SlideShare une entreprise Scribd logo
1  sur  52
Auditing Security Management Systems and the
           Supply Chain: ISO28000
ASIS International 3rd Asia-Pacific Conference
 Wednesday 4 February 2009 11.50 - 12.35


                Dr. Marc Siegel
              ASIS International
           ISO/TC 8 Delegation Head

                                                 © 2008
Promoting Security in the Supply Chain
  Supplier – Manufacturer – Distributor – Retailer – Logistics




         Continuity in the supply chain is a key
       component of today's global marketplace
                                                                 © 2008
Globalization of Supply Chains
Disruption of the Supply Chain a Rising Threat

  •   Just-in-time manufacturing
  •   Outsourcing
  •   Global sourcing
  •   Specialized factories
  •   Centralized distribution
  •   Supply consolidation
  •   Reduction of the supplier base
  •   Volatility of demand
  •   Lack control procedures
                                                 © 2008
So What Could Happen?

 •   Human trafficking
 •   Contraband smuggling
 •   Theft
 •   Cyber-crime
 •   Internal sabotage
 •   Industrial sabotage
 •   Terrorism
 •   Counterfeiting
 •   Insurgency
 •   Bio-terrorism
 •   Wholesale and retail supply loss
 •   Organized crime
 •   WMD in containers
 •   Political disruptions
 •   $$$ Damages


                                        © 2008
What are the Consequences of an Incident?

  • Damage to tangibles:
     – Human and physical assets – property, products,
       infrastructure, personnel and the environment

  • Damage to intangibles:
     – Non-physical assets - reputation, market position, goodwill

  • The harm to the organization may include;
     –   Injury or serious harm to persons and property
     –   Business integrity
     –   Reputation
     –   Clients property
     –   Standing in industry community
     –   Regulatory issues

                                                                     © 2008
ISO 28000 to the Rescue




                          © 2008
The 28000 Series

  • Developed in response to demand from industry
    against a background of varying international security
    regimes.

  • Generic management specification to improve the
    security in supply chains.

  • Requires organizations to:
     – assess the security environment in which it operates
     – determine if adequate security measures are in place
     – improve performance

  • Designed to be a sound foundation for complying
    efficiently with other international, national and sector
    based security requirements and schemes.

                                                                © 2008
The ISO 28000 Series
Standards and codes of practice for supply chain security
• The 28000 series was developed to compliment the
  various international initiatives to facilitate uniform
  implementation worldwide.

 • ISO 28000 - Supply chain security
   management
    –   Published Sept. 2007
    –   Risked based model
    –   Plan, Do, Check, Act principles
    –   Designed for 1st, 2nd & 3rd party auditing

 • Certification Standard, similar to:
    – ISO 14001, OHSAS 18001, ISO 27001
                                                            © 2008
ISO 28000 Enables an Organization to:


 • Establish, implement, maintain and improve a
   security management system

 • Assure conformity with security management policy

 • Demonstrate such conformity

 • Seek certification/registration of conformity by an
   accredited third party organization

 • Make a self-determination and self-declaration of
   conformity


                                                         © 2008
Meet the Family




                  © 2008
ISO 28000 Series of Standards

 • ISO 28000:2007
   – Specification for security management systems for the supply
     chain
 • ISO 28001:2007
   – Security management systems for the supply chain -- Best
     practices for implementing supply chain security, assessments
     and plans -- Requirements and guidance
 • ISO 28003:2007
   – Security management systems for the supply chain --
     Requirements for bodies providing audit and certification of
     supply chain security management systems
 • ISO 28004:2007
   – Security management systems for the supply chain --
     Guidelines for the implementation of ISO 28000


                                                                     © 2008
What Does the ISO 28000 Address?

• ISO 28000 requires the organization to consider the
  likelihood of an event and all of its consequences
  including:

   – Physical failure threats and risks, such as functional failure,
     incidental damage, malicious damage or terrorist or criminal
     action

   – Operational threats and risks, including the control of the
     security, human factors and other activities which affect the
     organizations performance, condition or safety

   – Natural environmental events (storm, floods, etc.), which may
     render security measures and equipment ineffective

   – Factors outside of the organization's control, such as failures in
     externally supplied equipment and services


                                                                          © 2008
Built to Be Business Friendly

 • Suitable for all sizes and types of organizations that
   are involved in purchasing, manufacturing, service,
   storage, transportation and/or sales processes

 • Aligned with the globally accepted standards:
    – ISO 9001:2000 - Quality management
    – ISO 14001:2004 - Environmental management
    – ISO/IEC 27001:2005 - Information technology security

 • Supports consistent and integrated implementation
   and operation with related management standards.

 • One suitably designed management system can satisfy
   the requirements of all these standards

                                                             © 2008
The Standard Can Be Used to:

 • Demonstrate a robust and secure supply chain
   management system to regulators/authorities and other
   interested organizations
 • Demonstrate a robust and secure supply chain
   management system to their customers/potential
   customers
 • Provide a consistent approach by all service providers
   within a supply chain
 • Serve as the basis for an independent assessment
 • Demonstrate the ability to meet customer requirements
 • Improve services
                                                            © 2008
Commercial & Competitive Advantage

  • Unambiguous demonstration the
    organization takes security seriously
    – Customer confidence that their goods are
      protected
    – Increased brand equity through the clear
      demonstration of commitment to security
    – Benefit through increased market share and
      through customer retention
  • Increased organizational resilience
  • Brand and reputation protection

                                                   © 2008
Improved Management

• Effective management of security resources, resulting
  in cost savings

• Increased accountability at all levels

• Demonstrates effective corporate governance

• Improved safety and security for employees

• Improved staff and customer satisfaction

• Can be integrated with other internationally recognized
  management system standards
                                                            © 2008
Ports Worldwide Adopting ISO 28000

 •   September 2006 - DP World first to certify
      – HQ Dubai
      – Ports of Djibouti, Dubai, Vancouver (1st port in the Americas), Porto Caucedo
        (Dominican Republic- Latin American gateway to US), Southampton, Tilbury, Le
        Havre, Port of Busan, Korea
      – All Australia terminals undergoing implementation
      – DP World plans to certify all its ports/terminals

 •   March 2008 - Port of Houston Authority (PHA), Port Police has become the
     first port authority in the world to receive ISO 28000:2007 certification

 •   May 2008 - Singapore-based
     logistics and supply chain
     management company YCH
     Group becomes the first end-
     to-end Supply Chain
     Management (SCM) provider
     to receive the ISO 28000:
     2007 Certification.



                                                                                    © 2008
Mutual Recognition

 • ISO 28000 has been recognized by the EU Authorized
   Economic Operators (AEO) initiative as compliant to
   the AEO Safety and Security requirements

 • DP World’s ISO certification has been recognized by US
   Customs Border Protection, with the company uniquely
   being invited to join C-TPAT.

 • US Congress has recognized the relevance of 28000 to
   CTPAT and has tasked its research body, GAO, to
   confirm technical compatibility.
    – Companies that are ISO 28000 compliant may not have to
      qualify to join CTPAT but can now enjoy the benefits upon
      recognition.


                                                                  © 2008
ISO 28000 a New Member
  of the Family of ISO
  Management Systems
  Standards

          Identify risks, set priorities
            and establish dynamic
          programs and plans to cost
              effectively improve
                 performance
Generic framework for organizations of all sizes and types –
 private, public, faith-based or not-for-profit organizations.
                                                           © 2008
28000 is a Management System
• A management system is what the organization
  does to manage its processes, functions or
  activities.
  – Set of interrelated elements used to establish and
    achieve an organization’s policy and objectives.
  – Includes policies, organizational structure,
    responsibilities, planning activities, resources, practices,
    procedures and processes.
  – Allows an organization to create and manage its
    processes and activities to meet its business objectives.




                                                               © 2008
PDCA or APCI Model
 Approach to structured problem solving

Plan (Assess) - Do (Protect) - Check (Confirm) - Act (Improve)

                                     Plan
                              • Define & Analyze a
                            Problem and Identify the
                                  Root Cause



           Act                                                    Do
                                                           • Devise a Solution
   • Standardize Solution
                                                        • Develop Detailed Action
    • Review and Define
                                                          • Plan & Implement It
       Next Issues
                                                              Systematically



                                    Check
                              • Confirm Outcomes
                                  Against Plan
                            • Identify Deviations and
                                      Issues
                                                                                © 2008
Why Management Systems Work


 • Needs focused
 • Goals driven
 • People oriented
     – Leadership driven
     – Involves people at all levels
     – Promotes cultural change
 •   Emphasizes process approach
 •   System approach to management
 •   Factual basis for decision making
 •   Continual improvement

                                   Business Advantage
                                                        © 2008
Risk Management

 • Establishes risk management as proactive
   means of protecting the organization
   – Pragmatic and business-centric approach to
     risk management

   – Promotes risk management as a central
     component of effective management

   – Key decision making and commitment of
     resources is based on a process of effective
     risk assessment
                                                    © 2008
What Does the ISO 28000 Say?




              M Re .6
               an vi
                 ag ew
                                     Po




                   em
                                        lic
                                    4.2 y




                     en
                      4



                        t
                        Security
                       Management          Se
                                             cur
                  &
        Checking         System          As      it
                                            ses y risk
               tive                     Pla     s
         Correc                            nn ment
                 4.5                          ing
          Action                                   4.3
                       Implementation
                         & operation
                             4.4



     Standards Implementation Requires A
   Organization-wide Commitment to Security
                                                         © 2008
Start: Know your Organization
                                                                                                                                                    - Define scope and boundaries
                                                                                                                                                    for security, preparedness and
                                                                                                                                                   continuity management program
                                                                                                                                                 - Identify critical objectives, operation,
                                                                                                                                                     functions, products and services
                                                                                                                                               - Preliminary determination of likely risk
                                                                                                                                                    scenarios and consequences


                                                                                         Security Policy
           Management Review                                                             - Management Commitment
           - Adequacy and Effectiveness                                                  - Commitment to Protection of Critical Assets
           - Need for Changes                                                            - Commitment to Continuous Improvement
           - Opportunities for Improvement




                                                            Continual
                                                                                                              Planning
                                                          Improvement
Checking & Corrective Action                                                                                  - Risk Assessment
- Performance and Evaluation                                                                                  - Legal and Other Requirements
- Nonconformity, Corrective                                                                                   - Security Management Objectives
and Preventive Action
                                                                                                              - Security Management Targets
- Control of Records
                                                                                                              - Security Management Programs
- Audits




                                             Implementation and Operation
                                             - Structure, Authority and Responsibility
                                             - Competence, Training, & Awareness
                                             - Communication
                                             - Documentation
                                             - Document and Data Control
                                             - Operational Control
                                             - Emergency Preparedness, Response
                                             and Security Recovery                                                                                                                     © 2008
Start: Know your Organization
                                                                                                                                                    - Define scope and boundaries

                                                                                 Start: Know your Organization                                      for security, preparedness and
                                                                                                                                                   continuity management program
                                                                                                                                                 - Identify critical objectives, operation,
                                                                •        Define scope and boundaries for security,                                   functions, products and services


                                                                        preparedness and continuity management                                 - Preliminary determination of likely risk
                                                                                                                                                    scenarios and consequences

                                                                        program          Security Policy


                                                                •        Identify critical objectives, operation,
           Management Review                                                             - Management Commitment
           - Adequacy and Effectiveness                                                  - Commitment to Protection of Critical Assets
           - Need for Changes                                           functions, products and services
                                                                                         - Commitment to Continuous Improvement
           - Opportunities for Improvement

                                                                •        Preliminary determination of likely risk
                                                                        scenarios and consequences

                                                            Continual
                                                                                                              Planning
                                                          Improvement
Checking & Corrective Action                                                                                  - Risk Assessment
- Performance and Evaluation                                                                                  - Legal and Other Requirements
- Nonconformity, Corrective                                                                                   - Security Management Objectives
and Preventive Action
                                                                                                              - Security Management Targets
- Control of Records
                                                                                                              - Security Management Programs
- Audits




                                             Implementation and Operation
                                             - Structure, Authority and Responsibility
                                             - Competence, Training, & Awareness
                                             - Communication
                                             - Documentation
                                             - Document and Data Control
                                             - Operational Control
                                             - Emergency Preparedness, Response
                                             and Security Recovery                                                                                                                     © 2008
Start: Know your Organization
                                                                                                                                                    - Define scope and boundaries
                                                                                                                                                    for security, preparedness and
                                                                                                                                                   continuity management program
                                                                                                                                                 - Identify critical objectives, operation,
                                                                                                                                                     functions, products and services
                                                                                                                                               - Preliminary determination of likely risk
                                                                                                                                                    scenarios and consequences

                                                               Security Policy           Security Policy
           Management Review                                                             - Management Commitment
           - Adequacy and Effectiveness
           - Need for Changes
                                                               - Management Commitment   - Commitment to Protection of Critical Assets
                                                                                         - Commitment to Continuous Improvement
           - Opportunities for Improvement
                                                               - Commitment to Protection of Critical Assets
                                                               - Commitment to Continuous Improvement

                                                            Continual
                                                                                                              Planning
                                                          Improvement
Checking & Corrective Action                                                                                  - Risk Assessment
- Performance and Evaluation                                                                                  - Legal and Other Requirements
- Nonconformity, Corrective                                                                                   - Security Management Objectives
and Preventive Action
                                                                                                              - Security Management Targets
- Control of Records
                                                                                                              - Security Management Programs
- Audits




                                             Implementation and Operation
                                             - Structure, Authority and Responsibility
                                             - Competence, Training, & Awareness
                                             - Communication
                                             - Documentation
                                             - Document and Data Control
                                             - Operational Control
                                             - Emergency Preparedness, Response
                                             and Security Recovery                                                                                                                     © 2008
Start: Know your Organization
                                                                                                                                                    - Define scope and boundaries
                                                                                                                                                    for security, preparedness and
                                                                                                                                                   continuity management program
                                                                                                                                                 - Identify critical objectives, operation,
                                                                                                                                                     functions, products and services
                                                                                                                                               - Preliminary determination of likely risk
                                                                                                                                                    scenarios and consequences


                                                                                         Security Policy
           Management Review                                                             - Management Commitment
           - Adequacy and Effectiveness                                                  - Commitment to Protection of Critical Assets
           - Need for Changes                                                            - Commitment to Continuous Improvement
           - Opportunities for Improvement




                                                            Continual
                                                          Improvement
                                                                           Planning                           Planning
Checking & Corrective Action                                                                                  - Risk Assessment
- Performance and Evaluation                                               - Risk Assessment                  - Legal and Other Requirements
- Nonconformity, Corrective                                                                                   - Security Management Objectives
and Preventive Action
- Control of Records
                                                                           - Legal and Other Requirements     - Security Management Targets
                                                                                                              - Security Management Programs
- Audits
                                                                           - Security Management Objectives
                                                                           - Security Management Targets
                                             Implementation and Operation

                                                                           - Security Management Programs
                                             - Structure, Authority and Responsibility
                                             - Competence, Training, & Awareness
                                             - Communication
                                             - Documentation
                                             - Document and Data Control
                                             - Operational Control
                                             - Emergency Preparedness, Response
                                             and Security Recovery                                                                                                                     © 2008
Objectives, Targets and Programs

                          Policy                Road to Success
     Threats,
    Risks and        Legal / Other          Views of
     Impacts         Requirements          Interested
                                             Parties



                Objectives                           SMS
                    And
                                                   Program
                 Targets


Technology       Finance      Operations          Critical Assets
                                                                    © 2008
Start: Know your Organization
                                                                                                                                                      - Define scope and boundaries
                                                                                                                                                      for security, preparedness and
                                                                                                                                                     continuity management program
                                                                                                                                                   - Identify critical objectives, operation,
                                                                                                                                                       functions, products and services
                                                                                                                                                 - Preliminary determination of likely risk
                                                                                                                                                      scenarios and consequences


                                                                                           Security Policy
           Management Review                                                               - Management Commitment
           - Adequacy and Effectiveness                                                    - Commitment to Protection of Critical Assets
           - Need for Changes                                                              - Commitment to Continuous Improvement
           - Opportunities for Improvement


                                             Implementation and Operation
                                             • Structure, Authority and Responsibility
                                             • Competence, Training, and Awareness
                                                       Continual
                                                                                                                Planning
                                                     Improvement
                                             • Communication
Checking & Corrective Action                                                                                    - Risk Assessment
- Performance and Evaluation                                                                                    - Legal and Other Requirements
- Nonconformity, Corrective
                                             • Documentation
                                                                                                                - Security Management Objectives
and Preventive Action
                                                                                                                - Security Management Targets
- Control of Records
                                                                                                                - Security Management Programs
- Audits
                                             • Document and Data Control
                                             • Operational Control
                                               Implementation and Operation

                                             • Emergency Preparedness, Response
                                               - Structure, Authority and Responsibility
                                               - Competence, Training, & Awareness

                                             and Security Recovery
                                               - Communication
                                               - Documentation
                                               - Document and Data Control
                                               - Operational Control
                                               - Emergency Preparedness, Response
                                               and Security Recovery                                                                                                                     © 2008
Start: Know your Organization
                                                                                                                                                    - Define scope and boundaries
                                                                                                                                                    for security, preparedness and
                                                                                                                                                   continuity management program
                                                                                                                                                 - Identify critical objectives, operation,
                                                                                                                                                     functions, products and services
                                                                                                                                               - Preliminary determination of likely risk
                                                                                                                                                    scenarios and consequences


                                                                                         Security Policy
           Management Review                                                             - Management Commitment
           - Adequacy and Effectiveness                                                  - Commitment to Protection of Critical Assets
           - Need for Changes                                                            - Commitment to Continuous Improvement
           - Opportunities for Improvement




 Checking & Corrective Action
 - Security Performance Improvement
                         Monitoring
                          Continual
                                                                                                              Planning

 and Measurement
Checking & Corrective Action                                                                                  - Risk Assessment
- Performance and Evaluation                                                                                  - Legal and Other Requirements
- Nonconformity, Corrective
 - System Evaluation
                                                                                                              - Security Management Objectives
and Preventive Action
                                                                                                              - Security Management Targets
- Control of Records
                                                                                                              - Security Management Programs
 - Nonconformity, Corrective and
- Audits



 Preventive Action
                                             Implementation and Operation
 - Control of Records                        - Structure, Authority and Responsibility
                                             - Competence, Training, & Awareness

 - Audits                                    - Communication
                                             - Documentation
                                             - Document and Data Control
                                             - Operational Control
                                             - Emergency Preparedness, Response
                                             and Security Recovery                                                                                                                     © 2008
Start: Know your Organization
                                                                                                                                                     - Define scope and boundaries
                                                                                                                                                     for security, preparedness and
                                                                                                                                                    continuity management program

           Management Review                                                                                                                      - Identify critical objectives, operation,
                                                                                                                                                      functions, products and services
                                                                                                                                                - Preliminary determination of likely risk
                                                                                                                                                     scenarios and consequences

           - Adequacy and Effectiveness                                                   Security Policy
            Management Review                                                             - Management Commitment

           - Need for Changes
            - Adequacy and Effectiveness
            - Need for Changes
                                                                                          - Commitment to Protection of Critical Assets
                                                                                          - Commitment to Continuous Improvement
            - Opportunities for Improvement

           - Opportunities for Improvement


                                                             Continual
                                                                                                               Planning
                                                           Improvement
Checking & Corrective Action                                                                                   - Risk Assessment
- Performance and Evaluation                                                                                   - Legal and Other Requirements
- Nonconformity, Corrective                                                                                    - Security Management Objectives
and Preventive Action
                                                                                                               - Security Management Targets
- Control of Records
                                                                                                               - Security Management Programs
- Audits




                                              Implementation and Operation
                                              - Structure, Authority and Responsibility
                                              - Competence, Training, & Awareness
                                              - Communication
                                              - Documentation
                                              - Document and Data Control
                                              - Operational Control
                                              - Emergency Preparedness, Response
                                              and Security Recovery                                                                                                                     © 2008
There’s a Bottleneck

           Lead Auditors Needed




  Demand for implementation and certification is
currently outpacing the availability of lead auditors
                                                        © 2008
Types of Audits

• First Party
  – Internal audit of client
  – Self declaration
• Second Party
  – External non-certification audit
  – Contractually enforced (supply chain)
• Third Party
  – Audit by external certified auditors
  – Road to certification
                                            © 2008
Accreditation and Certification                                     Relevant Standards
        (Registration) Bodies
               Accreditation Bodies                      ISO/IEC 17011:2004
  An organization (usually a national standards body     Conformity assessment -- General requirements for accreditation
                                                         bodies accrediting conformity assessment bodies
 associated with ISO) that checks certification bodies
                                                         ISO/IEC 17040:2005
and, provided their certification assessment processes   Conformity assessment -- General requirements for peer
   pass muster, accredits them i.e. grants them the      assessment of conformity assessment bodies and accreditation
      authority to issue recognized certificates.        bodies




                  Certification                          ISO 28003:2007
                                                         Security management systems for the supply chain --
              (Registration) Bodies                      Requirements for bodies providing audit and certification of
 An independent external body that issues written        supply chain security management systems
  assurance (the certificate) that it has audited a      ISO/IEC 17021:2006
management system and verified that it conforms to       Conformity assessment -- Requirements for bodies providing
    the requirements specified in the standard.          audit and certification of management systems


                                                         Certified Lead Auditor
                                                         ISO 19011:2002
                                                         Guidelines for quality and/or environmental management
                                                         systems auditing

                   Organization
Implements standard – may seek formal recognition        ISO 28000:2007
  (certification) by a specialized third party body.     Specification for security management systems for the supply
                                                         chain




                                                                                                                        © 2008
Principles that Relate to Auditors

 • Ethical conduct: the foundation of professionalism

 • Fair presentation: the obligation to report truthfully
   and accurately

 • Due professional care: the application of diligence
   and judgement in auditing

 • Independence: the basis for the impartiality of the
   audit and objectivity of the audit conclusions

 • Evidence-based approach: the rational method for
   reaching reliable and reproducible audit conclusions in a
   systematic audit process

                                                               © 2008
Lead Auditor Certification

 • Knowledge of management systems
 • Knowledge of the standard being audit to, as
   well as normative documents
 • Principles of auditing based on ISO 19011
 • Technical knowledge of the activity being
   audited
 • Understanding risk assessment and
   management from a business perspective
 • General knowledge of regulatory requirements
 • Understanding of security, preparedness
   response and recovery management

                                                  © 2008
How Do I Become a Player?

ISO 28000 is Here – and Rapidly Gaining Momentum




                Your Ticket to Play
              BECOME A CERTIFIED
            ISO 28000 LEAD AUDITOR
                                                   © 2008
Course Objectives
 • Knowledge of a systematic and practical approach to security
   management system auditing

 • Broad understanding of the scope of security management
   system auditor responsibilities

 • Competency in organizing and directing audit team members

 • An in-depth understanding of the ISO 28000 and security risk
   management requirements

 • The ability to effectively provide management with objective
   advice regarding progress towards compliance and certification of
   security management systems

 • Demonstrable understanding of the intent and application of
   relevant Acts, Standards, Codes of Practice, and other documents
   relevant to regualtions and legislation
                                                                       © 2008
Key Session Topics

 • Plan, conduct, and report an actual audit and examine
   relevant case studies

 • Major elements and scope of risk management
   including definitions of common risk management
   terms

 • Structure and make-up of management system
   documentation

 • Roles and responsibilities for security management

 • Requirements and methods for ensuring continuous
   improvement

                                                           © 2008
Key Session Topics

 • Audit techniques and methodology according to:
    – ISO 28000:2007 Specification for Security Management
      Systems for the Supply Chain
    – ISO 31000 Risk Management
    – ISO 31010 Risk Assessment (Methodologies)
    – ASIS International Risk Assessment (Process)
    – ISO 19011:2003 Guidelines for Quality and/or Environmental
      Management (under revision to add risk-based processes)

 • Systems Auditing
    –   Security threat and vulnerability assessments
    –   Asset protection and loss protection
    –   IT and electronic security
    –   Personnel protection
    –   Risk to transport and infrastructure from terrorism
                                                                   © 2008
Competence of Auditors

 Competence =

 ∑ Personal attributes
 + Generic auditing knowledge and skills
 + Security, Preparedness, Response and
  Recovery specific knowledge and skills


                                           © 2008
Process
Flow for
Audit
Program




      © 2008
Authority to Audit
•    The organization’s top management should    Process
    grant the authority for managing the audit
    program.                                     Flow for
• Establish, implement, monitor, review and      Audit
  improve the audit program
• Identify the necessary resources and ensure    Program
  they are provided




                                                       © 2008
Process
                    Plan                    Flow for
•Objectives of an audit program             Audit
•Extent of an audit program
                                            Program
   • Scope, objective and duration
   • Standards, statutory, regulatory and
   contractual requirements
   • Language, cultural and social issues
•Audit program responsibilities
•Audit program resources
•Audit program procedures




                                                  © 2008
Competence and evaluation of auditors
  •                                           Process
        Competence = ∑ (Personal attributes) + (Generic
        auditing knowledge and skills) + (Security- knowledge
        and skills)                           Flow for
  •     Confidentiality and clearances
                                              Audit
                                              Program
                  Do
•Audit program implementation
      •communicating the audit coordinating and scheduling
      audits
      •establishing and maintaining a process for the evaluation
      of the auditors
      •selection of audit teams
      •providing necessary resources to the audit teams
      •conduct of audits according to the audit program
      •control of records of the audit activities
      •review and approval of audit reports,
      •audit follow-up
•Audit program records                                        © 2008
Process
                                                 Flow for
                                                 Audit
                                                 Program




                Check
- Audit program monitoring and reviewing
- Identify needs for corrective and preventive
actions
- Identify opportunities for improvement               © 2008
Process
                                         Flow for
                                         Audit
                                         Program


                 Act
- Improve the audit program
- Commitment to Continuous Improvement




                                               © 2008
Initiating the audit
  - appointing the audit team leader
  - defining audit objectives, scope and criteria
  - determining the feasibility of the audit
  - selecting the audit team
  - establishing initial contact with the auditee
                                                                       Overview
                    Conducting document review                         of typical
- reviewing relevant management system documents, including records,
and determining their adequacy with respect to audit criteria            audit
              Preparing for the on-site audit activities
                                                                       activities
- preparing the audit plan
- assigning work to the audit team
- preparing work documents


                 Conducting on-site audit activities
- conducting opening meeting
- communication during the audit
- roles and responsibilities of guides and observers
- collecting and verifying information
- generating audit findings
- preparing audit conclusions
- conducting closing meeting


       Preparing, approving and distributing the audit report
- preparing the audit report
- approving and distributing audit report


                        Completing the audit


                     Conducting audit follow-up
                                                                                    © 2008
Source of Information




Collecting and verifying information by
  appropriate sampling techniques         Collecting
                                          Information to
                                          Reach Audit
          Audit evidence
                                          Conclusions

   Evaluating against audit criteria




           Audit findings


              Reviewing



          Audit conclusions
                                                       © 2008
What Does the Future Hold?


                   • ISO 28002,
                     Resilience in the
                     Supply Chain
                   • ISO 28005, Ships and
                     marine technology -
                     Computer
                     applications -
                     Electronic port
                     clearance (EPC)


                                         © 2008
Thank You

           Dr. Marc Siegel
 Security Management System Consultant
            ASIS International
         Phone: +1-858-484-9855
    Email: siegel@ASIS-Standards.net
            siegel@ymail.com



                                         S

                                             © 2008

Contenu connexe

Tendances

Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
Criterios Minimos de Seguridad CTPAT 2019 conference
Criterios Minimos de Seguridad CTPAT 2019 conferenceCriterios Minimos de Seguridad CTPAT 2019 conference
Criterios Minimos de Seguridad CTPAT 2019 conferenceJoe Garza
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain SecurityCustoms-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain SecurityLivingston International
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsUppala Anand
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1David Santiago
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Iso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaIso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaFahmi Albaheth
 
1. c tpat minimum security criteria
1. c tpat minimum security criteria1. c tpat minimum security criteria
1. c tpat minimum security criteriaProColombia
 
All you wanted to know about iso 27000
All you wanted to know about iso 27000All you wanted to know about iso 27000
All you wanted to know about iso 27000Ramana K V
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...Hernan Huwyler, MBA CPA
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPrivacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPECB
 
Qms kick off meeting ppt
Qms kick off meeting pptQms kick off meeting ppt
Qms kick off meeting pptANUPAM RAY
 
NQA ISO 27001 A Guide to Annex A
NQA ISO 27001 A Guide to Annex ANQA ISO 27001 A Guide to Annex A
NQA ISO 27001 A Guide to Annex ANA Putra
 
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyBest Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyPECB
 
Great ISO 14001 Compliance Obligations and Legal Requirements
Great ISO 14001 Compliance Obligations and Legal RequirementsGreat ISO 14001 Compliance Obligations and Legal Requirements
Great ISO 14001 Compliance Obligations and Legal RequirementsNimonik
 

Tendances (20)

Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Criterios Minimos de Seguridad CTPAT 2019 conference
Criterios Minimos de Seguridad CTPAT 2019 conferenceCriterios Minimos de Seguridad CTPAT 2019 conference
Criterios Minimos de Seguridad CTPAT 2019 conference
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain SecurityCustoms-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
 
SOC 2 and You
SOC 2 and YouSOC 2 and You
SOC 2 and You
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Iso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaIso27001- Nashwan Mustafa
Iso27001- Nashwan Mustafa
 
1. c tpat minimum security criteria
1. c tpat minimum security criteria1. c tpat minimum security criteria
1. c tpat minimum security criteria
 
ISO lead auditor Training
ISO lead auditor TrainingISO lead auditor Training
ISO lead auditor Training
 
All you wanted to know about iso 27000
All you wanted to know about iso 27000All you wanted to know about iso 27000
All you wanted to know about iso 27000
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPrivacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
 
Qms kick off meeting ppt
Qms kick off meeting pptQms kick off meeting ppt
Qms kick off meeting ppt
 
NQA ISO 27001 A Guide to Annex A
NQA ISO 27001 A Guide to Annex ANQA ISO 27001 A Guide to Annex A
NQA ISO 27001 A Guide to Annex A
 
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyBest Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
 
Great ISO 14001 Compliance Obligations and Legal Requirements
Great ISO 14001 Compliance Obligations and Legal RequirementsGreat ISO 14001 Compliance Obligations and Legal Requirements
Great ISO 14001 Compliance Obligations and Legal Requirements
 

En vedette

C-TPAT Security Training
C-TPAT Security TrainingC-TPAT Security Training
C-TPAT Security TrainingAdrian Spectre
 
GSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_PresentationGSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_PresentationSunjib Anwar
 
Meta.solutions ctpat (english)
Meta.solutions  ctpat (english)Meta.solutions  ctpat (english)
Meta.solutions ctpat (english)Meta:Solutions
 
CTPAT-Highway Carrier Security Requirements
CTPAT-Highway Carrier Security RequirementsCTPAT-Highway Carrier Security Requirements
CTPAT-Highway Carrier Security RequirementsPrep4Audit
 
The profile of u & v group
The profile of u & v groupThe profile of u & v group
The profile of u & v groupvabby26
 
Walmart CTPAT Audit Report 1.PDF
Walmart CTPAT Audit Report 1.PDFWalmart CTPAT Audit Report 1.PDF
Walmart CTPAT Audit Report 1.PDFManoj Dnyanmothe
 
Supply chain management
Supply chain managementSupply chain management
Supply chain managementShwe Zin
 
226680637 tai-lieu-huong-dan-c-tpat-docx
226680637 tai-lieu-huong-dan-c-tpat-docx226680637 tai-lieu-huong-dan-c-tpat-docx
226680637 tai-lieu-huong-dan-c-tpat-docxHiền Bốn Mắt
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSource Code Control Limited
 
BUSN7024_Project Management Plan_Example
BUSN7024_Project Management Plan_ExampleBUSN7024_Project Management Plan_Example
BUSN7024_Project Management Plan_ExampleVIVAIO
 
How to choose the best transportation with supply chain
How to choose the best transportation with supply chainHow to choose the best transportation with supply chain
How to choose the best transportation with supply chainguest06c40002
 
7 point security inspection guide
7 point security inspection guide7 point security inspection guide
7 point security inspection guidehuynhloan
 
Building an Effective Supply Chain Security Program
Building an Effective Supply Chain Security ProgramBuilding an Effective Supply Chain Security Program
Building an Effective Supply Chain Security ProgramPriyanka Aash
 
Presentacion c tpat diplomado
Presentacion c tpat diplomadoPresentacion c tpat diplomado
Presentacion c tpat diplomadodeliaarce
 
Topic 7 audit planning (2)
Topic 7 audit planning (2)Topic 7 audit planning (2)
Topic 7 audit planning (2)sakura rena
 
Improve your organization’s capability for faster growth and change with BPM,...
Improve your organization’s capability for faster growth and change with BPM,...Improve your organization’s capability for faster growth and change with BPM,...
Improve your organization’s capability for faster growth and change with BPM,...Eric D. Schabell
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)Cyril Soeri
 

En vedette (20)

C-TPAT Security Training
C-TPAT Security TrainingC-TPAT Security Training
C-TPAT Security Training
 
GSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_PresentationGSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_Presentation
 
Meta.solutions ctpat (english)
Meta.solutions  ctpat (english)Meta.solutions  ctpat (english)
Meta.solutions ctpat (english)
 
CTPAT-Highway Carrier Security Requirements
CTPAT-Highway Carrier Security RequirementsCTPAT-Highway Carrier Security Requirements
CTPAT-Highway Carrier Security Requirements
 
The profile of u & v group
The profile of u & v groupThe profile of u & v group
The profile of u & v group
 
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdfIso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
 
Walmart CTPAT Audit Report 1.PDF
Walmart CTPAT Audit Report 1.PDFWalmart CTPAT Audit Report 1.PDF
Walmart CTPAT Audit Report 1.PDF
 
GS Profile Presentation(Jacobs)
GS Profile Presentation(Jacobs)GS Profile Presentation(Jacobs)
GS Profile Presentation(Jacobs)
 
Supply chain management
Supply chain managementSupply chain management
Supply chain management
 
226680637 tai-lieu-huong-dan-c-tpat-docx
226680637 tai-lieu-huong-dan-c-tpat-docx226680637 tai-lieu-huong-dan-c-tpat-docx
226680637 tai-lieu-huong-dan-c-tpat-docx
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
BUSN7024_Project Management Plan_Example
BUSN7024_Project Management Plan_ExampleBUSN7024_Project Management Plan_Example
BUSN7024_Project Management Plan_Example
 
How to choose the best transportation with supply chain
How to choose the best transportation with supply chainHow to choose the best transportation with supply chain
How to choose the best transportation with supply chain
 
7 point security inspection guide
7 point security inspection guide7 point security inspection guide
7 point security inspection guide
 
Building an Effective Supply Chain Security Program
Building an Effective Supply Chain Security ProgramBuilding an Effective Supply Chain Security Program
Building an Effective Supply Chain Security Program
 
C tpat
C tpatC tpat
C tpat
 
Presentacion c tpat diplomado
Presentacion c tpat diplomadoPresentacion c tpat diplomado
Presentacion c tpat diplomado
 
Topic 7 audit planning (2)
Topic 7 audit planning (2)Topic 7 audit planning (2)
Topic 7 audit planning (2)
 
Improve your organization’s capability for faster growth and change with BPM,...
Improve your organization’s capability for faster growth and change with BPM,...Improve your organization’s capability for faster growth and change with BPM,...
Improve your organization’s capability for faster growth and change with BPM,...
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)
 

Similaire à ISO 28000 Security Management for Supply Chains

ISO 28000:2008 Certification
ISO 28000:2008 Certification ISO 28000:2008 Certification
ISO 28000:2008 Certification Sifiso Nxele
 
Iso9000 pvcgmp roll no. 01
Iso9000  pvcgmp roll no. 01Iso9000  pvcgmp roll no. 01
Iso9000 pvcgmp roll no. 01Hetal Hinglajia
 
Study of international organization for standardization (ISO) ISO -9000 ,140...
Study of international organization for standardization (ISO)  ISO -9000 ,140...Study of international organization for standardization (ISO)  ISO -9000 ,140...
Study of international organization for standardization (ISO) ISO -9000 ,140...jay Rathod
 
Company profile
Company profileCompany profile
Company profilereenaisaac
 
stellar profile
stellar profilestellar profile
stellar profileponky2012
 
gestion logistique selon la norme ISO 28000
gestion logistique selon la norme ISO 28000gestion logistique selon la norme ISO 28000
gestion logistique selon la norme ISO 28000Abderrahim Meftah
 
10 Benefits of Implementing ISO/IEC 20000 in an Organization
10 Benefits of Implementing ISO/IEC 20000 in an Organization10 Benefits of Implementing ISO/IEC 20000 in an Organization
10 Benefits of Implementing ISO/IEC 20000 in an OrganizationPECB
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
Insight into the new
Insight into the newInsight into the new
Insight into the newANUPAM RAY
 
english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxssuser00d6eb
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Yerlin Sturdivant
 
ISO 28000 | ISO 28000 Implementation Training
ISO 28000 | ISO 28000 Implementation TrainingISO 28000 | ISO 28000 Implementation Training
ISO 28000 | ISO 28000 Implementation Traininghimalya sharma
 
ISO 28000 | ISO 28000 Internal AuditorTraining
ISO 28000 | ISO 28000 Internal AuditorTrainingISO 28000 | ISO 28000 Internal AuditorTraining
ISO 28000 | ISO 28000 Internal AuditorTraininghimalya sharma
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part Ikhushboo
 
Introduction to ISO 9000
Introduction to ISO 9000Introduction to ISO 9000
Introduction to ISO 9000Ketan Shahade
 

Similaire à ISO 28000 Security Management for Supply Chains (20)

ISO 28000:2008 Certification
ISO 28000:2008 Certification ISO 28000:2008 Certification
ISO 28000:2008 Certification
 
Iso9000 pvcgmp roll no. 01
Iso9000  pvcgmp roll no. 01Iso9000  pvcgmp roll no. 01
Iso9000 pvcgmp roll no. 01
 
ISO Intro1.pptx
ISO Intro1.pptxISO Intro1.pptx
ISO Intro1.pptx
 
Study of international organization for standardization (ISO) ISO -9000 ,140...
Study of international organization for standardization (ISO)  ISO -9000 ,140...Study of international organization for standardization (ISO)  ISO -9000 ,140...
Study of international organization for standardization (ISO) ISO -9000 ,140...
 
Company profile
Company profileCompany profile
Company profile
 
stellar profile
stellar profilestellar profile
stellar profile
 
gestion logistique selon la norme ISO 28000
gestion logistique selon la norme ISO 28000gestion logistique selon la norme ISO 28000
gestion logistique selon la norme ISO 28000
 
10 Benefits of Implementing ISO/IEC 20000 in an Organization
10 Benefits of Implementing ISO/IEC 20000 in an Organization10 Benefits of Implementing ISO/IEC 20000 in an Organization
10 Benefits of Implementing ISO/IEC 20000 in an Organization
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
ISO- 9001
ISO- 9001ISO- 9001
ISO- 9001
 
Corporate presentation 18.02.2013
Corporate presentation   18.02.2013Corporate presentation   18.02.2013
Corporate presentation 18.02.2013
 
Insight into the new
Insight into the newInsight into the new
Insight into the new
 
english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptx
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 
ISO 27001 definitions
ISO 27001 definitionsISO 27001 definitions
ISO 27001 definitions
 
ISO 9000 series
ISO 9000 seriesISO 9000 series
ISO 9000 series
 
ISO 28000 | ISO 28000 Implementation Training
ISO 28000 | ISO 28000 Implementation TrainingISO 28000 | ISO 28000 Implementation Training
ISO 28000 | ISO 28000 Implementation Training
 
ISO 28000 | ISO 28000 Internal AuditorTraining
ISO 28000 | ISO 28000 Internal AuditorTrainingISO 28000 | ISO 28000 Internal AuditorTraining
ISO 28000 | ISO 28000 Internal AuditorTraining
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 
Introduction to ISO 9000
Introduction to ISO 9000Introduction to ISO 9000
Introduction to ISO 9000
 

Plus de Enterprise Security Risk Management

Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantEnterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantEnterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Enterprise Security Risk Management
 

Plus de Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Dernier

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 

Dernier (20)

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 

ISO 28000 Security Management for Supply Chains

  • 1. Auditing Security Management Systems and the Supply Chain: ISO28000 ASIS International 3rd Asia-Pacific Conference Wednesday 4 February 2009 11.50 - 12.35 Dr. Marc Siegel ASIS International ISO/TC 8 Delegation Head © 2008
  • 2. Promoting Security in the Supply Chain Supplier – Manufacturer – Distributor – Retailer – Logistics Continuity in the supply chain is a key component of today's global marketplace © 2008
  • 3. Globalization of Supply Chains Disruption of the Supply Chain a Rising Threat • Just-in-time manufacturing • Outsourcing • Global sourcing • Specialized factories • Centralized distribution • Supply consolidation • Reduction of the supplier base • Volatility of demand • Lack control procedures © 2008
  • 4. So What Could Happen? • Human trafficking • Contraband smuggling • Theft • Cyber-crime • Internal sabotage • Industrial sabotage • Terrorism • Counterfeiting • Insurgency • Bio-terrorism • Wholesale and retail supply loss • Organized crime • WMD in containers • Political disruptions • $$$ Damages © 2008
  • 5. What are the Consequences of an Incident? • Damage to tangibles: – Human and physical assets – property, products, infrastructure, personnel and the environment • Damage to intangibles: – Non-physical assets - reputation, market position, goodwill • The harm to the organization may include; – Injury or serious harm to persons and property – Business integrity – Reputation – Clients property – Standing in industry community – Regulatory issues © 2008
  • 6. ISO 28000 to the Rescue © 2008
  • 7. The 28000 Series • Developed in response to demand from industry against a background of varying international security regimes. • Generic management specification to improve the security in supply chains. • Requires organizations to: – assess the security environment in which it operates – determine if adequate security measures are in place – improve performance • Designed to be a sound foundation for complying efficiently with other international, national and sector based security requirements and schemes. © 2008
  • 8. The ISO 28000 Series Standards and codes of practice for supply chain security • The 28000 series was developed to compliment the various international initiatives to facilitate uniform implementation worldwide. • ISO 28000 - Supply chain security management – Published Sept. 2007 – Risked based model – Plan, Do, Check, Act principles – Designed for 1st, 2nd & 3rd party auditing • Certification Standard, similar to: – ISO 14001, OHSAS 18001, ISO 27001 © 2008
  • 9. ISO 28000 Enables an Organization to: • Establish, implement, maintain and improve a security management system • Assure conformity with security management policy • Demonstrate such conformity • Seek certification/registration of conformity by an accredited third party organization • Make a self-determination and self-declaration of conformity © 2008
  • 10. Meet the Family © 2008
  • 11. ISO 28000 Series of Standards • ISO 28000:2007 – Specification for security management systems for the supply chain • ISO 28001:2007 – Security management systems for the supply chain -- Best practices for implementing supply chain security, assessments and plans -- Requirements and guidance • ISO 28003:2007 – Security management systems for the supply chain -- Requirements for bodies providing audit and certification of supply chain security management systems • ISO 28004:2007 – Security management systems for the supply chain -- Guidelines for the implementation of ISO 28000 © 2008
  • 12. What Does the ISO 28000 Address? • ISO 28000 requires the organization to consider the likelihood of an event and all of its consequences including: – Physical failure threats and risks, such as functional failure, incidental damage, malicious damage or terrorist or criminal action – Operational threats and risks, including the control of the security, human factors and other activities which affect the organizations performance, condition or safety – Natural environmental events (storm, floods, etc.), which may render security measures and equipment ineffective – Factors outside of the organization's control, such as failures in externally supplied equipment and services © 2008
  • 13. Built to Be Business Friendly • Suitable for all sizes and types of organizations that are involved in purchasing, manufacturing, service, storage, transportation and/or sales processes • Aligned with the globally accepted standards: – ISO 9001:2000 - Quality management – ISO 14001:2004 - Environmental management – ISO/IEC 27001:2005 - Information technology security • Supports consistent and integrated implementation and operation with related management standards. • One suitably designed management system can satisfy the requirements of all these standards © 2008
  • 14. The Standard Can Be Used to: • Demonstrate a robust and secure supply chain management system to regulators/authorities and other interested organizations • Demonstrate a robust and secure supply chain management system to their customers/potential customers • Provide a consistent approach by all service providers within a supply chain • Serve as the basis for an independent assessment • Demonstrate the ability to meet customer requirements • Improve services © 2008
  • 15. Commercial & Competitive Advantage • Unambiguous demonstration the organization takes security seriously – Customer confidence that their goods are protected – Increased brand equity through the clear demonstration of commitment to security – Benefit through increased market share and through customer retention • Increased organizational resilience • Brand and reputation protection © 2008
  • 16. Improved Management • Effective management of security resources, resulting in cost savings • Increased accountability at all levels • Demonstrates effective corporate governance • Improved safety and security for employees • Improved staff and customer satisfaction • Can be integrated with other internationally recognized management system standards © 2008
  • 17. Ports Worldwide Adopting ISO 28000 • September 2006 - DP World first to certify – HQ Dubai – Ports of Djibouti, Dubai, Vancouver (1st port in the Americas), Porto Caucedo (Dominican Republic- Latin American gateway to US), Southampton, Tilbury, Le Havre, Port of Busan, Korea – All Australia terminals undergoing implementation – DP World plans to certify all its ports/terminals • March 2008 - Port of Houston Authority (PHA), Port Police has become the first port authority in the world to receive ISO 28000:2007 certification • May 2008 - Singapore-based logistics and supply chain management company YCH Group becomes the first end- to-end Supply Chain Management (SCM) provider to receive the ISO 28000: 2007 Certification. © 2008
  • 18. Mutual Recognition • ISO 28000 has been recognized by the EU Authorized Economic Operators (AEO) initiative as compliant to the AEO Safety and Security requirements • DP World’s ISO certification has been recognized by US Customs Border Protection, with the company uniquely being invited to join C-TPAT. • US Congress has recognized the relevance of 28000 to CTPAT and has tasked its research body, GAO, to confirm technical compatibility. – Companies that are ISO 28000 compliant may not have to qualify to join CTPAT but can now enjoy the benefits upon recognition. © 2008
  • 19. ISO 28000 a New Member of the Family of ISO Management Systems Standards Identify risks, set priorities and establish dynamic programs and plans to cost effectively improve performance Generic framework for organizations of all sizes and types – private, public, faith-based or not-for-profit organizations. © 2008
  • 20. 28000 is a Management System • A management system is what the organization does to manage its processes, functions or activities. – Set of interrelated elements used to establish and achieve an organization’s policy and objectives. – Includes policies, organizational structure, responsibilities, planning activities, resources, practices, procedures and processes. – Allows an organization to create and manage its processes and activities to meet its business objectives. © 2008
  • 21. PDCA or APCI Model Approach to structured problem solving Plan (Assess) - Do (Protect) - Check (Confirm) - Act (Improve) Plan • Define & Analyze a Problem and Identify the Root Cause Act Do • Devise a Solution • Standardize Solution • Develop Detailed Action • Review and Define • Plan & Implement It Next Issues Systematically Check • Confirm Outcomes Against Plan • Identify Deviations and Issues © 2008
  • 22. Why Management Systems Work • Needs focused • Goals driven • People oriented – Leadership driven – Involves people at all levels – Promotes cultural change • Emphasizes process approach • System approach to management • Factual basis for decision making • Continual improvement Business Advantage © 2008
  • 23. Risk Management • Establishes risk management as proactive means of protecting the organization – Pragmatic and business-centric approach to risk management – Promotes risk management as a central component of effective management – Key decision making and commitment of resources is based on a process of effective risk assessment © 2008
  • 24. What Does the ISO 28000 Say? M Re .6 an vi ag ew Po em lic 4.2 y en 4 t Security Management Se cur & Checking System As it ses y risk tive Pla s Correc nn ment 4.5 ing Action 4.3 Implementation & operation 4.4 Standards Implementation Requires A Organization-wide Commitment to Security © 2008
  • 25. Start: Know your Organization - Define scope and boundaries for security, preparedness and continuity management program - Identify critical objectives, operation, functions, products and services - Preliminary determination of likely risk scenarios and consequences Security Policy Management Review - Management Commitment - Adequacy and Effectiveness - Commitment to Protection of Critical Assets - Need for Changes - Commitment to Continuous Improvement - Opportunities for Improvement Continual Planning Improvement Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Legal and Other Requirements - Nonconformity, Corrective - Security Management Objectives and Preventive Action - Security Management Targets - Control of Records - Security Management Programs - Audits Implementation and Operation - Structure, Authority and Responsibility - Competence, Training, & Awareness - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 26. Start: Know your Organization - Define scope and boundaries Start: Know your Organization for security, preparedness and continuity management program - Identify critical objectives, operation, • Define scope and boundaries for security, functions, products and services preparedness and continuity management - Preliminary determination of likely risk scenarios and consequences program Security Policy • Identify critical objectives, operation, Management Review - Management Commitment - Adequacy and Effectiveness - Commitment to Protection of Critical Assets - Need for Changes functions, products and services - Commitment to Continuous Improvement - Opportunities for Improvement • Preliminary determination of likely risk scenarios and consequences Continual Planning Improvement Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Legal and Other Requirements - Nonconformity, Corrective - Security Management Objectives and Preventive Action - Security Management Targets - Control of Records - Security Management Programs - Audits Implementation and Operation - Structure, Authority and Responsibility - Competence, Training, & Awareness - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 27. Start: Know your Organization - Define scope and boundaries for security, preparedness and continuity management program - Identify critical objectives, operation, functions, products and services - Preliminary determination of likely risk scenarios and consequences Security Policy Security Policy Management Review - Management Commitment - Adequacy and Effectiveness - Need for Changes - Management Commitment - Commitment to Protection of Critical Assets - Commitment to Continuous Improvement - Opportunities for Improvement - Commitment to Protection of Critical Assets - Commitment to Continuous Improvement Continual Planning Improvement Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Legal and Other Requirements - Nonconformity, Corrective - Security Management Objectives and Preventive Action - Security Management Targets - Control of Records - Security Management Programs - Audits Implementation and Operation - Structure, Authority and Responsibility - Competence, Training, & Awareness - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 28. Start: Know your Organization - Define scope and boundaries for security, preparedness and continuity management program - Identify critical objectives, operation, functions, products and services - Preliminary determination of likely risk scenarios and consequences Security Policy Management Review - Management Commitment - Adequacy and Effectiveness - Commitment to Protection of Critical Assets - Need for Changes - Commitment to Continuous Improvement - Opportunities for Improvement Continual Improvement Planning Planning Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Risk Assessment - Legal and Other Requirements - Nonconformity, Corrective - Security Management Objectives and Preventive Action - Control of Records - Legal and Other Requirements - Security Management Targets - Security Management Programs - Audits - Security Management Objectives - Security Management Targets Implementation and Operation - Security Management Programs - Structure, Authority and Responsibility - Competence, Training, & Awareness - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 29. Objectives, Targets and Programs Policy Road to Success Threats, Risks and Legal / Other Views of Impacts Requirements Interested Parties Objectives SMS And Program Targets Technology Finance Operations Critical Assets © 2008
  • 30. Start: Know your Organization - Define scope and boundaries for security, preparedness and continuity management program - Identify critical objectives, operation, functions, products and services - Preliminary determination of likely risk scenarios and consequences Security Policy Management Review - Management Commitment - Adequacy and Effectiveness - Commitment to Protection of Critical Assets - Need for Changes - Commitment to Continuous Improvement - Opportunities for Improvement Implementation and Operation • Structure, Authority and Responsibility • Competence, Training, and Awareness Continual Planning Improvement • Communication Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Legal and Other Requirements - Nonconformity, Corrective • Documentation - Security Management Objectives and Preventive Action - Security Management Targets - Control of Records - Security Management Programs - Audits • Document and Data Control • Operational Control Implementation and Operation • Emergency Preparedness, Response - Structure, Authority and Responsibility - Competence, Training, & Awareness and Security Recovery - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 31. Start: Know your Organization - Define scope and boundaries for security, preparedness and continuity management program - Identify critical objectives, operation, functions, products and services - Preliminary determination of likely risk scenarios and consequences Security Policy Management Review - Management Commitment - Adequacy and Effectiveness - Commitment to Protection of Critical Assets - Need for Changes - Commitment to Continuous Improvement - Opportunities for Improvement Checking & Corrective Action - Security Performance Improvement Monitoring Continual Planning and Measurement Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Legal and Other Requirements - Nonconformity, Corrective - System Evaluation - Security Management Objectives and Preventive Action - Security Management Targets - Control of Records - Security Management Programs - Nonconformity, Corrective and - Audits Preventive Action Implementation and Operation - Control of Records - Structure, Authority and Responsibility - Competence, Training, & Awareness - Audits - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 32. Start: Know your Organization - Define scope and boundaries for security, preparedness and continuity management program Management Review - Identify critical objectives, operation, functions, products and services - Preliminary determination of likely risk scenarios and consequences - Adequacy and Effectiveness Security Policy Management Review - Management Commitment - Need for Changes - Adequacy and Effectiveness - Need for Changes - Commitment to Protection of Critical Assets - Commitment to Continuous Improvement - Opportunities for Improvement - Opportunities for Improvement Continual Planning Improvement Checking & Corrective Action - Risk Assessment - Performance and Evaluation - Legal and Other Requirements - Nonconformity, Corrective - Security Management Objectives and Preventive Action - Security Management Targets - Control of Records - Security Management Programs - Audits Implementation and Operation - Structure, Authority and Responsibility - Competence, Training, & Awareness - Communication - Documentation - Document and Data Control - Operational Control - Emergency Preparedness, Response and Security Recovery © 2008
  • 33. There’s a Bottleneck Lead Auditors Needed Demand for implementation and certification is currently outpacing the availability of lead auditors © 2008
  • 34. Types of Audits • First Party – Internal audit of client – Self declaration • Second Party – External non-certification audit – Contractually enforced (supply chain) • Third Party – Audit by external certified auditors – Road to certification © 2008
  • 35. Accreditation and Certification Relevant Standards (Registration) Bodies Accreditation Bodies ISO/IEC 17011:2004 An organization (usually a national standards body Conformity assessment -- General requirements for accreditation bodies accrediting conformity assessment bodies associated with ISO) that checks certification bodies ISO/IEC 17040:2005 and, provided their certification assessment processes Conformity assessment -- General requirements for peer pass muster, accredits them i.e. grants them the assessment of conformity assessment bodies and accreditation authority to issue recognized certificates. bodies Certification ISO 28003:2007 Security management systems for the supply chain -- (Registration) Bodies Requirements for bodies providing audit and certification of An independent external body that issues written supply chain security management systems assurance (the certificate) that it has audited a ISO/IEC 17021:2006 management system and verified that it conforms to Conformity assessment -- Requirements for bodies providing the requirements specified in the standard. audit and certification of management systems Certified Lead Auditor ISO 19011:2002 Guidelines for quality and/or environmental management systems auditing Organization Implements standard – may seek formal recognition ISO 28000:2007 (certification) by a specialized third party body. Specification for security management systems for the supply chain © 2008
  • 36. Principles that Relate to Auditors • Ethical conduct: the foundation of professionalism • Fair presentation: the obligation to report truthfully and accurately • Due professional care: the application of diligence and judgement in auditing • Independence: the basis for the impartiality of the audit and objectivity of the audit conclusions • Evidence-based approach: the rational method for reaching reliable and reproducible audit conclusions in a systematic audit process © 2008
  • 37. Lead Auditor Certification • Knowledge of management systems • Knowledge of the standard being audit to, as well as normative documents • Principles of auditing based on ISO 19011 • Technical knowledge of the activity being audited • Understanding risk assessment and management from a business perspective • General knowledge of regulatory requirements • Understanding of security, preparedness response and recovery management © 2008
  • 38. How Do I Become a Player? ISO 28000 is Here – and Rapidly Gaining Momentum Your Ticket to Play BECOME A CERTIFIED ISO 28000 LEAD AUDITOR © 2008
  • 39. Course Objectives • Knowledge of a systematic and practical approach to security management system auditing • Broad understanding of the scope of security management system auditor responsibilities • Competency in organizing and directing audit team members • An in-depth understanding of the ISO 28000 and security risk management requirements • The ability to effectively provide management with objective advice regarding progress towards compliance and certification of security management systems • Demonstrable understanding of the intent and application of relevant Acts, Standards, Codes of Practice, and other documents relevant to regualtions and legislation © 2008
  • 40. Key Session Topics • Plan, conduct, and report an actual audit and examine relevant case studies • Major elements and scope of risk management including definitions of common risk management terms • Structure and make-up of management system documentation • Roles and responsibilities for security management • Requirements and methods for ensuring continuous improvement © 2008
  • 41. Key Session Topics • Audit techniques and methodology according to: – ISO 28000:2007 Specification for Security Management Systems for the Supply Chain – ISO 31000 Risk Management – ISO 31010 Risk Assessment (Methodologies) – ASIS International Risk Assessment (Process) – ISO 19011:2003 Guidelines for Quality and/or Environmental Management (under revision to add risk-based processes) • Systems Auditing – Security threat and vulnerability assessments – Asset protection and loss protection – IT and electronic security – Personnel protection – Risk to transport and infrastructure from terrorism © 2008
  • 42. Competence of Auditors Competence = ∑ Personal attributes + Generic auditing knowledge and skills + Security, Preparedness, Response and Recovery specific knowledge and skills © 2008
  • 44. Authority to Audit • The organization’s top management should Process grant the authority for managing the audit program. Flow for • Establish, implement, monitor, review and Audit improve the audit program • Identify the necessary resources and ensure Program they are provided © 2008
  • 45. Process Plan Flow for •Objectives of an audit program Audit •Extent of an audit program Program • Scope, objective and duration • Standards, statutory, regulatory and contractual requirements • Language, cultural and social issues •Audit program responsibilities •Audit program resources •Audit program procedures © 2008
  • 46. Competence and evaluation of auditors • Process Competence = ∑ (Personal attributes) + (Generic auditing knowledge and skills) + (Security- knowledge and skills) Flow for • Confidentiality and clearances Audit Program Do •Audit program implementation •communicating the audit coordinating and scheduling audits •establishing and maintaining a process for the evaluation of the auditors •selection of audit teams •providing necessary resources to the audit teams •conduct of audits according to the audit program •control of records of the audit activities •review and approval of audit reports, •audit follow-up •Audit program records © 2008
  • 47. Process Flow for Audit Program Check - Audit program monitoring and reviewing - Identify needs for corrective and preventive actions - Identify opportunities for improvement © 2008
  • 48. Process Flow for Audit Program Act - Improve the audit program - Commitment to Continuous Improvement © 2008
  • 49. Initiating the audit - appointing the audit team leader - defining audit objectives, scope and criteria - determining the feasibility of the audit - selecting the audit team - establishing initial contact with the auditee Overview Conducting document review of typical - reviewing relevant management system documents, including records, and determining their adequacy with respect to audit criteria audit Preparing for the on-site audit activities activities - preparing the audit plan - assigning work to the audit team - preparing work documents Conducting on-site audit activities - conducting opening meeting - communication during the audit - roles and responsibilities of guides and observers - collecting and verifying information - generating audit findings - preparing audit conclusions - conducting closing meeting Preparing, approving and distributing the audit report - preparing the audit report - approving and distributing audit report Completing the audit Conducting audit follow-up © 2008
  • 50. Source of Information Collecting and verifying information by appropriate sampling techniques Collecting Information to Reach Audit Audit evidence Conclusions Evaluating against audit criteria Audit findings Reviewing Audit conclusions © 2008
  • 51. What Does the Future Hold? • ISO 28002, Resilience in the Supply Chain • ISO 28005, Ships and marine technology - Computer applications - Electronic port clearance (EPC) © 2008
  • 52. Thank You Dr. Marc Siegel Security Management System Consultant ASIS International Phone: +1-858-484-9855 Email: siegel@ASIS-Standards.net siegel@ymail.com S © 2008