Global Commerce Security

Making good decisions begin with having good data and assessing risk. Each consultation we provide will be based upon the best data and assessment tailored to your business construct and practice. Securing and evaluating your logistical supply chain can be broken down into three areas; risk, threat and vulnerability evaluation or assessment. The risk assessment is a qualitative and quantitative process for determining outside threats to your company’s procedures and processes, such as tracking and monitoring shipments, personnel security and vetting subcontractors/business partners. The threat assessment measures external risks to your company’s supply chain that have a direct impact on your process and procedures, such as terrorism, cargo theft, and port operations. The vulnerability assessment determines existing weaknesses within your every-day process and procedure, such as access control, personal and physical security systems, IT security, and conveyance controls.

Summit-Tek principles use their in-depth experience in supply chain and global commerce security to protect client operations in overseas markets. The principles have successfully negotiated and implemented programs to include the Container Security Initiative (CSI), Secure Freight Initiative (SFI), Customs Trade Partnership Against Terrorism (CT-PAT), and the Department of Energy’s Second Line of Defense program in countries worldwide. Our firm maintains numerous foreign contacts overseas that assist with supply chain security and verification audits at source locations (factories), transit hubs (shipping, freight forwarders) and destination sites.