Documente Academic
Documente Profesional
Documente Cultură
Karen Lobdell
Director Global Solutions
Integration Point
1
Is This Your Current Process?
2
CBPs Approach to Risk Assessment
3
Risky Business
4
One Size Does Not Fit All
5
5-Step Risk Assessment Process
6
5 Step Risk Assessment Process
7
Conduct a Risk Assessment
Assign a risk score to each combine the risk score for each to
determine overall risk rating
8
# 1- Conduct a Threat Assessment
9
Threat Assessment
10
Resources
11
No Cost Open Source Data
12
Country Threat Analysis
13
# 2 - Conducting a Vulnerability
Assessment
14
Conducting a Vulnerability Assessment
15
Assessing Business Partner Risk
Date of Review:
Risk Rating
M = Must Risk Rating
Supply Chain Process C-TPAT Security Criteria C-TPAT Sub-Criteria Method to Verify Vulnerabilities Identified (sub- Best Practices
S = Should (Criteria)
criteria)
Participation in foreign
customs administration S
security program
16
Supplier Results Database
17
Consequences
Potential outcomes:
Damage to brand reputation
Loss of program status / benefits
Financial
Delays value of the cargo
Increased scrutiny by government agencies
Decrease in sourcing options/flexibility
18
# 3- Preparing an Action Plan
19
Sample Action Plan
20
#3- Preparing an Action Plan
21
#4 - Mapping / Cargo Flow
22
Trade Lane Mapping Analysis
23
#5 Document How Risk
Assessments Are Conducted
When established
Who is responsible (have backups)
When assessments are done & on who
How frequently
How often the policy is reviewed
Process for each of the steps
Training
Management oversight
24
Effective Risk Management
You may not be able to change a threat, but you can impact
vulnerability and consequences
25
Best Practices
26
Automate or Perish
27
Coming Attractions
Portal 2.0
C-TPAT/ISA Merger?
28
Karen Lobdell
Director Global Solutions
Integration Point
KLobdell@IntegrationPoint.com
Tel: (704) 576-3678 X-1179
29