Traveler Safety & Security in the Modern World Bruce McIndoe February 2012.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
INTRODUCTION COPYRIGHT 2011 PONY CLUB AUSTRALIA TRAVEL SAFETY, SECURITY AND CRISIS MANAGEMENT PLAN.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 Introduction to Travel Risk Management Presented by GBTA’s Travel & Meetings Risk Management Committee Joshua Rose Director, Strategic Accounts Global.
Security Controls – What Works
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Business Continuity Check List PageOne. - Why Does Your Business Need A Continuity Checklist? Should the unexpected occur, your business will be able.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
© 2011 iJET International, Inc. All Rights Reserved | iJET® PROPRIETARY AND CONFIDENTIAL INFORMATION Worldcue ® TRAVELER An Introduction Log in at:
Risk Management for International Meeting Planners
Corporate Travel Risk Management 101 DeAnne Dale Chief Sales Officer.
H iJET International 185 Admiral Cochrane Drive Annapolis, MD Operate Globally with Confidence Washington. London. Singapore Traveler.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
© 2010 iJET International, Inc. It’s 2011 – Now What? Balancing the Insecurity of Security Kathie Lia - iJET International, Inc.
1 Introduction to Travel Risk Management Presented by GBTA’s Travel & Meetings Risk Management Committee John Rose, President Business Travel Services.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
ESCCO Data Security Training David Dixon September 2014.
Travel Risk Management Today’s Challenges in a Risky Environment (C) iJET International, Inc. All rights reserved.
Insurance Institute for Business & Home Safety Even if the worst happens, be prepared to stay.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Farm Safety and the Atlantic Dairy Farmers Emergency Management Plan Presentation to the Canadian Agricultural Safety Association November 12, 2009 Paul.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Course # Unit 2 - OEP and PEMS. Unit 2 OEP and PEMS HQ OEP  OEP Mission  EP Website PEMS  Overview  Benefits  Current Functionality 
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
TEFMA 2008 Sudhish Nayyar. AGENDA CRISIS –What is the worst thing that could happen? –Where? –When? Steps in effective Crisis Management Aon’s capabilities.
Computer Security By Duncan Hall.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
1 Crisis Management and Communication Dr. Joy Smith and Ms. Robin Denny.
THE TMC ROLE IN MANAGING TRAVEL RISK Presented by Europ Assistance USA August 6, 2014.
BABTA Risk Management Panel – January 21, 2106
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Writing an Emergency Operations Plan Why do we need to plan? Spring 2008.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
IJET.com (C) iJET International, Inc. All rights reserved. 1 Travel Risk Management and Duty of Care Mark Donohue, VP Risk Management Programs OPERATE.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Health & Safety Management “and a few other things for your consideration”
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Business Continuity Planning 101
Emergency Preparedness. Proposed Emergency Preparedness Rules NFR/LMC §19.326(a) deleted and moved to § for Emergency Preparedness Rules Places.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
EMERGENCY PREPAREDNESS School Bus Driver Inservice 2016/171.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Information Technology Acceptable Use An Overview
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Global Medical Assistance Program
Assistance App Client Name Date.
Inter Partner Assistance (IPA)
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
I have many checklists: how do I get started with cyber security?
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
TRAVEL RISK MANAGEMENT and DUTY OF CARE
Business Continuity Program Overview
Presentation transcript:

Traveler Safety & Security in the Modern World Bruce McIndoe February 2012

iJET.com You will learn… How Global Threats and Business Disruptions Impact Business About Organizational Liability and Duty of Care Travel Risk Management as a discipline About the Traveler Safety Continuum How to benchmark your TRM program and where to focus Precautions around social media, smartphones, and laptops The Top 10 Reasons Programs Fail 2

iJET.com Major Incidents Every Year… 3

iJET.com Escalating Global Threats 4 SOURCES: Georgia Institute of Technology. National Center for Atmospheric Research. The Rand Corporation. The World Health Organization.

iJET.com Who do Your Employees Turn to? 1.Pre-trip / assignment destination – safety and security? 2.For immunizations and medical advice? 3.Hotel or residence property selection? 4.When they need help? 5.When an incident occurs? 5

iJET.com Who do You Turn to? 1.For country/city safety/security information? 2.Traveler or Expat safety/security training? 3.What to do in higher-risk environments? 4.Threat against an employee? 5.For a medical emergency? 6.Plane or vehicle crash? 7.Kidnapping? 6

iJET.com Management Questions What’s really happening now? Who is impacted? Where and how does this affect us? Are the right people aware? What should we do? When? 7 Who can do it? What is our liability if we don’t? What is our competition doing?

iJET.com Legal Deposition – How would you answer? Death or serious injury to employee  It is well known that this area was risky, why wasn’t the employee notified?  What process do you have in place to understand the risks your employees may face?  What information is provided to the employee before he or she went there?  What did you do to mitigate these hazards?  Who was notified and when? What did they do? 8

iJET.com Management Program Motivators  Organizational Liability  Risk Exposure  Previous litigation history  Duty of Care  What is expected?  Anxiety Management  Standard of Care  What are others doing? 9

What is Travel Risk Management?

iJET.com Travel Risk Management … is a well defined process to identify risks, prepare travelers pre- trip, monitor threats, and respond to incidents as they arise. Benefits include: More productive and prepared employees Reduced number of costly “incidents” Lower cost of response Reduced corporate liability 11

iJET.com Optimal Response Time The longer it takes an organization to respond to an incident or opportunity, the greater the risks and costs. 12 Optimal Response

iJET.com Preparedness Impacts Response Time 13  Planning  Mitigation  Communication  Exercises/Drills PREPAREDNESS

iJET.com Multiple Functional Areas Support the Employee 14 EMPLOYEE HR/LEGAL Focus on expatriatesResponsible for all employeesPolicy & proceduresCorporate insurance / benefit programs MEDICAL Pre-trip health planning Immunizations Medical assistance & evacuations for international travelers TRAVEL Advisor and knowledge base Books trips and handles travel issues Provides reporting SECURITY Risk assessment Crisis & evacuation plans Emergency contact info Coordinates Response

iJET.com Traveler Safety Continuum 15 Training All employees Management team Personal protection Country/region specific Pre-Trip/Assignment Crisis management plans Policy/compliance Enterprise communication Access to Intelligence Travelers/Expatriates Management (push) Assess risks/set ratings Pre-trip (pull) During travel (Alerts) Track Employees Employee profiles Automated and verified Real-time alerting Communication options Security Service Executive Protection Ground Transport Guards Evacuation Medical Service In-country, Western-quality care Evacuation Hotline 24 x 7 - One Number Specific protocols Travel, security, health

iJET.com Key Elements of Execution Proactive Planning Reactive Training Incident Response 24x7 Monitoring Feedback

iJET.com How it works – Every Trip! Country & City Information Employee Travel/ Security/ HR Manager Travel Agency/ Booking Tool Alerts & Notification Implement Protocol 24x7 Global Employee Hotline Report Trouble Report Issue Response Help Provided Pre-trip/assignment Preparedness Book Trip or Assignment Automated Risk Assessment Automated Trip/Assignment Briefs & Alerts Alerts & Notification Report Issue Implement Protocol Report Trouble Help Provided Worldcue® Risk System

iJET.com TRM Key Process Areas 18 Data Management Risk Assess- ment Policy/Procedures Training Notification Communication Risk Disclosure Risk Mitigation Risk Monitoring Response Overarching KPAs Management KPAs Infrastructure KPAs

iJET.com Measuring your Program Maturity Level 19 Program integrated throughout organization Metrics collected and reviewed. Cross-organization support. Consistent execution of travel risk management processes. Basic travel risk management policies defined and documented. Primary focus on incident response. Ad hoc. Few policies. Chaotic in the event of an emergency. Optimized (5) Managed (4) Proactive (3) Defined (2) Reactive (1)

iJET.com Social Media Awareness Do not disclose travel plans on Facebook or other social media sites. Do not post while on travel – discloses where you are, and are not! Caution on using Twitter or other IM software in high risk countries Be cautious of who you “friend” – especially on travel Consider having two personalities – “Open You” and “Closed You” 20

iJET.com Be Aware! Your mobile telephone has four major vulnerabilities 1.Vulnerability to monitoring of your conversations while using the phone. 2.Vulnerability of your phone being turned into a microphone to monitor conversations in the vicinity of your phone while your phone is inactive. 3.Vulnerability to tracking your phone based on its emitter or GPS data. 4.Vulnerability to "cloning," or the use of your phone number by others to make calls that are charged to your account. 21

iJET.com Smart Phones - Vulnerabilities Smart phones are powerful computers… Complete with an Operating System and Applications Every PC vulnerability can be translated to the phone… and more! Cross-Service Attacks (LAN, Bluetooth, WiFi, GSM, etc.) Code vulnerabilities and exploits Malware Viruses

iJET.com What to do? Backup contacts, , and calendars Install latest OS and security updates Enable PIN/Password – And remote “Wipe” Record Make/Model/Serial Numbers Maintain continuous control of your devices Lock in safe if you leave in room Do not use unprotected networks Do not allow web browser to save login & password Consider using a travel phone with limited data to higher risk locations 23

iJET.com Guidelines for Laptops – Before Travel Leave all but essential storage devices at home – use encrypted USBs Enable “user authentication” -- requiring a password or PIN on your device to gain access. Use a strong (combination of number, digit, and special character) password Load encryption software and encrypt either the whole device (full-disk encryption) or any sensitive files or folders Ensure operating system, firewall/VPN and Anti-Virus are updated

iJET.com Summary – Key Take-Away Thoughts  Protection of human assets is a multidisciplinary effort  Best approach is a risk management framework  Training is critical to overall success  Prevention and decision support through real-time intelligence & communication  Planning for response minimizes impact

Top 10 Reasons Things Fail…

iJET.com #10 Company does not know what to do in an emergency 27 Don’t be reactive. Get a basic plan in place and make sure you know where to get help.

iJET.com #9 Out of date contact numbers 28 Get contact numbers (cell, home, office, e- mail, IM, etc.) for the people that you need in an emergency. Periodically get them updated and verified.

iJET.com #8 Primary AND Backup Person are not available 29 This happens frequently. Try to have multiple backup contacts. Think about people that are normally available.

iJET.com #7 Cell phones don’t always work 30 We are becoming totally reliant on cell phones. Try to find a pay phone! Provide travelers with international cell phones or satellite phones.

iJET.com #6 No response resource retained 31 Who would you turn to for a kidnapping? What about a threat against an employee? Medical emergency? Car accident? Incident on Vacation? Make a list of incident types and answer who would I turn to?

iJET.com #5 3rd Party response resource does not know what is going on 32 Talk to your vendors. Include them in your planning. Run exercises and drills.

iJET.com #4 Protocols are not maintained 33 Managers and organizations need to periodically review their plans and protocols. At least annually. Train staff on procedures. Run drills and exercises.

iJET.com #3 Protocol or procedure is too complex 34 Many times the plans and procedures are way too complex. Look to streamline the process. In a time of emergency, you will only have time and bandwidth for the basics.

iJET.com #2 Inconsistent skill level within the team 35 Crisis and emergency management is not the core competency of most travel managers and staff. Get training for the core team that will be called to deal with an emergency.

iJET.com #1 Cost sensitivity delays response 36 Deal with where the funds will come from and who will pay BEFORE the event! Delay in response increases cost and can cost lives.

iJET.com THANK YOU! Every organization needs to address duty of care for all employees Bruce McIndoe, President, iJET International Resources 37