Introduction to Security Frameworks in Supply Chain Management
6 classes
1.1 Define Key Concepts in Security Frameworks for Supply Chains
1.2 Identify Common Security Risks in Supply Chain Management
1.3 Examine the Role of ISO 28000 in Security Management
1.4 Analyze Current Security Frameworks Used in Supply Chains
1.5 Evaluate the Benefits of Implementing a Security Framework
1.6 Develop an Action Plan for Adopting a Security Framework
Key Components of ISO 28000: Security Management Systems
6 classes
2.1 Identify Key Objectives of ISO 28000
2.2 Analyze the Importance of Security Risk Assessment
2.3 Examine Security Policies and Procedures within ISO 28000
2.4 Explore the Role of Leadership in Security Management
2.5 Implement Continuous Improvement Techniques in Security Systems
2.6 Evaluate Real-World Applications of ISO 28000 in Supply Chain Security
Threat Analysis and Risk Assessment Techniques
6 classes
3.1 Identify Key Threats in Supply Chains
3.2 Analyze Vulnerabilities in Security Frameworks
3.3 Assess Risks: Probability and Impact Evaluation
3.4 Utilize Risk Assessment Tools and Techniques
3.5 Develop Mitigation Strategies for Identified Risks
3.6 Conduct a Comprehensive Threat Assessment Review
Implementing Security Measures in Supply Chains
6 classes
4.1 Assessing Vulnerabilities in Supply Chains
4.2 Identifying Key Security Measures for Supply Chains
4.3 Developing a Risk Management Plan for Supply Chain Security
4.4 Implementing Physical Security Controls in Supply Chains
4.5 Integrating Technology Solutions for Enhanced Supply Chain Security
4.6 Training Staff on Security Protocols in the Supply Chain
Continuous Improvement and Compliance in Security Management
6 classes
5.1 Analyze Existing Security Frameworks in Supply Chain Management
5.2 Identify Key Metrics for Continuous Improvement in Security
5.3 Develop Action Plans for Compliance with ISO 28000 Standards
5.4 Implement Best Practices for Monitoring Security Performance
5.5 Evaluate the Effectiveness of Security Improvements in Supply Chains
5.6 Create a Culture of Continuous Improvement in Security Management