Assessing Threat Vulnerability for Food Defence, Edition 2

(3 customer reviews)


Assessing Threat Vulnerability for Food Defence – what’s new in Edition 2?

The book has been restructured, so that it flows through the raw material supply-chain to the product supply-chain.  Now that GFSI have updated their standard, their benchmarking requirements give equal gravitas to both on site threats as they do supply chain threats, therefore the book has been equally sectioned, to allow the methodology to be used for either on site threats, supply chain threats, or of course, both.

GFSI and also the standards recognised by them, use a number of different terms such as food defence, food security and food fraud.  In Edition 2 we explain how food fraud, food terrorism and food sabotage all sit together, under the one heading; food defence.

To support this view and to add further clarity, we have provided a simple way of naming the assessments; raw material vulnerability and product vulnerability, which is aligned with the structure of the book.




Review by Professor Chris Elliott

“The second edition of this book very much builds on the important topic of food defense and does so in a very well structured manner. The flow from raw material supply-chain, to the product supply-chain is a very logical and systematic approach to building the defenses needed, to counter the growing threats to the integrity of food businesses.

The scope of the new edition has also been widened to cover both BRC and GFSI standards, and the authors have updated their benchmarking requirements. What pleases me especially about this edition, is the view taken that food defense encompasses the very broad range of threats that emerge from the triple dangers associated with food fraud, food terrorism and food sabotage.

A modified vulnerability scoring system based on the likelihood of the threat occurring has been developed within this new edition. From my own experience the opportunity ‘to do harm’ is often foremost in the mind of the perpetrators in terms of doing the most damage without being caught.

The system devised by Adele Adams and Kassy Marsh, to provide a strong shield against the infiltration of food businesses by those wishing to cause damage, is a strong and robust one. It’s implementation will, without doubt leave your business better protected against those wishing to undertake criminal activity. While this is in many ways, a sad reflection of where we are currently, I’m afraid I do not see any room for complacency. Indeed, all indications that I pick up, are that such barriers are growingly viewed as an essential part of doing business in the food arena.”

Professor Chris Elliott
OBE, Founder of the Institute for Global Food Security

3 reviews for Assessing Threat Vulnerability for Food Defence, Edition 2

  1. Mike Brereton

    As I suspect for the majority of food industry technical managers putting together a threat and vulnerability study that meets the requirements of BRC V7 is just one more onerous task, we found the threat and vulnerability guide a really useful starting point for our “new” T&V system which will obviously evolve as the concept becomes more mainstream over the coming months and years. My one slight criticism is that it is not particularly clear whether an assessment should be made on the whole process including issues identified at our own site or to base the assessment solely around suppliers (we decided that the latter was the course for us).
    In general we found “assessing threats and vulnerabilities for food defence” was really useful in getting us started.

    • Kassy Marsh

      Hi Mike,
      Thank you so much for your feedback, it really helps us develop our methodology and also the way that we set out the book. I’m really pleased that you’ve found it useful. The book was written to cover both process flow driven assessments (the whole supply chain and processes involved) and also suppliers/ raw material assessments – as we felt that businesses at the moment would need the option of which was best for them. We’ll definitely take your feedback on board though and see if we can make this clearer, when we look to produce a second edition.
      Thank you again, Kassy

  2. Julie Long

    Initially I hadn’t realised how complicated and time consuming this new threat & vulnerability requirement was going to be. It is yet another daunting task to be carried out which puts a strain on resources already stretched. I found the guide to be very helpful and informative with clear practical detail – especially liked the “key points” at the end of each section. Its concise and easy to understand, no unnecessary jargon, and hopefully will be a useful tool when we start putting together our assessment.

    • Kassy Marsh

      Hi Julie,
      Thanks for your feedback. I’m really pleased that you found the book useful. We agree it’s such a complex subject (and I suspect it will grow in the future) so we felt that some clear methodology was needed. Good luck with your assessment.
      Take care, Kassy

  3. Alina Petichenko

    Thank you very much for an interesting brainstorming. 99% agree with you in terms of the need to unite assess threats and vulnerabilities. There is a complexity which include unintentional harm to the emergency?
    And yet, in my view, the essence of the definition of the CCP more clearly illustrates the specific place of the analysis, the need for measurable limits, the constant monitoring and corrective action. I agree that could be called a TCCP 🙂

    • Kassy Marsh

      Hi Alina
      Thanks for your comments. I agree with you, that additional measures are required. In our methodology we have developed a term called a VTP (vulnerable threat point) which is the threat equivalent of a CCP. This way it ensures that it gets managed with the additional focus that it needs.

Add a review

Your email address will not be published.