Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResiliencePhysical Security

ADM unlocks the power of existing data for COVID-19 response

ADM and its security team tapped into existing data, both inside the company and publicly available, to enable informed decision-making and real-time insight into the company’s pandemic response plan including contact tracing, location insight and information, and facility occupancy.

By Maggie Shein
SEC0521-Covid-ADM_Feat-slide1_900px

Global food supply chain company ADM has utilized existing data and publicly available information to help make informed decisions surrounding the COVID-19 pandemic and to minimize operational disruptions.

Image courtesy of ADM

SEC0521-Covid-ADM_slide2_900px

Pictured here is ADM’s North America Headquarters in Decatur, Ill.

Image courtesy of ADM

SEC0521-Covid-ADM_slide3_900px

Kevin Wujek, Insider Threat Coordinator, ADM.

Image courtesy of Wujek

SEC0521-Covid-ADM_Feat-slide1_900px
SEC0521-Covid-ADM_slide2_900px
SEC0521-Covid-ADM_slide3_900px
May 11, 2021

Founded in 1902, ADM works across the global food supply chain as a human and animal nutrition provider and agricultural origination and processing company, serving 200 countries and connecting crops to markets on six continents. Headquartered in Chicago, the company has more than 800 facilities, 38,000 employees, and $64 billion in revenue.

Kevin Wujek, Insider Threat Coordinator, originally came from an accounting background when he started working for ADM’s Global Security team seven years ago. Over the years, he’s managed regulatory programs as well as worked on the company’s Insider Risk team. He now manages several of ADM’s government-regulated security programs as well as its global Insider Risk program. And he has taught himself a number of skills and competencies over his tenure to grow with the company’s ever-changing security needs, particularly over the past year and a half.

When COVID-19 became a reality, Wujek became indispensable to the organization in enabling ADM to continue business across the enterprise’s extremely varied sites, providing data that was meaningful for the organization’s leaders to continue to tweak and adjust its pandemic response. Working closely with a number of departments, Wujek and his team have repurposed and reimagined data in a way that has allowed enterprise management to make tough pandemic-related decisions, as well as ensure business continuity.

In the early stages of ADM’s pandemic response, the company implemented several aspects of its Crisis Leadership Plan, including regional incident management teams throughout the globe, a global incident management team, and a core crisis leadership team.

At first, the security team was providing weekly reports for a select few high-priority locations. “But as time went on, the list of locations continued to grow and it was becoming increasingly difficult to manually collect data and present findings for an ever-expanding list of locations,” Wujek says.

Although information was available through multiple sources and websites, ADM management needed a means to collect, organize and digitize salient and reliable information, as well as provide the data in a digestible format with real-time insight for more informed, targeted decision-making regarding risk evaluation and business continuity.

To meet the need, Wujek set out to develop a dashboard using publicly available information — similar to what he’d seen from Johns Hopkins University, COVID-Tracking Project, The Centre for the Mathematical Modelling of Infectious Diseases, CDC and more — where ADM’s executives could view each location’s pandemic status, including various restrictions, projected opening dates and other metrics.

Wujek worked with global security intelligence colleagues to develop a Return-to-Workplace risk assessment tool for all offices and facilities worldwide, allowing for rapid and real-time evaluation of the work environment that exceeded any previous expectations management had on what they could learn. The dashboard includes several different pandemic-related metrics, including case growth, COVID-19 testing and positivity rates, and hospitalization rates at a local level. The information gives senior leadership incredible visibility not only to office and facility locations, but to surrounding county locations where colleagues and company employees reside.

“We took publicly accessible state and county-level data, and then developed and applied our own scoring algorithm based on current CDC health recommendations. Our scoring system enabled our management teams to process multiple, dynamic data sets in a much more understandable way with a highly user-friendly interface,” he says. Employees can view ADM’s dashboard through a browser or via mobile device, selecting by locality to quickly see current and historical “composite score” on a simple range defined by severity.

The localized insight has allowed ADM’s leaders to make more informed assessments and decisions regarding operations and COVID-19 response.

Wujek also aided the development of ADM’s Real-Time Facility Occupancy Dashboard, which repurposes data from the company’s card access control system, providing managers with detailed real-time information on occupancy, including the number of in-office colleagues per team, per floor and more.

“The simple solution allows management actionable data they can rely on — and you can appreciate how valuable this data is for contact tracing and population density decision-making related to return-to-office discussions,” Wujek says.

As sites opened or continued to operate and evaluate conditions and outbreaks, ADM leaders soon realized the company needed a more centralized approach to tracking quarantined employees and determining employee scheduling and hiring. Although teams throughout the world were tracking the number of colleagues who had contracted COVID-19, the data wasn’t separate and categorized to give senior managers insight regarding which mitigation measures were working best in various environments such as manufacturing facilities, research labs, facility labs, offices, etc. Wujek worked with HR to access databases, which allowed executives better insight into this tracking globally and provided a centralized database for data of quarantined or infected employees.

“The solution provided our Transportation and HR teams with the tracking and visibility necessary to enable effective quarantine management and workforce-planning decisions,” Wujek says.

Much of Wujek and the team’s aid in operational efficiency has come from streamlining work processes and procedures and encompassing existing data and technologies that the company already had, with little to no additional investments.

Wujek also worked with Global Security’s travel security analysts and IT operations to develop an approval workflow process for business-critical travel to review travel justifications and ensure high-risk travel was addressed consistently and appropriately. The digitization of the process has also allowed senior executives to see various analytics and reporting surrounding the travel data.

Collecting and presenting actionable, meaningful data that continues to meet ADM’s information needs has not only elevated Wujek’s status as an irreplaceable member of the enterprise, but it has continued to prove the Global Security team’s value as a business enabler and allowed the security team to be involved at every level of the company’s response to COVID-19 and impact on the organization.

“Our collective work in creating these dashboards has allowed data to serve as a unifying force for our global teams,” Wujek shares. “We continue to work closely with all operations teams (for business continuity), business analytics, supply chain/procurement, human resources, data scientists, microbiologists, transportation as well as environment health and safety colleagues.”

KEYWORDS: COVID-19 Heroes emergency management Emergency Preparedness insider threats risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • boeing

    Boeing values information as the backbone to pandemic response

    See More
  • soft skills

    The super power of soft skills in security

    See More
  • Ground Zero 9/11 terrorist attacks 20th anniversary

    The 20th anniversary of September 11: Reflections on the evolution of enterprise security

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×
Global food supply chain company ADM has utilized existing data and publicly available information to help make informed decisions surrounding the COVID-19 pandemic and to minimize operational disruptions. Image courtesy of ADM
Pictured here is ADM’s North America Headquarters in Decatur, Ill. Image courtesy of ADM
Kevin Wujek, Insider Threat Coordinator, ADM. Image courtesy of Wujek

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!