Santé et sécurité au travail Faites de chaque travailleur un leader SST

Size: px
Start display at page:

Download "Santé et sécurité au travail Faites de chaque travailleur un leader SST"

Transcription

1 Santé et sécurité au travail Faites de chaque travailleur un leader SST 9 septembre

2 Visible Felt Leadership - Showing Passion for Safety Ward Metzler Montreal, Quebec September 9, 2015 Copyright 2014, E. I. du Pont de Nemours and Company. All rights reserved. The DuPont logo, DuPont TM and The miracles of science TM are registered trademarks of DuPont

3 The DuPont Safety Culture Powder mill operation began in Off-the-job safety program began in the 1950s. First safety rules established in Safety is a line management responsibility. No employee may enter a new or rebuilt mill until a member of top management has personally operated it. E. I. du Pont Belief that all injuries are preventable developed in the 1940s. Safety statistics began in

4 Our Purpose DuPont is a Science Company We work collaboratively to find sustainable, innovative, market-driven solutions to solve some of the world s biggest challenges, making lives better, safer, and healthier for people everywhere. 3 9/10/2015 DuPont Today 2014 National Geographic Image and Company. All rights reserved. The DuPont logo, DuPontTM and The miracles of sciencetm are registered trademarks of DuPont Copyright 2015, E. I. du Pont de Nemours 3

5 Our Areas of Focus As the global population climbs up to 9 billion people in 2050, DuPont uses its science-powered innovation to help solve the challenges facing the world, with a focus on: FOOD ENERGY PROTECTION 4 9/10/2015 Copyright 2015, E. I. du Pont de Nemours and Company. All rights reserved. The DuPont logo, DuPont TM and The DuPont miracles of science Today TM are 2014 registered trademarks of DuPont 4

6 Felt Leadership Safety Culture Safety Culture Safety Felt Leadership DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.

7 FELT Leadership What is it? It is TO DO, TO BE SEEN, and TO BE BELIEVED

8 Felt Leadership Felt Leadership -management s total actions that lead people at all levels to understand and feel their leaders high standards, and accept their strong commitment to safety as being genuine DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.

9 Felt Leadership Why is Felt Leadership important? YOU are the primary influence on your organization. You lead your people. Your people will satisfy perceived expectations. You set expectations and create culture by your actions or your inaction. DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.

10 Felt Leadership Felt Leadership 1. Be visible to the organization. 2. Be relentless about time with your people. 3. Recognize your role as a teacher/trainer. 4. Lead by example. Maintain a self-safety focus. 5. Hold people accountable 6. You are authentic in all aspects of communication 7. Celebrate and recognize successes. DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.

11 Felt Leadership Providing coaching and feedback is a key aspect of Felt Leadership Approach Courses and reading 10% Networking, feedback about good and bad examples 20% On-the-job experiences, tasks and problem solving 70%

12 Felt Leadership What processes and systems are used by organizations to provide Felt Leadership around safety? Workplace observations Leadership of safety committees Town hall meetings Others? DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.

13 Safety Culture delivers Operational Discipline Safety Management Standards Operational Discipline Operational Efficiency 60% x 30% = 18% System Quality Implementation State Results (Safety performance) Safety Professionals Production Line (Operations) 12

14 Reaction DuPont Bradley Curve Anticipation Where are we? Where do we want to be? The GOAL is ZERO Incidents are bound to happen I don t want to get caught I don t want to get hurt I don t want anyone to get hurt Reactive Dependent Independent Interdependent Safety by Natural Instinct Compliance is the Goal Delegated to Safety Manager Lack of management involvement. Management Commitment Discipline & Rules Supervisor Control, Emphasis, and Goals Values all people Training is the answer. Personal Knowledge, Commitment, & Standards Internalization Personal value Care for Self Practice and habits Individual recognition Help Others Conform Others Keeper Care for others Networking contributor Organizational Pride Reactive Proactive Copyright 2014 DuPont. 13

15 DuPont Safety Perception Survey Safety Culture 24 core questions Cross-section of employees Data is compared across departments, levels, responsibilities Test if safety is a core value held by management and if that value is transferred to the worker on the floor Examine employee and management involvement in audits, incident investigations and safety meetings Examine attitudes about off-the-job safety 14 DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.

16 DuPont uses 12 elements to drive toward World-Class Safety. They are based on proven Safety Management Principles. Integrated Safety Management System Strong Leadership Management commitment Policies & principles Goals, objectives & plans Procedures & performance standards Appropriate Structure Focused Processes & Actions Line management accountability & responsibility Safety personnel Integrated organization structure Motivation & awareness Incident investigation Observations & audits Effective communication Training & development 15

17 DuPont Safety Management System Systems Leadership (Site & Corporate) 16

18 Reaction DuPont Bradley Curve Anticipation Where are we? Where do we want to be? The GOAL is ZERO Incidents are bound to happen I don t want to get caught I don t want to get hurt I don t want anyone to get hurt Reactive Dependent Independent Interdependent Safety by Natural Instinct Compliance is the Goal Delegated to Safety Manager Lack of management involvement. Management Commitment Discipline & Rules Supervisor Control, Emphasis, and Goals Values all people Training is the answer. Personal Knowledge, Commitment, & Standards Internalization Personal value Care for Self Practice and habits Individual recognition Help Others Conform Others Keeper Care for others Networking contributor Organizational Pride Reactive Proactive Copyright 2014 DuPont. 17

19 A desirable safety culture is built by approaching safety proactively, shifting focusfrom injuries to risks that can be corrected before injuries occur. Shift emphasis Operator slips, grabs at handrail and misses. Falls from equipment platform to the cement floor below. Operator slips, grabs at handrail and misses. Ankle is sprained, requires time off or light duty. Operator slips, grabs at handrail and misses. Twists ankle which requires trip to clinic. Operator slips, grabs handrail. No injury or minor abrasion from grabbing the handrail. from here Operator jumps off of equipment at the end of his shift rather than stepping down the stairs and holding the handrail. To here

20 Serious Injury & Fatality Prevention Low frequency / High consequence SERIOUS INJURY & FATALITY (SIF) Near Miss Incident with potential for injury, but no actual consequences or injury occurred. Lost Time Injuries Higher Risk Activity (HRA) Task, exposure, activity that if not anticipated / controlled could cause possible SIF. Recordable Injuries High Potential Incident (HPI) Incident with or without injury that has potential to cause possible SIF. First Aids HPIs Example Life Saving Rule Incidents 19

21 What are the challenges in today s workforce? Demographics Many companies have been focused on reducing people numbers Retirements are forcing companies to start hiring Knowledge transfer How do you connect to new employees? 20

22 Behavioral and NEUROSCIENCE 21 DuPont Sustainable Solutions Copyright 2015 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.

23 WE ROUTINELY MAKE We routinely make risky decisions RISKY DECISIONS 22 DuPont Sustainable Solutions Copyright 2015 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.

24 PRINCIPLES of Affective Psychology 23 DuPont Sustainable Solutions Copyright 2015 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.

25 module OBJECTIVES Own It UNDERSTAND that we routinely take unnecessary amounts of risk each and every day. RECOGNIZE that if ONLY a small percentage of our decisions are risky, we put ourselves in danger hundreds of times a day! 24

26 We each make up to 35,000decisions a day most often, without even realizing it 25

27 If ONLY1 % of your decisions are RISKY YOU PUT YOURSELF in DANGER 350times per DAY! =+21decisions per HOUR awake =1decision every 3 minutes DuPont Sustainable Solutions Copyright 2015 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates. 26

28 That 1% of RISKY DECISIONS x200,000 employees = 70,000,000 Risky Decisions PER DAY 3,000,000 Risky Decisions PER HOUIR 50,000 Risky Decisions PER MINUTE How much RISK CAN YOU AFFORD? 27

29 tools PAUSE PROCESS OWN IT PROCEED Copyright 2015, E. I. du Pont de Nemours and Company. All rights reserved. The DuPont logo, DuPontTM and The miracles of sciencetm are registered trademarks of DuPont 28

30 What s YOURAPPROACH? Copyright 2015 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.

31 Leadership iskey 30 30

32 DECISIONS Information and DATA ABSOLUTE right/wrong black/white safe/unsafe SUBJECTIVE good / bad fun/difficult feeling andemotion 31

33 WeHEAR data 32

34 Wefeel emotions 33

35 Persuasive leaders inspire

36 THEODORE ROOSEVELT 35 35

37 Persuasive leaders influence

38 Felt Leadership Safety Culture Safety Culture Felt Leadership 37 DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.

39 DuPont Bradley Value Curve for Operational Risk Management & Safety Culture Improvement LEADERSHIP WORKER ENGAGEMENT Incident & Injury Rates BRADLEY CURVE Risk Reduction & Control GROWTH CURVE Value Generation & Operational Discipline Operational Excellence REACTIVE DEPENDENT INDEPENDENT INTERDEPENDENT CULTURAL MATURITY 38 DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.

40 DuPont Contact Information Ward Metzler Account Executive DuPont Sustainable Solutions E. I. du Pont Canada Company 1919 Minnesota Court, Mississauga, ON L5N0C9 Tel : Ward.Metzler@dupont.com 39

41 Questions? 40

42 Santé et sécurité au travail Faites de chaque travailleur un leader SST 9 septembre

(JSA) Job Safety Analysis Program. Safety Manual. 1.0 Purpose. 2.0 Scope. 3.0 Regulatory References. 4.0 Policy

(JSA) Job Safety Analysis Program. Safety Manual. 1.0 Purpose. 2.0 Scope. 3.0 Regulatory References. 4.0 Policy Page 1 of 7 1.0 Purpose Job Safety Analysis is a primary element of the Hazard Identification and Mitigation Management Process. JSA s are completed daily to identify and evaluate hazards associated with

More information

ACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE

ACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE ACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE Cybersecurity Awareness by gamification: Kaspersky CyberSafety Training 2017 Kaspersky Lab. All rights reserved. 1 HUMAN MISTAKES

More information

Learning's from Major Process Safety Incidents

Learning's from Major Process Safety Incidents Learning's from Major Process Safety Incidents Brian D. Rains Global PSM Practice Leader DuPont Sustainable Solutions 23 February 2012 Copyright 2010 DuPont. All rights reserved. The DuPont Oval Logo,

More information

Certified Manager Certification

Certified Manager Certification Certified Manager Certification Get Trained Get Certified Get Recognized www.hr-pulse.org In Partnership With HR Pulse has the Learning Solutions to Empower Your People & Grow Your Business About ICPM

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

T78 - Improve Safety and Compliance Using The Connected Enterprise

T78 - Improve Safety and Compliance Using The Connected Enterprise T78 - Improve Safety and Compliance Using The Connected Enterprise PUBLIC Copyright 2018 Rockwell Automation, Inc. All Rights Reserved. 1 The Connected Enterprise delivers transformational value in productivity

More information

Cybersafety Culture Assessment

Cybersafety Culture Assessment Kaspersky Enterprise Cybersecurity Cybersafety Culture Assessment Target-based learning program: culture & attitudes kaspersky.com/awareness #truecybersecurity Cybersafety Culture Assessment Focus Assessment

More information

Department of Justice Policing and Victim Services BUSINESS PLAN

Department of Justice Policing and Victim Services BUSINESS PLAN Policing and Victim Services BUSINESS PLAN 2004-2005 1. The Creation of a New Division The was created in 2001 by joining the former Divisions: Policing and Public Safety Services and Victims Services.

More information

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals 2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals Sponsored by Contents Introduction....3 Key Takeaways from the 2017 Report:....3 Security

More information

Maintain, Repair, Rebuild, Protect. Solutions for Industrial Asset Maintenance and Reliability

Maintain, Repair, Rebuild, Protect. Solutions for Industrial Asset Maintenance and Reliability Maintain, Repair, Rebuild, Protect Solutions for Industrial Asset Maintenance and Reliability Henkel. Solutions for All Your Maintenance Challenges. Maintain, Repair, Rebuild and Protect Industrial Equipment.

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

Cyber Security is it a boardroom issue?

Cyber Security is it a boardroom issue? Brisbane, 23 September 2014 Alistair Blake Director Cyber Security & Risk Services Today s session will cover Cyber Security and the Boardroom Executive sponsorship Organisational culture Operational readiness

More information

WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY. Integrating Resiliency into Our Culture and DNA

WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY. Integrating Resiliency into Our Culture and DNA WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY Integrating Resiliency into Our Culture and DNA Table of Contents Executive Summary.... 3 Background.... 4 Charter.................................................................4

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

REINVENTING ETHICAL, SUSTAINABLE SUPPLY CHAINS

REINVENTING ETHICAL, SUSTAINABLE SUPPLY CHAINS REINVENTING ETHICAL, SUSTAINABLE SUPPLY CHAINS HP Inc. Sustainability Briefing January 22, 2018 1 Copyright 2018 HP Development Company, L.P. The information contained herein is subject to change without

More information

SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION

SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION POSITION: CHIEF OPERATING OFFICER FUNCTION: Responsible for all aspects of the SLV POA day-to-day operations. In this capacity,

More information

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com Better together KPMG LLP s GRC Advisory Services for IBM OpenPages implementations kpmg.com KPMG A leader in GRC services KPMG LLP (KPMG) is the U.S. member firm of the KPMG global network of professional

More information

EVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System

EVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System EVALUATION AND APPROVAL OF AUDITORS Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System 1 TABLE OF CONTENTS 1. Scope and field of Application 3 2. Normative

More information

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:

More information

The data quality trends report

The data quality trends report Report The 2015 email data quality trends report How organizations today are managing and using email Table of contents: Summary...1 Research methodology...1 Key findings...2 Email collection and database

More information

Sustainable Security Operations

Sustainable Security Operations Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing,

More information

State of Cloud Survey GERMANY FINDINGS

State of Cloud Survey GERMANY FINDINGS 2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff

More information

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN Improving Data Governance in Your Organization Faire Co Regional Manger, Information Management Software, ASEAN Topics The Innovation Imperative and Innovating with Information What Is Data Governance?

More information

POSITION DESCRIPTION

POSITION DESCRIPTION UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:

More information

PRODUCT SAFETY PROFESSIONAL CERTIFICATION PROGRAM DETAILS. Overview

PRODUCT SAFETY PROFESSIONAL CERTIFICATION PROGRAM DETAILS. Overview Overview PRODUCT SAFETY PROFESSIONAL CERTIFICATION PROGRAM DETAILS The Product Safety Professional Certification Program at the Richard A. Chaifetz School of Business focuses on the theoretical as well

More information

Organizational Privacy Transformation: A case study from Critical Issues to Award Winning Success

Organizational Privacy Transformation: A case study from Critical Issues to Award Winning Success Organizational Privacy Transformation: A case study from Critical Issues to Award Winning Success Norine Primeau-Menzies VP Customer Services, Chief Privacy Officer May 2012 Agenda Overview of OTN Setting

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose: STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security

More information

The E.ON U.S. Approach To Effective Employee Safety. Chris Hermann Senior Vice President, Energy Delivery

The E.ON U.S. Approach To Effective Employee Safety. Chris Hermann Senior Vice President, Energy Delivery The E.ON U.S. Approach To Effective Employee Safety Chris Hermann Senior Vice President, Energy Delivery E.ON U.S. Safety World-class safety performer Overseen by the E.ON U.S. Safety Council Ensures internal

More information

The State of Cybersecurity and Digital Trust 2016

The State of Cybersecurity and Digital Trust 2016 The State of Cybersecurity and Digital Trust 2016 Identifying Cybersecurity Gaps to Rethink State of the Art Executive Summary Executive Summary While the advent of digital technology has fueled new business

More information

MSD Prevention in Manual Materials Handling (MMH)

MSD Prevention in Manual Materials Handling (MMH) MSD Prevention in Manual Materials Handling (MMH) CRE-MSD Conference October 2, 2017 Lisa Beech-Hawley, Manager, Health and Safety Program Donna Francom, Health & Safety Advisor Kesavan Jeyaveerasingam,

More information

ecald TM Web Developer Position Description

ecald TM Web Developer Position Description Date: November 2015 Job Title : (Part-time 0.5 FTE) Department : Institute of Innovation and Improvement Location : North Shore Hospital NB: the role will require the appointee to commute to West Auckland

More information

Colorado Digital Government Summit & Cyber Security Summit. September 18, 2007

Colorado Digital Government Summit & Cyber Security Summit. September 18, 2007 Colorado Digital Government Summit & Cyber Security Summit September 18, 2007 Aligning IT Strategy with Business Processes / Objectives Paul M Engelbert Global Practice Manager September 18, 2007 Aligning

More information

Kaspersky Security Awareness

Kaspersky Security Awareness Kaspersky for Business Kaspersky Security Awareness Gamified training programs for all organizational levels www.kaspersky.com #truecybersecurity An effective way of building cybersafety across an organization

More information

Build confidence in the cloud Best practice frameworks for cloud security

Build confidence in the cloud Best practice frameworks for cloud security Build confidence in the cloud Best practice frameworks for cloud security Cloud services are rapidly growing and becoming more of a focus for business. It s predicted that more than $1 trillion in IT spending

More information

IT TRENDS REPORT 2016:

IT TRENDS REPORT 2016: IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION NORTH AMERICA WHAT WE COVER IN THE REPORT IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION Introduction Key Findings Recommendations Full Survey Results INTRODUCTION

More information

The role of municipal government in preventing crime and building community safety

The role of municipal government in preventing crime and building community safety NATIONAL MUNICIPAL NETWORK ON CRIME PREVENTION Background and Reference Document Overview The National Municipal Network on Crime Prevention brings together Canadian municipalities from across the country

More information

How To Reduce the IT Budget and Still Keep the Lights On

How To Reduce the IT Budget and Still Keep the Lights On How To Reduce the IT Budget and Still Keep the Lights On By Charles Williams and John Carnegie CIOs are now more challenged than ever to demonstrate mature financial management disciplines, greater transparency,

More information

(b) Fiscal 2016 Initiative Results and Fiscal 2017 Plans

(b) Fiscal 2016 Initiative Results and Fiscal 2017 Plans provide a new framework based on ISO 26000, the global standard for corporate social responsibility. In accordance, Hitachi Metals will further reinforce its PDCA cycle for CSR management to accurately

More information

Operations Overview. March 31, 2015 Ian Kilgour, Executive Vice President & Chief Operating Officer

Operations Overview. March 31, 2015 Ian Kilgour, Executive Vice President & Chief Operating Officer March 31, 2015 Ian Kilgour, Executive Vice President & Chief Operating Officer Controlling the Controllable 3 Staying true to Teck s values Delivering results Building operational excellence Disciplined

More information

Distracted Driving Education for High School Students. Despina Stavrinos, PhD & Benjamin McManus

Distracted Driving Education for High School Students. Despina Stavrinos, PhD & Benjamin McManus Distracted Driving Education for High School Students Despina Stavrinos, PhD & Benjamin McManus The Problem Still an epidemic 153.3 billion text messages are sent in the US every month (CTIA) Slight decrease

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: October Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of managed environments,

More information

Helping State Government Agencies Deliver a Better Constituent Experience through Better Communications

Helping State Government Agencies Deliver a Better Constituent Experience through Better Communications S TAT E G O V E R N M E N T S O L U T I O N S Helping State Government Agencies Deliver a Better Constituent Experience through Better Communications A Better Constituent Experience Starts with Better

More information

DuPont Direct Next Generation User Interface

DuPont Direct Next Generation User Interface DuPont Direct Next Generation User Interface October 22, 2009 Agenda Welcome What has not changed What has changed Examples Copyright 2009 DuPont. All rights reserved. The DuPont Oval Logo, DuPont, The

More information

Tripwire State of Container Security Report

Tripwire State of Container Security Report RESEARCH Tripwire State of Container Security Report January 2019 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS As DevOps continues to drive increased use of containers, security teams

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

Texting and driving. Texting and Driving Report Angel Reyes

Texting and driving. Texting and Driving Report Angel Reyes Texting and Driving Report Angel Reyes Abstract Texting and Driving is a big issue we face today as a community killing many individuals and injuring even more. From teenagers to mid aged adults this a

More information

Security in Today s Insecure World for SecureTokyo

Security in Today s Insecure World for SecureTokyo Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation

More information

Xata Turnpike from AT&T AT&T Intellectual Property. All rights reserved.

Xata Turnpike from AT&T AT&T Intellectual Property. All rights reserved. Xata Turnpike from AT&T 2011 AT&T Intellectual Property. All rights reserved. Problems CSA Scores can threaten your ability to compete and stay in business DOT Violations traffic tickets and near misses

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

Panel Discussion Elements of Model Distracted Driving Programs

Panel Discussion Elements of Model Distracted Driving Programs INTRODUCTION Panel Members Tom Bennett/ExxonMobil David Hopps/ServiceMaster Amy Lokken/Coca-Cola Joe Van Houten/Johnson & Johnson Jack Hanley/NETS Moderator Topics Cell phone use policies Implementation/Sustainability

More information

State of the Cyber Training Market January 2018

State of the Cyber Training Market January 2018 State of the Cyber Training Market January 2018 2018 by CYBERBIT 2018 by CYBERBIT Proprietary CYBERBIT Proprietary Cybersecurity Market Worth 202.36 Billion USD by 2021 Marketandmarkets analysis, 2017

More information

Rosco s Dual-Vision Video Recorder Helps Put It Down and Keep It Down

Rosco s Dual-Vision Video Recorder Helps Put It Down and Keep It Down Rosco s Dual-Vision Video Recorder Helps Put It Down and Keep It Down....................................................................... The Leading Solution For Compliance With Distracted Driving

More information

Insperity Learning & Development Course Listing

Insperity Learning & Development Course Listing WORKFORCE ADMINISTRATION Insperity Learning & Development Course Listing *For non-coemployment Insperity clients only Insperity Learning & Development Course Catalog Insperity Learning and Development

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

! " #! $ % & '( ) % * * $ " +, " -../

!  #! $ % & '( ) % * * $  +,  -../ ! " #!$% &'()%** $" +,"-../ 0$"1!" "#$%& & '( %!) #( ( *% % ( *+* *+* (( &2 2 * 2 /34! " #! $ %! & *5(,.3-4 '( '( '' )# '' *) ' +, ' # ' *--! '& %.*/. * $ $ # & )! 0 *2 2 +.3+6! (!* ' 1! # # 2 5*& +3/4.

More information

RSA Cybersecurity Poverty Index : APJ

RSA Cybersecurity Poverty Index : APJ RSA Cybersecurity Poverty Index : APJ 2016 Overview Welcome to RSA s second annual Cybersecurity Poverty Index. The RSA Cybersecurity Poverty Index is the result of an annual maturity self-assessment completed

More information

RSA Cybersecurity Poverty Index

RSA Cybersecurity Poverty Index RSA Cybersecurity Poverty Index 2016 RSA Cybersecurity Poverty Index Overview Welcome to RSA s second annual Cybersecurity Poverty Index. The RSA Cybersecurity Poverty Index is the result of an annual

More information

HVAC INDUSTRY SECTOR WORKSHOP

HVAC INDUSTRY SECTOR WORKSHOP HVAC INDUSTRY SECTOR WORKSHOP Prepared by: Ryan Coleman & Murray Bond Home Performance Stakeholder Council (HPSC) Prepared for: HVAC Sector Workshop Attendees FRIDAY, MAY 6 th 2016 AGENDA 1. Brief History

More information

APICS Brand Launch. September 28, APICS Leadership Summit. Jane Pearson Director, Global Communications

APICS Brand Launch. September 28, APICS Leadership Summit. Jane Pearson Director, Global Communications APICS Brand Launch September 28, 2013 APICS Leadership Summit Jane Pearson Director, Global Communications Jennifer Daniels Vice President, Marketing Contents We re Launching the New APICS Brand October

More information

IBM Corporation. Global Energy Management System Implementation: Case Study. Global

IBM Corporation. Global Energy Management System Implementation: Case Study. Global Energy Management System Implementation: Case Study IBM Corporation ISO 50001 Registration: Results and Benefits It takes a global team to drive real success. Business case for energy management IBM is

More information

Best-in-Class Crisis Preparation: Maximize Readiness with the Four T s. Business Continuity Readiness Overview

Best-in-Class Crisis Preparation: Maximize Readiness with the Four T s. Business Continuity Readiness Overview Best-in-Class Crisis Preparation: Maximize Readiness with the Four T s Robert Edson Vice President, Global Sales and Marketing Business Continuity Readiness Overview Business Continuity Management (BCM)

More information

Incident Training Guide

Incident Training Guide Incident Training Guide Using the Main Application V1.4 (Non WHS Unit User) WHS Version Control Document Title: Incident Training Guide using the Main Application Document Issue: Version 1.4 Date Issued:

More information

10 Cloud Myths Demystified

10 Cloud Myths Demystified 10 Cloud s Demystified The Realities for Digital Healthcare Transformation It s a challenging time for the healthcare industry, with changing regulations, consolidation and the consumerization of healthcare

More information

Five Tips to Mastering Enterprise Mobility

Five Tips to Mastering Enterprise Mobility Five Tips to Mastering Enterprise Mobility Table of Contents Introduction Tip 1: Assess Your Environment Tip 2: Review Security Protocols Tip 3: Be Smart About BYOD Tip 4: Consider Customized Mobility

More information

About the Global Communication Certification Council

About the Global Communication Certification Council The Global Communication Certification Council s Professional Communicator Certification Increases the Value and Effectiveness of Individual Professional Business Communicators and Their Employing Organizations

More information

Symantec Data Center Transformation

Symantec Data Center Transformation Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments

More information

Accreditation of Forensic Science Service Providers

Accreditation of Forensic Science Service Providers Accreditation of Forensic Science Service Providers Laurel J Farrell Senior Accreditation Manager ANSI-ASQ National Accreditation Board Quality Matters Topics Accreditation what it is and what it is not

More information

Partnership Information

Partnership Information SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:

More information

IT TRENDS REPORT 2016:

IT TRENDS REPORT 2016: IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION SINGAPORE WHAT WE COVER IN THE REPORT IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION Introduction Key Findings Recommendations Full Survey Results INTRODUCTION

More information

EHS Steering Team Meting, 2008

EHS Steering Team Meting, 2008 EHS Steering Team Meting t, 2008 Duke Energy Fast Facts Duke Energy Corporation is an energy company headquartered in Charlotte, N.C. Its Regulated Utilities business unit serves 7.3 million retail electric

More information

University Strategy

University Strategy University Strategy 2011-2015 FOREWORD Dear Colleagues Thank you for your contributions to the University Strategy 2011-2015, which was endorsed by University Council at its meeting in December 2010. The

More information

Retail. Network IP: Making a difference in UK retail surveillance

Retail. Network IP: Making a difference in UK retail surveillance Retail Network IP: Making a difference in UK retail surveillance The Results Retail sector continues to show strong trend toward migration to network IP The latest annual Centre for Retail Research (CRR)

More information

Attachment B E. B. Cape Center A Corporate University City of Houston Houston, Texas Course Assessment Guide 3/1/2009

Attachment B E. B. Cape Center A Corporate University City of Houston Houston, Texas Course Assessment Guide 3/1/2009 HCC Policies & Procedures relative to this process. To receive HCC credit for training modules from the approved Course Assessment Guide list, the student must: 1) Have a current Houston Community College

More information

10 Cloud Myths Demystified

10 Cloud Myths Demystified 10 Cloud s Demystified The Realities for Modern Campus Transformation Higher education is in an era of transformation. To stay competitive, institutions must respond to changing student expectations, demanding

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

PROFESSIONAL DEVELOPMENT COURSES. May - December Institute for Professional Excellence

PROFESSIONAL DEVELOPMENT COURSES. May - December Institute for Professional Excellence PROFESSIONAL DEVELOPMENT COURSES May - December 2018 Institute for Professional Excellence INSTITUTE FOR PROFESSIONAL EXCELLENCE (IPEx) Training to Advance Your Career Davenport University s IPEx offers

More information

Creating a Cybersecurity Culture: (ISC)2 Survey Responses

Creating a Cybersecurity Culture: (ISC)2 Survey Responses 10/3/18 Creating a Cybersecurity Culture: (ISC)2 Survey Responses Dr. Keri Pearlson (ISC)2 Conference October 8, 2018 CAMS - (IC)3 https://cams.mit.edu 1 200,000Security events The average company handles

More information

Building a Threat Intelligence Program

Building a Threat Intelligence Program WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351

More information

Modern slavery and human trafficking statement 2017

Modern slavery and human trafficking statement 2017 Modern slavery and human trafficking statement 2017 Ericsson.com Statement for financial year 2017 Introduction Conducting business responsibly is the foundation of Ericsson s commitment to sustainability

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

The Business Case for Usability. Why do IT Projects Fail? Why Most Websites Fail? Forrester Research. The Cost of Change

The Business Case for Usability. Why do IT Projects Fail? Why Most Websites Fail? Forrester Research. The Cost of Change 1 The Business Case for Usability Usability on the Web: from the business case to the design deliverables Elisa del Galdo elisa@optimum-web.co.uk 2 Why do IT Projects Fail? Scope of Failures- 31% of projects

More information

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made

More information

WHAT YOU NEED TO KNOW ABOUT THE EVOLVING WORKPLACE Adapting to new, advanced communications technology

WHAT YOU NEED TO KNOW ABOUT THE EVOLVING WORKPLACE Adapting to new, advanced communications technology WHAT YOU NEED TO KNOW ABOUT THE EVOLVING WORKPLACE Adapting to new, advanced communications technology Your workforce, customers, partners and suppliers are distributed across locations and they re mobile.

More information

LFI Learning from Incidents

LFI Learning from Incidents LFI Learning from Incidents 1 Current State Good systems with analysis exist Generally good culture of reporting Areas for Enhancement Not shared between organizations Safety culture could further encourage

More information

Modélisation du comportement anisotropique des matériaux thermoplastiques renforcés fibres de verre

Modélisation du comportement anisotropique des matériaux thermoplastiques renforcés fibres de verre Modélisation du comportement anisotropique des matériaux thermoplastiques renforcés fibres de verre Sulmoni Mattia mattia.sulmoni@dupont.com The information provided herein corresponds to our knowledge

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010 Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at

More information

HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT

HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT ARE YOU REALLY READY TO EXECUTE A GLOBAL IOT STRATEGY? Increased demand driven by long-term trends of the Internet of Things, WLAN, connected LED

More information

The Role of IT in HIPAA Security & Compliance

The Role of IT in HIPAA Security & Compliance The Role of IT in HIPAA Security & Compliance Mario Cruz OFMQ Chief Information Officer For audio, you must use your phone: Step 1: Call (866) 906-0123. Step 2: Enter code 2071585#. Mario Cruz Mario Cruz

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents Services to Help You Prepare for and Quickly Respond to Security Incidents The Challenge The threat landscape is always evolving and adversaries are getting harder to detect; and with that, cyber risk

More information

Best practices in IT security co-management

Best practices in IT security co-management Best practices in IT security co-management How to leverage a meaningful security partnership to advance business goals Whitepaper Make Security Possible Table of Contents The rise of co-management...3

More information

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives SECURING THE UK S DIGITAL PROSPERITY Enabling the joint delivery of the National Cyber Security Strategy's objectives 02 November 2016 2 SECURING THE UK S DIGITAL PROSPERITY SECURING THE UK S DIGITAL PROSPERITY

More information

NDIS Quality and Safeguards Commission. Incident Management System Guidance

NDIS Quality and Safeguards Commission. Incident Management System Guidance NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the

More information

Moving Workloads to the Public Cloud? Don t Forget About Security.

Moving Workloads to the Public Cloud? Don t Forget About Security. Whitepaper Moving Workloads to the Public Cloud? Don t Forget About Security. Key considerations for developing a cloud-ready cybersecurity strategy Introduction For many organizations today, it s not

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

Hitachi Work Life Innovation

Hitachi Work Life Innovation FEATURED ARTICLES Hitachi Initiatives for Creating New Work Styles Hitachi Work Life Innovation Work life innovation is becoming a challenge throughout Japan as worker needs diversify and the working-age

More information

Process Safety Management in R&D

Process Safety Management in R&D Safety Management in R&D Jeff Hedges Division Manager Integrated Laboratory Technologies Richmond CA August 21, 2013 ETC Laboratory Safety/Operational Excellence Overview 2 Facility Design & Construction

More information

Compliance Program Assessment Overview of Findings. Report to the Audit and Risk Committee of the Teachers Retirement Board June 8, 2016

Compliance Program Assessment Overview of Findings. Report to the Audit and Risk Committee of the Teachers Retirement Board June 8, 2016 Compliance Program Assessment Overview of Findings Report to the Audit and Risk Committee of the Teachers Retirement Board June 8, 2016 Kaplan & Walker LLP 2 Law firm specializing in counseling organizations

More information