Description
Launching the 2nd Edition of our pioneering Threat Vulnerability book by Adele Adams and Kassy Marsh. We’re really proud that Prof. Chris Elliot has, as with our first edition, reviewed and recommend the book and kindly written us a foreword
Key changes in the 2nd edition include:
- Restructuring the flow of the book to walk you through threat assessments across the entire end-to-end supply chain. Starting by considering threats in the raw material supply chain then moving on to assessing threats in the product supply chain (your factory box and subsequent distribution chain)
- Expansion of the scope to include food fraud, food terrorism and food sabotage under the heading of food defence
- Updates on the current requirements for threat assessments in the most commonly used GFSI recognised standards, such as SQF, FSSC 22000, IFS as well as BRC
- Further development of the risk assessment methodology and scoring, which now includes the likelihood of detection
In response to the updated GFSI standard, which now gives equal weighting to both on-site threats and raw material supply chain threats, we have balanced the content of the book to reflect this.
The risk assessment methodology has been kept simple yet robust and the same scoring system can still be used for both raw materials and product threat assessments.
There is a variety of terminology currently being used in this area, we have compared these and explained how they all fit together under a broader heading of food defence. Prof. Chris Elliott gave this point particular praise as it helps to alleviate some of the current confusion.
We’ve developed the risk assessment scoring system even further, this now includes the likelihood of detection. Meaning that the methodology can now be used by agents and brokers and storage and distribution facilities, not just manufacturers.
Kassy and I really hope that the thought and effort we’ve put into creating the 2nd edition proves valuable in helping the industry tackle this challenging topic.
A.Farmer –
The scoring set up and methodology is very helpful
Chris W –
Scoring system of vulnerability is very good and I feel is something I could use.