Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security & Business Resilience

Proactive Planning for International Response and Recovery

By Michael Payne
Operational Risk management model © iJET International, Inc. All rights reserved.

© iJET International, Inc. All rights reserved.

August 1, 2015

In the wake of disasters like Nepal’s earthquake, proactive efforts provide a significant return on investment when reacting to the extraordinary challenges of response and recovery; they reduce the demand for reactive resources in environments rife with life safety constraints and limitations.

There is a truism as old as time itself – risk is never static. Despite overwhelming historical evidence as a driver to reduce risk, there are still organizations with a high tolerance and strong appetite for it. These organizations can be identified by undeveloped plans, frequent unintended consequences, non-existent training and ineffective processes. However, other organizations develop plans, conduct exercises and monitor events to profile and manage their risk. They pre-establish acceptable and unacceptable risk levels to aid countermeasure selection and manage anticipated impacts. This increases organizational risk capacity and resiliency. Our objective is to establish a balanced approach to risk. How is this achieved? Through the application of Integrated Risk Management.

 

Communications

Working through the model, one can see the overarching need for communications. This is critical to the model’s effectiveness, and provides kinetic energy to ensure accurate information is provided to the right stakeholders at the right time; resources are applied efficiently; and the commitment to resolving the event and controlling the information flow (preventing misinformation) is firmly demonstrated. It is imperative communications are accurate, timely and relevant. This reduces tensions by answering unknowns and avoiding the unnecessary expenditure of resources.

 

Planning and Training (Proactive)

Planning and training provide information essential to the identification and mitigation of risk. They identify the actions and resources necessary to ensure life safety, communications and support are effective and efficient. For plans to achieve their desired end state, they must be established, understood and implemented. To ensure personnel are prepared, adequate training must be offered to enable a familiarity with how the process is designed to work; specifically, roles and responsibilities. Training must include all personnel, not just key leadership. Maintaining a focus on training and exercises, while closely monitoring the feedback loop, provides for a continuous improvement process. As globalization increases in complexity and interconnectedness; an increased focus is required to achieve the requisite balance between proactive and reactive efforts. 

 

Monitoring (Proactive)

In today’s world, information alone is not enough. A 24/7 intelligence capability is needed for monitoring the globe. It requires multisource data, standardized processes, analytics and a team of subject matter experts. The team provides intelligence, bulletins, assessments and alerts for emerging or dynamic events. These products drive the development of operational protocols, communication processes and event triggers as part of the proactive strategy for mitigating risk and ensuring duty of care.

 

Notification and Activation (Reactive)

Upon reaching the threshold for an event trigger (proactive transitions to reactive), the notification and plan activation process is implemented. This is based in the totality of circumstances for developing events (e.g. projected path of a hurricane), or dynamic events like the Nepal earthquake (e.g. quake exceeds 6.0 on the Richter scale). Establishing event triggers provide a definitiveness for the notification and activation of established plans. The organization should evaluate evolving conditions prior to activating resources to ensure an effective response.

 

Response and Recovery (Reactive)

Response and recovery objectives require a high level of flexibility in reacting to disruptive environments. But, action doesn’t always equal improvement. In the case of Nepal, some personnel were safe, sheltered and well supplied. iJET recommended these persons remain at their location and maintained communications until evacuation could be safely effected. Roads in Nepal are hazardous in the best of situations, but moving at this point would have unnecessarily increased their risk profile. In addition to the earthquake and strong aftershocks causing landslides, making some roads impassable, in Kathmandu food, water and shelter were in short supply. While focus initially gravitates to the event itself, leadership must quickly transition to circumstances and consequences, including monitoring for deviations and cascading effects.

 

Fundamentals

During disasters, widespread shortages of food, fuel, water, medical care, communications, transportation, electricity and sanitation are likely. These conditions alone should be sufficient to warrant proactive planning to ensure reactive efforts are effective. As no two events are identical, no single plan can anticipate and address every possible circumstance. Therefore, establishing the organization’s risk profile and applying an Operational Risk Management approach are essential toward mitigating risk. Effectiveness is achieved by focusing on the fundamentals. These include: 

  • Ensuring life safety
  • Communicating effectively with all stakeholders
  • Mitigating risk by understanding your Risk Profile
  • Planning, training and exercises (improve outcomes)
  • Anticipating disaster support needs and staging resources

As risk is never static, history provides us a stark reminder to organizations who have selected the “wait and hope” approach; fate favors the prepared.

KEYWORDS: Emergency Preparedness incident management systems international security Travel Risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael payne

 Michael Payne, CPP, CBCP, is the Organizational Resilience Manager for iJET International, an Integrated Risk Management company providing custom intelligence, preparedness, and response solutions. He has more than 30 years of experience planning, training, and leading these solutions at the operational and strategic level for multi-national corporations and within the U.S. government.  In times of crisis, Payne assumes the role of Global Operations Incident Manager leading crisis and resource surge management efforts for major natural disasters, socio-political situations and terrorism critical response operations. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Countering the Effects of New Age Terrorism on Business and Travel

    Countering the Effects of New Age Terrorism on Business and Travel

    See More
  • Drawing a flowchart

    Recovery point objectives 101: Planning for cyberattacks

    See More
  • Insights on Emergency Management

    Emergency & Medical Response Planning for Mass Casualty Terror Attacks

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • June 24, 2025

    Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

    ON DEMAND: For today's security teams, making informed decisions in the first moments of a crisis is critical.
  • January 16, 2025

    Preparing for the 2025 Threat Landscape

    ON DEMAND: In 2024, businesses faced a barrage of critical events with far-reaching impacts. From record-breaking storms and costly infrastructure failures to contentious election cycles and sophisticated cyberattacks, companies are navigating an increasingly complicated threat landscape.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing