Skip to Content

Supply Chain Security

A Comprehensive Approach

By Arthur G. Arway

CRC Press – 2013 – 189 pages

Purchasing Options:

  • Add to CartHardback: $69.95
    978-1-46-651187-3
    February 28th 2013

Description

The supply chain is a complex system of numerous, integrated stakeholders. These stakeholders are responsible for the transportation, storage, documentation, and handling of material goods and cargo. Each entity has its own unique relationship with and role within the chain—as well as its own unique security requirements. The challenge of trying to secure the supply chain at every level is both a domestic and global concern. In this global economy, companies must be able to integrate security into supply chain logistics to protect their employees, assets, and clients from incidents of theft and other damaging events.

Supply Chain Security: A Comprehensive Approach provides security professionals the tools necessary to ensure supply chain security. The book demonstrates how to establish and enforce security policies and protocols, including rapid responses that must be deployed in the event of a theft or security incident. Most importantly, it enables professionals to integrate business practices into the planning, development, and successful operation of supply chains to ensure security and protect assets.

Drawn from the experience of a recognized leader in domestic and international supply chain logistics, trade, and transportation security, the book illustrates through a series of case studies how security professionals can institute sound security practices. By demonstrating to their stakeholders and potential customers that they provide a secure environment for materials, products, goods, and cargo, companies can increase their customer base and improve their bottom line.

Contents

WHAT IS SUPPLY CHAIN SECURITY?

What Is a Supply Chain?

Origin

Manufacturing/Suppliers

Handoffs

Initial Service Provider

Service Providers

Trucking

Ocean Shipping

Airlines

Third-Party Logistics Providers

PODs

Elements That Impact the Supply Chain

Operations

Contracts

Customer Demands, Written and Nonwritten

Provider Capability

Geography

Force Majeure/Acts of God

Crime

Volume

Storage Capacity

Government Controls

Security: Supply Chain versus Corporate

Focus of the Program

Corporate Culture

Supplier and Provider Relationships

DEVELOPING A SUPPLY CHAIN SECURITY PROGRAM

Security for Key Links in the Chain

Origin

Security Reviews of Origin

Actions

Customers

Providers

Provider Security Review

CCTV

Access Controls

Intrusion Alarms

Storage and Distribution

Security Review of Facility and Location

Transportation Security Review

Shipping and Receiving

Destination Concerns

Elements of a Successful Supply Chain Security Program

Goal of the Supply Chain Security Program

Theft and Pilferage

Smuggling and Contamination

Antiterrorism

Government Supply Chain Security Program Compliance

Customer Contractual Obligations

Risk Management

Industry Positioning and Branding

Marketing and Sales

Methodology for Supply Chain Security

Integration into the Business

Business Unit Support

Structure and Reporting

Responsibilities and Roles

Policies and Procedures

Training

Classifications

Security Auditing and Assessments

Information Technology

Liaisons

Budgeting

Justification

Internal vs. External

Own or Rent?

REGULATION AND RESOURCE

Government and Industry Supply Chain Security Programs

C-TPAT (Customs-Trade Partnership against Terrorism)

A Growing Partnership

Extending the Zone of US Border Security

How It Works

An Emerging Focus: Mutual Recognition Arrangements

PIP (Partners in Protection)

History

Modernization

Mutual Recognition

Harmonization of PIP and C-TPAT

FAST (Free and Secure Trade)

How It Works

Benefits

FAST-Eligible Goods

BASC (Business Alliance for Secure Commerce)

Mission

Vision

Specific Objectives

AEO (Authorized Economic Operator)

AEO Guidelines

CCSP (Certified Cargo Screening Program)

Background

Program Overview

Benefits

TAPA (Transported Asset Protection Association)

About TAPA

HVTT Asset Theft: A Shared Problem

Standards Lead to Solutions

Resources and Technology for Supply Chain Security

GPS (Global Positioning System)

GSM (Global System for Mobile Communications)

Trucking-Focused Devices

Asset Tracking and Radio Frequency Identification (RFID)

Taping/Wrapping

Seals

Screening

CASE STUDIES

Case Studies

Case Study 1: Ocean Container Theft, Port of Newark, NJ

Case Study 2: Pilfering within a "Knitting" and Distribution Operation

Case Study 3: Truck Theft

Case Study 4: Parcel Network Operation Pilferage

Case Study 5: Latin America Warehouse Assault

APPENDICES

Appendix A: Sample Customer Security Requirements

Appendix B: Sample Policy/Procedure

Appendix C: Sample Security Review/Audit

Appendix D: Sample Security Budget

Appendix E: List of Acronyms

INDEX

Author Bio

Dr. Arthur G. Arway is a recognized leader in domestic and international logistics, trade, and transportation security. He brings to the table 27-plus years of supply chain cargo security, law enforcement, investigative, human resources, and corporate security experience. He is an advisor to senior management as well as governmental security agencies. Dr. Arway has contributed to the body of work on supply chain and logistics security and has been cited in trade publications such as Journal of Commerce, CargoVision, and the online logistics magazine, DCVelocity. As a Certified Protection Professional (CPP) with ASIS International, he has presented at numerous industry meetings and exhibitions. He has also been honored by ASIS International with the Golden Writers Award for his work on workplace violence.

Name: Supply Chain Security: A Comprehensive Approach (Hardback)CRC Press 
Description: By Arthur G. Arway. The supply chain is a complex system of numerous, integrated stakeholders. These stakeholders are responsible for the transportation, storage, documentation, and handling of material goods and cargo. Each entity has its own unique relationship with and...
Categories: Supply Chain Management, Security Services, Computing & IT Security