Psychological Safety: An Important Component for Safety in the Workplace
Psychological safety has been referred to as the single most important characteristic for successful teams and leads to decrease in turnover and increases in effectiveness. Psychological safety is the belief that your environment is safe for interpersonal risk-taking meaning that asking questions, pointing out problems, and suggesting innovation will be responded to in a respectful manner. This presentation will cover what psychological safety is, why it’s important, how to assess its presence, and tips on how to grow this in your workplace.
By
Paula Allen, MS, BSN, RN, CPPS and
Karen Allard, MS, BA, RN.
Patient Safety Specialists, Bellin Health
PREVENT WORK-RELATED INJURIES
Behavior-based safety is based on the theory that most accidents at workplaces can be prevented with the right behavioral analysis and training. Minor errors and oversights are often left unreported and thus can lead to major accidents if the causes for the incidents are not addressed.
Improve employee safety with our presentation on Behavior-Based Safety:
http://www.presentationload.com/behavior-based-safety-powerpoint-template.html
The BBS approach examines which behaviors and organizational circumstances led to accidents. By knowing this, you can inform employees about safe behavior at the workplace and implement Behavior-Based Safety in your company.
This template not only contains images with background information on occupational safety, but also a series of graphs with statistics and figures on the subject as well as a useful icons toolbox.
Psychological Safety: An Important Component for Safety in the Workplace
Psychological safety has been referred to as the single most important characteristic for successful teams and leads to decrease in turnover and increases in effectiveness. Psychological safety is the belief that your environment is safe for interpersonal risk-taking meaning that asking questions, pointing out problems, and suggesting innovation will be responded to in a respectful manner. This presentation will cover what psychological safety is, why it’s important, how to assess its presence, and tips on how to grow this in your workplace.
By
Paula Allen, MS, BSN, RN, CPPS and
Karen Allard, MS, BA, RN.
Patient Safety Specialists, Bellin Health
PREVENT WORK-RELATED INJURIES
Behavior-based safety is based on the theory that most accidents at workplaces can be prevented with the right behavioral analysis and training. Minor errors and oversights are often left unreported and thus can lead to major accidents if the causes for the incidents are not addressed.
Improve employee safety with our presentation on Behavior-Based Safety:
http://www.presentationload.com/behavior-based-safety-powerpoint-template.html
The BBS approach examines which behaviors and organizational circumstances led to accidents. By knowing this, you can inform employees about safe behavior at the workplace and implement Behavior-Based Safety in your company.
This template not only contains images with background information on occupational safety, but also a series of graphs with statistics and figures on the subject as well as a useful icons toolbox.
A Keynote speech by Dr Domininc Cooper CFIOSH C.Psychol examining the 'true' success factors of Behavior-Based Safety from the 1970's to the present day.
Behavio-Based Safety is still evolving to the point where it is effective in all workplaces, all of the time. Many implementations have been successful, but many have failed or faded away over the years. What can we learn from the past and the present to optimize future BBS implementations for the good of all? This tour of BBS examines the evolution of BBS, implementation strategies, and remaining challenges. Issues to be addressed include (but are not limited to):
[1 Where BBS fits in an organizations Safety Culture
[2] Who owns BBS?
[3] The role of employees and managers
[4] BBS design Issues
[5] Integrating BBS into mainstream safety management systems
Leadership is one of the key drivers of a culture within an organisation.
Key attributes of a safety leader include understanding the basis of a high performance organisation through the adoption of HSE mindfulness.
A case study examining the actual impact of safety leadership on employee safety behavior in the OIl & Gas construction sector, over a two year period during the roll-out and execution of 'B-Safe', a behavioral safety process.
Establishing and fostering a safety culture has, quite rightly, become a more prominent topic to consider for safety directors. No matter the industry or organization, it is now commonly accepted that safety culture can have a huge influence on the success or failure of a safety management system.
Safety culture is not a program, policy or procedure, it is a reflection of how safety is managed in a workplace. However, it is often difficult to pin down, as it is a somewhat ethereal concept, based on soft components that cannot be easily measured – factors such as accountability, leadership and organizational learning.
This difficulty is at the heart of many safety directors’ struggle – how do you pinpoint your organization’s current safety culture? Which activities are having a positive or negative effect?
In this presentation, Shannon Crinklaw defines safety culture and provide suggestions and ideas around how to recognize and foster a strong safety culture within your organization.
Watch this webinar and learn:
How safety culture can be broken down into components
The different ways that it can be (indirectly) measured
Steps that managers should take to improve it
How using Medgate to automate some safety activities assist in building a safety culture
Are you frustrated by not being able to make use of all the data you’ve collected? Do you run for cover every time you hear complaints about taking the time to do incident reports and hazard analysis? Do you struggle to use Job Hazard data to improve incident rates? This presentation shows the visuals from a discussion about Best-in-Class safety strategy.
A Keynote speech by Dr Domininc Cooper CFIOSH C.Psychol examining the 'true' success factors of Behavior-Based Safety from the 1970's to the present day.
Behavio-Based Safety is still evolving to the point where it is effective in all workplaces, all of the time. Many implementations have been successful, but many have failed or faded away over the years. What can we learn from the past and the present to optimize future BBS implementations for the good of all? This tour of BBS examines the evolution of BBS, implementation strategies, and remaining challenges. Issues to be addressed include (but are not limited to):
[1 Where BBS fits in an organizations Safety Culture
[2] Who owns BBS?
[3] The role of employees and managers
[4] BBS design Issues
[5] Integrating BBS into mainstream safety management systems
Leadership is one of the key drivers of a culture within an organisation.
Key attributes of a safety leader include understanding the basis of a high performance organisation through the adoption of HSE mindfulness.
A case study examining the actual impact of safety leadership on employee safety behavior in the OIl & Gas construction sector, over a two year period during the roll-out and execution of 'B-Safe', a behavioral safety process.
Establishing and fostering a safety culture has, quite rightly, become a more prominent topic to consider for safety directors. No matter the industry or organization, it is now commonly accepted that safety culture can have a huge influence on the success or failure of a safety management system.
Safety culture is not a program, policy or procedure, it is a reflection of how safety is managed in a workplace. However, it is often difficult to pin down, as it is a somewhat ethereal concept, based on soft components that cannot be easily measured – factors such as accountability, leadership and organizational learning.
This difficulty is at the heart of many safety directors’ struggle – how do you pinpoint your organization’s current safety culture? Which activities are having a positive or negative effect?
In this presentation, Shannon Crinklaw defines safety culture and provide suggestions and ideas around how to recognize and foster a strong safety culture within your organization.
Watch this webinar and learn:
How safety culture can be broken down into components
The different ways that it can be (indirectly) measured
Steps that managers should take to improve it
How using Medgate to automate some safety activities assist in building a safety culture
Are you frustrated by not being able to make use of all the data you’ve collected? Do you run for cover every time you hear complaints about taking the time to do incident reports and hazard analysis? Do you struggle to use Job Hazard data to improve incident rates? This presentation shows the visuals from a discussion about Best-in-Class safety strategy.
Presentation delivered to the Minnesota Counties Computer Cooperative (http://mnccc.org/) on October 30, 2019. The talk was given by SecurityStudio's CEO, Evan Francen and focused on how local governments play a role in protecting all of us.
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013Adrian Wright
Security on the Brain – Using Human Psychology to Achieve Compliance: ISSA-UK Expert Workshop
Presented by Adrian Wright - ISSA-UK VP of Research
One of the biggest wake-up calls in recent times is the realisation that more than 60% of major security breaches and data losses are down to 'human factor' failings.
Our main weapon in mitigating these failings is to spend more on in-house awareness campaigns and on technical measures to minimise any losses - yet incidents and losses continue to increase. Clearly these existing awareness campaigns and controls are not enough, as the message is still not getting through or isn't being complied with.
This presentation and workshop session challenges current thinking and strategies in dealing with people as both an asset and a source of risk, by leveraging human psychology and people's differing motivations to improve communication, change opinions and turn basic awareness into actual compliance.
In this session
Learn:
- The psychology of why we don't comply - why awareness alone won't do
- What motivates people to do - or not do - specific things
- Neurolinguistics - it's not just what you say; but how you say it and to who
- Divide and conquer - adapting your message to target specific personality types
- Changing the security culture by changing people's belief systems
- Dirty tricks (slightly) - tactics that work in changing behaviour
- Selling the unsellable - lessons from other sectors in making boring stuff sexy
Participate:
- Informal group discussion of challenges and successes from your experience
- Identifying your audience’s character types and shaping the message
- Influencing the Board by speaking their language
- Developing an internal PR strategy to improve security's image and influence
- Develop a brand new and more effective mission statement for your team
About the Presenter:
Adrian Wright CISA
20 years experience in Information Security, IT Risk Management & Compliance. Specialist in managing security, risk and compliance awareness campaigns;
9 Years Global CISO Head of InfoSec at Reuters - covering 142 countries and 250,000 systems;
10 years founder and programme director at Secoda Risk Management. Experienced speaker and writer on all things cyber security, governance, risk & compliance.
2 Years Director of Projects & 1 Year VP of Research & Board member at ISSA-UK
Having spent decades looking into the darker recesses and failings within technology; Adrian has recently turned his attention to the darker recesses and failings within the human beings that work with the technology…
John Parker (Vico Construction) gave this presentation at the I&O Medical Centers Spring 2016 Seminar. It addresses Basic Accident Investigation for employers.
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
Shawn Tuma delivered this presentation on April 9, 2019, at the Oklahoma State University 4th Annual Cyber Security Conference in Oklahoma City, Oklahoma.
In twenty years of practicing cyber law, Shawn Tuma has seen a multitude of cybersecurity and data breach cases that have helped him understand the real-world risks companies face and the practical things they can do to prioritize their resources and effectively manage cyber risk. In this presentation, he will share his experience on issues such as:
· Why cybersecurity is an overall business risk issue that must be properly managed to comply with laws and regulations
· Why strategic leadership is critical in cybersecurity
· Why teams are critical for cybersecurity and how to personalities and psychology can impact that team
· The most likely real-world risks that most companies face
· How to prioritize limited resources to effectively manage the most likely real-world risks
· What is reasonable cybersecurity
· How to develop, implement, and mature a cyber risk management program
· Why cyber insurance is a critical component of the cyber risk management process
WANTED - People Committed to Solving Our Information Security Language ProblemEvan Francen
Our industry has plenty of problems to solve. The language we use shouldn’t be one of them, and now it’s not. SecurityStudio, a Minnesota-based security SaaS company committed to solving information security problems for our industry has developed a common, easily-understood information security risk assessment that’s comprehensive, foundational, and completely free for all to use.
Today, more than 1,500 organizations are speaking the language. We invite you to do the same.
In a world of accelerating innovation and increasingly complex digital services, applications, appliances, and devices, it seems unreasonable to expect customers to understand and maintain their own cyber security. We are way past the point where even the well educated can cope with the compounded complexity of an ‘on-line-life’. The reality is, today's products and services are incomplete and sport wholly inadequate cyber defence applications.
Perhaps the single biggest problem is that defenders have never been professional attackers - and they don’t share the same level of thinking and deviousness, or indeed, the inventiveness of their enemies. Apart from an education embracing the attack techniques, and in some cases, engaging in war games, the defenders remain on the back foot However, there a number of new, an potentially significant, approaches yet to be addressed, and we care to look at the problem from a new direction.
In the maintenance of high-tech equipment and systems across many industries, identifiable precursors are employed to flag impending outages and failures. This realisation prompted a series of experiments to see if it was possible to presage pending cyber attacks. And indeed it was found to be the case!
In this presentation we give an overview of our early experimental and observational results, long with our current thinking spanning networks through to individual hackers, and inside actors.
ISACA talk - cybersecurity and security cultureCraig McGill
PwC's talented senior cybersecurity and infosec manager Ross Foley recently gave a great talk on the growing importance of security culture within infosec. Here are the slides to help raise awareness of this issue.
CIS502 discussion post responses.Disaster RecoveryDisaster rec.docxmccormicknadine86
CIS502 discussion post responses.
Disaster Recovery
Disaster recovery has been the topic of study this week. What do you think is the most difficult and expensive disaster to plan for? Do you think companies plan adequately? In your experience (or research if you have no experience) what aspect is most lacking in corporate planning? Why do you think this is? What would you do to advise leadership in your company to prepare for a disaster? Be specific and explain your thought processes on this subject based on your learning.
JP’s post states the following:Top of Form
Disaster Recovery
Disaster recovery has been the topic of study this week. What do you think is the most difficult and expensive disaster to plan for? Do you think companies plan adequately? In your experience (or research if you have no experience) what aspect is most lacking in corporate planning? Why do you think this is? What would you do to advise leadership in your company to prepare for a disaster? Be specific and explain your thought processes on this subject based on your learning.
I believe a natural disaster is the most expensive disaster to plan for. Natural disasters could occur at any point and time and location has a lot to do with it. Depending on the businesses geographic location it may have to deal with floods, earthquakes, hurricanes, electrical storms etc. The companies that I have had the pleasure to work for are located globally and have well established disaster recovery plans for natural disasters known to happen in that region. Because of the unpredictable nature natural disasters bring, not one company has a disaster recovery plan that is readily available for every situation. Funding for possible disasters that have a low chance of occurring may be a lacking aspect in corporate planning, since at the end of the day in business investments must make sense. Also advising leadership on shortages or delays of necessary materials can keep bandages, disinfectant, and medicine cabinets up to date in case of an unexpected emergencies.
Reference
https://yourbusiness.azcentral.com/effects-lack-planning-organization-11394.html
KF’s post states the following:Top of Form
Disaster recovery is the topic of study this week. What do you think is the most difficult and expensive disaster to plan for? Do you think companies plan adequately? In your experience (or research if you have no experience) what aspect is most lacking in corporate planning? Why do you think this is? What would you do to advise leadership in your company to prepare for a disaster? Be specific and explain your thought processes on this subject based on your learning.
I thought about many disasters this week and also discussed this information with my friends because I thought it was interesting. We came to a conclusion that any aspect that takes human life would be the worst kind of disaster. Physical/Weather Disaster can cause this (strong tornadoes, hurricanes, earthquakes). We also dis ...
An overview of Information Security in 2016. Prepared for the Economic Roundtable in Jacksonville, focuses on helping non-IT folks understand some things they can do to make their businesses more secure.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
2. “Measuring performance
by the number of injuries
you have is like measuring
parenting by the number
of smacks you give.”
-Dr. Robert Long
3. “Safety is not an intellectual
exercise to keep us in work. It is a
matter of life and death. It is the
sum of our contributions to
safety management that
determines whether the people
we work with live or die.”
-Sir Brian Appleton, safety assessor
4. “Safety is not a gadget, but a state
of mind.”
-Eleanor Everet, safety expert
5. “If you put good people in
bad systems, you get bad
results. You have to water
the flowers you want to
grow.”
-Stephen Covey
6. “A chain is only as strong as its
weakest link.”
-Unknown
7. “Better to be late in this world
instead of early to the next.”
-Unknown
8. “Don’t do something
detrimental to yourself. In
hurting yourself, you
obviously do damage to
you, but you are part of
the team, so when you
damage yourself via a
poor choice, you are
hurting the team as well.”
-Matt Forck, Safetystrat.com
10. “Whether you think you can or
think you can’t, you’re right.”
-Henry Ford
11. “You are your own
last line of defense in
safety. It boils down
to you.”
-Kina Repp,
workplace accident survivor
& motivational speaker
12. “To one who believes that
really good industrial
conditions are the hope for
a machine civilization,
nothing is more heartening
than to watch conference
methods and education
replacing police methods.”
-Frances Perkins,
Secretary of Labor
13. “Error is pervasive. The unexpected
is pervasive...What is not pervasive
are well-developed skills to detect
and contain these errors at their
early stages.”
-Karl E. Weick,
author, Managing the Unexpected
14. “A health and safety problem
can be described by statistics
but cannot be understood by
statistics. It can only be
understood by knowing and
feeling the pain, anguish and
depression and shattered
hopes of the victim and of the
wives, husbands, parents,
children, grandparents and
friends…”
-George Robotham, safety
advocate
15. “An incident is just the tip of the iceberg, a
sign of a much larger problem below the
surface.”
-Don Brown,
Owner, Director of Software Products and Services for BasicSafe
16. About BasicSafe
Basicsafe is an internet based integrated approach to managing safe
work cultures and compliance with regulatory requirements.
Extensive programming based on proven safety methodologies that
target employee training and information access are the backbone
of the BasicSafe suite.
For more information, please visit www.basicsafe.us/