A firm’s “vulnerability” can be viewed as a combination of the likelihood of a disruption and its potential severity. Vulnerability can be caused by:

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Enhancing Supply Chain Security Dr. Omar Keith HelferichDr. Judith M. Whipple Supply Chain FacultyAssociate Professor Central Michigan UniversityMichigan.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
PARAMETRIC TECHONOLOGIES CORPORATION PTC ENGINEERING GRAPHICS.
TRANSPORTATION AND CARGO SECURITY Presented by : Aysar Naserallah.
 Co-opetition  Radar Screen Competitor Map  Reasons for an Alliance with Rivals  Managing the Risk of Co-opetition Contents.
© MIT 2002 Supply Chain Response to Global Terrorism: Synthesis of Feedback Potential MIT Roles December 6, 2002.
2007 Global Survey Identifies Characteristics of Supply Chain Leaders Liz Batson Lyndsey Shaver Di Wu From CNNMoney.Com.
What is an Information System? Input of DataResourcesProcessing Data Data Control of System Performance Storage of Data Resources Output of InformationProducts.
1 Knowledge Management. 2  Knowledge management (KM) is a process that helps organizations identify, select, organize, disseminate, and transfer important.
Crisis Management Planning Employee Health Safety and Security Expertise Panel · Presenter Name · 2008.
Business Risk Marketing Co-op.  Communication  What is communication?  Types of communication  Online  Telephone  Nonverbal Previously.
© Pearson Education Limited 2015
Regional Development and Governance Symposium Innovation Enhancement in Slovenian Regions Tadeja Colnar Leskovšek Anteja ECG Izmir, 26 October 2007.
McGraw-Hill/Irwin Copyright © 2011 The McGraw-Hill Companies, All Rights Reserved Chapter 14 Enterprise Resource Planning Systems.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
COGITA is made possible by Bologna, 23 October 2014 European Public Policies on CSR: The perceptions SMEs Eleni Apospori, Ph.D. Assistant Professor of.
Johnson & Johnson Overview Incorporated in 1887: Listed on NYSE in 1944 symbol JNJ 250 operating companies, 117K employees in 57 countries Three business.
TECHNOPRENEURSHIP (EM604) Session 6 20 Principles for Creating Successful Technology Ventures Dr. Winarno.
a way of making things that is arranged so each person performs one task again and again.
“The Resilient Economy: Integrating Competitiveness and Security” Council on Competiveness.
Interdependence between Critical Infrastructures Broadening the definition of infrastructure: from transport to logistics.
Business & Management Topic 1 Stakeholders. Learning Objectives To know what is meant by a stakeholder Be able to differentiate between internal and external.
Supply Chain Security: How Being Engaged Can Benefit Your Company by Monica Isbell Presentation at the Supply Chain & Logistics Summit Scottsdale, AZ 7.
BENCHMARKING BENCHMARKING. What is Benchmarking ? It is a continuous process of comparing a company’s strategy, products, and processes with those of.
The External and Internal Environments Chapter Two Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
International Life Cycle Partnership To bring science-based life cycle approaches into practice worldwide UNEP/SETAC Life-Cycle Initiative Life Cycle Management.
Information Systems in Organizations 3.2 Systems Management.
Positioning Terrorism in Marketing: Research Propositions Michael R. Czinkota Georgetown University and Gary A. Knight Florida State University 6 th Annual.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
Copyright ©2015 Pearson Education, Inc.15-1 Chapter 15 Operations Management.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Approaches to CSR. Inspiring Long-term Driven by and evokes passion Broad; Overarching; Brief Fundamental statement of the organization’s Values Aspiration.
Real Life Scenario An employee in the Finance and Business Operations receives a targeted phishing . Follows instructions and infects his or.
ILO Programme on HIV and AIDS and the world of work,
Disaster and Emergency Management
Risk management.
Business Risk Marketing Co-op.
Principles Of Women Empowerment
5 OCTOBER 2015 MANILA, PHILIPPINES
Information Technology Sector
INTRODUCTION TO E-BUSINESS AND E-COMMERCE
A Thread Relevant to all Levels of the EA Cube
Business Environment Dr. Aravind Banakar –
International Business Dr. Aravind Banakar –
International Business Dr. Aravind Banakar –
Principles and Practice of Management
Principles and Practice of Management
Business Environment
Principles and Practice of Management
International Business
International Business
Business Environment
Principles and Practice of Management
International Business
International Business
“The Link” - Continuity of Operations and Emergency Management
Performance Ownership: A Roadmap to a Compelling Employment Brand
Cybersecurity at PJM Jonathon Monken
Emergency response The topic ‘emergency response’ is divided in:
ISCOM/376 Supply Chain Disruption
PART 5—LOOKING TO THE FUTURE
Elements of Corporate Resilience
COMPANY NAME Business Continuity Plan Date Presented by.
Markets What are your key market segments?
Cybersecurity at PJM Jonathon Monken
Organisation The topic ‘organisation’ is divided in:
Presentation transcript:

A firm’s “vulnerability” can be viewed as a combination of the likelihood of a disruption and its potential severity. Vulnerability can be caused by:  Competitive environment  Supply chains  One supplier  Intentional attacks  Accidents  Natural disruptions

Reducing a company’s vulnerability to disruption includes:  Increasing security.  Increasing the participation of all employees in security efforts.

 The Spreading Impact of an Extinguished Fire  Nokia Responds to Potential Disruption  Ericsson Waits for Parts  End Result

The essence of resilience is the containment of disruption and recovery from it: There are some things that create resilient inside the interprises: Culture The right corporate culture – a shared passion to be successful – is a crucial ingredient in creating resilient enterprises.

Organizing for Action Assesing the vulnerabilities Reducing the likelihood of disruptioin Collaborating for security Building in redundancies Designing Resilient Supply Chanis Investing in Training and culture.

The Resilient Enterprise