“Integrating Property Management with Emergency Recovery” Ivonne Bachar, CPPM CF Director, Property Management Office Stanford University

Slides:



Advertisements
Similar presentations
Role of Senior Management
Advertisements

EMS Checklist (ISO model)
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Unit 1: Introductions and Course Overview Administrative Information  Daily schedule  Restroom locations  Breaks and lunch  Emergency exit routes 
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
@TxSchoolSafety Continuity of Operations Planning Workshop Devolution & Reconstitution.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Business Crisis and Continuity Management (BCCM) Class Session
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Alachua County Post-Disaster Redevelopment Plan Alachua County Board of County Commissioners Meeting April 27, 2010.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
1 Assessment: Audits. Assessment: Audits - Module 9 2 Learning Objectives At the end of this activity, you will be able to: Develop a process to prepare.
A Healthy Place to Live, Learn, Work and Play:
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
61 What is hazard risk management?. 62 Emergency risk management is “a systematic process that produces a range of measures that contribute to the well.
© 2013 BOS Solutions Ltd. Revised: Mar 15,2013 Version 2 – BOS HSE MSpg. 1 The BOS HSE Management System Brad Whitaker, MSPH, CSP BOS Solutions HSE Director.
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
CUAV Conference Risk Assessment May 18, 2015
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
International Civil Aviation Organization European and North Atlantic Office SAFETY MANAGEMENT Elements Michel Béland ICAO Regional Safety Officer Europe.
Internal Auditing and Outsourcing
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
What is Business Analysis Planning & Monitoring?
An Overview of Environmental Management Systems (EMS)
CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)
Project ManagementDay 1 in the pm Project Management (PM) Structures.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Rich Archer Partner, Risk Advisory Services KPMG LLP Auditing Business Continuity Plans.
HOTLINE: The Value of internal Audit at Georgia Tech 1 Department of Internal Auditing.
Business Continuity and Disaster Recovery Planning.
Water Quality Program Financial Assistance Progress and Plans for Meeting RCW Requirements (Joint Legislative Audit and Review Committee)
Integrated Risk Management Charles Yoe, PhD Institute for Water Resources 2009.
The Audit as a Management Tool Vermont State Auditor’s Office – April 2009.
SMS Planning.  Safety management addresses all of the operational activities of the entire organization.  The four (4) components of an SMS are: 1)
Info-Tech Research Group1 Requirements Gathering World Class Operations - Impact Workshop.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
2014 NPMA Spring Seminar Value Through Professional Asset Management Property 101 Basic Property Tara Miller PMP, CPPM, CF Beth Green CPPM, CF Consultant.
1 | 2010 Lecture 3: Project processes. Covered in this lecture Project processes Project Planning (PP) Project Assessment & Control (PAC) Risk Management.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
2013 NPMA Fall Conference Value Through Professional Asset Management Property 101 Basic Property Tara Miller PMP, CPPM, CF Beth Green CPPM, CF Consultant.
REC support is. provided under cooperative agreement 90RC0025/01 from the Office of the National Coordinator for HIT, US Dept. of Health and Human Services.
Placing Information Security within an Organization
Key Terms Business Continuity Plan (BCP) – A comprehensive written plan to maintain or resume business in the event of a disruption Critical Process –
Environment and Disaster Planning Hari Srinivas, GDRC Rajib Shaw, Kyoto University Contents of the presentation: -What is the problem? -Precautionary Principles.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Environmental Management System Implementation. Practices, Aspects, Impacts- Concepts Mission Resource Impact Resource Impact Activities/ Operations Practices.
Assessment Validation. MORE THAN YOU IMAGINE ASQA (Australian Skills Quality Authority) New National Regulator ASQA as of 1 July, 2011.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Swedish Risk Management System Internal management and control Aiming to Transport Administration with reasonable certainty to.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
Business Continuity Disaster Planning
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
What is Internal Audit University of Date. What/Who is Internal Audit? A University department that reports directly to the Board of Regents (BOR) through.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Internal Control Process at Geneseo. Objectives Understand the objectives of effective internal controls Describe Geneseo’s internal control program Accurately.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
APTA Rail Transit SMS Implementation Guide June, 2016.
Business Continuity Steven S. Keleman, CPM. Emergency Management Prevention Response Preparation Mitigation Recovery.
THINK DIFFERENT. THINK SUCCESS.
Data Architecture World Class Operations - Impact Workshop.
EMS Checklist (ISO model)
Presentation transcript:

“Integrating Property Management with Emergency Recovery” Ivonne Bachar, CPPM CF Director, Property Management Office Stanford University

Today’s Discussion Points  Context  Why Property & Emergency Recovery Integration?  Key Collaborations  Risk Assessment Tools  Infrastructure Adjustments

Context  Focus on increasing value of Property Management Operations  Integrate with Enterprise Risk Mgmt. Efforts How do we fit?

Why Property & Emergency Recovery?  Integral to Risk Management Strategy  Instrumental for Effective Mitigation  Part of Mission Critical Business Process  Business Continuity is Critical  Personnel Safety of Primary Importance  Future Award funding may be jeopardized A Prime Opportunity and Responsibility for Property Managers

Key Collaborations  Distributed Property Management Personnel  Business Units and Departments  Institutional Compliance  Internal Audit  Public Safety or Security  Facilities  Application Support

Risk Assessment Matrix Examples

Risk Levels  Here is another approach to assigning risk level on an asset by asset level.  Focus on mission criticality vs. likelihood of an risk event occurring

Root Cause Analysis (RCA)  A systematic process To identify the underlying cause of a problem  In all RCA methods, remember that the focus of investigation and analysis, steps include: State the problem Gather information, data and evidence, as needed Determine the root cause of the problem Identify recommendations to prevent a recurrence Implement the solution

“5 Whys” Strategy  A strategy to look at a problem and ask… “Why did this happen?” “What caused this problem?” Although the method is called the “5 Whys,” you may need more or less than five questions  Depends on the complexity of the event.  Keep asking “why” until the underlying cause is revealed.

Acquisition Policy and Procedure Adjustments  Must support highly situational conditions  Incorporate flexibility and adaptability for emergencies  Prioritize internal activities and decisions Establish condition assessment criteria Identify authorized individuals Define funding usage Streamline repair and replacement process

Business Processes & Records  Triage strategies and steps  Documentation  Key Records Data Elements Risk Likelihood Ranking Asset Criticality Category Comparative Photos “Mission” for which it is critical  Systems and Reports

Assessment, Disposal, & Replacement  Define roles & responsibilities  Document delegated authorities  Establish damage assessment process and protocols  Inventory and segregate damaged items  Clarify parameters for suspension of standard replacement processes Establish robust reutilization processes Expedited purchasing, alternate receiving and identification, etc.

Communications  Maximize use of technology but remember its limits  Organizational Personnel  Sponsor Representatives  Establish Alternate Methods

Results of Effective Program  Our overall goal is to facilitate resuming the organizational mission as soon as possible after an emergency Rules and Requirements Orgs, Policies, Procedures, People Assets, Tech Infrastructure Property Professional Skills