Major/Key Accountabilities
Execute on time to an area volume 550 truckloads per week
Deliver to average cost per unit budget for market
Tender all optimized and manually planned issues, collections, and stock transfers within responsible area
Efficiently tracking of all CHEP arranged freight due for delivery daily to ensure on time shipment and delivery
Manages transporter base to ensure consistent customer service and on time delivery by working across functionally and with provider
Resolves all loads in booked not shipped, booked not received and in transit relocations statues daily
Maintains accurate electronic documentation revolving around responsible area with systematic tools not limited to SAP, Siebel, Outlook, LEAN, Logistics cockpit
Provide Holiday coverage per Logistics rotation schedule
Plan
…show more content…
Provide briefing for advance threat analysis (i.e., advanced persistent threats, underground hacktivism, and federal agency information). Business minded threat analysis and proactive mitigation is a critical success factor.
Communicating with different levels of IT and business leaders on drivers of the IT security risk assessment agenda.
Manage the IT Risk Management/IT Audit process including providing targeted and quantifiable reporting of IT Risk Management activities, including all aspects of the metrics/ reporting lifecycle management and maintaining an IT Risk register. Collaborates with all technology groups, lines of business, and corporate functional areas to define, gather and analyse metrics. Provides targeted reporting to all levels of IT and Business Management.
Responsible for facilitating the development and maintenance of IT Security policies and standards based on knowledge of best practices and compliance
AWG is faced with logistical challenges similar to others in the industry. The largest logistical challenge on a daily basis at AWG is their finite timeline between restocking and outgoing shipments to retailers. Any deviation from the schedule due to an extenuating circumstance (labor strike, weather event, ...
This can be accomplished by using disciplined delivery time windows, developing close relationships with a small group of reliable transportation carriers, and shipping only what is needed at a particular time, which means small lots being delivered more frequently often using partially filled trucks” (Taylor, 2013, p. 6).
Analyzing and reducing the cyber threats is key to keeping the nation’s networks secure. By employing individuals who work directly in the information Technology industry, helps reduce the security breaches that could occur during a cyber attack to the nation’s networks. Disasters happen to the nation whether they are environmental, natural causes, or terroristic. Planning and preparing for potential disasters as well as having a good response and recovery strategy is a key factor. Making sure the strategies can have to correct amount of funding levitates the amount of help that can be given to answer a
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
In my current role, I have served many roles within risk management. As a Risk Manager in the Operations & Systems department, I facilitated IT risk assessments, prepared units for audit reviews and monitored business line progress on mitigation tasks. As I took more senior roles, I led many initiatives
Governance – Who will be responsible for managing the development of the IT strategy and the ongoing oversight of it? Without clear accountability, the delivery of successful outcomes is
National security in the United States is extremely important and requires extensive risk management measures including strategic, exercise, operational and capability-based planning, research, development, and making resource decisions in order to address real-world events, maintain safety, security and resilience (Department of Homeland Security [DHS], 2011). The national security and threat assessment process consists of identifying the risk and establishing an objective, analyzing the relative risks and environment, exploring alternatives and devising a plan of action for risk management, decision making and continued monitoring and surveillance (DHS, 2011). Identifying risks entails establishing a context to define the risk, considering related risks and varying scenarios, including the unlikely ones, which then leads to the analysis phase; gathering data and utilizing various methodologies and analysis data software systems to survey incidence rates, relative risks, prevalence rates, likelihood and probable outcomes (DHS, 2011). These two key phases lay the foundation to explore alternatives and devise action plans. Threats, vulnerabilities and consequences (TCV) are also a key component of many national security risk management assessments because it directly relates to safety and operation capabilities, but the text stress that it should not be included in the framework of every assessment because it is not always applicable (DHS, 2011).
Information security is a broad topic and one that is essential to the success of every organization, regardless of the industry, and at the heart of it is our most valued resource, the employee. Technology is at the forefront of all our day to day interactions and our employees are constantly burdened with issues that can wreck havoc on their effectiveness. Emotions come into play in every interaction and even physical security must be addressed as part of any program awareness.
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
The clearing agent pays the necessary dock or port trust dues and obtains the port Trust receipt in two
Vulnerability is a weakness in a security system. A threat is a set of circumstances that has the potential to cause loss or harm. How do we address the problems of threats and vulnerabilities? We use control as a defensive method. Control is an action, device, procedure, or technique that removes or reduces vulnerability. (Pfleeger & Pfleeger, 2007)It is essential to have adequately qualified IT personnel on the security team to properly monitor the network’s activity log because this log records the activities occurring in an organization’s systems and on its networks.
Since UPS’s establishment, the company aims to provide “best service and lowest rates.” UPS aims to have the best service through satisfying their customers with timely and accurate shipments. The DIAD tracks information through the scannable bar-coded label and gives the drivers the best delivery route. The package tracking system gives the customers real time feedback to package whereabouts. The Web-based Post Sales Order Management System (OMS) manages global service orders and inventory for critical parts fulfillment. High-tech electronics, aerospace, medical, and other companies can receive critical packages quickly. The system allows for orders to be placed online and track parts from the warehouse to the final user. The customer is informed on each shipment milestone and changes in delivery. The UPS Supply Chain Solution allows for other subscribing companies to use UPS’s systems and infrastructure to handle their deliveries at a cheaper rate than on their own systems. Thus, the company meets their goal to offer the lowest
Private persons, big and small businesses at a point would have to either send or receive parcels, shipment, among other things. This cannot be done without the help of cargo companies, which are highly involved in the process of transportation of goods and services from one point to the other, but in short and long distances. And the demand to have this parcel and shipment delivered in a faster and more secured way , has brought about a high competition among several companies in the world , and they all have adopted both similar and also different measures to tackle the issues they deal with in the delivering order and tracking issues.
"Risk management is the part of analysis phase that identifies vulnerabilities in an organization's information system and take carefully reasoned steps to assure the confidentiality, integrity, and availability of all components in the organization's information system" (Management of Information Security - second Ed, Michael E. Whitman and Herbert J. Mattord)
The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad. The following report will provide you guidance about auditing and hardening techniques applied though the 7 Domains by utilizing IT Security Best Practices.