Enhancing Supply Chain Security Dr. Omar Keith HelferichDr. Judith M. Whipple Supply Chain FacultyAssociate Professor Central Michigan UniversityMichigan.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Core Competencies Training for Supervisors
Supply Chain Security and IT Governance Nainika Patnayakuni Department of Economics and Information Systems UAHuntsville Information Security and Computer.
New Realities in Handling a Crisis
Supply Chain Management
Strategic Control Chapter 13
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Strategic formulation
Security Controls – What Works
Greg Shaw How do we turn private sector preparedness into an investment rather than a cost of doing.
Strategic Alignment Maturity Maturity is when your long-term intentions shape your short-term focus - Anonymous.
The Internal Organization Resources, Capabilities, Core Competencies, and Competitive Advantages Pages
2007 Global Survey Identifies Characteristics of Supply Chain Leaders Liz Batson Lyndsey Shaver Di Wu From CNNMoney.Com.
Freight Security and the World Economic Forum December 5, 2002.
AusIndustry Martin Cebis AusIndustry – Entrepreneur Development Facilitator.
Chapter 2: Strategy and Sales Program Planning
Crisis Management Planning Employee Health Safety and Security Expertise Panel · Presenter Name · 2008.
The Business Value Chain
Allen Hepner Senior Planning & Performance Manager September 22, 2011
Confidential 1 Risk assessment in the supply chain Supply Chain Risk Leadership Council Developments in Insurance January Confidential – Do Not.
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
Chapter 2: Strategy and Sales Program Planning
History of Responsible Care® in the Gulf Alan J. Izzard Borouge VP Corporate HSE/ VC RC Committee.
Vision & Mission Strategy Formulation External Opportunities & Threats Internal Strengths & Weaknesses Long-Term Objectives Alternative Strategies Strategy.
Business Crisis and Continuity Management (BCCM) Class Session
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Industrial Engineering Roles In Industry
Procurement’s Impact on Logistics Business Marketing 880 Spring 1999 Bernard J. LaLonde Steven Robeano.
Fall 2015 Bruce Duggan Providence University College
2010 Virginia RIMS and PRIMA Conference October 5, 2010 Business Impact Analysis: The Road Map to Managing Risks.
08 October 2015 M. Ammar Mehdi Introduction to Human Resource Management & SSG-16 Actions 4 th Steering Committee on Competence of Human.
Federation des Experts Comptables Méditerraneens Bucharest May 2003 Challenges Facing the Profession Information Technology: Enterprise Innovation.
Prepared by the (Institute of Industrial Engineers – Industry Advisory Board)
PROFESSIONAL TRADING RELATIONSHIP Advisory Group – May 24, 2005.
Copyright, © 2004, Theresa M. Welbourne, Ph.D. 1 HR Confidence June Leadership Pulse Dr. Theresa M. Welbourne Preliminary Report June 16, 2004.
© 2007 Pearson Education Managing Quality Integrating the Supply Chain S. Thomas Foster Chapter 16 Implementing and Validating the Quality System.
Chapter 3 Dell Computer Example. Value Chain 2Q 2000 Market2Q 1999MarketGrowth RankVendorShipmentsShareShipmentsShare2000/99 1Dell2,293, %1,808, %26.8%
1 Confidential, unpublished property of CIGNA. Do not duplicate or distribute. Use and distribution limited solely to authorized personnel. (c) Copyright.
Nuclear Security Culture William Tobey Workshop on Strengthening the Culture of Nuclear Safety and Security, Sao Paulo, Brazil August 25-26, 2014.
Chapter 20 Strategy in Purchasing and Supply Management.
Judith M. Whipple, Ph.D. Department of Marketing and Supply Chain Management Michigan State University 325 North Business Complex
Developing a Security Program. Exercise Plan Develop/Update Plan Review/Revisit Plan.
Quality Management Theory Terms, Concepts, & Principles.
Kathy Corbiere Service Delivery and Performance Commission
Risk Management for Small & Medium Sized Enterprises
The Second Annual Medical Device Regulatory, Reimbursement and Compliance Congress Presented by J. Glenn George Thursday, March 29, 2007 Day II – Track.
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
Tom Lenart & John Field CT DEMHS Region 2.  Department of Emergency Services and Public Protection (DESPP)  Commission on Fire Prevention and Control.
Strategic alignment.
Organization  As a member of the Strategy & Business Development team, this position will support the development and execution of Corporate, Sector,
Department of Defense Voluntary Protection Programs Center of Excellence Development, Validation, Implementation and Enhancement for a Voluntary Protection.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Service Design.
Department of Defense Voluntary Protection Programs Center of Excellence Development, Validation, Implementation and Enhancement for a Voluntary Protection.
Global Dialogue on Customs Capacity Building 04 April 2007 © 2007 IBM Corporation Benefits of Supply Chain Security and Trade Facilitation: The IBM Experience.
Physical Security Governance Model
Core Competencies Training for Supervisors
Chris Lintern Co-operative Financial Services
Core Competencies Training for Supervisors
Procurement’s Impact on Logistics.
SUPPLY CHAIN MANAGEMENT
2017 Health care Preparedness and Response Draft Capabilities
UNIT – OPERATION STRATEGY
Cybersecurity ATD technical
Business Continuity Program Overview
Securing Critical Chemical Assets: The Responsible Care® Security Code
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

Enhancing Supply Chain Security Dr. Omar Keith HelferichDr. Judith M. Whipple Supply Chain FacultyAssociate Professor Central Michigan UniversityMichigan State University July 31, 2007 – Foundation For Strategic Sourcing

Objectives  Define Supply Chain Security  Identify status of supply chain security initiatives  Identify competencies and capabilities that firms are using to enhance supply chain security  Discuss benchmarking tool for improving supply chain security This research was supported by the U.S. Department of Homeland Security (Grant number N ), through a grant awarded to the National Center for Food Protection and Defense at the University of Minnesota. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the author (s) and do not represent the policy or position of the Department of Homeland Security.

Definition of Supply Chain Protection and Security  The application of policies, procedures, and technology to protect supply chain assets (product, facilities, equipment, information, and personnel) from theft, damage, or terrorism and to prevent the introduction of unauthorized contraband, people, or weapons of mass destruction. Closs and McGarrell (2004), “Enhancing Security Throughout the Supply Chain,” IBM Center for the Business of Government –

Secure Supply Chain Requirements  Preventing any biological, chemical or unauthorized agent to be incorporated into the product  Preventing any illegal commodity to be intermingled with the shipment  Preventing transportation assets or a shipment’s contents to be used as a weapon  Preventing unauthorized access to the product and/or supply chain network  Preventing disruptions of the supply chain network/infrastructure

Supply Chain Security Impact: A State of Transition  From Corporate security Theft prevention Inside the company Vertically integrated supply chain with 1 st tier suppliers Country or geographic Contingency planning Reactive  To Cross functional team To include anti-terrorism End-to-end supply chain Business model that includes 2 nd and 3 rd tier suppliers Global To include crisis management Proactive

Security Expectations: A Changing Future  Secure supply chains – containing advanced security processes and procedures  Resilient supply chains – able to react to unexpected disruptions quickly in order to restore normal operations Rice and Caniato (2003), “Building a Secure and Resilient Supply Network,” Supply Chain Management Review, September/October.

Industries Under Investigation  Food – National Center for Food Protection and Defense (A Department of Homeland Security Center of Excellence)  Electronics and Pharmaceuticals (IBM Research Grant)  Hazardous Material (Dow Chemical Grant)

Potential Supply Chain Risk High Low Potential # of Incidents Range of Security Strategies SafetySecurity Management Integrated Supply Chain Security UnintentionalIntentional Unintentional Range of Security Strategies

Key Considerations: Capabilities and Competencies  Capability – the infrastructure, processes, systems, assets, and resources to develop a specific competency  Competency –the broad set of skills, knowledge, and aptitude that create and sustain a secure supply chain Competency 1 Capability 1 Capability 2 Capability 3

Outcomes of the Food Supply Chain Benchmarking Research  Provide industry with in-depth understanding of the capabilities that form competencies in supply chain security  Define competencies and understand their impact on security performance  Compare capabilities, competencies and performance across firms in the food supply chain  Create benchmarking process and tool to assist in extended and future comparison and evaluation

Team Members Jean Kinsey, Ph.D. Robert Kauffman, Ph.D. Theodore Labruzza, Ph.D. Jon Seltzer, Ph.D. David Closs, Ph.D. Cheri Speier, Ph.D. O. Keith Helferich, Ph.D. Dan Lynch, Ph.D. Ed McGarrell, Ph.D. Robyn Mace, Ph.D. Judy Whipple, Ph.D. Doug Voss, RA Alan Erera, Ph.D. Chip White, Ph.D. Steven Morris, RA

Competency Assessment Supply Chain Security Practice Competencies Supply Chain Security Performance Firm Demographics Size Channel location Organizational responsibility What practices are used? Which practices are more effective? How do they differ?

Competency Performance Drives Security Performance Management Technology (MT)Process Technology (PT)Process Management (PM)Food Supply Chain SecurityMetrics/Measurement (MM)Communications Management (CM)Relationship Management (RM)Infrastructure Management (IM)Public Interface Management (PIM)Process Strategy (PS)Service Provider Management (SPM)

Definitions of Competencies  Process Strategy (PS) – executive commitment to security and the institution of a culture of security  Process Management (PM) – the degree to which specific security provisions have been integrated into processes managing the flow of products, services and information  Infrastructure Management (IM) – security provisions that have been implemented to secure the physical infrastructure  Communications Management (CM) – internal information exchange between employees, managers, and contractors to increase security

Competencies (Continued)  Management Technology (MT) – the effectiveness of existing information systems for identifying and responding to a potential security breach  Process Technology (PT) – specific technologies implemented to limit access and trace the movement of goods  Metrics/Measurement (MM) – the availability and use of measurement to better identify and manage security threats

Competencies (Continued)  Relationship Management (RM) – information sharing and collaboration between supply partners  Public Interface Management (PIM) – the security related relationships and exchanges of information with the government and the public  Service Provider Management (SPM) – information sharing and collaboration between the firm and its logistical service providers

Performance Measures  Ability to detect security incidents  Reduction in the number of security incidents  Increased resilience in recovery  Changed risk profile  Changed firm and supply chain cost, shrink, injuries, and turnover  Improved security relative to competitors  Improved ability to meet security requirements

What Capabilities (Practices) Create a Competency? One Example Communications Management Defined communication protocols Information preventing incidents Information detecting incidents Information responding to incidents Information regarding recovering from incidents Information protocols in case of contamination Reporting protocols in case of incident

Research Process  In-depth company interviews 15 manufacturers 13 retailers 7 transportation providers  Questionnaire Development  Overall Survey Response (total respondents = 239) Food Products Association (134 – 58%) Michigan Department of Agriculture (83 – 9%) ASIS International (22 – 10%)  Respondents’ Scope of Responsibility Quality Management (101 – 42%) Supply Chain Management (36 – 15%) Security Management (25 – 10%) Other (57 – 24%) Not Defined (20 – 8%)

Who Responded to the Survey – Size of Firm? Size of FirmManufacturer/ Wholesalers < $20 M59 $20 - $100 M44 $100 - $500 M29 $500 M - $1 B10 > $1 B64 Not Defined32

Initial Research Questions  Where are firms focusing their efforts?  Is there a difference between large and small manufacturers in competency focus?  Where are firms seeing results?  Is there a difference between large and small manufacturers in security performance?

Where are Manufacturers/Wholesalers Focusing Their Efforts? Score of 5 Indicates Strong Activity

CompetencyMean Score (Large) Mean Score (Small) Process management * Management technology * Communications management * Infrastructure management Metrics/Measurement * Process strategy * Public interface management * Service provider management * Process technology * Relationship management * * Indicates statistically significant difference in mean Is There a Difference Between Large and Small Manufacturers/Wholesalers?

Where are Manufacturers/Wholesalers Seeing Results? Score of 5 Indicates Significant Change (SC)

Is There a Difference Between Large and Small Manufacturers/Wholesalers? Performance MeasureMean Score (Large)Mean Score (Small) Detect incidents inside firm Detect incidents across SC * Decreased incidents inside firm * Decreased incidents across SC Increased firm resilience Increased SC resilience Improved firm risk profile Improved SC risk profile NOTE: Scale anchors: Significantly Increased – No Change – Significantly Decreased * Indicates statistically significant difference in mean

Performance MeasureMean Score (Large)Mean Score (Small) Firm reduced operating cost Firm reduced loss/shrink Firm reduced insurance cost Firm reduced personal injury Firm reduced employee turnover SC reduced operating cost SC reduced loss/shrink SC reduced insurance cost SC reduced personal injury SC reduced employee turnover NOTE: Scale anchors: Significantly Increased – No Change – Significantly Decreased Is There a Difference Between Large and Small Manufacturers/Wholesalers?

Perceived Performance Results for Manufacturers/Wholesalers  The positive results are Increased detection within firm and across supply chain Increased firm and supply chain resilience Decreased personal injury  However, there has been an increase in firm and supply chain operating cost

Further Research Questions  Do some firms consider security as a high strategic priority?  What do these firms do differently than low priority firms?  Do high priority firms have better performance results than low priority firms?

Strategic Security Construct  Our firm's senior management views supply chain security as necessary for protecting our brand or reputation.  Our firm has a corporate level strategy to address security concerns.  Our firm’s senior management views supply chain security as a competitive advantage.  Our firm’s senior management views supply chain security initiatives as a necessary cost of doing business.  Our firm’s senior management supports food supply chain security initiatives. 127 firms classified as high priority; 72 as low priority.

Internal Security MeasureMean Score (High) Mean Score (Low) Information systems provide timely information for response * Information systems provide valid information for response * Information systems allow us to quickly share information * Our firm uses RFID to effectively track products Our firm incorporates prevention information into training * Our firm incorporates detection information into training * Our firm incorporates response information into training * Our firm incorporates recovery information into training * Our firm’s information systems are secure * NOTE: Scale anchors: Strongly Disagree – Strongly Agree Is There a Difference Between High and Low Strategic Priority Firms? * Indicates statistically significant difference in mean

External Security Measure (across the supply chain)Mean Score (High) Mean Score (Low) Information systems provide timely information for response * Information systems provide valid information for response * Information systems provide actionable information * Our SC partners uses RFID to effectively track products Our firm has processes in place to prevent a SC incident * Our firm has processes in place to detect a SC incident * Our firm has processes in place to respond to a SC incident * Our firm has processes in place to recover from a SC incident * Our SC partners’ information systems are secure * NOTE: Scale anchors: Strongly Disagree – Strongly Agree Is There a Difference Between High and Low Strategic Priority Firms? * Indicates statistically significant difference in mean

Performance Measure – “Our firm’s security investment has significantly reduced/significantly increased…” Mean Score (High) Mean Score (Low) Our ability to detect security incidents inside our firm * Our ability to detect security incidents across the supply chain * Security incidents inside our firm Security incidents across the supply chain Our resilience in recovering from security incidents inside our firm * Our resilience in recovering from security incidents across the supply chain * Do High Strategic Priority Firms Perform Better than Low Strategic Priority Firms? * Indicates statistically significant difference in mean NOTE: Scale anchors: Significantly Increased – No Change – Significantly Decreased

What Measures Impact Detection/Recovery for High Strategic Priority Firms?  Internal Timely information to respond Prevention information in employee training Recovery information in employee training  External Processes in place to recover from an incident in our supply chain Our supply chain partners’ information systems are secure

The Creation of an Assessment and Benchmarking Tool  Survey for internal company use  Summary of results from company use  Benchmark of company results by item, competency, and total score

Example of a Firm’s Diagnostics Results Food Supply Chain Security Firm World Class Scale: Disagree Agree MeanBenchmarkGap 1 Process Management (0.56) 2 Process Strategy (0.99) 3 Infrastructure Management (1.93) 4 Communication Management (0.25) 5 Management Technology (0.05) 6 Process Technology (0.02) Public Interface Management (0.05) Metrics/Measurement (0.58) Service Provider Management Relationship Management (0.52) Overall Score (4.79) * Large gaps indicate problem areas * World Class is the sample mean plus 1 standard deviation

Conclusions  Food supply chain firms are increasingly interested in protecting their supply chains to protect their customers and brand names.  Firms must develop a broad range of competencies to achieve supply chain protection.  Firms have seen performance improvements in detection and resiliency.  In general, firms embarking on supply chain security initiatives will, at least initially, increase firm and supply chain operating cost.  Better performance is linked to extended supply chain security efforts throughout the supply chain.