Santé et sécurité au travail Faites de chaque travailleur un leader SST
|
|
- Gwendoline Osborne
- 6 years ago
- Views:
Transcription
1 Santé et sécurité au travail Faites de chaque travailleur un leader SST 9 septembre
2 Visible Felt Leadership - Showing Passion for Safety Ward Metzler Montreal, Quebec September 9, 2015 Copyright 2014, E. I. du Pont de Nemours and Company. All rights reserved. The DuPont logo, DuPont TM and The miracles of science TM are registered trademarks of DuPont
3 The DuPont Safety Culture Powder mill operation began in Off-the-job safety program began in the 1950s. First safety rules established in Safety is a line management responsibility. No employee may enter a new or rebuilt mill until a member of top management has personally operated it. E. I. du Pont Belief that all injuries are preventable developed in the 1940s. Safety statistics began in
4 Our Purpose DuPont is a Science Company We work collaboratively to find sustainable, innovative, market-driven solutions to solve some of the world s biggest challenges, making lives better, safer, and healthier for people everywhere. 3 9/10/2015 DuPont Today 2014 National Geographic Image and Company. All rights reserved. The DuPont logo, DuPontTM and The miracles of sciencetm are registered trademarks of DuPont Copyright 2015, E. I. du Pont de Nemours 3
5 Our Areas of Focus As the global population climbs up to 9 billion people in 2050, DuPont uses its science-powered innovation to help solve the challenges facing the world, with a focus on: FOOD ENERGY PROTECTION 4 9/10/2015 Copyright 2015, E. I. du Pont de Nemours and Company. All rights reserved. The DuPont logo, DuPont TM and The DuPont miracles of science Today TM are 2014 registered trademarks of DuPont 4
6 Felt Leadership Safety Culture Safety Culture Safety Felt Leadership DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.
7 FELT Leadership What is it? It is TO DO, TO BE SEEN, and TO BE BELIEVED
8 Felt Leadership Felt Leadership -management s total actions that lead people at all levels to understand and feel their leaders high standards, and accept their strong commitment to safety as being genuine DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.
9 Felt Leadership Why is Felt Leadership important? YOU are the primary influence on your organization. You lead your people. Your people will satisfy perceived expectations. You set expectations and create culture by your actions or your inaction. DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.
10 Felt Leadership Felt Leadership 1. Be visible to the organization. 2. Be relentless about time with your people. 3. Recognize your role as a teacher/trainer. 4. Lead by example. Maintain a self-safety focus. 5. Hold people accountable 6. You are authentic in all aspects of communication 7. Celebrate and recognize successes. DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.
11 Felt Leadership Providing coaching and feedback is a key aspect of Felt Leadership Approach Courses and reading 10% Networking, feedback about good and bad examples 20% On-the-job experiences, tasks and problem solving 70%
12 Felt Leadership What processes and systems are used by organizations to provide Felt Leadership around safety? Workplace observations Leadership of safety committees Town hall meetings Others? DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.
13 Safety Culture delivers Operational Discipline Safety Management Standards Operational Discipline Operational Efficiency 60% x 30% = 18% System Quality Implementation State Results (Safety performance) Safety Professionals Production Line (Operations) 12
14 Reaction DuPont Bradley Curve Anticipation Where are we? Where do we want to be? The GOAL is ZERO Incidents are bound to happen I don t want to get caught I don t want to get hurt I don t want anyone to get hurt Reactive Dependent Independent Interdependent Safety by Natural Instinct Compliance is the Goal Delegated to Safety Manager Lack of management involvement. Management Commitment Discipline & Rules Supervisor Control, Emphasis, and Goals Values all people Training is the answer. Personal Knowledge, Commitment, & Standards Internalization Personal value Care for Self Practice and habits Individual recognition Help Others Conform Others Keeper Care for others Networking contributor Organizational Pride Reactive Proactive Copyright 2014 DuPont. 13
15 DuPont Safety Perception Survey Safety Culture 24 core questions Cross-section of employees Data is compared across departments, levels, responsibilities Test if safety is a core value held by management and if that value is transferred to the worker on the floor Examine employee and management involvement in audits, incident investigations and safety meetings Examine attitudes about off-the-job safety 14 DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.
16 DuPont uses 12 elements to drive toward World-Class Safety. They are based on proven Safety Management Principles. Integrated Safety Management System Strong Leadership Management commitment Policies & principles Goals, objectives & plans Procedures & performance standards Appropriate Structure Focused Processes & Actions Line management accountability & responsibility Safety personnel Integrated organization structure Motivation & awareness Incident investigation Observations & audits Effective communication Training & development 15
17 DuPont Safety Management System Systems Leadership (Site & Corporate) 16
18 Reaction DuPont Bradley Curve Anticipation Where are we? Where do we want to be? The GOAL is ZERO Incidents are bound to happen I don t want to get caught I don t want to get hurt I don t want anyone to get hurt Reactive Dependent Independent Interdependent Safety by Natural Instinct Compliance is the Goal Delegated to Safety Manager Lack of management involvement. Management Commitment Discipline & Rules Supervisor Control, Emphasis, and Goals Values all people Training is the answer. Personal Knowledge, Commitment, & Standards Internalization Personal value Care for Self Practice and habits Individual recognition Help Others Conform Others Keeper Care for others Networking contributor Organizational Pride Reactive Proactive Copyright 2014 DuPont. 17
19 A desirable safety culture is built by approaching safety proactively, shifting focusfrom injuries to risks that can be corrected before injuries occur. Shift emphasis Operator slips, grabs at handrail and misses. Falls from equipment platform to the cement floor below. Operator slips, grabs at handrail and misses. Ankle is sprained, requires time off or light duty. Operator slips, grabs at handrail and misses. Twists ankle which requires trip to clinic. Operator slips, grabs handrail. No injury or minor abrasion from grabbing the handrail. from here Operator jumps off of equipment at the end of his shift rather than stepping down the stairs and holding the handrail. To here
20 Serious Injury & Fatality Prevention Low frequency / High consequence SERIOUS INJURY & FATALITY (SIF) Near Miss Incident with potential for injury, but no actual consequences or injury occurred. Lost Time Injuries Higher Risk Activity (HRA) Task, exposure, activity that if not anticipated / controlled could cause possible SIF. Recordable Injuries High Potential Incident (HPI) Incident with or without injury that has potential to cause possible SIF. First Aids HPIs Example Life Saving Rule Incidents 19
21 What are the challenges in today s workforce? Demographics Many companies have been focused on reducing people numbers Retirements are forcing companies to start hiring Knowledge transfer How do you connect to new employees? 20
22 Behavioral and NEUROSCIENCE 21 DuPont Sustainable Solutions Copyright 2015 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.
23 WE ROUTINELY MAKE We routinely make risky decisions RISKY DECISIONS 22 DuPont Sustainable Solutions Copyright 2015 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.
24 PRINCIPLES of Affective Psychology 23 DuPont Sustainable Solutions Copyright 2015 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.
25 module OBJECTIVES Own It UNDERSTAND that we routinely take unnecessary amounts of risk each and every day. RECOGNIZE that if ONLY a small percentage of our decisions are risky, we put ourselves in danger hundreds of times a day! 24
26 We each make up to 35,000decisions a day most often, without even realizing it 25
27 If ONLY1 % of your decisions are RISKY YOU PUT YOURSELF in DANGER 350times per DAY! =+21decisions per HOUR awake =1decision every 3 minutes DuPont Sustainable Solutions Copyright 2015 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates. 26
28 That 1% of RISKY DECISIONS x200,000 employees = 70,000,000 Risky Decisions PER DAY 3,000,000 Risky Decisions PER HOUIR 50,000 Risky Decisions PER MINUTE How much RISK CAN YOU AFFORD? 27
29 tools PAUSE PROCESS OWN IT PROCEED Copyright 2015, E. I. du Pont de Nemours and Company. All rights reserved. The DuPont logo, DuPontTM and The miracles of sciencetm are registered trademarks of DuPont 28
30 What s YOURAPPROACH? Copyright 2015 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.
31 Leadership iskey 30 30
32 DECISIONS Information and DATA ABSOLUTE right/wrong black/white safe/unsafe SUBJECTIVE good / bad fun/difficult feeling andemotion 31
33 WeHEAR data 32
34 Wefeel emotions 33
35 Persuasive leaders inspire
36 THEODORE ROOSEVELT 35 35
37 Persuasive leaders influence
38 Felt Leadership Safety Culture Safety Culture Felt Leadership 37 DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.
39 DuPont Bradley Value Curve for Operational Risk Management & Safety Culture Improvement LEADERSHIP WORKER ENGAGEMENT Incident & Injury Rates BRADLEY CURVE Risk Reduction & Control GROWTH CURVE Value Generation & Operational Discipline Operational Excellence REACTIVE DEPENDENT INDEPENDENT INTERDEPENDENT CULTURAL MATURITY 38 DuPont Sustainable Solutions Copyright 2014 E. I. du Pont de Nemours and Company. All rights reserved. The DuPont Oval Logo, DuPont, and The miracles of science are registered trademarks or trademarks of DuPont or its affiliates.
40 DuPont Contact Information Ward Metzler Account Executive DuPont Sustainable Solutions E. I. du Pont Canada Company 1919 Minnesota Court, Mississauga, ON L5N0C9 Tel : Ward.Metzler@dupont.com 39
41 Questions? 40
42 Santé et sécurité au travail Faites de chaque travailleur un leader SST 9 septembre
(JSA) Job Safety Analysis Program. Safety Manual. 1.0 Purpose. 2.0 Scope. 3.0 Regulatory References. 4.0 Policy
Page 1 of 7 1.0 Purpose Job Safety Analysis is a primary element of the Hazard Identification and Mitigation Management Process. JSA s are completed daily to identify and evaluate hazards associated with
More informationACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE
ACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE Cybersecurity Awareness by gamification: Kaspersky CyberSafety Training 2017 Kaspersky Lab. All rights reserved. 1 HUMAN MISTAKES
More informationLearning's from Major Process Safety Incidents
Learning's from Major Process Safety Incidents Brian D. Rains Global PSM Practice Leader DuPont Sustainable Solutions 23 February 2012 Copyright 2010 DuPont. All rights reserved. The DuPont Oval Logo,
More informationCertified Manager Certification
Certified Manager Certification Get Trained Get Certified Get Recognized www.hr-pulse.org In Partnership With HR Pulse has the Learning Solutions to Empower Your People & Grow Your Business About ICPM
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationT78 - Improve Safety and Compliance Using The Connected Enterprise
T78 - Improve Safety and Compliance Using The Connected Enterprise PUBLIC Copyright 2018 Rockwell Automation, Inc. All Rights Reserved. 1 The Connected Enterprise delivers transformational value in productivity
More informationCybersafety Culture Assessment
Kaspersky Enterprise Cybersecurity Cybersafety Culture Assessment Target-based learning program: culture & attitudes kaspersky.com/awareness #truecybersecurity Cybersafety Culture Assessment Focus Assessment
More informationDepartment of Justice Policing and Victim Services BUSINESS PLAN
Policing and Victim Services BUSINESS PLAN 2004-2005 1. The Creation of a New Division The was created in 2001 by joining the former Divisions: Policing and Public Safety Services and Victims Services.
More information2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals
2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals Sponsored by Contents Introduction....3 Key Takeaways from the 2017 Report:....3 Security
More informationMaintain, Repair, Rebuild, Protect. Solutions for Industrial Asset Maintenance and Reliability
Maintain, Repair, Rebuild, Protect Solutions for Industrial Asset Maintenance and Reliability Henkel. Solutions for All Your Maintenance Challenges. Maintain, Repair, Rebuild and Protect Industrial Equipment.
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationCyber Security is it a boardroom issue?
Brisbane, 23 September 2014 Alistair Blake Director Cyber Security & Risk Services Today s session will cover Cyber Security and the Boardroom Executive sponsorship Organisational culture Operational readiness
More informationWHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY. Integrating Resiliency into Our Culture and DNA
WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY Integrating Resiliency into Our Culture and DNA Table of Contents Executive Summary.... 3 Background.... 4 Charter.................................................................4
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationREINVENTING ETHICAL, SUSTAINABLE SUPPLY CHAINS
REINVENTING ETHICAL, SUSTAINABLE SUPPLY CHAINS HP Inc. Sustainability Briefing January 22, 2018 1 Copyright 2018 HP Development Company, L.P. The information contained herein is subject to change without
More informationSAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION
SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION POSITION: CHIEF OPERATING OFFICER FUNCTION: Responsible for all aspects of the SLV POA day-to-day operations. In this capacity,
More informationBetter together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com
Better together KPMG LLP s GRC Advisory Services for IBM OpenPages implementations kpmg.com KPMG A leader in GRC services KPMG LLP (KPMG) is the U.S. member firm of the KPMG global network of professional
More informationEVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System
EVALUATION AND APPROVAL OF AUDITORS Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System 1 TABLE OF CONTENTS 1. Scope and field of Application 3 2. Normative
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationThe data quality trends report
Report The 2015 email data quality trends report How organizations today are managing and using email Table of contents: Summary...1 Research methodology...1 Key findings...2 Email collection and database
More informationSustainable Security Operations
Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing,
More informationState of Cloud Survey GERMANY FINDINGS
2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff
More informationImproving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN
Improving Data Governance in Your Organization Faire Co Regional Manger, Information Management Software, ASEAN Topics The Innovation Imperative and Innovating with Information What Is Data Governance?
More informationPOSITION DESCRIPTION
UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:
More informationPRODUCT SAFETY PROFESSIONAL CERTIFICATION PROGRAM DETAILS. Overview
Overview PRODUCT SAFETY PROFESSIONAL CERTIFICATION PROGRAM DETAILS The Product Safety Professional Certification Program at the Richard A. Chaifetz School of Business focuses on the theoretical as well
More informationOrganizational Privacy Transformation: A case study from Critical Issues to Award Winning Success
Organizational Privacy Transformation: A case study from Critical Issues to Award Winning Success Norine Primeau-Menzies VP Customer Services, Chief Privacy Officer May 2012 Agenda Overview of OTN Setting
More informationCanada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?
Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY
More informationSTAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:
STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security
More informationThe E.ON U.S. Approach To Effective Employee Safety. Chris Hermann Senior Vice President, Energy Delivery
The E.ON U.S. Approach To Effective Employee Safety Chris Hermann Senior Vice President, Energy Delivery E.ON U.S. Safety World-class safety performer Overseen by the E.ON U.S. Safety Council Ensures internal
More informationThe State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016 Identifying Cybersecurity Gaps to Rethink State of the Art Executive Summary Executive Summary While the advent of digital technology has fueled new business
More informationMSD Prevention in Manual Materials Handling (MMH)
MSD Prevention in Manual Materials Handling (MMH) CRE-MSD Conference October 2, 2017 Lisa Beech-Hawley, Manager, Health and Safety Program Donna Francom, Health & Safety Advisor Kesavan Jeyaveerasingam,
More informationecald TM Web Developer Position Description
Date: November 2015 Job Title : (Part-time 0.5 FTE) Department : Institute of Innovation and Improvement Location : North Shore Hospital NB: the role will require the appointee to commute to West Auckland
More informationColorado Digital Government Summit & Cyber Security Summit. September 18, 2007
Colorado Digital Government Summit & Cyber Security Summit September 18, 2007 Aligning IT Strategy with Business Processes / Objectives Paul M Engelbert Global Practice Manager September 18, 2007 Aligning
More informationKaspersky Security Awareness
Kaspersky for Business Kaspersky Security Awareness Gamified training programs for all organizational levels www.kaspersky.com #truecybersecurity An effective way of building cybersafety across an organization
More informationBuild confidence in the cloud Best practice frameworks for cloud security
Build confidence in the cloud Best practice frameworks for cloud security Cloud services are rapidly growing and becoming more of a focus for business. It s predicted that more than $1 trillion in IT spending
More informationIT TRENDS REPORT 2016:
IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION NORTH AMERICA WHAT WE COVER IN THE REPORT IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION Introduction Key Findings Recommendations Full Survey Results INTRODUCTION
More informationThe role of municipal government in preventing crime and building community safety
NATIONAL MUNICIPAL NETWORK ON CRIME PREVENTION Background and Reference Document Overview The National Municipal Network on Crime Prevention brings together Canadian municipalities from across the country
More informationHow To Reduce the IT Budget and Still Keep the Lights On
How To Reduce the IT Budget and Still Keep the Lights On By Charles Williams and John Carnegie CIOs are now more challenged than ever to demonstrate mature financial management disciplines, greater transparency,
More information(b) Fiscal 2016 Initiative Results and Fiscal 2017 Plans
provide a new framework based on ISO 26000, the global standard for corporate social responsibility. In accordance, Hitachi Metals will further reinforce its PDCA cycle for CSR management to accurately
More informationOperations Overview. March 31, 2015 Ian Kilgour, Executive Vice President & Chief Operating Officer
March 31, 2015 Ian Kilgour, Executive Vice President & Chief Operating Officer Controlling the Controllable 3 Staying true to Teck s values Delivering results Building operational excellence Disciplined
More informationDistracted Driving Education for High School Students. Despina Stavrinos, PhD & Benjamin McManus
Distracted Driving Education for High School Students Despina Stavrinos, PhD & Benjamin McManus The Problem Still an epidemic 153.3 billion text messages are sent in the US every month (CTIA) Slight decrease
More informationTHE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:
October Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of managed environments,
More informationHelping State Government Agencies Deliver a Better Constituent Experience through Better Communications
S TAT E G O V E R N M E N T S O L U T I O N S Helping State Government Agencies Deliver a Better Constituent Experience through Better Communications A Better Constituent Experience Starts with Better
More informationDuPont Direct Next Generation User Interface
DuPont Direct Next Generation User Interface October 22, 2009 Agenda Welcome What has not changed What has changed Examples Copyright 2009 DuPont. All rights reserved. The DuPont Oval Logo, DuPont, The
More informationTripwire State of Container Security Report
RESEARCH Tripwire State of Container Security Report January 2019 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS As DevOps continues to drive increased use of containers, security teams
More informationImplementing ITIL v3 Service Lifecycle
Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational
More informationTexting and driving. Texting and Driving Report Angel Reyes
Texting and Driving Report Angel Reyes Abstract Texting and Driving is a big issue we face today as a community killing many individuals and injuring even more. From teenagers to mid aged adults this a
More informationSecurity in Today s Insecure World for SecureTokyo
Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation
More informationXata Turnpike from AT&T AT&T Intellectual Property. All rights reserved.
Xata Turnpike from AT&T 2011 AT&T Intellectual Property. All rights reserved. Problems CSA Scores can threaten your ability to compete and stay in business DOT Violations traffic tickets and near misses
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationPanel Discussion Elements of Model Distracted Driving Programs
INTRODUCTION Panel Members Tom Bennett/ExxonMobil David Hopps/ServiceMaster Amy Lokken/Coca-Cola Joe Van Houten/Johnson & Johnson Jack Hanley/NETS Moderator Topics Cell phone use policies Implementation/Sustainability
More informationState of the Cyber Training Market January 2018
State of the Cyber Training Market January 2018 2018 by CYBERBIT 2018 by CYBERBIT Proprietary CYBERBIT Proprietary Cybersecurity Market Worth 202.36 Billion USD by 2021 Marketandmarkets analysis, 2017
More informationRosco s Dual-Vision Video Recorder Helps Put It Down and Keep It Down
Rosco s Dual-Vision Video Recorder Helps Put It Down and Keep It Down....................................................................... The Leading Solution For Compliance With Distracted Driving
More informationInsperity Learning & Development Course Listing
WORKFORCE ADMINISTRATION Insperity Learning & Development Course Listing *For non-coemployment Insperity clients only Insperity Learning & Development Course Catalog Insperity Learning and Development
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More information! " #! $ % & '( ) % * * $ " +, " -../
! " #!$% &'()%** $" +,"-../ 0$"1!" "#$%& & '( %!) #( ( *% % ( *+* *+* (( &2 2 * 2 /34! " #! $ %! & *5(,.3-4 '( '( '' )# '' *) ' +, ' # ' *--! '& %.*/. * $ $ # & )! 0 *2 2 +.3+6! (!* ' 1! # # 2 5*& +3/4.
More informationRSA Cybersecurity Poverty Index : APJ
RSA Cybersecurity Poverty Index : APJ 2016 Overview Welcome to RSA s second annual Cybersecurity Poverty Index. The RSA Cybersecurity Poverty Index is the result of an annual maturity self-assessment completed
More informationRSA Cybersecurity Poverty Index
RSA Cybersecurity Poverty Index 2016 RSA Cybersecurity Poverty Index Overview Welcome to RSA s second annual Cybersecurity Poverty Index. The RSA Cybersecurity Poverty Index is the result of an annual
More informationHVAC INDUSTRY SECTOR WORKSHOP
HVAC INDUSTRY SECTOR WORKSHOP Prepared by: Ryan Coleman & Murray Bond Home Performance Stakeholder Council (HPSC) Prepared for: HVAC Sector Workshop Attendees FRIDAY, MAY 6 th 2016 AGENDA 1. Brief History
More informationAPICS Brand Launch. September 28, APICS Leadership Summit. Jane Pearson Director, Global Communications
APICS Brand Launch September 28, 2013 APICS Leadership Summit Jane Pearson Director, Global Communications Jennifer Daniels Vice President, Marketing Contents We re Launching the New APICS Brand October
More informationIBM Corporation. Global Energy Management System Implementation: Case Study. Global
Energy Management System Implementation: Case Study IBM Corporation ISO 50001 Registration: Results and Benefits It takes a global team to drive real success. Business case for energy management IBM is
More informationBest-in-Class Crisis Preparation: Maximize Readiness with the Four T s. Business Continuity Readiness Overview
Best-in-Class Crisis Preparation: Maximize Readiness with the Four T s Robert Edson Vice President, Global Sales and Marketing Business Continuity Readiness Overview Business Continuity Management (BCM)
More informationIncident Training Guide
Incident Training Guide Using the Main Application V1.4 (Non WHS Unit User) WHS Version Control Document Title: Incident Training Guide using the Main Application Document Issue: Version 1.4 Date Issued:
More information10 Cloud Myths Demystified
10 Cloud s Demystified The Realities for Digital Healthcare Transformation It s a challenging time for the healthcare industry, with changing regulations, consolidation and the consumerization of healthcare
More informationFive Tips to Mastering Enterprise Mobility
Five Tips to Mastering Enterprise Mobility Table of Contents Introduction Tip 1: Assess Your Environment Tip 2: Review Security Protocols Tip 3: Be Smart About BYOD Tip 4: Consider Customized Mobility
More informationAbout the Global Communication Certification Council
The Global Communication Certification Council s Professional Communicator Certification Increases the Value and Effectiveness of Individual Professional Business Communicators and Their Employing Organizations
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More informationAccreditation of Forensic Science Service Providers
Accreditation of Forensic Science Service Providers Laurel J Farrell Senior Accreditation Manager ANSI-ASQ National Accreditation Board Quality Matters Topics Accreditation what it is and what it is not
More informationPartnership Information
SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:
More informationIT TRENDS REPORT 2016:
IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION SINGAPORE WHAT WE COVER IN THE REPORT IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION Introduction Key Findings Recommendations Full Survey Results INTRODUCTION
More informationEHS Steering Team Meting, 2008
EHS Steering Team Meting t, 2008 Duke Energy Fast Facts Duke Energy Corporation is an energy company headquartered in Charlotte, N.C. Its Regulated Utilities business unit serves 7.3 million retail electric
More informationUniversity Strategy
University Strategy 2011-2015 FOREWORD Dear Colleagues Thank you for your contributions to the University Strategy 2011-2015, which was endorsed by University Council at its meeting in December 2010. The
More informationRetail. Network IP: Making a difference in UK retail surveillance
Retail Network IP: Making a difference in UK retail surveillance The Results Retail sector continues to show strong trend toward migration to network IP The latest annual Centre for Retail Research (CRR)
More informationAttachment B E. B. Cape Center A Corporate University City of Houston Houston, Texas Course Assessment Guide 3/1/2009
HCC Policies & Procedures relative to this process. To receive HCC credit for training modules from the approved Course Assessment Guide list, the student must: 1) Have a current Houston Community College
More information10 Cloud Myths Demystified
10 Cloud s Demystified The Realities for Modern Campus Transformation Higher education is in an era of transformation. To stay competitive, institutions must respond to changing student expectations, demanding
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationPROFESSIONAL DEVELOPMENT COURSES. May - December Institute for Professional Excellence
PROFESSIONAL DEVELOPMENT COURSES May - December 2018 Institute for Professional Excellence INSTITUTE FOR PROFESSIONAL EXCELLENCE (IPEx) Training to Advance Your Career Davenport University s IPEx offers
More informationCreating a Cybersecurity Culture: (ISC)2 Survey Responses
10/3/18 Creating a Cybersecurity Culture: (ISC)2 Survey Responses Dr. Keri Pearlson (ISC)2 Conference October 8, 2018 CAMS - (IC)3 https://cams.mit.edu 1 200,000Security events The average company handles
More informationBuilding a Threat Intelligence Program
WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351
More informationModern slavery and human trafficking statement 2017
Modern slavery and human trafficking statement 2017 Ericsson.com Statement for financial year 2017 Introduction Conducting business responsibly is the foundation of Ericsson s commitment to sustainability
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationThe Business Case for Usability. Why do IT Projects Fail? Why Most Websites Fail? Forrester Research. The Cost of Change
1 The Business Case for Usability Usability on the Web: from the business case to the design deliverables Elisa del Galdo elisa@optimum-web.co.uk 2 Why do IT Projects Fail? Scope of Failures- 31% of projects
More informationCLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS
CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made
More informationWHAT YOU NEED TO KNOW ABOUT THE EVOLVING WORKPLACE Adapting to new, advanced communications technology
WHAT YOU NEED TO KNOW ABOUT THE EVOLVING WORKPLACE Adapting to new, advanced communications technology Your workforce, customers, partners and suppliers are distributed across locations and they re mobile.
More informationLFI Learning from Incidents
LFI Learning from Incidents 1 Current State Good systems with analysis exist Generally good culture of reporting Areas for Enhancement Not shared between organizations Safety culture could further encourage
More informationModélisation du comportement anisotropique des matériaux thermoplastiques renforcés fibres de verre
Modélisation du comportement anisotropique des matériaux thermoplastiques renforcés fibres de verre Sulmoni Mattia mattia.sulmoni@dupont.com The information provided herein corresponds to our knowledge
More informationBPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationData Protection. Plugging the gap. Gary Comiskey 26 February 2010
Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at
More informationHOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT
HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT ARE YOU REALLY READY TO EXECUTE A GLOBAL IOT STRATEGY? Increased demand driven by long-term trends of the Internet of Things, WLAN, connected LED
More informationThe Role of IT in HIPAA Security & Compliance
The Role of IT in HIPAA Security & Compliance Mario Cruz OFMQ Chief Information Officer For audio, you must use your phone: Step 1: Call (866) 906-0123. Step 2: Enter code 2071585#. Mario Cruz Mario Cruz
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationIncident Response Services to Help You Prepare for and Quickly Respond to Security Incidents
Services to Help You Prepare for and Quickly Respond to Security Incidents The Challenge The threat landscape is always evolving and adversaries are getting harder to detect; and with that, cyber risk
More informationBest practices in IT security co-management
Best practices in IT security co-management How to leverage a meaningful security partnership to advance business goals Whitepaper Make Security Possible Table of Contents The rise of co-management...3
More informationSECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives
SECURING THE UK S DIGITAL PROSPERITY Enabling the joint delivery of the National Cyber Security Strategy's objectives 02 November 2016 2 SECURING THE UK S DIGITAL PROSPERITY SECURING THE UK S DIGITAL PROSPERITY
More informationNDIS Quality and Safeguards Commission. Incident Management System Guidance
NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the
More informationMoving Workloads to the Public Cloud? Don t Forget About Security.
Whitepaper Moving Workloads to the Public Cloud? Don t Forget About Security. Key considerations for developing a cloud-ready cybersecurity strategy Introduction For many organizations today, it s not
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationHitachi Work Life Innovation
FEATURED ARTICLES Hitachi Initiatives for Creating New Work Styles Hitachi Work Life Innovation Work life innovation is becoming a challenge throughout Japan as worker needs diversify and the working-age
More informationProcess Safety Management in R&D
Safety Management in R&D Jeff Hedges Division Manager Integrated Laboratory Technologies Richmond CA August 21, 2013 ETC Laboratory Safety/Operational Excellence Overview 2 Facility Design & Construction
More informationCompliance Program Assessment Overview of Findings. Report to the Audit and Risk Committee of the Teachers Retirement Board June 8, 2016
Compliance Program Assessment Overview of Findings Report to the Audit and Risk Committee of the Teachers Retirement Board June 8, 2016 Kaplan & Walker LLP 2 Law firm specializing in counseling organizations
More information