Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Supply Chain Security: Best Practices Build Success

By Peter Cheviot
April 1, 2010

As the supply chain industry continues to evolve at record pace, so does the need to improve protection for the products that move inside the networks. Two factors inevitably continue to push the need: (1) the value and attraction for theft; and (2) pressure from the consumer to get their valued products to their destinations – yesterday. 

These two challenges faced BAX Global Inc. when I started its Corporate Security Program in 1992. BAX Global (now a component of DB Schenker) was an integrated cargo carrier and distributor. We had a U.S. domestic air and trucking network that offered overnight and deferred services for our customers. In this complex express cargo network, our success relied on very efficient coordination and interaction throughout the supply chain. As the head of BAX Global Security for more than 17 years, I had the opportunity to create, design and implement a security program that achieved that coordination by integrating with existing operational practices and encouraging user ownership of security. Our program eventually became an industry-leading, best practice model.

When introducing new security practices, we recognized the need to work closely with the operators. I set forth a strategy that included scheduled communication forums with the key management stakeholders. Through effective communication and implementation processes, we stressed the team concept from the beginning, and that team approach became ongoing, proactive and key to our success.

Not only did strong user participation help us reduce liability costs, it helped drive creation of revenue-generating opportunities. Several of our policies were cited as best practices, including our high-risk product management program and reweigh process. These security practices became added values that impacted our company’s bottom line, as well as the supply chain industry.


High-Risk Program

Our high-risk product management program began as a response to the increase in higher-risk products, such as electronics and pharmaceuticals, moving in our supply chain networks. 
 
Through the high-risk program, we instituted an escalated communications process that was security protected in our IT systems. Information regarding higher-risk shipments was communicated from the origin and down the line to any other locations that would receive these consignments, all the way to the destination. At each location, there were requirements that demanded escalated attention for this particular cargo. 

We reduced our problem experiences to rare exceptions. And because this process influenced a very strong awareness of high-risk cargo consignments, our ability to address problems became immediate. The program was embraced by the entire organization; it led to major business growth, because high-risk shippers knew they could trust us to protect their valued products. 

In this case, we drove a security practice that met a customer need. The result was improved customer satisfaction and a high level of security awareness that became cultural.


Reweigh Process

One of the primary security challenges for many supply chain operations is how to reconcile palletized or over-packed cartons at each transaction point. Over packing is a method of combining multiple cartons into a single unit. One way to over pack is to palletize cartons – to stack multiple cartons on a loading skid and shrink-wrap them together. It is not uncommon to have a pallet of 50 or more computers or other valued commodities moving on these palletized units. This method enables customers to keep consignments of multiple pieces together as one unit, but it can also raise risk to a very high level. 
 
It is a fundamental security practice to ensure your supply chain product is confirmed for any discrepancies at the receiving point. You need to know if any product was stolen or compromised so that immediate steps can be taken to investigate the root cause. However, perpetrators began using innovative means to remove product from over-packed shipments and disguise the theft. Cartons were being taken from the bottom and middle of pallets. Electronics products were being removed and the cartons put back. The skids would arrive at the destination, looking as perfect as when they were tendered at the origin. But upon delivery and final breakdown, the consignee would discover empty cartons. 
 
The compromised skid could move through four other locations prior to delivery. We coordinated with our operations management to create a solution that provided significant returns on our investment.
Whenever we had over-packed or palletized shipments, our operators would re-weigh the units at each transfer location. We would do this for specific high-risk commodities only. We developed an electronic re-weigh communication that would begin at the origin location and then pass along the line. In some of our network chains, a product could move through as many as five transfer locations before getting to its destination. At each point the cargo would be re-weighed and checked to ensure it was within a kilo of the weight that was recorded at origin. 

This practice, which began as an essential solution, became a major selling point for the high-risk shippers. Because it worked as an integrated step in our operations, it did not impact our productivity.


Real ROI

Each of our security policies provided tangible returns on our investments. For example, we worked to calculate the customer revenue value that was generated by our reweigh practice. I teamed with the marketing group and began identifying the customers that required re-weigh as part of their shipping services. We designed a database to track those customers’ revenue contributions and our claims activity for them. On both financial indices, we were able to generate results that amounted to several million dollars. When I reported these dollar values, reweigh became a hot topic with our senior management. Through a best practice, we strengthened our security culture by teaming up with operations, connected a marketing and sales opportunity because of a customer need, and gave senior management data that showed genuine returns being produced by strong security.

Best security practices in supply chain operations will connect your security program to returns on investment and net gain opportunities. We all need to justify our existence, and in a corporate environment, there needs to be business purpose. Any good corporate security program should be based on fundamental security practices and policies. However, you can reach a best practice level by ensuring continuous improvement. Find ways to involve the operations people, who are the users and who will have the best ideas.


Links

  • www.securityexecutivecouncil.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Peter Cheviot is a security professional with more than 30 years experience in transportation industry management. He is a faculty member for the Security Executive Council and former vice president of corporate security for BAX Global Inc. Cheviot has contributed and supported development processes for initiatives with the Transportation Security Administration and the U.S. Customs Border and Protection Terrorist Threat program, C-TPAT.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • software security

    Best practices to bolster software supply chain security

    See More
  • Supply Chain Management Best Practices for 2014 and Beyond

    See More
  • Locked vault

    Fortifying the software supply chain: A crucial security practice

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing