SUPPLY CHAIN SECURITY – CTPAT & TAPA STANDARDS COMPLIANCE & RISK MANAGEMENT

Share:

INTRODUCTION SUPPLY CHAIN SECURITY – CTPAT & TAPA STANDARDS COMPLIANCE & RISK MANAGEMENT

The increase in statistics of loss related to company assets, namely cargo related crimes warrants an immediate methodological approach on how an organization may need to prepare itself with Total Prevention Methodology ensuring it does not fall prey to such losses that may influence Business Continuity.

This program, provides an insight to the organization on the importance of Supply Chain Security, namely the control and management methodologies, which includes a wide spectrum of elements, through a Supply Chain Risk Management Plan, focusing namely on CTPAT (Customs Trade Partnership Against Terrorism Standards) based on the Minimum Security Criteria 2022 (MSC 2021) & Transported Asset Protection Standards (TAPA)

 

COURSE OBJECTIVE

  • Recognise the prevention methodologies 
  • Understand the benefits of implementing Supply Chain Security Risk Management Plan, absorbing the requirements laid out in ISO 28000 (Supply Chain Security Management) & ISO 31000 (Risk Management)
  • Identify the change of trend in warehousing, transportation and logistics Security Management
  • Identify pro active approaches Supply Chain Security Management – Compliance Programme
  • Address the challenges of balancing security needs and economic efficiency
  • Developing an effective Risk Management Plan for Supply Chain Security
  • To be guided on internal audit skills and technique in conducting risk based auditing on CTPAT & TAPA guidelines
  • Understand the compliance requirement as per the Minimum Security Criteria 2021

 

WHO SHOULD ATTEND

Executive / Managers / Senior Managers / HODs; Security & Loss Prevention Personnel, Logistics and 

Warehouse Management Personnel, Supply Chain Service Providers

 

TRAINING METHODOLOGY 

  • Highly Interactive Session, with a bilateral approach to the subject matter allowing participants to share incidences at respective work locations.
  • Short Video Presentation
  • Mind Mapping and Recap Sessions
  • Workshop Session – allowing participants to have a hands on participation in the application of Planning, implementation, execution and compliance inspections strategies and work in synergy with other participants
  • Ice Breaking / Monotony Breaking Sessions – Purpose of rejuvenating the mind 
  • Encourage team work

 

DURATION: 2 Days (9am – 5pm)

 

COURSE OUTLINE 

Focus Area: – Corporate Security, Transport Security, Procedural Security , Business Partner Security, Agricultural Security, Cyber-Security, Physical Security 

1. ISO 28000 – Security Management System for the Supply Chain

  • An Overview
  • How to synergise with ISO 31000 Risk Management Standards 

2. Security Policy

  • Compliance Framework (Legal, Standard & Best Practices)
  • Management of assets (People & Property)

3. Threat & Risk Analysis (An Overview)

  • Risk Matrix (Basic Introduction and Understanding)
  • Assessment methodology of threat and risk to the organization / business
  • Impact of Risk
  • Management of threat and risk – Damage Control and  Mitigation Plan
  • Case Study

4. Customs Trade Partnership Against Terrorism (C-TPAT)

  • Background
  • Definition
  • Objective
  • Security Requirements (In General)
  • Container Security Requirement – Condition and Sealing Points
  • Benefits

Transported Asset Protection Association

  • FSR Module: Details the security requirements for facilities like warehouses and in-transit storage. 
  • TSR Module: Details the security requirements for road transportation of high-value goods. 
  • PSR Module: Focuses on the security of truck parking areas to protect drivers and cargo. 
  • GSR Module: Specifies the minimum acceptable security measures for human guarding services in supply chain logistics
  • Implementation and Auditing: Guidance on how to implement the standards

5. Transport Security Management – Background & Statistical Facts

  1. Supply Chain Security (Cargo Security)
    • Cargo Crime Statistics (Hijacks in Malaysia), Hijack  Modus Operandi, Target Products, Laws in relation to Hijack and Cargo Crimes.
    • Case Study.
  2. Supply Chain Security Management – Focus is on CTPAT Validation Program

6. Security Requirements Pre-Shipment

  1. Incoming Area / Storage Area / Loading Bay (Outgoing)  (Basic Understanding) 
    • Access Control Management
    • Facility Dock and Warehouse Access Control Management
    • High Value Storage Area Security Requirements and Inventory Management
    • Standard Operating Procedure
    • Process Review (Frequency)
    • Close Circuit Television (CCTV) – Quantity, Type, Coverage Angle
    • Lighting
    • Intrusion Detection System
    • Alarm System
  2. Transportation Security 
    • Standard Operating Procedure
    • Recommended mode of transportation – Security  features for transportation vehicle, inclusive of Global Positioning System (GPS)
    • Transportation Crew Management i.e:- Driver and Escorts (Armed / Unarmed) – Training /  Background checks (Vetting)
    • Routing, Scheduling, Pre-Alerts, Audits (Route, Airport Cargo, Warehouse, Ground Handlers)
  3. Transport / Trucking Crew Standards
    • Selection process and grooming requirements.
    • Crew Management – Weekly Meetings, Training Programme, Awareness Programme
    • Armed Escort Standards and Legal Requirement (Including Rules of Engagement) 
    • Third Party Escort
  4. Transport Vehicle / Trucking Inspection for Compliance
    • Physical Features / Condition
    • Security and Safety Standards
    • Roadworthiness
    • Inspection Checklist
  5. Armoury Security Requirements and Management
    • Access Control
    • Inventory Management
    • Issuance / Withdrawal of Weapons
    • License and Permit  

7. Security Requirements During Shipment

  • Crew’s Roles and Responsibilities (Driver and Armed Escort)
  • Vigilance
  • Point to point delivery (Non-stop)
  • Refuelling security requirements for long distance travelling
  • Environmental Change Identification – elements to look out for during Shipment
  • Security during vehicle breakdown / other emergencies                           
  • How to manage an attempt to hijack shipment.

8. Facility Security

  • Security Officers Standards 
    • Selection process and grooming requirements.
    • Perception Management
    • Security Officers Management – Weekly Meetings, Training Programme,   Awareness Programme
    • Enforcement Methodology
  • Security Equipment Management
    • Walkie – Talkies
    • Key Management system.
    • Alarm System
    • CCTV Management system
    • Security Seal Management
  • Perimeter Security 
    • Office and Vehicle (Trucks) Parking Security Standards
    • Facility Access Control, Employee / Visitor /  Vendor / Contractor Management
    • Patrolling requirements and procedures
    • Perimeter Security / Patrolling Methodology
      • Access Control, Visitor / Contractor / Vendor Management in / out of facility building & internal movement controls.
      • Patrolling and Audit Methodology (Routine Patrolling, Daily Audits, Perimeter Audits and Recording Findings)
      • Inspection Methodology (People, Bags, Vehicles) – Legal Rights and Limitations
    • Close Circuit Television (CCTV) Management
      • Introduction to CCTV
      • Management, Surveillance Methodology, Intrusion Detection system

9. Shop Floor Security Risk Management

  • Escalation Processes
  • Effective Inventory Controls of WIP materials and  Products

10. Human Resources and Procurement Standards for Supply Chain Security

  • Hiring and Selection
  • Risk Management Plan
  • Due Diligence (Background Checks)
  • 11. Business Partner Security and Management
  • Engagement of 3rd party
  • Due Diligence (Background Checks)

12. Cyber Security 

  • Personal Data Protection Act 2010 and its related requirement.
  • Enforcement, Non-Disclosure Documents and Practices. 
  • Basic Security Protocols (Username, Password, OTP)

13. Social Compliance

  • No Forced Labour involved in Cargo Process (Sorting, Storage, Packing, Loading, Transportation)

14. Agricultural Security

  • Pest Contamination Prevention Plan
  • Risk Assessment 

15. Communication & Awareness

  • Training
  • App Based Learning
  • Employee Handbook
  • Code of Conduct for Employees and Supplier Code of Conduct.

16. Procedural Security

  • Security Procedures
  • Work Instructions
  • Compliance Standard

17. Crisis Management & Business Continuity Planning

How To Submit an Enquiry to Us?

  1. Fill in the form below and submit to us.
  2. Initiate a conversation via live chat on the bottom left of our website by stating: “Hi, my name is [your-name]. I’ve already submitted the form for this training.”
  3. We’ll promptly reach out to you regarding the training you’re interested in.

Program Enquiry Form

    ORGANIZATION DETAILS






    PERSON-IN-CHARGE DETAILS





    FOR FURTHER INFORMATION, PLEASE CONTACT US!

    Thank you