Loading Events

« All Events

  • This event has passed.

Supply Chain Security Management

Sep 20, 2017 - Sep 21, 2017


The Certified International Supply Chain Professional (CiSP)™ programme is specifically designed to equip supply chain professionals for advanced management roles internationally. This 3-day certification programme will identify and discuss areas of Supply Chains Security that have become more risk ridden and less result driven, covering current problems and providing solutions. Other areas covered will be TAPA Asia, ISO 2800 and C-TPAT Supply Chain Security Initiatives.

Upon successful completion of this programme and examination, you will be awarded with Certified International Supply Chain Professional (CiSP)™.

Key benefits of attending this workshop:

  • Gain in-depth understanding about the security within your own supply chain
  • Protect your supply chains from being attacked from internal and external threats
  • Identify the signs to look for that pose threats to supply chains
  • Assess your current supply chain whether it is safe and secure
  • Master the best ways to protect your supply chain

  • Supply Chain Managers
  • Logistics Managers
  • Air Freight Managers
  • Sea Freight Managers
  • Rail Freight Managers
  • Road Freight Managers
  • Customs Personnel
  • IT Professionals
  • Legal Associates
  • Warehouse Managers
  • Procurement Staff
  • Distributors
  • Suppliers
  • Factory Managers
  • Government Personnel
  • CEO’s and Directors of large and small Supply Chain driven enterprises
  • Oil and Gas Companies
  • Mining Companies
  • Anyone else involved in Supply Chain Operations

Workshop Trainer:

Workshop Trainer is the IABFM director of Procurement and Supply Chain Practice and sits on the Board of the Australian Branch of the International Academy of Business and Financial Management. He is also actively involved at IABFM in improving existing training programmes and developing new programmes in areas such as Procurement, Supply Chain and Human Resource Policies. He has delivered CIPP, CIWP, CHRM training programmes in a number of countries including Australia, United Arab Emirates, Kingdom of Saudi Arabia, Kenya, South Africa, Indonesia, Malaysia, Singapore, Hong Kong, Zambia, China, Ghana and Namibia.

He holds a DBA in Business and Marketing, and acts as a PhD supervisor for a number of university doctorate candidates in Asia. He has an extensive educational background in operating adult education programmes in fields such as international business, human resources management, marketing, procurement, logistics, warehouse and supply chain management for the Australian Institute of Export, Swinburne University, Griffith University, Swinburne University and the North Western Christian University among others. In addition to this he has more than 19 years of experience, in providing public procurement and supply contracts in Hong Kong, where he has worked with and assisted various departments of the HKSAR Government. He has also been identified as a respected specialist in consulting and assisted in a number of start-up cooperation’s for Europe based companies, who wish to set up businesses or trade with private and state owned enterprise companies in PRC China. 

He holds a voluntary role as the Vice Chairman of Training for the South China Institute of Supply Chain Management at the Hong Kong Polytechnic University, and has a seat on the board with other respected professionals and academics, whose role is acting as a think tank for innovation and improvement in areas of Supply Chain and Procurement. 

His latest ventures involved creating a training and coaching program which uses supply chain software to train supply chain personnel how to set up a real-time supply chain models then run the models through a simulation, to analyse them and optimise the operation to improve its overall performance, by applying planning and development strategies. This programme is effective in getting supply chains to run lean and efficient. 

EXCLUSIVE Case Studies & Exercises:

  • The Email Scam that netted 14 million in just over a year from Companies

  • Blue Coat 3rd Party Scandal in Syria (the cost of doing business in a 3rd world country)

  • Ways to avoid your Supply Chain being vulnerable

  • Applying the ICE BERG Theory with the ICE CUBE Theory to deal with immediate and developing Supply Chain Risk

Interested in partnering with us?

Please contact us to discuss your requirements.
Click here to get in touch with us.

Grand Copthorne Waterfront Hotel

392 Havelock Road, Singapore 169663


According to Verizon's 2015 Data Breach Investigations Report, there were 2,122 confirmed data breaches in the previous year at organizations in 61 countries. These are only the ones known about, incidents that were reported. The truth is hundreds and perhaps thousands more, mostly at small and medium-size businesses, go unreported.

Verizon’s research indicates not only that the threat of cyberattacks is rising but also how insidious and adaptive they can be. According to Verizon's 2013 Data Breach Investigations report, although 91 percent of data breaches were carried out in a matter of minutes or hours, it took months or years to detect 62 percent of those compromises, and it took several months, sometimes up to a year to contain more than half of the breaches after they were discovered.

One of the largest known data breaches to ever occur, resulted in 110 million records being lost and hundreds of millions of dollars in damages, being sought against a small, third-party supplier along the chain. The attackers easily compromised Fazio Mechanical Services, a supplier of HVAC services, to gain easy access to Target’s network. In a report by Dark Reading, taking a piggyback ride on third-party suppliers is now a well-tested method to use in an attackers’ playbook.

Nowadays, the security of a supply chain of a supply chain is no different. It is either taken for granted,taken too lightly, understated or all three. World leading Supply Chain company’s know what supply chain security means to their company, and fully understand the cost of not having it or only having part of it.

The golden question that company’s need to be asking themselves is:‘are we confident that our supply chain is secure or at the very least safe within the environment we work in?’ Most companies either refuse to ask this question or refuse to answer or admit their supply chain could be vulnerable. No Supply Chain is vulnerable to disruption or unexpected events so why should it be safe from supply chain security infiltration.

“If you want to attack the world’s largest gold vault at Fort Knox and you know they have almost impregnable locks and well-trained guards to enforce strong security, it is going to be much easier to attack one of their providers. They are one of several keys that already has access to the gold.” 

In this high-risk world we live and work in, company’s must take a proactive approach when it comes to supply chain security; to do otherwise, invites a host of serious and potentially devastating consequences not just to the doorstep, but to the very inside of your operation. There are more and more companies becoming proactive today, especially those that have been victimized or subjected to a breach in their once safe Supply Chain wall. When a company encounters a major theft, fraud, product tampering incident,or any other type of connected security problem, the human and financial resources required to deal with it are quite significant, and quite dramatic. It is seldom a good experience and in truth, most executives want to do everything within their power to avoid having to go through the same thing or worse. Being proactive is the best way to do that.

So if you are still not convinced and asking yourself ‘Why do I need to attend this program?’ Here’s some compelling more reasons why?

Supply Chain Security today has become such a major challenge because there are more enticing opportunities in a complex run supply chain that attract theft, smuggling, and product tampering. The main objective for companies is to develop, introduce, and then diligently maintain asset protection continuity within each link of their supply chain. This is neither an easy or simple thing to do, particularly when you are working with a global logistics network. The main problem in this regard is that too many foreign entities don’t accurately represent or understand what their supply chain safeguards really are or should be. Today, the most successful company’s are aware and are genuinely concerned about all aspects of their security. Theft of property or proprietary information, fraud,inventory theft, product tampering, sabotage, and terrorism can and do dramatically affect a company’s profitability and reputation in the marketplace with their customers. The main problem is that executives too often either assume or are under the belief that their company is far better protected than it normally is. The realisation that they weren’t only becomes apparent after they have been victimized. It is only then that company’s realise how vulnerable they actually were.

Written by the Course Facilitator


Open Forum Enterprise Pte Ltd
(65) 6635 8836