International Travel Safety. Business Resilience

Size: px
Start display at page:

Download "International Travel Safety. Business Resilience"

Transcription

1 International Travel Safety Business Resilience 1

2 Preparation Proactive Mindset Resilience The Business resilience program is focused on empowering business activity in high-risk locations and safeguarding ViaSat personnel, assets and overall brand equity. ViaSat International Official Travel Risk Level Low 85% Medium 14% High <1% Vetted Trained Connected Secure Driver(s) Security Agent(s) Emergency Evacuation Support Global Medical Support Traveler Situational Awareness Destination Threat Assessments Medical Security Both Cost Avoidance Proactive mindset: BAs to integrate security solutions to enable business activity in high-risk destinations $0 $50,000 $100,000 $150,000 $200,000 Medical Cost for Serious Injury to Employee Secure driver $11,700 (Avg 13 days in 2016 per $900/day) [Algeria] 2

3 Preparation Awareness Readiness Environment Cyber Travel Risks Security risks Medical risks Accountability Travel kit Emergency record Medication inventory Vaccinations Contact card Local Knowledge Cultural advice Extreme weather Travel alerts Protection Cybersecurity issues Privacy Travel risks Research destination prior to arrival Accountability Register travel on TravelTracker [ISOS] Concur = automatic MyTrip = manual upload Work Supervisor S.T.E.P. 3

4 Preparation Awareness Readiness Environment Cyber Travel Risks Security risks Medical risks Accountability Travel kit Emergency record Medication inventory Vaccinations Contact card Local Knowledge Cultural advice Extreme weather Travel alerts Protection Cybersecurity issues Privacy Travel kit Passport (copies) Government ID Travel itinerary Maps & contact sheet Medications Local cell sat phone Travel kit Extra glasses Hand sanitizer Disinfectant & bandages Insect repellent Flashlight 4

5 Preparation Awareness Readiness Environment Cyber Travel Risks Security risks Medical risks Accountability Travel kit Emergency record Medication inventory Vaccinations Contact card Local Knowledge Cultural advice Extreme weather Travel alerts Protection Cybersecurity issues Privacy Travel advice Language & money Cultural tips Phone & power Geography & weather Calendar events 5

6 Preparation Awareness Readiness Environment Cyber Travel Risks Security risks Medical risks Accountability Travel kit Emergency record Medication inventory Vaccinations Contact card Local Knowledge Cultural advice Extreme weather Travel alerts Protection Cybersecurity issues Privacy Secure & encrypt data Never connect to ad-hoc or Peer to peer wireless networks Use VPN to access your corporate systems If you company does not have VPN, consider an online service to create secure connection (clear with IT before travel) Wipe and re-image after trip Tamper proofing Tamperlock Pacsafe Lockable straps 6

7 Proactive Mindset Ground Air Travel Hotel Out in Town Transportation Travel Risks Perceived vulnerability Airport Aircraft Prearranged Driver Riding in Vehicle Risk Mitigation Floor selection Room safety Emergency exits Elevators Lobby Vulnerability Low profile Varied routine Layered protection Perceived vulnerability Foreigners seen as person who has low level of situational awareness or disoriented and unable to respond to threats effectively Airport Luggage marking Handbag possession Control valuables Minimize time in airport avoid loitering Safest places lounges Walk with a purpose Aircraft On aircraft remain vigilant [restroom visits & while sleeping] 7

8 Proactive Mindset Ground Air Travel Hotel Out in Town Transportation Travel Risks Perceived vulnerability Airport Aircraft Prearranged Driver Riding in Vehicle Risk Mitigation Floor selection Room safety Emergency exits Elevators Lobby Vulnerability Low profile Varied routine Layered protection Pre-arranged driver What is my first name? Where are you taking me? Who do I work for? Taxi company name, #, driver name, mobile number and driver license Riding in vehicle >1 occupant = NO GO (aware of persons entering) If no meter agree on price PRIOR to entering Bags in vehicle vs trunk Know location, monitor progress on map Sit in back, opposite driver, lock doors, windows up Valuables out of site 8

9 Proactive Mindset Ground Air Travel Hotel Out in Town Transportation Travel Risks Perceived vulnerability Airport Aircraft Prearranged Driver Riding in Vehicle Risk Mitigation Floor selection Room safety Emergency exits Elevators Lobby Vulnerability Low profile Varied routine Layered protection Room selection Away from lobby don t advertise room number 3 rd -7 th floor fire rescue ladders height Close to elevator away from alternate entry points & any renovation work Women only floors? In room Windows & door(s) lock accessible from outside? Deadlock Door wedge? Peep hole? Smoke detectors sprinklers? Leave TV on & put do not disturb sign up Valuables in safe expensive clothing under other garments 9

10 Proactive Mindset Ground Air Travel Hotel Out in Town Transportation Travel Risks Perceived vulnerability Airport Aircraft Prearranged Driver Riding in Vehicle Risk Mitigation Floor selection Room safety Emergency exits Elevators Lobby Vulnerability Low profile Varied routine Layered protection Conduct pre-travel research Avoid high threat areas Avoid areas after dark and traveling alone Separate currency into multiple locations Maintain redundant copies of critical documents/contact info Secret critical items on your person Do not display large sums of money in public Have a distract bundle of easily accessible small bills (disposable wallet) Do not accept local help Establish rally points with team/coworkers Learn exits, surrounding streets and immediate transportation options 10

11 Resilience Medical Security Assistance Evacuation Research Risks Preparedness Facilities Civil Unrest Robbery Abduction Medical Facilities U.S. Diplomatic Missions Crisis Management Risk Assessment Safe Haven Movement plan Point of departure Risks Leading cause of medical issues: road accidents Travel Health Notices Research destination risks (Malaria, Yellow Fever, etc) Preparedness Vaccinations & medicines Identify needs for trip Food & water Emergency medical record Center for Disease Control Healthy Travel Packing List Facilities Medical center of excellence Communication barriers Payments Traveler insurance 11

12 Resilience Medical Security Assistance Evacuation Research Risks Preparedness Facilities Civil Unrest Robbery Abduction Medical Facilities U.S. Diplomatic Missions Crisis Management Risk Assessment Safe Haven Movement plan Point of departure Civil Unrest Remain calm Move out of area Conduct movement to safe haven or rally points with team/coworkers Robbery Do not fight unless that is the path to survival Appear compliant, non-threatening Drop or throw pre-staged bundle (dummy wallet) Move delicately, slowly Abduction Fight, scream, claw, run Create dead weight Mentally log as many details as possible: persons, vehicles, time, locations, witnesses Accentuate humanism: family, children, spouse (names) 12

13 Resilience Medical Security Assistance Evacuation Research Risks Preparedness Facilities Civil Unrest Robbery Abduction Medical Facilities U.S. Diplomatic Missions Crisis Management Risk Assessment Safe Haven Movement plan Point of departure Medical Centers of Excellence Standards of medical care will not be the same as at home Referrals to medical care is very important do research prior to travel U.S. Embassy & Consulate American Citizens Services Arrest or death Victims of crimes Lost passport or visas Emergency financial assistance Legal references 13

14 Resilience Medical Security Assistance Evacuation Research Risks Preparedness Facilities Civil Unrest Robbery Abduction Medical Facilities U.S. Diplomatic Missions Crisis Management Risk Assessment Safe Haven Movement plan Point of departure Notification Containment Assessment Actions Significant incident triggers evacuation criteria TRIGGERS 1. Violence outside norm impacting business 2. Collapse of law/order 3. Medical facilities ceasing ops 4. Emergency services & basic needs collapsing Account for staff Personnel stop movement & remain in safe locations Review all available information Stage at safe haven Coordinate travel Means of evacuation? Route clear to point of departure? Move to POD Method of evacuation: 1. Air 2. Ground 3. Water 14

15 Summary Preparation Proactive Mindset Low profile Layered Protection Resilience Situational Awareness Informed Traveler 15

16 Questions 16

mycisi Participant Portal: Online Tools and Support for CISI Insureds

mycisi Participant Portal: Online Tools and Support for CISI Insureds mycisi Participant Portal: Online Tools and Support for CISI Insureds This document was designed as a helpful summary or overview of the mycisi Participant Portal s main functionalities. Your CISI coverage

More information

mycisi Participant Portal: Online Tools and Support for CISI Insureds

mycisi Participant Portal: Online Tools and Support for CISI Insureds mycisi Participant Portal: Online Tools and Support for CISI Insureds This document was designed as a helpful summary or overview to the mycisi Participant Portal s main functionalities. Your CISI coverage

More information

HUMANITARIAN COORDINATION TRAINING. Safety & Security in Humanitarian Coordination

HUMANITARIAN COORDINATION TRAINING. Safety & Security in Humanitarian Coordination HUMANITARIAN COORDINATION TRAINING Safety & Security in Humanitarian Coordination Pre-Departure Security Considerations Make appointment for pre-departure security briefing with your organization Research

More information

Global Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc.

Global Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc. Global Risks Peculiar to Resorts: Prevention, Management, Litigation Richard G. Hudak Managing Partner Resort Security Consulting Inc. www.resortsecurity.com Presenters Richard G. Hudak, Managing Partner,

More information

Disaster Preparedness Community Emergency Response Team

Disaster Preparedness Community Emergency Response Team Disaster Preparedness Community Emergency Response Team Berkeley CERT Disaster Preparedness Unit Objectives Describe the types of hazards to which your community is vulnerable Describe the functions of

More information

Fighting Hunger Worldwide. WFP Field Security Keeping you safe & secure

Fighting Hunger Worldwide. WFP Field Security Keeping you safe & secure Fighting Hunger Worldwide WFP Field Security Keeping you safe & secure April 2016 Safety and security: a top priority In the field, our security risk management personnel provide specific knowledge of

More information

Solving Safety and Security Concerns at Meetings and Events

Solving Safety and Security Concerns at Meetings and Events Solving Safety and Security Concerns at Meetings and Events Chris Gernentz Safety and Security, Carlson Rezidor Hotel Group 22 years in Safety and Security Hospitality, manufacturing, petro chem, medical.

More information

Max Security Solutions

Max Security Solutions Max Security Solutions Max Security Solutions Proactive Risk Management What we do Max Security provides comprehensive security and risk management solutions for the business sector, private clients and

More information

Introduction. Overview. Every Crisis Management Team Needs a Critical Decision Checklist. Presented by Roseanne Rostron, CBCP President Raido Response

Introduction. Overview. Every Crisis Management Team Needs a Critical Decision Checklist. Presented by Roseanne Rostron, CBCP President Raido Response Every Crisis Management Team Needs a Critical Decision Checklist Presented by Roseanne Rostron, CBCP President Raido Response Tuesday, May 9, 2006 Introduction Roseanne Rostron, CBCP - President Raido

More information

Booking vacation packages (general)

Booking vacation packages (general) Outrigger Hotels and Resorts Vacations FAQs: Booking vacation packages (general) Am I booking my vacation package directly with Outrigger Hotels and Resorts? No, your booking is handled through Global

More information

Making a Family Emergency Communications Plan

Making a Family Emergency Communications Plan Making a Family Emergency Communications Plan OEM Open House 9/9/17 Arline Stith, presenter Content mostly based on MEMA Massachusetts Emergency Management Agency mass.gov/eopss/agencies/mema/ Cell/Mobile

More information

Best Practices for Campus Security. January 26, 2017

Best Practices for Campus Security. January 26, 2017 Best Practices for Campus Security January 26, 2017 Welcome to Safe University (Safe U ) Protecting People, Property, and Tradition: The Safe University (Safe U SM ) Program By G. Michael Verden, Owner

More information

St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN

St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN ERP Lockdown may be initiated in response to incidents originating within the facility, or incidents occuring in the community that have the

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) Security Risk Assessment Tool Physical Safeguards Content Version Date:

More information

IS-906: Workplace Security Awareness. Visual 1 IS-906: Workplace Security Awareness

IS-906: Workplace Security Awareness. Visual 1 IS-906: Workplace Security Awareness IS-906: Workplace Security Awareness Visual 1 Course Administration Sign-in sheet Course evaluation forms Site logistics Emergency procedures Breaks Restrooms Cell phones/blackberrys Visual 2 Course Objectives

More information

South East Region THIRA

South East Region THIRA South East Region THIRA The THIRA follows a four-step process, as described in Comprehensive Preparedness Guide 201, Second Edition: 1. Identify the Threats and Hazards of Concern. Based on a combination

More information

For more information: FONETRAC - FULL INTEGRATION WITH GLOBAL MONITORING

For more information:   FONETRAC - FULL INTEGRATION WITH GLOBAL MONITORING FONETRAC - FULL INTEGRATION WITH GLOBAL MONITORING For more information: http://fonetrac-go.com 1995-2018 IMG GlobalSecur, Inc. All Rights Reserved. GlobalSecur & FoneTrac are registered trademarks of

More information

MAYS LANDING CAMPUS SECURITY

MAYS LANDING CAMPUS SECURITY SECURITY Clery Act Public Crime Log From 1/1/2018 To 9/18/2018 : C BUILDING Date/Time Reported: 1/3/2018 1530 Incident Occurred Between: 1/3/2018 1530 and UNKNOWN Case #: 0120180103-000001 Int. Ref. #:

More information

Kodagu District Disaster Management Plan

Kodagu District Disaster Management Plan Kodagu District map Message Deputy Commissioner Kodagu District Disaster Management Plan 2015-16 Content Index Page No. Abbreviation 1 Kodagu District Disaster Management Team 2 4 Chapter 1 INTRODUCTION

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

keeping executives safe

keeping executives safe keeping executives safe Neil Austin and Lawrence Dando, two career surveillance specialists, established Mint Executive in 2015, having worked on and managed some of the most complex Police operations

More information

CYBER SECURITY AIR TRANSPORT IT SUMMIT

CYBER SECURITY AIR TRANSPORT IT SUMMIT CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER

More information

Prepare your Emergency respons, continuity plan, recovery plan

Prepare your Emergency respons, continuity plan, recovery plan Prepare your Emergency respons, continuity plan, recovery plan Panel Discussion with PortAventura,Europa Park, Disneyland Paris,Liseberg,the Safety Committee members with Q & A from attendees Septembre

More information

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED

More information

Getting Started Guide WORLDCUE MOBILE

Getting Started Guide WORLDCUE MOBILE Getting Started Guide WORLDCUE MOBILE Operate Globally with Confidence 2 TABLE OF CONTENTS INTRODUCTION TO WORLDCUE MOBILE 3 INITIAL SETUP 3 TERMS AND CONDITIONS 6 DEVICE PHONE NUMBER 6 NOTIFICATIONS 7

More information

COPYRIGHTED MATERIAL. Contents. xv xxi. Preface About the Web Site

COPYRIGHTED MATERIAL. Contents. xv xxi. Preface About the Web Site Preface About the Web Site CHAPTER 1 Business Continuity Management Plan 1 Crisis Management 4 The Value 5 Common Failings 7 Business Continuity Goals 9 Defining a Crisis 10 Mapping Risks 11 Critical Dependencies

More information

BUSINESS DISASTER & TERRORISM PREPAREDNESS

BUSINESS DISASTER & TERRORISM PREPAREDNESS BUSINESS DISASTER & TERRORISM PREPAREDNESS MINORITY CHAMBER OF COMMERCE, CYBER SECURITY FORUM MIAMI-DADE PUBLIC-PRIVATE PARTNERSHIP The Public-Private Partnership program incorporates the public and private

More information

MedAire Trip Ready User Guide for iphone

MedAire Trip Ready User Guide for iphone Get Trip Ready: Flight planning and travel risk management just got a whole lot easier. Assess and mitigate travel and safety risks for crew and passengers on your upcoming trips with the MedAire Trip

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

Updating Your Travel Profile... 3 Travel Arranger... 3 Access... 3 Obtain Airfare Quote.. 5. Obtain Car Rental Quote.. 8. Obtain Hotel Room Quote 10

Updating Your Travel Profile... 3 Travel Arranger... 3 Access... 3 Obtain Airfare Quote.. 5. Obtain Car Rental Quote.. 8. Obtain Hotel Room Quote 10 Table of Contents Updating Your Travel Profile... 3 Travel Arranger... 3 Access... 3 Obtain Airfare Quote.. 5 Obtain Car Rental Quote.. 8 Obtain Hotel Room Quote 10 Book a Flight... 13 Book a Car... 17

More information

Business Continuity Planning

Business Continuity Planning Business Continuity Planning The Unexpected Happens Be Ready Copyright -Business Survival Partners, llc. 2011 - All Rights Reserved www.survivalpartners.biz RISK 2 Risks to National Security A secure and

More information

Table of Contents. Page 1 of 17

Table of Contents. Page 1 of 17 Table of Contents Accessing Your Concur Site... 2 Updating Your Travel Profile (You must do this before booking travel)... 2 Reviewing the Home Page... 4 Tulane Travel Site and Policy... 4 Company Notes...

More information

Concur Travel User Guide

Concur Travel User Guide Concur Travel User Guide 1 Table of Contents What is Concur?... 3 Concur Modules... 3 Logging on to Concur... 5 Exploring the Home Page... 6 Updating Your Travel Profile... 7 Personal Information... 7

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

People Assets Reputation

People Assets Reputation Welcome to Spearpoint International LLC The risks faced by global business are greater now than ever, the increasing danger from terrorism and the ever present threat from organized and opportunistic crime

More information

Freedom to explore. Tracker takes care of you and your loved ones, no matter where you go. To care is to protect.

Freedom to explore. Tracker takes care of you and your loved ones, no matter where you go. To care is to protect. Freedom to explore Tracker takes care of you and your loved ones, no matter where you go. To care is to protect. To care is to protect Tracker gives you the freedom to explore your world. With our innovative

More information

desktop Security Rev 3.0

desktop Security Rev 3.0 desktop Security Rev 3.0 Technology that works for you. Imagine having the ability to automate your establishment s safety and security procedures with the simple click of a button. Even better, imagine

More information

TEA, Inc. CORPORATE HEALTH AND SAFETY PROGRAM

TEA, Inc. CORPORATE HEALTH AND SAFETY PROGRAM CORPORATE HEALTH AND SAFETY PROGRAM Updated June 24, 2013 August 12, 2013 Prepared by 10636 Linkwood Court Baton Rouge, Louisiana 70810 Phone: (225) 767-3880 Fax: (225) 767-3883 TABLE OF CONTENTS Section

More information

ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response

ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT ACTIVE SHOOTER RESPONSE Responding to armed assault acts of terrorism and active shooter incidents Acts of terrorism and shootings in public places have become

More information

Number: USF System Emergency Management Responsible Office: Administrative Services

Number: USF System Emergency Management Responsible Office: Administrative Services POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

AN EMERGENCY OPERATIONS CENTER FIELD STUDY HENRICO COUNTY, VIRGINIA. by Anna M. McRay

AN EMERGENCY OPERATIONS CENTER FIELD STUDY HENRICO COUNTY, VIRGINIA. by Anna M. McRay Notes on the Science of Extreme Situations, Paper No. 2 AN EMERGENCY OPERATIONS CENTER FIELD STUDY HENRICO COUNTY, VIRGINIA by Anna M. McRay Copyright 2002 by Anna M. McRay. All rights reserved. Permission

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

Security Guideline for the Electricity Sector: Business Processes and Operations Continuity

Security Guideline for the Electricity Sector: Business Processes and Operations Continuity Security Guideline for the Electricity Sector: Business Processes and Operations Continuity Preamble: It is in the public interest for NERC to develop guidelines that are useful for improving the reliability

More information

July 31, University of Maryland Emergency Management Faculty Staff Essentials

July 31, University of Maryland Emergency Management Faculty Staff Essentials July 31, 2015 University of Maryland Emergency Management Faculty Staff Essentials What is Emergency Management? 2 What is Emergency Management? The process of preparing for, mitigating, responding to

More information

PASS Your HMA / HMO Exam Incident Management

PASS Your HMA / HMO Exam Incident Management 1) Who assumes command at a haz mat incident? A) The driver of the first-arriving squad truck B) The first person on the scene or the ranking individual of the first company on the scene C) The first-arriving

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

Forensics and Active Protection

Forensics and Active Protection Forensics and Active Protection Computer and Network Forensics Research Project 2003 Work Update Yanet Manzano Florida State University manzano@cs.fsu.edu manzano@cs.fsu.edu 1 Outline CNF Project Goal

More information

HOTEL RESILIENT Plan ahead stay ahead. With support from the German Government through

HOTEL RESILIENT Plan ahead stay ahead. With support from the German Government through HOTEL RESILIENT Plan ahead stay ahead With support from the German Government through WHAT CAN GO WRONG WILL GO WRONG Murphy s Law More than 40% of hotels do not reopen after large disasters FEMA 2010

More information

Guidance for Accident Reporting

Guidance for Accident Reporting Guidance for Accident Reporting Produced by Date approved and agreed Health, Safety and Wellbeing 1 st February 2016 Review Date 1 st February 2017 Version 1.0 Document reference HSW/GN/AR If you need

More information

CRITICAL INCIDENT STRESS MANAGEMENT

CRITICAL INCIDENT STRESS MANAGEMENT The purpose of a Critical Incident Stress Management (CISM) is to provide support and professional intervention after emergency personnel have been subjected to a significant traumatic event. CISM is designed

More information

Ulster University Policy Cover Sheet

Ulster University Policy Cover Sheet Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective

More information

Train employees to avoid inadvertent cyber security breaches

Train employees to avoid inadvertent cyber security breaches Train employees to avoid inadvertent cyber security breaches TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 2 How much do you know about cyber security? Small business owners often lack

More information

USER GUIDE. for. Worldcue TRAVELER

USER GUIDE. for. Worldcue TRAVELER USER GUIDE for Worldcue TRAVELER Updated: 17Mar2009 Welcome to Worldcue TRAVELER! Preface This user guide is designed for use by any Worldcue TRAVELER user and provides guidance on how to use the many

More information

Breaking down information silos to improve GSOC efficiency and effectiveness

Breaking down information silos to improve GSOC efficiency and effectiveness Breaking down information silos to improve GSOC efficiency and effectiveness Microsoft s Global Security Operations teams adopted Visual Command Center from IDV Solutions, an Everbridge company, to reduce

More information

Quick Reference Card Booking Travel in Concur Travel and Expense

Quick Reference Card Booking Travel in Concur Travel and Expense This QRC provides the steps for travelers and/or their delegates to book travel and complete the Request Header in Concur Travel and Expense. Log In To Concur Go to the Employee Portal page. www.purdue.edu/employeeportal

More information

HIPAA FOR BROKERS. revised 10/17

HIPAA FOR BROKERS. revised 10/17 HIPAA FOR BROKERS revised 10/17 COURSE PURPOSE The purpose of this information is to help ensure that all Optima Health Brokers are prepared to protect the privacy and security of our members health information.

More information

American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment

American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment July 20, 2017 DECIDEPLATFORM.COM The new Reality of Cyber Security

More information

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber

More information

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld Balancing Compliance and Operational Security Demands Nov 2015 Steve Winterfeld What is more important? Compliance with laws / regulations Following industry best practices Developing a operational practice

More information

Global Crisis Management at Target

Global Crisis Management at Target 2011/EPWG/WKSP/008 Session 1 Global Crisis Management at Target Submitted by: Target Workshop on Private Sector Emergency Preparedness Sendai, Japan 1-3 August 2011 Global Crisis Management at Target Bryan

More information

SECTION 9 POLICY AND PROCEDURES

SECTION 9 POLICY AND PROCEDURES SECTION 9 POLICY AND PROCEDURES This section contains links to Clackamas County Employment Policy & Practice (EPP) documents that have particular application to Risk Management. These are the same documents

More information

CYBER SECURITY FOR WATER AND WASTEWATER UTILITIES PRESENTED BY: DAVID A. CHANDA, PE

CYBER SECURITY FOR WATER AND WASTEWATER UTILITIES PRESENTED BY: DAVID A. CHANDA, PE CYBER SECURITY FOR WATER AND WASTEWATER UTILITIES PRESENTED BY: DAVID A. CHANDA, PE Cyber Security A Hot Topic NotPetya Cyberattack 2018 Thales Data Threat Report Tempting Cedar Spyware Implementation

More information

ACI-NA 2018 Risk Management Conference SAFETY Act. Washington, D.C

ACI-NA 2018 Risk Management Conference SAFETY Act.  Washington, D.C ACI-NA 2018 Risk Management Conference SAFETY Act Akmal Ali, J.D. akmal.ali@catalystdc.com Principal, Catalyst Partners 1250 Connecticut Ave. NW www.catalystdc.com Washington, D.C. 20036 Following the

More information

Florida State University

Florida State University Florida State University Disaster Recovery & Business Continuity Planning Overview October 24, 2017 1 Key Readiness Questions Has your department identified the business functions and infrastructure that

More information

Yoga Retreat Booking Agreement with Iguana Lodge

Yoga Retreat Booking Agreement with Iguana Lodge Yoga Retreat Booking Agreement with Iguana Lodge This booking agreement is between: El Marlin de Peninsula de Osa, SA, Cedula Juridica 3-101-141-757 (a Costa Rican company) Calle a Calle Playa Platanares,

More information

Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay

Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay Assistant Director General Office of State Security and Emergency Coordination Department of the Premier and Cabinet

More information

STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season

STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season IBERIA PARISH STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Critical Infrastructure Owners/Operators

More information

Global Crisis Management at Target

Global Crisis Management at Target Global Crisis Management at Target Bryan Strawser Group Manager, Global Crisis Management Target & Chairman, Private Sector Committee, National Emergency Management Association (US) Global Crisis Management

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference

More information

Katherine Fernandez Rundle. MiAMi s state AttoRney. Justice Starts Here CRIME. prevention guide. Elderly.

Katherine Fernandez Rundle.   MiAMi s state AttoRney. Justice Starts Here CRIME. prevention guide. Elderly. Katherine Fernandez Rundle MiAMi s state AttoRney www.miamisao.com Justice Starts Here CRIME prevention guide for thee E Elderly ly At the bank Many criminals know exactly when government checks arrive

More information

Presented by Joe Burns Kentucky Rural Water Association July 19, 2005

Presented by Joe Burns Kentucky Rural Water Association July 19, 2005 Infrastructure Security for Public Water and Wastewater Utilities Presented by Joe Burns Kentucky Rural Water Association July 19, 2005 Public Health Security and Bioterrorism Preparedness and Response

More information

Emergencies: Protecting Staff & Assets. Presented By: Tom Heebner, CSP, ARM, ABCP AVP / Risk Consultant HUB International Limited

Emergencies: Protecting Staff & Assets. Presented By: Tom Heebner, CSP, ARM, ABCP AVP / Risk Consultant HUB International Limited Emergencies: Protecting Staff & Assets Presented By: Tom Heebner, CSP, ARM, ABCP AVP / Risk Consultant HUB International Limited Agenda Why is Planning Important? Lessons Learned From Recent Events The

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security

More information

Concur Travel User Guide

Concur Travel User Guide Concur Travel User Guide Table of Contents What is Concur?... 2 What Can You Use it For?... 2 Logging on to Concur... 3 Exploring the Home Page... 4 Updating Your Travel Profile... 5 Personal Information...

More information

Demand management Policy

Demand management Policy Demand management Policy Policy summary This policy provides guidance on all aspects of demand management from taking of the initial call to the completion of tasks following attendance at incidents. Aim

More information

Local Government Disaster Planning and what can be learned from it.

Local Government Disaster Planning and what can be learned from it. Local Government Disaster Planning and what can be learned from it. Emergency Operations Plans Emergency Support Functi0ns: ESF-1 ESF-2 ESF-3 ESF-4 ESF-5 ESF-6 ESF-7 Transportation Communications Public

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

Walmart Resiliency NCEM ECU Hurricane Conference May 2016

Walmart Resiliency NCEM ECU Hurricane Conference May 2016 NCEM ECU Hurricane Conference May 2016 Emergency Management Guiding Principles Taking Care of Our Associates Taking Care of Our Operations Taking Care of Our Communities 2 Why Preparedness Matters to Walmart

More information

L18: Integrate Control Disciplines to Increase Control and Save Money

L18: Integrate Control Disciplines to Increase Control and Save Money L18: Integrate Control Disciplines to Increase Control and Save Money Kathleen Lucey, FBCI Montague Risk kalucey@montaguetm.com tel: 1.516.676.9234 Connections Information Security (computer security,

More information

Climate change and health Building resilience through ehealth

Climate change and health Building resilience through ehealth Climate change and health Building resilience through ehealth Helsinki, 31 August 2012 Dr. Åsa Holmner Rocklöv Dept. of Biomedical Engineering & Informatics University Hospital of Northern Sweden & Umeå

More information

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates Corporate Security & Emergency Management Summary of Submitted 2015 From Rates Service Expense 2014 2015 Revised Non Tax Revenue Net Tax Supported Expense Draft Non Tax Revenue Net Tax Supported Increase

More information

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC Draft Version incorporating Management Review [MR] Edits and Comments Document Date: July 2013 Goal One: Ensure Interoperable

More information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington

More information

Hurricane and Storm Commercial Damage Assessment

Hurricane and Storm Commercial Damage Assessment Hurricane and Storm Commercial Continue to follow all evacuation orders. Stay up-to-date on current hurricane and storm information by visiting the U.S. National Hurricane Center. How to Conduct s:. PREPARE

More information

Making airports safer and smarter

Making airports safer and smarter Making airports safer and smarter Transforming Situation Management into Actionable Intelligence Dharmesh Patel October 17 th, 2017 Technology & Theory Integration Workflow Automation Collaboration Airports

More information

INFINITI CONNECTION FAQs

INFINITI CONNECTION FAQs What is Infiniti Connection? Do I need my cell phone to be able to use Infiniti Connection features? What type of connection does Infiniti Connection use? How many features does Infiniti Connection have?

More information

Using the NIST Framework for Metrics 5/14/2015

Using the NIST Framework for Metrics 5/14/2015 Using the NIST Framework for Metrics 5/14/2015 ITD - Public Safety Safety improvements reduced total crashes by 29% and injury crashes by 41% in corridors after GARVEE projects were completed Ads / Commercials

More information

Crisis Management at Disneyland Paris Eric Cosset (Disneyland Paris) 27/09/2017

Crisis Management at Disneyland Paris Eric Cosset (Disneyland Paris) 27/09/2017 Crisis Management at Disneyland Paris Eric Cosset (Disneyland Paris) 27/09/2017 Summary 1. Introduction and definition 2. DLP Crisis management evolution 3. Kinetics of a crisis 4. Tools and processes

More information

Express Monitoring 2019

Express Monitoring 2019 Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Hometown Security Overview Minnesota Festivals and Events Association 5 November, 018

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

Weathering the Perfect Storm:

Weathering the Perfect Storm: Weathering the Perfect Storm: Overcoming Escalating Threats to Business Operations September 24, 2007 Agenda Overview of Trends Marty Pfinsgraff ijet Intelligent Risk Systems Panel Discussion: Weathering

More information

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification

More information

DeMystifying Data Breaches and Information Security Compliance

DeMystifying Data Breaches and Information Security Compliance May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts

More information

Business Continuity Policy

Business Continuity Policy Business Continuity Policy Version Number: 3.6 Page 1 of 14 Business Continuity Policy First published: 07-01-2014 Amendment record Version Date Reviewer Comment 1.0 07/01/2014 Debbie Campbell 2.0 11/07/2014

More information