This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » 5 Key Components of a Robust Travel Risk Management Program
Security Enterprise ServicesOverseas and Secure Column

5 Key Components of a Robust Travel Risk Management Program

travel-enews
March 14, 2017
Mark Deane
KEYWORDS international security / security awareness / security risk management / Travel Risk / travel security
Reprints
No Comments

Meeting duty of care requirements is a complex process to navigate for any organization with employees who are traveling overseas on company business. Understanding what measures one can take to manage risk to an acceptable standard remains a considerable challenge. Now, more than ever in our volatile world the question arises: how best to meet this legal obligation?

 

The GEBIR principal identifies the five key components of a Travel Risk Management (TRM) program:

1.     Ground Truth

2.     Education

3.     Briefings

4.     In-Country Support

5.     Response

 

Ground Truth

It is vital to obtain a comprehensive threat overview of all international locations where travel will be conducted. Accurate risk assessments and country security risk reports will provide for a more informed and balanced decision-making capability regarding operational security concerns.

Security risk reports provide the organization a comprehensive understanding of what we refer to as “Ground Truth” – knowing the risks of the area of operations – country, region and locale. Documents should be user-friendly, relevant and up-to-date. Situations change rapidly and timely intelligence will provide detail on current and future anticipated threats.

 

Education

Provide personnel the tools and knowledge to minimize and mitigate personal travel risk. Travel safety and situational awareness is a vital cog in the TRM machine. Risks can be significantly reduced with the sensible application of basic personal security methodology. It is often the most cost-effective and efficient method of significantly improving the safety of individuals or groups abroad. Any training should provide an auditable trail that personnel completed the necessary steps prior to departure to minimize the risk of litigation.

 

Briefings

Prior to any travel, the individual traveling should be fully aware and conversant with the environment they will be visiting, as well as the threats and risk of those threats.  To avoid the risk of litigation, it is vital that any individual’s travel goes ahead willingly and with “eyes wide open.” To ensure this, any organization should supply, or provide access to a country briefing to an individual or group prior to departure.

 

In-Country Support

The provision of the necessary protective and personal safety support when your travelers are in-country should involve, but not be limited to, two categories:

1. Ground Transportation – The biggest risk to any traveler in a foreign country is vehicular accident. Further, most robberies, abductions and violent opportunistic crime occurs in or near a vehicle. It is therefore essential that journey management plans are prepared and rigorously enforced. Trusted and vetted suppliers of drivers and vehicles must be a priority. A reliance on taxis and ride-share services has led to multiple issues for organizations throughout the world.

Private transportation significantly alleviates risk to individuals abroad. The risks of express kidnapping, robbery and sexual assault are significantly reduced if travelers do not have to hail taxis from the street or utilize public transport. 


2. Security – In some countries, the use of Executive Protection may be required to manage individual and group security. Executive protection is no longer a service for the rich and famous. The modern professional “bodyguard” acts in an enabling role, facilitating the movement of executives through the plethora of risks that exist.

 

Response

The final part of the GEBIR principal is contingency planning. If an emergency incident occurs police and national emergency medical services are often inadequate, overwhelmed, or non-existent. There must be a pre-identified and rehearsed service in place to ensure the effective and timely response to an emergency.

There are three components to Response:

1. Communication – The benchmark is to be able to identify the exact location of your employees and be able to effectively communicate with them within 15-20 minutes of an incident occurring.

2. Crisis Management –  Being able to react immediately and effectively. This requires the design and implementation of plans and processes, to be complemented by the introduction and training of a crisis management team.

3. Emergency Evacuation or Hibernation Plans – These should be a structured and practical guide for the organization to identify and respond to executing a full or partial evacuation of personnel from operational locations, or hibernate in-situ until the situation changes.

 

The moral arguments for a solid TRM plan are obvious, but there is now a growing recognition both in the courts and with potential plaintiffs that breaches of duty of care occurring abroad can be heard in U.S. courts. The number of cases being presented has increased, and employment lawyers are particularly alert to the issue.

Subscribe to Security Magazine

Recent Articles by Mark Deane

Never Let the Protest Become the Event

Business Travel to Brazil: Lessons from the Sao Paulo Grand Prix Armed Robbery

International Travel Training: How Employees Should Respond to a Mugging

Business Travelers: Worrying About Terrorism May Kill You

Mark-deane

Mark Deane, the CEO of ETS Risk Management Inc. and founder of Explore Secure® is a risk management professional whose experience stems from his previous career as a Covert Operational Officer with the British Government. He has planned, managed and delivered numerous security and risk management operations at both a government and corporate level. He regularly delivers training to corporate and government agencies in a range of security, surveillance and intelligence services. 

Related Articles

International Travel Training: How Employees Should Respond to a Mugging

Business Travelers: Worrying About Terrorism May Kill You

Related Events

Effective Risk Communication: Theory, Tools, and Practical Skills for Communicating about Risk

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

cybersecurity breach

The Top 12 Data Breaches of 2019

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing