SlideShare a Scribd company logo
1 of 12
Enterprise Compliance Management (ECM) 1998 - 2010 “ Reducing Preventable Mishaps” “ Ensuring Mission Readiness” “ Environmental Protection” International Compliance Systems, Inc. New Bedford, Massachusetts
ECM/JSCAS is critical to the DoD’s tool box ,[object Object],[object Object],[object Object],[object Object],Iraq alone 3,657 / 905 24.75% = Preventable up 2% from 2008
The habitual problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An ICS configured solution
Respondent Results
Primary Areas of Focus
Probability of Mishap
Proven Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outstanding review by customers We are deep in the middle of our Safety inspection. So far, it is going very well and exceeding my greatest expectations. I have touted the JSCAS tool and results thus far and it has earned me huge points. I have observers here and they would like to start coordinating with you for inclusion in the JSCAS process.   Lt Col JEFFREY A. BRIERE, Lt Col, NEANG 155th Chief of Safety I am watching the JSCAS results too. Getting close, and getting excited with the current results. I actually briefed a lot of the information at Tuesday’s Senior Staff meeting. The commanders were very impressed with the data. It’s very telling, and gives us good guidance as to where we need to focus our efforts.   Lt Col   JEFFREY A. BRIERE, Lt Col, NEANG 155th Chief of Safety Wow! That looks awesome -- thanks. Lt Col Jimmy "Nick" Nichols 138FW Chief of Safety We are trying a new survey tool called JSCAS (Joint Safety Climate Assessment Survey) that should fit your culture survey needs perfectly.  It is easy to use, provides mitigation tools at  the conclusion, and best of all, it gives quality feedback to every participant automatically! It is being adopted by the USAF and Navy as their primary survey tool. ANG is leading the way on this one. DON PHILLIPS Investigations & Reporting AFSAS Administration
ECM Components ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Management & Financial Responsibility ICS will provide comprehensive milestones, monthly reports, implementation / results briefings, and a final report. ICS will oversee all financial aspects of its internal operations as well as those of its subcontractors. ICS will continue to coordinate an outstanding team for the execution of the ECM Initiative. Using the GSA schedule, the Government has the ability to quickly and easily contract with ICS to avoid interruptions in momentum associated with their loss mitigation initiatives.
 

More Related Content

What's hot

case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)ishan parikh production
 
2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge DeliverableCurtis Brazzell
 
Business continuity and recovery planning for manufacturing
Business continuity and recovery planning for manufacturingBusiness continuity and recovery planning for manufacturing
Business continuity and recovery planning for manufacturingARC Advisory Group
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing Cultureladukepc
 
Risk and testing
Risk and testingRisk and testing
Risk and testingEmi Rahmi
 
SEVEN DEADLY CYBERSECURITY SINS
SEVEN DEADLY CYBERSECURITY SINSSEVEN DEADLY CYBERSECURITY SINS
SEVEN DEADLY CYBERSECURITY SINSCRUZ CERDA
 
Hpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedbackHpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedbackPMHaas
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Pragmatic Device Risk Management
Pragmatic Device Risk Management Pragmatic Device Risk Management
Pragmatic Device Risk Management Seapine Software
 
Determining Condition Monitoring
Determining Condition MonitoringDetermining Condition Monitoring
Determining Condition MonitoringKerry Williams
 
Quiz 9
Quiz 9Quiz 9
Quiz 9jiml59
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC Advisory Group
 
Strategies improving-vulnerability-assessment-effectiveness-large-organizatio...
Strategies improving-vulnerability-assessment-effectiveness-large-organizatio...Strategies improving-vulnerability-assessment-effectiveness-large-organizatio...
Strategies improving-vulnerability-assessment-effectiveness-large-organizatio...wardell henley
 
[Webinar] Contractor Management: What is the Return on Investment (ROI)?
[Webinar] Contractor Management: What is the Return on Investment (ROI)?[Webinar] Contractor Management: What is the Return on Investment (ROI)?
[Webinar] Contractor Management: What is the Return on Investment (ROI)?browzcompliance
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management ProgramBeyondTrust
 
Risk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisRisk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisGaurav Singh Rajput
 
Aerial Data Management and The Digital Enterprise
Aerial Data Management and The Digital EnterpriseAerial Data Management and The Digital Enterprise
Aerial Data Management and The Digital EnterpriseAdvisian
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CulturePhil La Duke
 
Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]Darwin Jayson Mariano
 

What's hot (20)

case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
 
2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable
 
Business continuity and recovery planning for manufacturing
Business continuity and recovery planning for manufacturingBusiness continuity and recovery planning for manufacturing
Business continuity and recovery planning for manufacturing
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing Culture
 
Risk and testing
Risk and testingRisk and testing
Risk and testing
 
SEVEN DEADLY CYBERSECURITY SINS
SEVEN DEADLY CYBERSECURITY SINSSEVEN DEADLY CYBERSECURITY SINS
SEVEN DEADLY CYBERSECURITY SINS
 
Hpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedbackHpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedback
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Pragmatic Device Risk Management
Pragmatic Device Risk Management Pragmatic Device Risk Management
Pragmatic Device Risk Management
 
Determining Condition Monitoring
Determining Condition MonitoringDetermining Condition Monitoring
Determining Condition Monitoring
 
Quiz 9
Quiz 9Quiz 9
Quiz 9
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
 
Risk assesment
Risk assesmentRisk assesment
Risk assesment
 
Strategies improving-vulnerability-assessment-effectiveness-large-organizatio...
Strategies improving-vulnerability-assessment-effectiveness-large-organizatio...Strategies improving-vulnerability-assessment-effectiveness-large-organizatio...
Strategies improving-vulnerability-assessment-effectiveness-large-organizatio...
 
[Webinar] Contractor Management: What is the Return on Investment (ROI)?
[Webinar] Contractor Management: What is the Return on Investment (ROI)?[Webinar] Contractor Management: What is the Return on Investment (ROI)?
[Webinar] Contractor Management: What is the Return on Investment (ROI)?
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 
Risk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisRisk Assessment and Job Safety Analysis
Risk Assessment and Job Safety Analysis
 
Aerial Data Management and The Digital Enterprise
Aerial Data Management and The Digital EnterpriseAerial Data Management and The Digital Enterprise
Aerial Data Management and The Digital Enterprise
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing Culture
 
Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]
 

Viewers also liked

Viewers also liked (6)

Ap style presentation
Ap style presentationAp style presentation
Ap style presentation
 
Pavasaris
PavasarisPavasaris
Pavasaris
 
Brantu bibliotēka
Brantu bibliotēkaBrantu bibliotēka
Brantu bibliotēka
 
When you graduate you will be...
When you graduate you will be...When you graduate you will be...
When you graduate you will be...
 
Non small cell
Non  small  cellNon  small  cell
Non small cell
 
An Introduction to Team Management Systems
An Introduction to Team Management SystemsAn Introduction to Team Management Systems
An Introduction to Team Management Systems
 

Similar to Ecm

During week 6 we develop the theory and application of capital bud.docx
During week 6 we develop the theory and application of capital bud.docxDuring week 6 we develop the theory and application of capital bud.docx
During week 6 we develop the theory and application of capital bud.docxjacksnathalie
 
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
 (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docxjoyjonna282
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxmydrynan
 
Global HSE Newsletter March 2014
Global HSE Newsletter March 2014Global HSE Newsletter March 2014
Global HSE Newsletter March 2014Mohammad Ghadban
 
Coordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCognizant
 
White paper pragmatic safety solutions
White paper pragmatic safety solutionsWhite paper pragmatic safety solutions
White paper pragmatic safety solutionsCraig Tappel
 
White paper holistic_approach_to_government_continuity_of_operations_apr2014
White paper holistic_approach_to_government_continuity_of_operations_apr2014White paper holistic_approach_to_government_continuity_of_operations_apr2014
White paper holistic_approach_to_government_continuity_of_operations_apr2014EMC
 
Feb 08 Quarterly Review
Feb 08 Quarterly ReviewFeb 08 Quarterly Review
Feb 08 Quarterly Reviewdeanmyersjr
 
TMardis Resume 2015
TMardis Resume 2015TMardis Resume 2015
TMardis Resume 2015Tom Mardis
 
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxjuliennehar
 
SPE Paper ARMS Ltd
SPE Paper ARMS LtdSPE Paper ARMS Ltd
SPE Paper ARMS LtdJohn Tucker
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docxgerardkortney
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCiente
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Lanate Drummond
 
Introduction to controlling
Introduction to controllingIntroduction to controlling
Introduction to controllingAhmed Adel
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSathishKumar960827
 

Similar to Ecm (20)

During week 6 we develop the theory and application of capital bud.docx
During week 6 we develop the theory and application of capital bud.docxDuring week 6 we develop the theory and application of capital bud.docx
During week 6 we develop the theory and application of capital bud.docx
 
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
 (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docx
 
Global HSE Newsletter March 2014
Global HSE Newsletter March 2014Global HSE Newsletter March 2014
Global HSE Newsletter March 2014
 
Coordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management Planning
 
Audit fieldwork
Audit fieldworkAudit fieldwork
Audit fieldwork
 
White paper pragmatic safety solutions
White paper pragmatic safety solutionsWhite paper pragmatic safety solutions
White paper pragmatic safety solutions
 
White paper holistic_approach_to_government_continuity_of_operations_apr2014
White paper holistic_approach_to_government_continuity_of_operations_apr2014White paper holistic_approach_to_government_continuity_of_operations_apr2014
White paper holistic_approach_to_government_continuity_of_operations_apr2014
 
h6358-ictsi-cporellano
h6358-ictsi-cporellanoh6358-ictsi-cporellano
h6358-ictsi-cporellano
 
Feb 08 Quarterly Review
Feb 08 Quarterly ReviewFeb 08 Quarterly Review
Feb 08 Quarterly Review
 
TMardis Resume 2015
TMardis Resume 2015TMardis Resume 2015
TMardis Resume 2015
 
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docx
 
3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...
3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...
3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...
 
SPE Paper ARMS Ltd
SPE Paper ARMS LtdSPE Paper ARMS Ltd
SPE Paper ARMS Ltd
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdf
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...
 
Introduction to controlling
Introduction to controllingIntroduction to controlling
Introduction to controlling
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
 

Ecm

  • 1. Enterprise Compliance Management (ECM) 1998 - 2010 “ Reducing Preventable Mishaps” “ Ensuring Mission Readiness” “ Environmental Protection” International Compliance Systems, Inc. New Bedford, Massachusetts
  • 2.
  • 3.
  • 4. An ICS configured solution
  • 8.
  • 9. Outstanding review by customers We are deep in the middle of our Safety inspection. So far, it is going very well and exceeding my greatest expectations. I have touted the JSCAS tool and results thus far and it has earned me huge points. I have observers here and they would like to start coordinating with you for inclusion in the JSCAS process.   Lt Col JEFFREY A. BRIERE, Lt Col, NEANG 155th Chief of Safety I am watching the JSCAS results too. Getting close, and getting excited with the current results. I actually briefed a lot of the information at Tuesday’s Senior Staff meeting. The commanders were very impressed with the data. It’s very telling, and gives us good guidance as to where we need to focus our efforts.   Lt Col JEFFREY A. BRIERE, Lt Col, NEANG 155th Chief of Safety Wow! That looks awesome -- thanks. Lt Col Jimmy "Nick" Nichols 138FW Chief of Safety We are trying a new survey tool called JSCAS (Joint Safety Climate Assessment Survey) that should fit your culture survey needs perfectly.  It is easy to use, provides mitigation tools at  the conclusion, and best of all, it gives quality feedback to every participant automatically! It is being adopted by the USAF and Navy as their primary survey tool. ANG is leading the way on this one. DON PHILLIPS Investigations & Reporting AFSAS Administration
  • 10.
  • 11. Management & Financial Responsibility ICS will provide comprehensive milestones, monthly reports, implementation / results briefings, and a final report. ICS will oversee all financial aspects of its internal operations as well as those of its subcontractors. ICS will continue to coordinate an outstanding team for the execution of the ECM Initiative. Using the GSA schedule, the Government has the ability to quickly and easily contract with ICS to avoid interruptions in momentum associated with their loss mitigation initiatives.
  • 12.