Risk Mitigation in Challenging Environments Mark Wachter Regional - - PDF document

risk mitigation in challenging environments
SMART_READER_LITE
LIVE PREVIEW

Risk Mitigation in Challenging Environments Mark Wachter Regional - - PDF document

2/16/2012 Risk Mitigation in Challenging Environments Mark Wachter Regional Security Manager- Americas Travel Security Services Key Points How to enhance risk assessment/mitigation cycle Assess posture and operating profile


slide-1
SLIDE 1

2/16/2012 1

Risk Mitigation in Challenging Environments

Mark Wachter Regional Security Manager- Americas Travel Security Services

Key Points

  • How to enhance risk assessment/mitigation cycle
  • Assess posture and operating profile
  • Assess posture and operating profile
  • Consistent planning and policy formation
  • Staff understand their roles and responsibilities

during a crisis

  • Relationship between social risk and security risks

– Both are areas where company protocols meet the public

  • Standoff distance between business activities

and social conflict is disappearing

slide-2
SLIDE 2

2/16/2012 2

Agenda

  • Security Posture

Layered Defense Model

  • Layered Defense Model
  • Risk Mitigation Methodology
  • Planning Considerations
  • Support and Response
  • Knowledge Sharing
  • Social Risk
  • Simulation

Simulation

  • Challenges

Posture

slide-3
SLIDE 3

2/16/2012 3

Layered Defense

  • Community Perception
  • Social Risk Mitigation
  • Security Forces/ Physical Security
  • Corporate Security policy
  • Staff Awareness
  • Personal Security Principles

Methodology

slide-4
SLIDE 4

2/16/2012 4

What Should You Plan For?

  • Proper planning requires a thorough understanding of your operating profile

– Are you sending representatives of your organization into harm’s – Are you sending representatives of your organization into harm s way?

  • Understanding your organization’s response capability
  • At a minimum, individual travelers should have a response plan for the

following incidents: – Shelter in place – Medical emergencies g – Natural disasters/severe weather – Evacuation – Lost communications

Planning and Awareness

  • Reduction of risk through a better understanding of the operating environment
  • Understanding stakeholder capabilities
  • Understanding stakeholder capabilities
  • Training

– Are employees aware of their roles and responsibilities?

  • Planning

– Consistent with security philosophy and posture – Create a mechanism for dialogue around security – Use case studies and generate a knowledge pool

  • Conducting regular security surveys and determine exposure to risk
  • Conducting regular security surveys and determine exposure to risk

– Working relationships with local providers – Community presence

  • Understand organic assets and identify gaps
slide-5
SLIDE 5

2/16/2012 5

Organizing Your Assets

  • What do you already have?
  • What will you need to execute your response?

Planning Considerations

  • Trigger Events
  • Security protocols in-country
  • Security protocols in-country

– Do they fit with your posture? – Is there disparity between expatriates and local staff?

  • Response measures should be scalable
  • Tracking your travelers and expatriates
  • Information being pushed out to personnel
  • Continue awareness and compliance initiatives
  • Balance local and international perceptions of risk
  • Balance local and international perceptions of risk
  • Constantly assess internal capability and external relationships
slide-6
SLIDE 6

2/16/2012 6

Perceptions

Philadelphia Lagos

  • 32 shot over 5 days
  • Mobs storm store assault patrons
  • Restaurant robber robs 24,

steals rare diamond necklace

  • Mobs storm store, assault patrons
  • Corpse found washed up on nearby shore
  • Stash of grenades found in basement
  • 4 mentally disabled trapped in dungeon
  • Murder rate below 400 for the year
  • 120 organized crime members arrested

steals rare diamond necklace

  • Kidnappers release hostages
  • Hotel murder remains unsolved
  • Pollution rampant in city waters
  • Taxi scam uncovered

Communications

Communications Plan

Primary Alternate Contingency Emergency Actions on Lost Communications Train Staff Deploy physical infrastructure and establish call signs

  • External/Internal messages
  • Usually the first element of the plan to break down
  • Ensure staff are aware of their part
  • Information being pushed out to personnel
slide-7
SLIDE 7

2/16/2012 7

Contingency and Response

  • Priorities of work
  • Deploy an incident management team?
  • Deploy an incident management team?
  • Seek guidance from your advisors
  • Utilize third party support
  • Allow your Incident Response Team to manage tactically but provide

strategic guidance

  • Provide training and decision support tools for areas like journey

management and convoy operations

  • Streamline communications, avoid panic judgments

, p j g

  • Efficient response requires a well-machined crisis management team in

sync with a well-resourced, flexible Incident Response Team

  • Do not wait for smoke on the horizon to build this relationship

Knowledge Sharing

  • Code policy based on experience and not doctrine
  • Create a feedback loop for returning lessons learned into policy
  • Helps you understand your staff’s local perspective
  • Simulations/Plan Refreshes
  • Supporting policy review
  • Give a voice to those in your organization with crisis-facing experience
  • Use case studies and generate a knowledge pool
  • Combat complacency with contribution
  • Combat complacency with contribution
  • Create a set of core safety and security values and plan accordingly to

achieve them

slide-8
SLIDE 8

2/16/2012 8

Social Risk Security Risk

  • How is your organization seen?
  • Understand the human terrain
  • Culturally-imposed work values often come into conflict

– Product of globalization and enhanced networking – Increased use of contracting

  • Identify local resources and create working relationships
  • Create a core of values around safety and security and align those
  • Create a core of values around safety and security and align those

working on behalf of the organization with these principles

Velocity of Information

  • Priority is on speed, not accuracy
  • Global public with easy access makes message management difficult
  • Stakeholders can/will demand answers based on incomplete picture
  • Information moves faster than your ability to respond
slide-9
SLIDE 9

2/16/2012 9

Crisis Simulation Scenario 1 l Stimulus #2 Crisis Simulation Scenario 1

Delhi airport crash

A passenger aircraft has crashed on landing at Delhi’s International Airport. Reports indicate aircraft veered of

Aircraft which crashed in Delhi, India

indicate aircraft veered of runway into the terminal area

slide-10
SLIDE 10

2/16/2012 10

Crisis Simulation Scenario 1 Crisis Simulation Scenario 1

Your Exposure

  • Transiting staff on the ground, en route to UK and SE Asia
  • Several key leaders already in India; however, due to depart tomorrow
  • Two important conferences scheduled this week in Delhi
  • One staff member reported to have been on the plane
  • Two reported seriously injured from terminal crash and resulting fire

Senior leadership demanding answers

  • Senior leadership demanding answers.

Needs Actions

slide-11
SLIDE 11

2/16/2012 11

Crisis Simulation Scenario 2 Crisis Simulation Scenario 2

slide-12
SLIDE 12

2/16/2012 12

Your Exposure:

  • Mobile phone networks cut by government

Crisis Simulation Scenario 2

  • Mobile phone networks cut by government
  • Contractors, staff, and dependents at various locations throughout the

country, some passports held by government

  • In al Khobar, four dependants trapped at a mall downtown
  • Continuity of business operations depends on favorable relations with

major stakeholders including the government

  • Methods for leaving the country are closing fast

Needs Actions

Challenges

  • Duty of care versus duty of responsibility
  • Economic drivers increasing risk tolerance
  • Economic drivers increasing risk tolerance
  • Decentralized business model
  • Use of contractors
  • Limitations of your organization
  • Geopolitical trends
  • Media ecology

Damage to reputation Regulatory restrictions Client Impact Injury/ Loss of life Inadequate preparation Inadequate response Advocates Become adversarial Media interest Financial liabilities National interest

slide-13
SLIDE 13

2/16/2012 13

Review & Feedback