SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
I am the CEO at iJET International.
@iJETIntl
mcindoeb@ijet.com
▪ Global Perspective - “Beyond Travelers”
▪ People Risk Management (PRM) Maturity Model
▪ Risk Management Approach
Prepare
Monitor
Respond
▪ Personnel Security
▪ People Risk Management (PRM) Toolkit
▪ Q&A
Agenda
# of Alerts Published - 8/1/2011 - 7/31/2016
Sources:
• The Digital Business Traveler, Sabre & GBTA Foundation Report, June 2016
• GBTA Business Traveler Sentiment Index, GBTA & AMEX, October 2015
• iJET Risk Intelligence Alert Data
of travel managers plan on
making traveler safety and
security a higher priority.
of business travelers agree
that travel security officials
do an excellent job of
ensuring safety.
(C) iJET International, Inc. All rights reserved. iJET
Threats can
impact all types of
assets: people,
locations, supply,
and information.
Sources
• iJET Risk Intelligence Alert Data
(C) iJET International, Inc. All rights reserved. iJET
More likely to impact all personnel, not just travelers.
Sources
• iJET Risk Intelligence Alert Data
(C) iJET International, Inc. All rights reserved. iJET
(C) iJET International, Inc. All rights reserved. iJET
Sources
• iJET Risk Intelligence Alert Data
… is a well defined process to identify risks, prepare personnel, monitor
& communicate threats, and respond to incidents as they arise.
(C) iJET International, Inc. All rights reserved. iJET
Overarching
KPAs
Management
KPAs
Infrastructure
KPAs
Same model as TRM3 focusing on all personnel, not just travelers.
(C) iJET International, Inc. All rights reserved. iJET
(C) iJET International, Inc. All rights reserved. iJET
Document a plan.
Educate your people
on that plan.
Practice emergency,
medical & cyber
protocols.
Revisit plan to
incorporate lessons
learned.
(C) iJET International, Inc. All rights reserved. iJET
▪ Financial Impact
▪ Courtroom Battles
▪ Insurance Premium Increases
▪ Adverse Publicity
▪ Brand Erosion
▪ Damaged Reputation
▪ Negative Impact on Staff Retention and Recruitment
(C) iJET International, Inc. All rights reserved. iJET
✓Intel…Intel…Intel (Dynamic, Intrinsic, Bespoke)
✓Incident & Crisis Communication Plan
✓PRM3 (People Risk Management Maturity Model Assessment)
✓PRM Solution
▪ Personnel “Location Aware” – Office, Trip and Assignment
▪ Pushed Threat Alerts – Granular and Specific
▪ Communication (2-way!)
▪ 24x7 Response (Security, Medical and Cyber)
(C) iJET International, Inc. All rights reserved. iJET
@iJETIntnl
mcindoeb@ijet.com

Weitere ähnliche Inhalte

Was ist angesagt?

Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Tony Martin-Vegue
 
Risk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru NagappanRisk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru Nagappan
BCM Institute
 
The Importance of Risk Management
The Importance of Risk ManagementThe Importance of Risk Management
The Importance of Risk Management
Vigilant Software
 

Was ist angesagt? (20)

Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information Risk
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
 
Risk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru NagappanRisk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru Nagappan
 
Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
 
6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk Management6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk Management
 
Risks and TCoR
Risks and TCoRRisks and TCoR
Risks and TCoR
 
Risk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation SlidesRisk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation Slides
 
Introduction to Open FAIR
Introduction to Open FAIRIntroduction to Open FAIR
Introduction to Open FAIR
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Calculate the Risk
Calculate the RiskCalculate the Risk
Calculate the Risk
 
How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational Approach
 
Risk management presentation
Risk management presentationRisk management presentation
Risk management presentation
 
Microsoft Risk Management
Microsoft Risk ManagementMicrosoft Risk Management
Microsoft Risk Management
 
Risk Reimagined! Series- The Relationship Between Strategy, Governance and Ri...
Risk Reimagined! Series- The Relationship Between Strategy, Governance and Ri...Risk Reimagined! Series- The Relationship Between Strategy, Governance and Ri...
Risk Reimagined! Series- The Relationship Between Strategy, Governance and Ri...
 
Business Risk Case Study Ba33
Business Risk Case Study Ba33Business Risk Case Study Ba33
Business Risk Case Study Ba33
 
The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field
 
Risk Culture. At The Heart Of Your Decisions
Risk Culture. At The Heart Of Your DecisionsRisk Culture. At The Heart Of Your Decisions
Risk Culture. At The Heart Of Your Decisions
 
The Importance of Risk Management
The Importance of Risk ManagementThe Importance of Risk Management
The Importance of Risk Management
 

Ähnlich wie Executive Travel, Keeping Your Employees Safe

Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...
Thiago Pinto - Forming a Safety Features  Personal Security Briefing Version ...Thiago Pinto - Forming a Safety Features  Personal Security Briefing Version ...
Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...
Thiago Pinto
 
Impact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing RiskImpact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing Risk
PECB
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATM
Wajahat Ali Khan
 

Ähnlich wie Executive Travel, Keeping Your Employees Safe (20)

Importance of Risk alert services in Business Continuity Planning
Importance of Risk alert services in Business Continuity PlanningImportance of Risk alert services in Business Continuity Planning
Importance of Risk alert services in Business Continuity Planning
 
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
 
Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...
Thiago Pinto - Forming a Safety Features  Personal Security Briefing Version ...Thiago Pinto - Forming a Safety Features  Personal Security Briefing Version ...
Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...
 
BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016
 
Cian Blackwell - Risk management and mitigation 2011
Cian Blackwell - Risk management and mitigation 2011Cian Blackwell - Risk management and mitigation 2011
Cian Blackwell - Risk management and mitigation 2011
 
Impact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing RiskImpact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing Risk
 
Corporate security pdf
Corporate security pdfCorporate security pdf
Corporate security pdf
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Tip & Trip Deck
Tip & Trip DeckTip & Trip Deck
Tip & Trip Deck
 
Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011
 
2018 Esri Developer Summit
2018 Esri Developer Summit2018 Esri Developer Summit
2018 Esri Developer Summit
 
Leading Change through Foresight & Governance
Leading Change through Foresight & GovernanceLeading Change through Foresight & Governance
Leading Change through Foresight & Governance
 
Revolutionizing your Business with AI (AUC VLabs).pdf
Revolutionizing your Business with AI (AUC VLabs).pdfRevolutionizing your Business with AI (AUC VLabs).pdf
Revolutionizing your Business with AI (AUC VLabs).pdf
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATM
 
Using ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernanceUsing ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and Governance
 
CompScience Transforms Workplace Safety with AI and Data Science
CompScience Transforms Workplace Safety with AI and Data ScienceCompScience Transforms Workplace Safety with AI and Data Science
CompScience Transforms Workplace Safety with AI and Data Science
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Infoception and quantified self
Infoception and quantified selfInfoception and quantified self
Infoception and quantified self
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
 

Mehr von Resolver Inc.

Mehr von Resolver Inc. (20)

ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
 
Terrorism in a Corporate Setting
Terrorism in a Corporate SettingTerrorism in a Corporate Setting
Terrorism in a Corporate Setting
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk Management
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver Core
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses Resolver
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social Engineering
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management Strategy
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
 
Data Driven Risk Assessment
Data Driven Risk AssessmentData Driven Risk Assessment
Data Driven Risk Assessment
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data Clean
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)
 
Leveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramLeveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM Program
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 

Executive Travel, Keeping Your Employees Safe

  • 1.
  • 2. I am the CEO at iJET International. @iJETIntl mcindoeb@ijet.com
  • 3. ▪ Global Perspective - “Beyond Travelers” ▪ People Risk Management (PRM) Maturity Model ▪ Risk Management Approach Prepare Monitor Respond ▪ Personnel Security ▪ People Risk Management (PRM) Toolkit ▪ Q&A Agenda
  • 4.
  • 5. # of Alerts Published - 8/1/2011 - 7/31/2016 Sources: • The Digital Business Traveler, Sabre & GBTA Foundation Report, June 2016 • GBTA Business Traveler Sentiment Index, GBTA & AMEX, October 2015 • iJET Risk Intelligence Alert Data of travel managers plan on making traveler safety and security a higher priority. of business travelers agree that travel security officials do an excellent job of ensuring safety. (C) iJET International, Inc. All rights reserved. iJET
  • 6. Threats can impact all types of assets: people, locations, supply, and information. Sources • iJET Risk Intelligence Alert Data (C) iJET International, Inc. All rights reserved. iJET
  • 7. More likely to impact all personnel, not just travelers. Sources • iJET Risk Intelligence Alert Data (C) iJET International, Inc. All rights reserved. iJET
  • 8. (C) iJET International, Inc. All rights reserved. iJET Sources • iJET Risk Intelligence Alert Data
  • 9.
  • 10. … is a well defined process to identify risks, prepare personnel, monitor & communicate threats, and respond to incidents as they arise. (C) iJET International, Inc. All rights reserved. iJET
  • 11. Overarching KPAs Management KPAs Infrastructure KPAs Same model as TRM3 focusing on all personnel, not just travelers. (C) iJET International, Inc. All rights reserved. iJET
  • 12. (C) iJET International, Inc. All rights reserved. iJET
  • 13.
  • 14. Document a plan. Educate your people on that plan. Practice emergency, medical & cyber protocols. Revisit plan to incorporate lessons learned. (C) iJET International, Inc. All rights reserved. iJET
  • 15. ▪ Financial Impact ▪ Courtroom Battles ▪ Insurance Premium Increases ▪ Adverse Publicity ▪ Brand Erosion ▪ Damaged Reputation ▪ Negative Impact on Staff Retention and Recruitment (C) iJET International, Inc. All rights reserved. iJET
  • 16.
  • 17. ✓Intel…Intel…Intel (Dynamic, Intrinsic, Bespoke) ✓Incident & Crisis Communication Plan ✓PRM3 (People Risk Management Maturity Model Assessment) ✓PRM Solution ▪ Personnel “Location Aware” – Office, Trip and Assignment ▪ Pushed Threat Alerts – Granular and Specific ▪ Communication (2-way!) ▪ 24x7 Response (Security, Medical and Cyber) (C) iJET International, Inc. All rights reserved. iJET