Preparing for the Intentional Adulteration rule in FSMA is an uncertain business because the final rule is not yet published. But, there are things you can and should be doing now to ensure your food defense plan is FSMA proof. In this webinar, you will:
- Understand what is expected by FSMA before conducting your vulnerability assessments
- Gain new insights on FDA terms and helpful tips as you prepare a food defense strategy
- Discover tools you can use to conduct a food defense vulnerability assessment that complies with FSMA
1. Understand what is expected by FSMA before conducting your vulnerability assessments
The term “Vulnerability Assessment” seems like a simple concept, but it has a special meaning according to the draft Intentional Adulteration rule. By understanding that meaning you can get ahead in your preparations. It is critical to know what is intended by the FDA and their requirements on vulnerability assessments.
Will your vulnerability assessments be approved by the FDA? Learn why two common ways of conducting vulnerability assessments are completely different than what is expected by FSMA. Find out the right approach to conducting vulnerability assessments to help mitigate risks and maintain compliance.
Hazard Analysis and Critical Control Point (HACCP) is a process that many of you are familiar with. It is an important and effective process for maintaining food safety and the FDA has leveraged this approach to address food defense, but there are important differences. You will learn the three ways that Vulnerability Assessment is similar to HACCP, and three ways it is different.
2. Gain new insights on FDA terms and helpful tips as you prepare your food defense strategy
The FDA uses several specific additional terms in the Intentional Adulteration rule: “Actionable Process Step”, “Focused Mitigation Strategies”, and four “Key Activity Types”. Discover real world examples for each of these terms and how to apply the best method to fit your specific situation:
- 2 alternatives permitted by the draft rule to determine your Actionable Process steps
- 2 rules of thumb to select and confirm the Actionable Process Steps
- 3 methods to choose your Focused Mitigation Strategies
- 3 three hints to getting the most out of the FDA’s online mitigation strategies database
3. Discover tools you can use to conduct a food defense vulnerability assessment that complies with FSMA
The FDA has published two tools to use for a Vulnerability Assessment: CARVER + Shock and the Food Defense Plan Builder tool. Learn the strengths and shortcomings of each tool, and find out about some helpful hints for how to use each of them.
When conducting a Vulnerability Assessment, get to know the difference between the “Big V” vulnerability and the “Little v” vulnerability. Learn the difference between accessibility and vulnerability as those terms are used in the tools.
FSMA is here and the Intentional Adulteration rule will be in force next year. Get ready by learning about how to best prepare for the final rule by participating in the first of a four part webinar series on food defense sponsored by Tyco Integrated Security. This first session will focus on the first step, conducting a vulnerability assessment, and will feature Ned Mitenius, Founder and President of Periscope Consulting, who built the models and exercises which became the FDA’s Food Defense Plan Builder tool.
Don Hsieh, Director of Commercial and Industrial Marketing, Tyco Integrated Security
Don is the Director of Commercial and Industrial Marketing at Tyco Integrated Security. He is responsible for developing and driving the go-to-market strategy for a broad spectrum of vertical markets including food and beverage manufacturing and distribution, restaurants and food service, which make up Tyco’s Food Defense initiative, as well as key market segments such as Pharmaceuticals, high tech, and service industries. Prior to joining Tyco, Don spent over 20 years in the high tech industry leading the development of multiple vertical markets and channels of distribution to accelerate growth at top-tier technology firms such as Hewlett-Packard, NCR and Konica Minolta.
Don earned an MBA from Stanford University Graduate School of Business and a B.A. in Business Administration from Whittier College.
Ned Mitenius, Founder and President, Periscope Consulting, LLC
Ned has been building Food Defense programs since 2003. Now Periscope Consulting has a global reputation in preparing Food Defense plans, conducting vulnerability assessments, creating tools and delivering education.
Ned built the models and exercises which became the FDA’s Food Defense Plan Builder tool and has served on FDA expert panels. He and his team built the scenarios and instruction kit used in the USDA’s “Food Defense and Recall Preparedness: A Scenario-Based Exercise.” He publishes an extensive blog series on the FSMA Intentional Adulteration rule.
Ned has traveled worldwide presenting Food Defense training to over 3000 participants from over 30 countries. He is the lead author of a Food Defense chapter in one textbook and a contributing author of another. He speaks at many forums including IFT and the Food Defense Strategy Exchange. In 2012, the team he traveled with globally was presented an FDA Agency Honor Award.Message Presenter
Who Should Attend?
- CSO, VP/Director of Corporate Security
- VP/Director of Food Safety/Quality
- VP/Director of Regulatory Compliance/Risk Management
For Food & Beverage manufacturers, distributors, retailers and food service providers
Tyco Integrated Security
A business unit of Tyco, Tyco Integrated Security is North America’s leading commercial security systems integrator, providing security and business optimization services to more than 500,000 customers. Headquartered in Boca Raton, Fla., Tyco Integrated Security has more than 10,000 employees.
Areas of Specialization
Tyco Integrated Security helps food and beverage manufacturers and distributors build a proactive food defense program to protect your brand. The 4 A’s of Tyco’s Food Defense program delivers actionable intelligence to:
Assess vulnerability of critical control points
Allow only authorized staff access to critical control points
Continuously monitor the supply chain and provide immediate alerts for rapid response
Audit processes to improve operational and regulatory compliance
Key Products and Services
Electronic access control
Critical condition monitoring
Fire detection and life safety
For more information visit www.tycois.com.
SecuringIndustry.com is a free-to-access information service that covers the issues surrounding supply chain and brand security. Our aim is to provide practical advice and intelligence to help manufacturers define and pursue their own strategies for tackling crime including counterfeiting, product diversion, adulteration and theft. We cover key developments in:
Coding and track-and-trace technologies
The evolution of data standards
Overt, covert and forensic authentication systems
Cargo thefts and shipment security
Developments in the global regulatory environment
Enforcement actions and case studies, and much more
Anti-counterfeiting and supply chain security news from SecuringIndustry.com.