:
    – ISO 9001:2000 - Quality management
    – ISO 14001:2004 - Environmental management
    – ISO/IEC 27001:2005 - Information technology security

 • Supports consistent and integrated implementation
   and operation with related management standards.

 • One suitably designed management system can satisfy
   the requirements of all these standards

                                                             © 2008
The Standard Can Be Used to:

 • Demonstrate a robust and secure supply chain
   management system to regulators/authorities and other
   interested organizations
 • Demonstrate a robust and secure supply chain
   management system to their customers/potential
   customers
 • Provide a consistent approach by all service providers
   within a supply chain
 • Serve as the basis for an independent assessment
 • Demonstrate the ability to meet customer requirements
 • Improve services
                                                            © 2008
Commercial & Competitive Advantage

  • Unambiguous demonstration the
    organization takes security seriously
    – Customer confidence that their goods are
      protected
    – Increased brand equity through the clear
      demonstration of commitment to security
    – Benefit through increased market share and
      through customer retention
  • Increased organizational resilience
  • Brand and reputation protection

                                                   © 2008
Improved Management

• Effective management of security resources, resulting
  in cost savings

• Increased accountability at all levels

• Demonstrates effective corporate governance

• Improved safety and security for employees

• Improved staff and customer satisfaction

• Can be integrated with other internationally recognized
  management system standards
                                                            © 2008
Ports Worldwide Adopting ISO 28000

 •   September 2006 - DP World first to certify
      – HQ Dubai
      – Ports of Djibouti, Dubai, Vancouver (1st port in the Americas), Porto Caucedo
        (Dominican Republic- Latin American gateway to US), Southampton, Tilbury, Le
        Havre, Port of Busan, Korea
      – All Australia terminals undergoing implementation
      – DP World plans to certify all its ports/terminals

 •   March 2008 - Port of Houston Authority (PHA), Port Police has become the
     first port authority in the world to receive ISO 28000:2007 certification

 •   May 2008 - Singapore-based
     logistics and supply chain
     management company YCH
     Group becomes the first end-
     to-end Supply Chain
     Management (SCM) provider
     to receive the ISO 28000:
     2007 Certification.



                                                                                    © 2008
Mutual Recognition

 • ISO 28000 has been recognized by the EU Authorized
   Economic Operators (AEO) initiative as compliant to
   the AEO Safety and Security requirements

 • DP World’s ISO certification has been recognized by US
   Customs Border Protection, with the company uniquely
   being invited to join C-TPAT.

 • US Congress has recognized the relevance of 28000 to
   CTPAT and has tasked its research body, GAO, to
   confirm technical compatibility.
    – Companies that are ISO 28000 compliant may not have to
      qualify to join CTPAT but can now enjoy the benefits upon
      recognition.


                                                                  © 2008
ISO 28000 a New Member
  of the Family of ISO
  Management Systems
  Standards

          Identify risks, set priorities
            and establish dynamic
          programs and plans to cost
              effectively improve
                 performance
Generic framework for organizations of all sizes and types –
 private, public, faith-based or not-for-profit organizations.
                                                           © 2008
28000 is a Management System
• A management system is what the organization
  does to manage its processes, functions or
  activities.
  – Set of interrelated elements used to establish and
    achieve an organization’s policy and objectives.
  – Includes policies, organizational structure,
    responsibilities, planning activities, resources, practices,
    procedures and processes.
  – Allows an organization to create and manage its
    processes and activities to meet its business objectives.




                                                               © 2008
PDCA or APCI Model
 Approach to structured problem solving

Plan (Assess) - Do (Protect) - Check (Confirm) - Act (Improve)

                                     Plan
                              • Define & Analyze a
                            Problem and Identify the
                                  Root Cause



           Act                                                    Do
                                                           • Devise a Solution
   • Standardize Solution
                                                        • Develop Detailed Action
    • Review and Define
                                                          • Plan & Implement It
       Next Issues
                                                              Systematically



                                    Check
                              • Confirm Outcomes
                                  Against Plan
                            • Identify Deviations and
                                      Issues
                                                                                © 2008
Why Management Systems Work


 • Needs focused
 • Goals driven
 • People oriented
     – Leadership driven
     – Involves people at all levels
     – Promotes cultural change
 •   Emphasizes process approach
 •   System approach to management
 •   Factual basis for decision making
 •   Continual improvement

                                   Business Advantage
                                                        © 2008
Risk Management

 • Establishes risk management as proactive
   means of protecting the organization
   – Pragmatic and business-centric approach to
     risk management

   – Promotes risk management as a central
     component of effective management

   – Key decision making and commitment of
     resources is based on a process of effective
     risk assessment
                                                    © 2008
What Does the ISO 28000 Say?




              M Re .6
               an vi
                 ag ew
                                     Po




                   em
                                        lic
                                    4.2 y




                     en
                      4



                        t
                        Security
                       Management          Se
                                             cur
                  &
        Checking         System          As      it
                                            ses y risk
               tive                     Pla     s
         Correc                            nn ment
                 4.5                          ing
          Action                                   4.3
                       Implementation
                         & operation
                             4.4



     Standards Implementation Requires A
   Organization-wide Commitment to Security
                                                         © 2008
Start: Know your Organization
                                                                                                                                                    - Define scope and boundaries
                                                                                                                                                    for security, preparedness and
                                                                                                                                                   continuity management program
                                                                                                                                                 - Identify critical objectives, operation,
                                                                                                                                                     functions, products and services
                                                                                                                                               - Preliminary determination of likely risk
                                                                                                                                                    scenarios and consequences


                                                                                         Security Policy
           Management Review                                                             - Management Commitment
           - Adequacy and Effectiveness                                                  - Commitment to Protection of Critical Assets
           - Need for Changes                                                            - Commitment to Continuous Improvement
           - Opportunities for Improvement




                                                            Continual
                                                                                                              Planning
                                                          Improvement
Checking & Corrective Action                                                                                  - Risk Assessment
- Performance and Evaluation                                                                                  - Legal and Other Requirements
- Nonconformity, Corrective                                                                                   - Security Management Objectives
and Preventive Action
                                                                                                              - Security Management Targets
- Control of Records
                                                                                                              - Security Management Programs
- Audits




                                             Implementation and Operation
                                             - Structure, Authority and Responsibility
                                             - Competence, Training, & Awareness
                                             - Communication
                                             - Documentation
                                             - Document and Data Control
                                             - Operational Control
                                             - Emergency Preparedness, Response
                                             and Security Recovery                                                                                                                     © 2008
Start: Know your Organization
                                                                                                                                                    - Define scope and boundaries

                                                                                 Start: Know your Organization                                      for security, preparedness and
                                                                                                                                                   continuity management program
                                                                                                                                                 - Identify critical objectives, operation,
                                                                •        Define scope and boundaries for security,                                   functions, products and services


                                                                        preparedness and continuity management                                 - Preliminary determination of likely risk
                                                                                                                                                    scenarios and consequences

                                                                        program          Security Policy


                                                                •        Identify critical objectives, operation,
           Management Review                                                             - Management Commitment
           - Adequacy and Effectiveness                                                  - Commitment to Protection of Critical Assets
           - Need for Changes                                           functions, products and services
                                                                                         - Commitment to Continuous Improvement
           - Opportunities for Improvement

                                                                •        Preliminary determination of likely risk
                                                                        scenarios and consequences

                                                            Continual
                                                                                                              Planning
                                                          Improvement
Checking & Corrective Action                                                                                  - Risk Assessment
- Performance and Evaluation                                                                                  - Legal and Other Requirements
- Nonconformity, Corrective                                                                                   - Security Management Objectives
and Preventive Action
                                                                                                              - Security Management Targets
- Control of Records
                                                                                                              - Security Management Programs
- Audits




                                             Implementation and Operation
                                             - Structure, Authority and Responsibility
                                             - Competence, Training, & Awareness
                                             - Communication
                                             - Documentation
                                             - Document and Data Control
                                             - Operational Control
                                             - Emergency Preparedness, Response
                                             and Security Recovery                                                                                                                     © 2008
Start: Know your Organization
                                                                                                                                                    - Define scope and boundaries
                                                                                                                                                    for security, preparedness and
                                                                                                                                                   continuity management program
                                                                                                                                                 - Identify critical objectives, operation,
                                                                                                                                                     functions, products and services
                                                                                                                                               - Preliminary determination of likely risk
                                                                                                                                                    scenarios and consequences

                                                               Security Policy           Security Policy
           Management Review                                                             - Management Commitment
           - Adequacy and Effectiveness
           - Need for Changes
                                                               - Management Commitment   - Commitment to Protection of Critical Assets
                                                                                         - Commitment to Continuous Improvement
           - Opportunities for Improvement
                                                               - Commitment to Protection of Critical Assets
                                                               - Commitment to Continuous Improvement

                                                            Continual
                                                                                                              Planning
                                                          Improvement
Checking & Corrective Action                                                                                  - Risk Assessment
- Performance and Evaluation                                                                                  - Legal and Other Requirements
- Nonconformity, Corrective                                                                                   - Security Management Objectives
and Preventive Action
                                                                                                              - Security Management Targets
- Control of Records
                                                                                                              - Security Management Programs
- Audits




                                             Implementation and Operation
                                             - Structure, Authority and Responsibility
                                             - Competence, Training, & Awareness
                                             - Communication
                                             - Documentation
                                             - Document and Data Control
                                             - Operational Control
                                             - Emergency Preparedness, Response
                                             and Security Recovery                                                                                                                     © 2008
Start: Know your Organization
                                                                                                                                                    - Define scope and boundaries
                                                                                                                                                    for security, preparedness and
                                                                                                                                                   continuity management program
                                                                                                                                                 - Identify critical objectives, operation,
                                                                                                                                                     functions, products and services
                                                                                                                                               - Preliminary determination of likely risk
                                                                                                                                                    scenarios and consequences


                                                                                         Security Policy
           Management Review                                                             - Management Commitment
           - Adequacy and Effectiveness                                                  - Commitment to Protection of Critical Assets
           - Need for Changes                                                            - Commitment to Continuous Improvement
           - Opportunities for Improvement




                                                            Continual
                                                          Improvement
                                                                           Planning                           Planning
Checking & Corrective Action                                                                                  - Risk Assessment
- Performance and Evaluation                                               - Risk Assessment                  - Legal and Other Requirements
- Nonconformity, Corrective                                                                                   - Security Management Objectives
and Preventive Action
- Control of Records
                                                                           - Legal and Other Requirements     - Security Management Targets
                                                                                                              - Security Management Programs
- Audits
                                                                           - Security Management Objectives
                                                                           - Security Management Targets
                                             Implementation and Operation

                                                                           - Security Management Programs
                                             - Structure, Authority and Responsibility
                                             - Competence, Training, & Awareness
                                             - Communication
                                             - Documentation
                                             - Document and Data Control
                                             - Operational Control
                                             - Emergency Preparedness, Response
                                             and Security Recovery                                                                                                                     © 2008
Objectives, Targets and Programs

                          Policy                Road to Success
     Threats,
    Risks and        Legal / Other          Views of
     Impacts         Requirements          Interested
                                             Parties



                Objectives                           SMS
                    And
                                                   Program
                 Targets


Technology       Finance      Operations          Critical Assets
                                                                    © 2008
Start: Know your Organization
                                                                                                                                                      - Define scope and boundaries
                                                                                                                                                      for security, preparedness and
                                                                                                                                                     continuity management program
                                                                                                                                                   - Identify critical objectives, operation,
                                                                                                                                                       functions, products and services
                                                                                                                                                 - Preliminary determination of likely risk
                                                                                                                                                      scenarios and consequences


                                                                                           Security Policy
           Management Review                                                               - Management Commitment
           - Adequacy and Effectiveness                                                    - Commitment to Protection of Critical Assets
           - Need for Changes                                                              - Commitment to Continuous Improvement
           - Opportunities for Improvement


                                             Implementation and Operation
                                             • Structure, Authority and Responsibility
                                             • Competence, Training, and Awareness
                                                       Continual
                                                                                                                Planning
                                                     Improvement
                                             • Communication
Checking & Corrective Action                                                                                    - Risk Assessment
- Performance and Evaluation                                                                                    - Legal and Other Requirements
- Nonconformity, Corrective
                                             • Documentation
                                                                                                                - Security Management Objectives
and Preventive Action
                                                                                                                - Security Management Targets
- Control of Records
                                                                                                                - Security Management Programs
- Audits
                                             • Document and Data Control
                                             • Operational Control
                                               Implementation and Operation

                                             • Emergency Preparedness, Response
                                               - Structure, Authority and Responsibility
                                               - Competence, Training, & Awareness

                                             and Security Recovery
                                               - Communication
                                               - Documentation
                                               - Document and Data Control
                                               - Operational Control
                                               - Emergency Preparedness, Response
                                               and Security Recovery                                                                                                                     © 2008
Start: Know your Organization
                                                                                                                                                    - Define scope and boundaries
                                                                                                                                                    for security, preparedness and
                                                                                                                                                   continuity management program
                                                                                                                                                 - Identify critical objectives, operation,
                                                                                                                                                     functions, products and services
                                                                                                                                               - Preliminary determination of likely risk
                                                                                                                                                    scenarios and consequences


                                                                                         Security Policy
           Management Review                                                             - Management Commitment
           - Adequacy and Effectiveness                                                  - Commitment to Protection of Critical Assets
           - Need for Changes                                                            - Commitment to Continuous Improvement
           - Opportunities for Improvement




 Checking & Corrective Action
 - Security Performance Improvement
                         Monitoring
                          Continual
                                                                                                              Planning

 and Measurement
Checking & Corrective Action                                                                                  - Risk Assessment
- Performance and Evaluation                                                                                  - Legal and Other Requirements
- Nonconformity, Corrective
 - System Evaluation
                                                                                                              - Security Management Objectives
and Preventive Action
                                                                                                              - Security Management Targets
- Control of Records
                                                                                                              - Security Management Programs
 - Nonconformity, Corrective and
- Audits



 Preventive Action
                                             Implementation and Operation
 - Control of Records                        - Structure, Authority and Responsibility
                                             - Competence, Training, & Awareness

 - Audits                                    - Communication
                                             - Documentation
                                             - Document and Data Control
                                             - Operational Control
                                             - Emergency Preparedness, Response
                                             and Security Recovery                                                                                                                     © 2008
Start: Know your Organization
                                                                                                                                                     - Define scope and boundaries
                                                                                                                                                     for security, preparedness and
                                                                                                                                                    continuity management program

           Management Review                                                                                                                      - Identify critical objectives, operation,
                                                                                                                                                      functions, products and services
                                                                                                                                                - Preliminary determination of likely risk
                                                                                                                                                     scenarios and consequences

           - Adequacy and Effectiveness                                                   Security Policy
            Management Review                                                             - Management Commitment

           - Need for Changes
            - Adequacy and Effectiveness
            - Need for Changes
                                                                                          - Commitment to Protection of Critical Assets
                                                                                          - Commitment to Continuous Improvement
            - Opportunities for Improvement

           - Opportunities for Improvement


                                                             Continual
                                                                                                               Planning
                                                           Improvement
Checking & Corrective Action                                                                                   - Risk Assessment
- Performance and Evaluation                                                                                   - Legal and Other Requirements
- Nonconformity, Corrective                                                                                    - Security Management Objectives
and Preventive Action
                                                                                                               - Security Management Targets
- Control of Records
                                                                                                               - Security Management Programs
- Audits




                                              Implementation and Operation
                                              - Structure, Authority and Responsibility
                                              - Competence, Training, & Awareness
                                              - Communication
                                              - Documentation
                                              - Document and Data Control
                                              - Operational Control
                                              - Emergency Preparedness, Response
                                              and Security Recovery                                                                                                                     © 2008
There’s a Bottleneck

           Lead Auditors Needed




  Demand for implementation and certification is
currently outpacing the availability of lead auditors
                                                        © 2008
Types of Audits

• First Party
  – Internal audit of client
  – Self declaration
• Second Party
  – External non-certification audit
  – Contractually enforced (supply chain)
• Third Party
  – Audit by external certified auditors
  – Road to certification
                                            © 2008
Accreditation and Certification                                     Relevant Standards
        (Registration) Bodies
               Accreditation Bodies                      ISO/IEC 17011:2004
  An organization (usually a national standards body     Conformity assessment -- General requirements for accreditation
                                                         bodies accrediting conformity assessment bodies
 associated with ISO) that checks certification bodies
                                                         ISO/IEC 17040:2005
and, provided their certification assessment processes   Conformity assessment -- General requirements for peer
   pass muster, accredits them i.e. grants them the      assessment of conformity assessment bodies and accreditation
      authority to issue recognized certificates.        bodies




                  Certification                          ISO 28003:2007
                                                         Security management systems for the supply chain --
              (Registration) Bodies                      Requirements for bodies providing audit and certification of
 An independent external body that issues written        supply chain security management systems
  assurance (the certificate) that it has audited a      ISO/IEC 17021:2006
management system and verified that it conforms to       Conformity assessment -- Requirements for bodies providing
    the requirements specified in the standard.          audit and certification of management systems


                                                         Certified Lead Auditor
                                                         ISO 19011:2002
                                                         Guidelines for quality and/or environmental management
                                                         systems auditing

                   Organization
Implements standard – may seek formal recognition        ISO 28000:2007
  (certification) by a specialized third party body.     Specification for security management systems for the supply
                                                         chain




                                                                                                                        © 2008
Principles that Relate to Auditors

 • Ethical conduct: the foundation of professionalism

 • Fair presentation: the obligation to report truthfully
   and accurately

 • Due professional care: the application of diligence
   and judgement in auditing

 • Independence: the basis for the impartiality of the
   audit and objectivity of the audit conclusions

 • Evidence-based approach: the rational method for
   reaching reliable and reproducible audit conclusions in a
   systematic audit process

                                                               © 2008
Lead Auditor Certification

 • Knowledge of management systems
 • Knowledge of the standard being audit to, as
   well as normative documents
 • Principles of auditing based on ISO 19011
 • Technical knowledge of the activity being
   audited
 • Understanding risk assessment and
   management from a business perspective
 • General knowledge of regulatory requirements
 • Understanding of security, preparedness
   response and recovery management

                                                  © 2008
How Do I Become a Player?

ISO 28000 is Here – and Rapidly Gaining Momentum




                Your Ticket to Play
              BECOME A CERTIFIED
            ISO 28000 LEAD AUDITOR
                                                   © 2008
Course Objectives
 • Knowledge of a systematic and practical approach to security
   management system auditing

 • Broad understanding of the scope of security management
   system auditor responsibilities

 • Competency in organizing and directing audit team members

 • An in-depth understanding of the ISO 28000 and security risk
   management requirements

 • The ability to effectively provide management with objective
   advice regarding progress towards compliance and certification of
   security management systems

 • Demonstrable understanding of the intent and application of
   relevant Acts, Standards, Codes of Practice, and other documents
   relevant to regualtions and legislation
                                                                       © 2008
Key Session Topics

 • Plan, conduct, and report an actual audit and examine
   relevant case studies

 • Major elements and scope of risk management
   including definitions of common risk management
   terms

 • Structure and make-up of management system
   documentation

 • Roles and responsibilities for security management

 • Requirements and methods for ensuring continuous
   improvement

                                                           © 2008
Key Session Topics

 • Audit techniques and methodology according to:
    – ISO 28000:2007 Specification for Security Management
      Systems for the Supply Chain
    – ISO 31000 Risk Management
    – ISO 31010 Risk Assessment (Methodologies)
    – ASIS International Risk Assessment (Process)
    – ISO 19011:2003 Guidelines for Quality and/or Environmental
      Management (under revision to add risk-based processes)

 • Systems Auditing
    –   Security threat and vulnerability assessments
    –   Asset protection and loss protection
    –   IT and electronic security
    –   Personnel protection
    –   Risk to transport and infrastructure from terrorism
                                                                   © 2008
Competence of Auditors

 Competence =

 ∑ Personal attributes
 + Generic auditing knowledge and skills
 + Security, Preparedness, Response and
  Recovery specific knowledge and skills


                                           © 2008
Process
Flow for
Audit
Program




      © 2008
Authority to Audit
•    The organization’s top management should    Process
    grant the authority for managing the audit
    program.                                     Flow for
• Establish, implement, monitor, review and      Audit
  improve the audit program
• Identify the necessary resources and ensure    Program
  they are provided




                                                       © 2008
Process
                    Plan                    Flow for
•Objectives of an audit program             Audit
•Extent of an audit program
                                            Program
   • Scope, objective and duration
   • Standards, statutory, regulatory and
   contractual requirements
   • Language, cultural and social issues
•Audit program responsibilities
•Audit program resources
•Audit program procedures




                                                  © 2008
Competence and evaluation of auditors
  •                                           Process
        Competence = ∑ (Personal attributes) + (Generic
        auditing knowledge and skills) + (Security- knowledge
        and skills)                           Flow for
  •     Confidentiality and clearances
                                              Audit
                                              Program
                  Do
•Audit program implementation
      •communicating the audit coordinating and scheduling
      audits
      •establishing and maintaining a process for the evaluation
      of the auditors
      •selection of audit teams
      •providing necessary resources to the audit teams
      •conduct of audits according to the audit program
      •control of records of the audit activities
      •review and approval of audit reports,
      •audit follow-up
•Audit program records                                        © 2008
Process
                                                 Flow for
                                                 Audit
                                                 Program




                Check
- Audit program monitoring and reviewing
- Identify needs for corrective and preventive
actions
- Identify opportunities for improvement               © 2008
Process
                                         Flow for
                                         Audit
                                         Program


                 Act
- Improve the audit program
- Commitment to Continuous Improvement




                                               © 2008
Initiating the audit
  - appointing the audit team leader
  - defining audit objectives, scope and criteria
  - determining the feasibility of the audit
  - selecting the audit team
  - establishing initial contact with the auditee
                                                                       Overview
                    Conducting document review                         of typical
- reviewing relevant management system documents, including records,
and determining their adequacy with respect to audit criteria            audit
              Preparing for the on-site audit activities
                                                                       activities
- preparing the audit plan
- assigning work to the audit team
- preparing work documents


                 Conducting on-site audit activities
- conducting opening meeting
- communication during the audit
- roles and responsibilities of guides and observers
- collecting and verifying information
- generating audit findings
- preparing audit conclusions
- conducting closing meeting


       Preparing, approving and distributing the audit report
- preparing the audit report
- approving and distributing audit report


                        Completing the audit


                     Conducting audit follow-up
                                                                                    © 2008
Source of Information




Collecting and verifying information by
  appropriate sampling techniques         Collecting
                                          Information to
                                          Reach Audit
          Audit evidence
                                          Conclusions

   Evaluating against audit criteria




           Audit findings


              Reviewing



          Audit conclusions
                                                       © 2008
What Does the Future Hold?


                   • ISO 28002,
                     Resilience in the
                     Supply Chain
                   • ISO 28005, Ships and
                     marine technology -
                     Computer
                     applications -
                     Electronic port
                     clearance (EPC)


                                         © 2008
Thank You

           Dr. Marc Siegel
 Security Management System Consultant
            ASIS International
         Phone: +1-858-484-9855
    Email: siegel@ASIS-Standards.net
            siegel@ymail.com



                                         S

                                             © 2008

More Related Content

What's hot

ISO 9001:2015 Awareness
 ISO 9001:2015 Awareness  ISO 9001:2015 Awareness
ISO 9001:2015 Awareness
Dr Madhu Aman Sharma
 
Qms awareness training
Qms awareness trainingQms awareness training
Qms awareness training
shree
 
ISO 9001:2015 Documentation Requirements
ISO 9001:2015 Documentation RequirementsISO 9001:2015 Documentation Requirements
ISO 9001:2015 Documentation Requirements
GlenView Group, Inc.
 
OHSMS exam solutions Jan2018
OHSMS exam solutions Jan2018OHSMS exam solutions Jan2018
OHSMS exam solutions Jan2018
YasirNaveed8
 
ISO 9001, 14001, 45001 (IMS) basics training material
ISO 9001, 14001, 45001 (IMS) basics training materialISO 9001, 14001, 45001 (IMS) basics training material
ISO 9001, 14001, 45001 (IMS) basics training material
RanganathanR9
 
Iso 9001.2015 full module
Iso 9001.2015 full moduleIso 9001.2015 full module
Iso 9001.2015 full module
Md.Mahedi Hasan
 
Benefits of ISO Certification Services to Your Business
Benefits of ISO Certification Services to Your BusinessBenefits of ISO Certification Services to Your Business
Benefits of ISO Certification Services to Your Business
Compliancehelp Consulting, LLC
 
Internal Audit 03-03-16
Internal Audit 03-03-16Internal Audit 03-03-16
Internal Audit 03-03-16Lisa Barnes
 
What Documents are required for ISO 45001:2018 Certification?
What Documents are required for ISO 45001:2018 Certification?What Documents are required for ISO 45001:2018 Certification?
What Documents are required for ISO 45001:2018 Certification?
Global Manager Group
 
Walmart CTPAT Audit Report
Walmart CTPAT Audit ReportWalmart CTPAT Audit Report
Walmart CTPAT Audit ReportManoj Dnyanmothe
 
Integrated Management System Manual Template (Preview)
Integrated Management System Manual Template (Preview)Integrated Management System Manual Template (Preview)
Integrated Management System Manual Template (Preview)
Centauri Business Group Inc.
 
Intertek Presentation
Intertek PresentationIntertek Presentation
Intertek Presentationdnicholson11
 
Internal audit
Internal auditInternal audit
Internal audit
Hpm India
 
Road map to iso 9001 certification
Road map to iso 9001 certification  Road map to iso 9001 certification
Road map to iso 9001 certification
ssqiindia
 
Great ISO 14001 Compliance Obligations and Legal Requirements
Great ISO 14001 Compliance Obligations and Legal RequirementsGreat ISO 14001 Compliance Obligations and Legal Requirements
Great ISO 14001 Compliance Obligations and Legal Requirements
Nimonik
 
Monitoring, measurement, analysis, and evaluation performance in ISO 45001
 Monitoring, measurement, analysis, and evaluation performance in ISO 45001 Monitoring, measurement, analysis, and evaluation performance in ISO 45001
Monitoring, measurement, analysis, and evaluation performance in ISO 45001
PECB
 
IMS .ppt
IMS .pptIMS .ppt
IMS .ppt
ssuserf260b6
 
ISO 45001 Key Implementation Steps
ISO 45001 Key Implementation StepsISO 45001 Key Implementation Steps
ISO 45001 Key Implementation Steps
PECB
 
ISO 45001 OH&SMS awareness preview
ISO 45001 OH&SMS awareness previewISO 45001 OH&SMS awareness preview
ISO 45001 OH&SMS awareness preview
Avinit Singh
 
Quality Management System - ISO 9001-2015
Quality Management System - ISO 9001-2015Quality Management System - ISO 9001-2015
Quality Management System - ISO 9001-2015
Abhishek Raj
 

What's hot (20)

ISO 9001:2015 Awareness
 ISO 9001:2015 Awareness  ISO 9001:2015 Awareness
ISO 9001:2015 Awareness
 
Qms awareness training
Qms awareness trainingQms awareness training
Qms awareness training
 
ISO 9001:2015 Documentation Requirements
ISO 9001:2015 Documentation RequirementsISO 9001:2015 Documentation Requirements
ISO 9001:2015 Documentation Requirements
 
OHSMS exam solutions Jan2018
OHSMS exam solutions Jan2018OHSMS exam solutions Jan2018
OHSMS exam solutions Jan2018
 
ISO 9001, 14001, 45001 (IMS) basics training material
ISO 9001, 14001, 45001 (IMS) basics training materialISO 9001, 14001, 45001 (IMS) basics training material
ISO 9001, 14001, 45001 (IMS) basics training material
 
Iso 9001.2015 full module
Iso 9001.2015 full moduleIso 9001.2015 full module
Iso 9001.2015 full module
 
Benefits of ISO Certification Services to Your Business
Benefits of ISO Certification Services to Your BusinessBenefits of ISO Certification Services to Your Business
Benefits of ISO Certification Services to Your Business
 
Internal Audit 03-03-16
Internal Audit 03-03-16Internal Audit 03-03-16
Internal Audit 03-03-16
 
What Documents are required for ISO 45001:2018 Certification?
What Documents are required for ISO 45001:2018 Certification?What Documents are required for ISO 45001:2018 Certification?
What Documents are required for ISO 45001:2018 Certification?
 
Walmart CTPAT Audit Report
Walmart CTPAT Audit ReportWalmart CTPAT Audit Report
Walmart CTPAT Audit Report
 
Integrated Management System Manual Template (Preview)
Integrated Management System Manual Template (Preview)Integrated Management System Manual Template (Preview)
Integrated Management System Manual Template (Preview)
 
Intertek Presentation
Intertek PresentationIntertek Presentation
Intertek Presentation
 
Internal audit
Internal auditInternal audit
Internal audit
 
Road map to iso 9001 certification
Road map to iso 9001 certification  Road map to iso 9001 certification
Road map to iso 9001 certification
 
Great ISO 14001 Compliance Obligations and Legal Requirements
Great ISO 14001 Compliance Obligations and Legal RequirementsGreat ISO 14001 Compliance Obligations and Legal Requirements
Great ISO 14001 Compliance Obligations and Legal Requirements
 
Monitoring, measurement, analysis, and evaluation performance in ISO 45001
 Monitoring, measurement, analysis, and evaluation performance in ISO 45001 Monitoring, measurement, analysis, and evaluation performance in ISO 45001
Monitoring, measurement, analysis, and evaluation performance in ISO 45001
 
IMS .ppt
IMS .pptIMS .ppt
IMS .ppt
 
ISO 45001 Key Implementation Steps
ISO 45001 Key Implementation StepsISO 45001 Key Implementation Steps
ISO 45001 Key Implementation Steps
 
ISO 45001 OH&SMS awareness preview
ISO 45001 OH&SMS awareness previewISO 45001 OH&SMS awareness preview
ISO 45001 OH&SMS awareness preview
 
Quality Management System - ISO 9001-2015
Quality Management System - ISO 9001-2015Quality Management System - ISO 9001-2015
Quality Management System - ISO 9001-2015
 

Viewers also liked

C-TPAT Security Training
C-TPAT Security TrainingC-TPAT Security Training
C-TPAT Security Training
Adrian Spectre
 
Meta.solutions ctpat (english)
Meta.solutions  ctpat (english)Meta.solutions  ctpat (english)
Meta.solutions ctpat (english)
Meta:Solutions
 
CTPAT-Highway Carrier Security Requirements
CTPAT-Highway Carrier Security RequirementsCTPAT-Highway Carrier Security Requirements
CTPAT-Highway Carrier Security Requirements
Prep4Audit
 
The profile of u & v group
The profile of u & v groupThe profile of u & v group
The profile of u & v group
vabby26
 
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdfIso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Lakshy Management Consultant Pvt Ltd
 
Walmart CTPAT Audit Report 1.PDF
Walmart CTPAT Audit Report 1.PDFWalmart CTPAT Audit Report 1.PDF
Walmart CTPAT Audit Report 1.PDFManoj Dnyanmothe
 
Supply chain management
Supply chain managementSupply chain management
Supply chain managementShwe Zin
 
226680637 tai-lieu-huong-dan-c-tpat-docx
226680637 tai-lieu-huong-dan-c-tpat-docx226680637 tai-lieu-huong-dan-c-tpat-docx
226680637 tai-lieu-huong-dan-c-tpat-docx
Hiền Bốn Mắt
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
Source Code Control Limited
 
BUSN7024_Project Management Plan_Example
BUSN7024_Project Management Plan_ExampleBUSN7024_Project Management Plan_Example
BUSN7024_Project Management Plan_ExampleVIVAIO
 
How to choose the best transportation with supply chain
How to choose the best transportation with supply chainHow to choose the best transportation with supply chain
How to choose the best transportation with supply chainguest06c40002
 
7 point security inspection guide
7 point security inspection guide7 point security inspection guide
7 point security inspection guide
huynhloan
 
Building an Effective Supply Chain Security Program
Building an Effective Supply Chain Security ProgramBuilding an Effective Supply Chain Security Program
Building an Effective Supply Chain Security Program
Priyanka Aash
 
Presentacion c tpat diplomado
Presentacion c tpat diplomadoPresentacion c tpat diplomado
Presentacion c tpat diplomado
deliaarce
 
Topic 7 audit planning (2)
Topic 7 audit planning (2)Topic 7 audit planning (2)
Topic 7 audit planning (2)
sakura rena
 
Improve your organization’s capability for faster growth and change with BPM,...
Improve your organization’s capability for faster growth and change with BPM,...Improve your organization’s capability for faster growth and change with BPM,...
Improve your organization’s capability for faster growth and change with BPM,...
Eric D. Schabell
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)Cyril Soeri
 
Stock optimizer in action - 5. Supply Chain konferencija
Stock optimizer in action - 5. Supply Chain konferencijaStock optimizer in action - 5. Supply Chain konferencija
Stock optimizer in action - 5. Supply Chain konferencija
Logiko d.o.o.
 

Viewers also liked (20)

C-TPAT Security Training
C-TPAT Security TrainingC-TPAT Security Training
C-TPAT Security Training
 
Meta.solutions ctpat (english)
Meta.solutions  ctpat (english)Meta.solutions  ctpat (english)
Meta.solutions ctpat (english)
 
CTPAT-Highway Carrier Security Requirements
CTPAT-Highway Carrier Security RequirementsCTPAT-Highway Carrier Security Requirements
CTPAT-Highway Carrier Security Requirements
 
The profile of u & v group
The profile of u & v groupThe profile of u & v group
The profile of u & v group
 
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdfIso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
 
Walmart CTPAT Audit Report 1.PDF
Walmart CTPAT Audit Report 1.PDFWalmart CTPAT Audit Report 1.PDF
Walmart CTPAT Audit Report 1.PDF
 
GS Profile Presentation(Jacobs)
GS Profile Presentation(Jacobs)GS Profile Presentation(Jacobs)
GS Profile Presentation(Jacobs)
 
Supply chain management
Supply chain managementSupply chain management
Supply chain management
 
226680637 tai-lieu-huong-dan-c-tpat-docx
226680637 tai-lieu-huong-dan-c-tpat-docx226680637 tai-lieu-huong-dan-c-tpat-docx
226680637 tai-lieu-huong-dan-c-tpat-docx
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
BUSN7024_Project Management Plan_Example
BUSN7024_Project Management Plan_ExampleBUSN7024_Project Management Plan_Example
BUSN7024_Project Management Plan_Example
 
How to choose the best transportation with supply chain
How to choose the best transportation with supply chainHow to choose the best transportation with supply chain
How to choose the best transportation with supply chain
 
7 point security inspection guide
7 point security inspection guide7 point security inspection guide
7 point security inspection guide
 
Building an Effective Supply Chain Security Program
Building an Effective Supply Chain Security ProgramBuilding an Effective Supply Chain Security Program
Building an Effective Supply Chain Security Program
 
C tpat
C tpatC tpat
C tpat
 
Presentacion c tpat diplomado
Presentacion c tpat diplomadoPresentacion c tpat diplomado
Presentacion c tpat diplomado
 
Topic 7 audit planning (2)
Topic 7 audit planning (2)Topic 7 audit planning (2)
Topic 7 audit planning (2)
 
Improve your organization’s capability for faster growth and change with BPM,...
Improve your organization’s capability for faster growth and change with BPM,...Improve your organization’s capability for faster growth and change with BPM,...
Improve your organization’s capability for faster growth and change with BPM,...
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)
 
Stock optimizer in action - 5. Supply Chain konferencija
Stock optimizer in action - 5. Supply Chain konferencijaStock optimizer in action - 5. Supply Chain konferencija
Stock optimizer in action - 5. Supply Chain konferencija
 

Similar to Auditing supply chain logistics -CTPAT

ISO 28000:2008 Certification
ISO 28000:2008 Certification ISO 28000:2008 Certification
ISO 28000:2008 Certification
Sifiso Nxele
 
Iso9000 pvcgmp roll no. 01
Iso9000  pvcgmp roll no. 01Iso9000  pvcgmp roll no. 01
Iso9000 pvcgmp roll no. 01Hetal Hinglajia
 
ISO Intro1.pptx
ISO Intro1.pptxISO Intro1.pptx
ISO Intro1.pptx
Chandrasen Sharma
 
Study of international organization for standardization (ISO) ISO -9000 ,140...
Study of international organization for standardization (ISO)  ISO -9000 ,140...Study of international organization for standardization (ISO)  ISO -9000 ,140...
Study of international organization for standardization (ISO) ISO -9000 ,140...
jay Rathod
 
Company profile
Company profileCompany profile
Company profilereenaisaac
 
stellar profile
stellar profilestellar profile
stellar profileponky2012
 
gestion logistique selon la norme ISO 28000
gestion logistique selon la norme ISO 28000gestion logistique selon la norme ISO 28000
gestion logistique selon la norme ISO 28000
Abderrahim Meftah
 
10 Benefits of Implementing ISO/IEC 20000 in an Organization
10 Benefits of Implementing ISO/IEC 20000 in an Organization10 Benefits of Implementing ISO/IEC 20000 in an Organization
10 Benefits of Implementing ISO/IEC 20000 in an Organization
PECB
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
newbie2019
 
ISO- 9001
ISO- 9001ISO- 9001
ISO- 9001
SUNILKUMARSINGH
 
Insight into the new
Insight into the newInsight into the new
Insight into the newANUPAM RAY
 
english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptx
ssuser00d6eb
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
Yerlin Sturdivant
 
ISO 27001 definitions
ISO 27001 definitionsISO 27001 definitions
ISO 27001 definitions
Mouhammad Esayed
 
ISO 9000 series
ISO 9000 seriesISO 9000 series
ISO 9000 series
Gayathri Iyyer
 
ISO 28000 | ISO 28000 Implementation Training
ISO 28000 | ISO 28000 Implementation TrainingISO 28000 | ISO 28000 Implementation Training
ISO 28000 | ISO 28000 Implementation Training
himalya sharma
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
Midhun Nirmal
 
ISO 28000 | ISO 28000 Internal AuditorTraining
ISO 28000 | ISO 28000 Internal AuditorTrainingISO 28000 | ISO 28000 Internal AuditorTraining
ISO 28000 | ISO 28000 Internal AuditorTraining
himalya sharma
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
khushboo
 

Similar to Auditing supply chain logistics -CTPAT (20)

ISO 28000:2008 Certification
ISO 28000:2008 Certification ISO 28000:2008 Certification
ISO 28000:2008 Certification
 
Iso9000 pvcgmp roll no. 01
Iso9000  pvcgmp roll no. 01Iso9000  pvcgmp roll no. 01
Iso9000 pvcgmp roll no. 01
 
ISO Intro1.pptx
ISO Intro1.pptxISO Intro1.pptx
ISO Intro1.pptx
 
Study of international organization for standardization (ISO) ISO -9000 ,140...
Study of international organization for standardization (ISO)  ISO -9000 ,140...Study of international organization for standardization (ISO)  ISO -9000 ,140...
Study of international organization for standardization (ISO) ISO -9000 ,140...
 
Company profile
Company profileCompany profile
Company profile
 
stellar profile
stellar profilestellar profile
stellar profile
 
gestion logistique selon la norme ISO 28000
gestion logistique selon la norme ISO 28000gestion logistique selon la norme ISO 28000
gestion logistique selon la norme ISO 28000
 
10 Benefits of Implementing ISO/IEC 20000 in an Organization
10 Benefits of Implementing ISO/IEC 20000 in an Organization10 Benefits of Implementing ISO/IEC 20000 in an Organization
10 Benefits of Implementing ISO/IEC 20000 in an Organization
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
ISO- 9001
ISO- 9001ISO- 9001
ISO- 9001
 
Corporate presentation 18.02.2013
Corporate presentation   18.02.2013Corporate presentation   18.02.2013
Corporate presentation 18.02.2013
 
Insight into the new
Insight into the newInsight into the new
Insight into the new
 
english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptx
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 
ISO 27001 definitions
ISO 27001 definitionsISO 27001 definitions
ISO 27001 definitions
 
ISO 9000 series
ISO 9000 seriesISO 9000 series
ISO 9000 series
 
ISO 28000 | ISO 28000 Implementation Training
ISO 28000 | ISO 28000 Implementation TrainingISO 28000 | ISO 28000 Implementation Training
ISO 28000 | ISO 28000 Implementation Training
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
ISO 28000 | ISO 28000 Internal AuditorTraining
ISO 28000 | ISO 28000 Internal AuditorTrainingISO 28000 | ISO 28000 Internal AuditorTraining
ISO 28000 | ISO 28000 Internal AuditorTraining
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 

More from Enterprise Security Risk Management

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
Enterprise Security Risk Management
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
Enterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Enterprise Security Risk Management
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Enterprise Security Risk Management
 

More from Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Recently uploaded

anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 

Recently uploaded (20)

anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 

Auditing supply chain logistics -CTPAT

  • 1. Auditing Security Management Systems and the Supply Chain: ISO28000 ASIS International 3rd Asia-Pacific Conference Wednesday 4 February 2009 11.50 - 12.35 Dr. Marc Siegel ASIS International ISO/TC 8 Delegation Head © 2008
  • 2. Promoting Security in the Supply Chain Supplier – Manufacturer – Distributor – Retailer – Logistics Continuity in the supply chain is a key component of today's global marketplace © 2008
  • 3. Globalization of Supply Chains Disruption of the Supply Chain a Rising Threat • Just-in-time manufacturing • Outsourcing • Global sourcing • Specialized factories • Centralized distribution • Supply consolidation • Reduction of the supplier base • Volatility of demand • Lack control procedures © 2008
  • 4. So What Could Happen? • Human trafficking • Contraband smuggling • Theft • Cyber-crime • Internal sabotage • Industrial sabotage • Terrorism • Counterfeiting • Insurgency • Bio-terrorism • Wholesale and retail supply loss • Organized crime • WMD in containers • Political disruptions • $$$ Damages © 2008
  • 5. What are the Consequences of an Incident? • Damage to tangibles: – Human and physical assets – property, products, infrastructure, personnel and the environment • Damage to intangibles: – Non-physical assets - reputation, market position, goodwill • The harm to the organization may include; – Injury or serious harm to persons and property – Business integrity – Reputation – Clients property – Standing in industry community – Regulatory issues © 2008
  • 6. ISO 28000 to the Rescue © 2008
  • 7. The 28000 Series • Developed in response to demand from industry against a background of varying international security regimes. • Generic management specification to improve the security in supply chains. • Requires organizations to: – assess the security environment in which it operates – determine if adequate security measures are in place – improve performance • Designed to be a sound foundation for complying efficiently with other international, national and sector based security requirements and schemes. © 2008
  • 8. The ISO 28000 Series Standards and codes of practice for supply chain security • The 28000 series was developed to compliment the various international initiatives to facilitate uniform implementation worldwide. • ISO 28000 - Supply chain security management – Published Sept. 2007 – Risked based model – Plan, Do, Check, Act principles – Designed for 1st, 2nd & 3rd party auditing • Certification Standard, similar to: – ISO 14001, OHSAS 18001, ISO 27001 © 2008
  • 9. ISO 28000 Enables an Organization to: • Establish, implement, maintain and improve a security management system • Assure conformity with security management policy • Demonstrate such conformity • Seek certification/registration of conformity by an accredited third party organization • Make a self-determination and self-declaration of conformity © 2008
  • 10. Meet the Family © 2008
  • 11. ISO 28000 Series of Standards • ISO 28000:2007 – Specification for security management systems for the supply chain • ISO 28001:2007 – Security management systems for the supply chain -- Best practices for implementing supply chain security, assessments and plans -- Requirements and guidance • ISO 28003:2007 – Security management systems for the supply chain -- Requirements for bodies providing audit and certification of supply chain security management systems • ISO 28004:2007 – Security management systems for the supply chain -- Guidelines for the implementation of ISO 28000 © 2008
  • 12. What Does the ISO 28000 Address? • ISO 28000 requires the organization to consider the likelihood of an event and all of its consequences including: – Physical failure threats and risks, such as functional failure, incidental damage, malicious damage or terrorist or criminal action – Operational threats and risks, including the control of the security, human factors and other activities which affect the organizations performance, condition or safety – Natural environmental events (storm, floods, etc.), which may render security measures and equipment ineffective – Factors outside of the organization's control, such as failures in externally supplied equipment and services © 2008
  • 13. Built to Be Business Friendly • Suitable for all sizes and types of organizations that are involved in purchasing, manufacturing, service, storage, transportation and/or sales processes • Aligned with the globally accepted standards: – ISO 9001:2000 - Quality management – ISO 14001:2004 - Environmental management – ISO/IEC 27001:2005 - Information technology security • Supports consistent and integrated implementation and operation with related management standards. • One suitably designed management system can satisfy the requirements of all these standards © 2008
  • 14. The Standard Can Be Used to: • Demonstrate a robust and secure supply chain management system to regulators/authorities and other interested organizations • Demonstrate a robust and secure supply chain management system to their customers/potential customers • Provide a consistent approach by all service providers within a supply chain • Serve as the basis for an independent assessment • Demonstrate the ability to meet customer requirements • Improve services © 2008
  • 15. Commercial & Competitive Advantage • Unambiguous demonstration the organization takes security seriously – Customer confidence that their goods are protected – Increased brand equity through the clear demonstration of commitment to security – Benefit through increased market share and through customer retention • Increased organizational resilience • Brand and reputation protection © 2008
  • 16. Improved Management • Effective management of security resources, resulting in cost savings • Increased accountability at all levels • Demonstrates effective corporate governance • Improved safety and security for employees • Improved staff and customer satisfaction • Can be integrated with other internationally recognized management system standards © 2008
  • 17. Ports Worldwide Adopting ISO 28000 • September 2006 - DP World first to certify – HQ Dubai – Ports of Djibouti, Dubai, Vancouver (1st port in the Americas), Porto Caucedo (Dominican Republic- Latin American gateway to US), Southampton, Tilbury, Le Havre, Port of Busan, Korea – All Australia terminals undergoing implementation – DP World plans to certify all its ports/terminals • March 2008 - Port of Houston Authority (PHA), Port Police has become the first port authority in the world to receive ISO 28000:2007 certification • May 2008 - Singapore-based logistics and supply chain management company YCH Group becomes the first end- to-end Supply Chain Management (SCM) provider to receive the ISO 28000: 2007 Certification. © 2008
  • 18. Mutual Recognition • ISO 28000 has been recognized by the EU Authorized Economic Operators (AEO) initiative as compliant to the AEO Safety and Security requirements • DP World’s ISO certification has been recognized by US Customs Border Protection, with the company uniquely being invited to join C-TPAT. • US Congress has recognized the relevance of 28000 to CTPAT and has tasked its research body, GAO, to confirm technical compatibility. – Companies that are ISO 28000 compliant may not have to qualify to join CTPAT but can now enjoy the benefits upon recognition. © 2008
  • 19. ISO 28000 a New Member of the Family of ISO Management Systems Standards Identify risks, set priorities and establish dynamic programs and plans to cost effectively improve performance Generic framework for organizations of all sizes and types – private, public, faith-based or not-for-profit organizations. © 2008
  • 20. 28000 is a Management System • A management system is what the organization does to manage its processes, functions or activities. – Set of interrelated elements used to establish and achieve an organization’s policy and objectives. – Includes policies, organizational structure, responsibilities, planning activities, resources, practices, procedures and processes. – Allows an organization to create and manage its processes and activities to meet its business objectives. © 2008
  • 21. PDCA or APCI Model Approach to structured problem solving Plan (Assess) - Do (Protect) - Check (Confirm) - Act (Improve) Plan • Define & Analyze a Problem and Identify the Root Cause Act Do • Devise a Solution • Standardize Solution • Develop Detailed Action • Review and Define • Plan & Implement It Next Issues Systematically Check • Confirm Outcomes Against Plan • Identify Deviations and Issues © 2008
  • 22. Why Management Systems Work • Needs focused • Goals driven • People oriented – Leadership driven – Involves people at all levels – Promotes cultural change • Emphasizes process approach • System approach to management • Factual basis for decision making • Continual improvement Business Advantage © 2008
  • 23. Risk Management • Establishes risk management as proactive means of protecting the organization – Pragmatic and business-centric approach to risk management – Promotes risk management as a central component of effective management – Key decision making and commitment of resources is based on a process of effective risk assessment © 2008
  • 24. What Does the ISO 28000 Say? M Re .6 an vi ag ew Po em lic 4.2 y en 4 t Security Management Se cur & Checking System As it ses y risk tive Pla s Correc nn ment 4.5 ing Action 4.3 Implementation & operation 4.4 Standards Implementation Requires A Organization-wide Commitment to Security © 2008
  • 25. Start: Know your Organization - Define scope and boundaries for security, preparedness and continuity management program - Identify critical objectives, operation, functions, products and services - Preliminary determination of likely risk scenarios and consequences Security Policy Management Review - Management Commitment - Adequacy and Effectiveness - Commitment to Protection of Critical Assets - Need for Changes - Commitment to Continuous Improvement - Opportunities for Improvement Continual Planning Improvement Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Legal and Other Requirements - Nonconformity, Corrective - Security Management Objectives and Preventive Action - Security Management Targets - Control of Records - Security Management Programs - Audits Implementation and Operation - Structure, Authority and Responsibility - Competence, Training, & Awareness - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 26. Start: Know your Organization - Define scope and boundaries Start: Know your Organization for security, preparedness and continuity management program - Identify critical objectives, operation, • Define scope and boundaries for security, functions, products and services preparedness and continuity management - Preliminary determination of likely risk scenarios and consequences program Security Policy • Identify critical objectives, operation, Management Review - Management Commitment - Adequacy and Effectiveness - Commitment to Protection of Critical Assets - Need for Changes functions, products and services - Commitment to Continuous Improvement - Opportunities for Improvement • Preliminary determination of likely risk scenarios and consequences Continual Planning Improvement Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Legal and Other Requirements - Nonconformity, Corrective - Security Management Objectives and Preventive Action - Security Management Targets - Control of Records - Security Management Programs - Audits Implementation and Operation - Structure, Authority and Responsibility - Competence, Training, & Awareness - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 27. Start: Know your Organization - Define scope and boundaries for security, preparedness and continuity management program - Identify critical objectives, operation, functions, products and services - Preliminary determination of likely risk scenarios and consequences Security Policy Security Policy Management Review - Management Commitment - Adequacy and Effectiveness - Need for Changes - Management Commitment - Commitment to Protection of Critical Assets - Commitment to Continuous Improvement - Opportunities for Improvement - Commitment to Protection of Critical Assets - Commitment to Continuous Improvement Continual Planning Improvement Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Legal and Other Requirements - Nonconformity, Corrective - Security Management Objectives and Preventive Action - Security Management Targets - Control of Records - Security Management Programs - Audits Implementation and Operation - Structure, Authority and Responsibility - Competence, Training, & Awareness - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 28. Start: Know your Organization - Define scope and boundaries for security, preparedness and continuity management program - Identify critical objectives, operation, functions, products and services - Preliminary determination of likely risk scenarios and consequences Security Policy Management Review - Management Commitment - Adequacy and Effectiveness - Commitment to Protection of Critical Assets - Need for Changes - Commitment to Continuous Improvement - Opportunities for Improvement Continual Improvement Planning Planning Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Risk Assessment - Legal and Other Requirements - Nonconformity, Corrective - Security Management Objectives and Preventive Action - Control of Records - Legal and Other Requirements - Security Management Targets - Security Management Programs - Audits - Security Management Objectives - Security Management Targets Implementation and Operation - Security Management Programs - Structure, Authority and Responsibility - Competence, Training, & Awareness - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 29. Objectives, Targets and Programs Policy Road to Success Threats, Risks and Legal / Other Views of Impacts Requirements Interested Parties Objectives SMS And Program Targets Technology Finance Operations Critical Assets © 2008
  • 30. Start: Know your Organization - Define scope and boundaries for security, preparedness and continuity management program - Identify critical objectives, operation, functions, products and services - Preliminary determination of likely risk scenarios and consequences Security Policy Management Review - Management Commitment - Adequacy and Effectiveness - Commitment to Protection of Critical Assets - Need for Changes - Commitment to Continuous Improvement - Opportunities for Improvement Implementation and Operation • Structure, Authority and Responsibility • Competence, Training, and Awareness Continual Planning Improvement • Communication Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Legal and Other Requirements - Nonconformity, Corrective • Documentation - Security Management Objectives and Preventive Action - Security Management Targets - Control of Records - Security Management Programs - Audits • Document and Data Control • Operational Control Implementation and Operation • Emergency Preparedness, Response - Structure, Authority and Responsibility - Competence, Training, & Awareness and Security Recovery - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 31. Start: Know your Organization - Define scope and boundaries for security, preparedness and continuity management program - Identify critical objectives, operation, functions, products and services - Preliminary determination of likely risk scenarios and consequences Security Policy Management Review - Management Commitment - Adequacy and Effectiveness - Commitment to Protection of Critical Assets - Need for Changes - Commitment to Continuous Improvement - Opportunities for Improvement Checking & Corrective Action - Security Performance Improvement Monitoring Continual Planning and Measurement Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Legal and Other Requirements - Nonconformity, Corrective - System Evaluation - Security Management Objectives and Preventive Action - Security Management Targets - Control of Records - Security Management Programs - Nonconformity, Corrective and - Audits Preventive Action Implementation and Operation - Control of Records - Structure, Authority and Responsibility - Competence, Training, & Awareness - Audits - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 32. Start: Know your Organization - Define scope and boundaries for security, preparedness and continuity management program Management Review - Identify critical objectives, operation, functions, products and services - Preliminary determination of likely risk scenarios and consequences - Adequacy and Effectiveness Security Policy Management Review - Management Commitment - Need for Changes - Adequacy and Effectiveness - Need for Changes - Commitment to Protection of Critical Assets - Commitment to Continuous Improvement - Opportunities for Improvement - Opportunities for Improvement Continual Planning Improvement Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Legal and Other Requirements - Nonconformity, Corrective - Security Management Objectives and Preventive Action - Security Management Targets - Control of Records - Security Management Programs - Audits Implementation and Operation - Structure, Authority and Responsibility - Competence, Training, & Awareness - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 33. There’s a Bottleneck Lead Auditors Needed Demand for implementation and certification is currently outpacing the availability of lead auditors © 2008
  • 34. Types of Audits • First Party – Internal audit of client – Self declaration • Second Party – External non-certification audit – Contractually enforced (supply chain) • Third Party – Audit by external certified auditors – Road to certification © 2008
  • 35. Accreditation and Certification Relevant Standards (Registration) Bodies Accreditation Bodies ISO/IEC 17011:2004 An organization (usually a national standards body Conformity assessment -- General requirements for accreditation bodies accrediting conformity assessment bodies associated with ISO) that checks certification bodies ISO/IEC 17040:2005 and, provided their certification assessment processes Conformity assessment -- General requirements for peer pass muster, accredits them i.e. grants them the assessment of conformity assessment bodies and accreditation authority to issue recognized certificates. bodies Certification ISO 28003:2007 Security management systems for the supply chain -- (Registration) Bodies Requirements for bodies providing audit and certification of An independent external body that issues written supply chain security management systems assurance (the certificate) that it has audited a ISO/IEC 17021:2006 management system and verified that it conforms to Conformity assessment -- Requirements for bodies providing the requirements specified in the standard. audit and certification of management systems Certified Lead Auditor ISO 19011:2002 Guidelines for quality and/or environmental management systems auditing Organization Implements standard – may seek formal recognition ISO 28000:2007 (certification) by a specialized third party body. Specification for security management systems for the supply chain © 2008
  • 36. Principles that Relate to Auditors • Ethical conduct: the foundation of professionalism • Fair presentation: the obligation to report truthfully and accurately • Due professional care: the application of diligence and judgement in auditing • Independence: the basis for the impartiality of the audit and objectivity of the audit conclusions • Evidence-based approach: the rational method for reaching reliable and reproducible audit conclusions in a systematic audit process © 2008
  • 37. Lead Auditor Certification • Knowledge of management systems • Knowledge of the standard being audit to, as well as normative documents • Principles of auditing based on ISO 19011 • Technical knowledge of the activity being audited • Understanding risk assessment and management from a business perspective • General knowledge of regulatory requirements • Understanding of security, preparedness response and recovery management © 2008
  • 38. How Do I Become a Player? ISO 28000 is Here – and Rapidly Gaining Momentum Your Ticket to Play BECOME A CERTIFIED ISO 28000 LEAD AUDITOR © 2008
  • 39. Course Objectives • Knowledge of a systematic and practical approach to security management system auditing • Broad understanding of the scope of security management system auditor responsibilities • Competency in organizing and directing audit team members • An in-depth understanding of the ISO 28000 and security risk management requirements • The ability to effectively provide management with objective advice regarding progress towards compliance and certification of security management systems • Demonstrable understanding of the intent and application of relevant Acts, Standards, Codes of Practice, and other documents relevant to regualtions and legislation © 2008
  • 40. Key Session Topics • Plan, conduct, and report an actual audit and examine relevant case studies • Major elements and scope of risk management including definitions of common risk management terms • Structure and make-up of management system documentation • Roles and responsibilities for security management • Requirements and methods for ensuring continuous improvement © 2008
  • 41. Key Session Topics • Audit techniques and methodology according to: – ISO 28000:2007 Specification for Security Management Systems for the Supply Chain – ISO 31000 Risk Management – ISO 31010 Risk Assessment (Methodologies) – ASIS International Risk Assessment (Process) – ISO 19011:2003 Guidelines for Quality and/or Environmental Management (under revision to add risk-based processes) • Systems Auditing – Security threat and vulnerability assessments – Asset protection and loss protection – IT and electronic security – Personnel protection – Risk to transport and infrastructure from terrorism © 2008
  • 42. Competence of Auditors Competence = ∑ Personal attributes + Generic auditing knowledge and skills + Security, Preparedness, Response and Recovery specific knowledge and skills © 2008
  • 44. Authority to Audit • The organization’s top management should Process grant the authority for managing the audit program. Flow for • Establish, implement, monitor, review and Audit improve the audit program • Identify the necessary resources and ensure Program they are provided © 2008
  • 45. Process Plan Flow for •Objectives of an audit program Audit •Extent of an audit program Program • Scope, objective and duration • Standards, statutory, regulatory and contractual requirements • Language, cultural and social issues •Audit program responsibilities •Audit program resources •Audit program procedures © 2008
  • 46. Competence and evaluation of auditors • Process Competence = ∑ (Personal attributes) + (Generic auditing knowledge and skills) + (Security- knowledge and skills) Flow for • Confidentiality and clearances Audit Program Do •Audit program implementation •communicating the audit coordinating and scheduling audits •establishing and maintaining a process for the evaluation of the auditors •selection of audit teams •providing necessary resources to the audit teams •conduct of audits according to the audit program •control of records of the audit activities •review and approval of audit reports, •audit follow-up •Audit program records © 2008
  • 47. Process Flow for Audit Program Check - Audit program monitoring and reviewing - Identify needs for corrective and preventive actions - Identify opportunities for improvement © 2008
  • 48. Process Flow for Audit Program Act - Improve the audit program - Commitment to Continuous Improvement © 2008
  • 49. Initiating the audit - appointing the audit team leader - defining audit objectives, scope and criteria - determining the feasibility of the audit - selecting the audit team - establishing initial contact with the auditee Overview Conducting document review of typical - reviewing relevant management system documents, including records, and determining their adequacy with respect to audit criteria audit Preparing for the on-site audit activities activities - preparing the audit plan - assigning work to the audit team - preparing work documents Conducting on-site audit activities - conducting opening meeting - communication during the audit - roles and responsibilities of guides and observers - collecting and verifying information - generating audit findings - preparing audit conclusions - conducting closing meeting Preparing, approving and distributing the audit report - preparing the audit report - approving and distributing audit report Completing the audit Conducting audit follow-up © 2008
  • 50. Source of Information Collecting and verifying information by appropriate sampling techniques Collecting Information to Reach Audit Audit evidence Conclusions Evaluating against audit criteria Audit findings Reviewing Audit conclusions © 2008
  • 51. What Does the Future Hold? • ISO 28002, Resilience in the Supply Chain • ISO 28005, Ships and marine technology - Computer applications - Electronic port clearance (EPC) © 2008
  • 52. Thank You Dr. Marc Siegel Security Management System Consultant ASIS International Phone: +1-858-484-9855 Email: siegel@ASIS-Standards.net siegel@ymail.com S © 2008