Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security & Business Resilience

Proactive Planning for International Response and Recovery

By Michael Payne
Operational Risk management model © iJET International, Inc. All rights reserved.

© iJET International, Inc. All rights reserved.

August 1, 2015

In the wake of disasters like Nepal’s earthquake, proactive efforts provide a significant return on investment when reacting to the extraordinary challenges of response and recovery; they reduce the demand for reactive resources in environments rife with life safety constraints and limitations.

There is a truism as old as time itself – risk is never static. Despite overwhelming historical evidence as a driver to reduce risk, there are still organizations with a high tolerance and strong appetite for it. These organizations can be identified by undeveloped plans, frequent unintended consequences, non-existent training and ineffective processes. However, other organizations develop plans, conduct exercises and monitor events to profile and manage their risk. They pre-establish acceptable and unacceptable risk levels to aid countermeasure selection and manage anticipated impacts. This increases organizational risk capacity and resiliency. Our objective is to establish a balanced approach to risk. How is this achieved? Through the application of Integrated Risk Management.

 

Communications

Working through the model, one can see the overarching need for communications. This is critical to the model’s effectiveness, and provides kinetic energy to ensure accurate information is provided to the right stakeholders at the right time; resources are applied efficiently; and the commitment to resolving the event and controlling the information flow (preventing misinformation) is firmly demonstrated. It is imperative communications are accurate, timely and relevant. This reduces tensions by answering unknowns and avoiding the unnecessary expenditure of resources.

 

Planning and Training (Proactive)

Planning and training provide information essential to the identification and mitigation of risk. They identify the actions and resources necessary to ensure life safety, communications and support are effective and efficient. For plans to achieve their desired end state, they must be established, understood and implemented. To ensure personnel are prepared, adequate training must be offered to enable a familiarity with how the process is designed to work; specifically, roles and responsibilities. Training must include all personnel, not just key leadership. Maintaining a focus on training and exercises, while closely monitoring the feedback loop, provides for a continuous improvement process. As globalization increases in complexity and interconnectedness; an increased focus is required to achieve the requisite balance between proactive and reactive efforts. 

 

Monitoring (Proactive)

In today’s world, information alone is not enough. A 24/7 intelligence capability is needed for monitoring the globe. It requires multisource data, standardized processes, analytics and a team of subject matter experts. The team provides intelligence, bulletins, assessments and alerts for emerging or dynamic events. These products drive the development of operational protocols, communication processes and event triggers as part of the proactive strategy for mitigating risk and ensuring duty of care.

 

Notification and Activation (Reactive)

Upon reaching the threshold for an event trigger (proactive transitions to reactive), the notification and plan activation process is implemented. This is based in the totality of circumstances for developing events (e.g. projected path of a hurricane), or dynamic events like the Nepal earthquake (e.g. quake exceeds 6.0 on the Richter scale). Establishing event triggers provide a definitiveness for the notification and activation of established plans. The organization should evaluate evolving conditions prior to activating resources to ensure an effective response.

 

Response and Recovery (Reactive)

Response and recovery objectives require a high level of flexibility in reacting to disruptive environments. But, action doesn’t always equal improvement. In the case of Nepal, some personnel were safe, sheltered and well supplied. iJET recommended these persons remain at their location and maintained communications until evacuation could be safely effected. Roads in Nepal are hazardous in the best of situations, but moving at this point would have unnecessarily increased their risk profile. In addition to the earthquake and strong aftershocks causing landslides, making some roads impassable, in Kathmandu food, water and shelter were in short supply. While focus initially gravitates to the event itself, leadership must quickly transition to circumstances and consequences, including monitoring for deviations and cascading effects.

 

Fundamentals

During disasters, widespread shortages of food, fuel, water, medical care, communications, transportation, electricity and sanitation are likely. These conditions alone should be sufficient to warrant proactive planning to ensure reactive efforts are effective. As no two events are identical, no single plan can anticipate and address every possible circumstance. Therefore, establishing the organization’s risk profile and applying an Operational Risk Management approach are essential toward mitigating risk. Effectiveness is achieved by focusing on the fundamentals. These include: 

  • Ensuring life safety
  • Communicating effectively with all stakeholders
  • Mitigating risk by understanding your Risk Profile
  • Planning, training and exercises (improve outcomes)
  • Anticipating disaster support needs and staging resources

As risk is never static, history provides us a stark reminder to organizations who have selected the “wait and hope” approach; fate favors the prepared.

KEYWORDS: Emergency Preparedness incident management systems international security Travel Risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael payne

 Michael Payne, CPP, CBCP, is the Organizational Resilience Manager for iJET International, an Integrated Risk Management company providing custom intelligence, preparedness, and response solutions. He has more than 30 years of experience planning, training, and leading these solutions at the operational and strategic level for multi-national corporations and within the U.S. government.  In times of crisis, Payne assumes the role of Global Operations Incident Manager leading crisis and resource surge management efforts for major natural disasters, socio-political situations and terrorism critical response operations. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Countering the Effects of New Age Terrorism on Business and Travel

    Countering the Effects of New Age Terrorism on Business and Travel

    See More
  • Drawing a flowchart

    Recovery point objectives 101: Planning for cyberattacks

    See More
  • Insights on Emergency Management

    Emergency & Medical Response Planning for Mass Casualty Terror Attacks

    See More

Related Products

See More Products
  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!