Zero-based Organizations versus World-Class Organizations
The developing and maintaining of a homeland security plan requires an organization to evaluate all aspects of their infrastructure, as well as, to meet their obligation to the community/public in providing protection and business continuity in the event of a terrorist attack, or any form of natural disaster. Homeland security assessments are based on meeting what has been established as the Baldrige Criteria. “Conducting a comprehensive organizational assessment based on the Baldridge Criteria for homeland security preparedness provides organizational perspective of their readiness and vulnerabilities that exist within their overall infrastructure. The Baldrige Criteria can also provide
…show more content…
I would relate this type of operation to that of an organized union, whereas employee involvement is only permitted off-site and limited to after normal hours of operation. This differs from world-class organizations based upon their utilization of internal senior leaders that function by a hands-on homeland security team. These senior leaders also “volunteer with citizen corps in the communities and deploy corporate security values among employees, customers, partners and suppliers” (Fisher, 2004). A zero-based organization does not take measures to ensure the safety and protection of their customer base or …show more content…
Their homeland security assessment includes an analysis of impending threats and the level of risk that may be associated with those threats. “They ensure key customer and vendor requirements and expectations are met regarding homeland security. This is involves performing annual surveys with federal, state, and local agencies to confirm that homeland security listening and learning methods for its customers are current with global standards. They also have quarterly meetings with their customers regarding updates and changes in order to strengthen the relationship with customers” (Fisher, 2004). A zero-based organization goes through no extra steps or precautions in safeguarding their customers. Their homeland security measures are generic and apply to all customers. These organizations take no part in annual surveys of any nature, and do not integrate changes into their homeland security plans to stay abreast with current methods in protecting their customers or meeting their requirements. Zero-based organizations provide no avenue for a customer to obtain homeland security information and have no set policies in place for addressing their
Homeland Security Presidential Directive 5 directly relates to the National Incident Management System and the National Response Framework. In fact, it directly correlates with their missions. HSPD-5 was the directive that needed to start things in motion; NIMS and the NRF are the aftermath of the directive. With the formation of NIMS and soon after the NRF, America can operate successfully under one national manage...
2) Maintain critical infrastructure centers (telegraph, bridges, hospitals) that provide a situational awareness capability, actionable information about emerging trends, imminent threats, and the status of any incidents that involve
Homeland Security. (2008, 12). National Incident Management System. Retrieved 10 22, 2011, from FEMA: http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf
The general topic for this literature review will be an examination of the Department of Defense and the National Guard in terms of Homeland Security. The areas of Homeland Defense and Civil Support will be primary subsections of Homeland Security which will be reviewed. For purposes of defining a time period none of the literature reviewed will be prior to September 11, 2001. The reasoning for this being to examine Homeland Defense using literature pertaining to 9/11 and the Boston Marathon Bombing, and Civil Support using literature pertaining to Hurricane Katrina.
Physical and environmental security programs are generally considered to be a collection of mechanisms and controls put into place that help ensure the availability of information technology capabilities. These programs protect an organization from fire, flood, theft, power failure, intentional, and even unintentional damage through negligence. Implementation of these programs at the organizational level can take place in a number of ways but most organizations choose to follow the application of a body of standards, usually set forth by an organization such as the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Once such body of standards put forth by ISO/IEC is 27002, Information technology – Security techniques – Code of practice for information secur...
Both man-made and natural disasters are often devastating, resource draining and disruptive. Having a basic plan ready for these types of disaster events is key to the success of executing and implementing, as well as assessing the aftermath. There are many different ways to create an emergency operations plan (EOP) to encompass a natural and/or man-made disaster, including following the six stage planning process, collection of information, and identification of threats and hazards. The most important aspect of the US emergency management system in preparing for, mitigating, and responding to man-made and natural disasters is the creation, implementation and assessment of a community’s EOP.
The goal of 2011 of the National Preparedness Goal, and a month later by the National Preparedness System (NPS). ‘Prepare’, or ‘preparedness’ is a key term here, as is ‘risk’. In order to properly examine the National Preparedness System these terms… (2011 National Preparedness Goal). The National Preparedness Goal can only work in risk management planning with prudency coupled with dispensation of resources at the local levels. Depending on the budgetary issues the financial appropriation might not be enough to sustain a carefully planned risk management. The forefront for the local authorities to mitigate against risk is funding. Of the pro at the community level are the loyalties of its employees of the local government and local community, and on hand resources that amplifies its footprint with the community in making sure that there is an uninterrupted continuation of life. The local government can device a well thought out plan to activate most of its resources when the alarms are sounded of a pending
This paper will briefly discuss the formation of the Department of Homeland Security (DHS). With every government program or agency comes an alphabet soup of acronyms and DHS is no different from the rest. To better understand the agency and concepts that comprise DHS, this paper will also examine acronyms associated with DHS. They are QHSR, HSE, NRF, NIMS, ICS, and UC. Each will get a description while highlighting and discussing core elements or requirements that each acronym calls for or offers.
However, some sources say that the DHS lead National Infrastructure Protection Plan (NIPP) falls well short because of not listening and not sharing information with critical infrastructure owner/operators. The NIPP document created by the DHS is for the government and is not a plan to improve resilience. The document is said to lack private sector information and most feel that the meetings with the government about the document were not heard. As for the information sharing part of the document there are shortcomings that do not enhance national level situational awareness. However, there are seven topics raised in the new document after its original creation four years ago. The first is to elevate security and resilience as the primary aim of CIP efforts. Second, expanding and updating critical infrastructure risk management. Third, focus on national priorities jointly determined by public and private sector. Fourth, integrate cyber and physical security. Fifth, affirm the reality that critical infrastructure security and resilience require international collaboration. Sixth, show continued progress to support execution of the plan at both national and community levels. Lastly, present a detailed Call to Action that includes steps the federal government will undertake to work with partners to make progress toward security and
I am considering the company I work for Lockheed Martin to develop a modified strategic plan that will focus on responding to the United States government's and Department of Defense's (DoD) new "Network Centricâ initiatives.
The Response Framework take an all hazards approach to preparedness, highlights key areas across five mission areas (Mitigation, Response, Recovery, Protection and Prevention) and addresses the whole community to optimize resources, therefore assisting and protecting the responders who have in the past been forgotten (National Response Framework, 2013). Responders that now work disaster sites can now rest a little easier, as there are teams and processes in place to help the identify threats and hazards to make response safer and easier. With the help of Homeland Security and other agencies, responders can now spot the signs of terrorism: surveillance, elicitation, test of security, funding acquiring of supplies, impersonation, rehearsal and deployment (Recognizing 8 Signs of Terrorism, 2012). Educating the responders is the only way improvements can be made to enhance their response ability and save lives. Terrorism will always be a threat to the United States, but with the re-education of our responders, terrorism will not be as deadly to the courageous men and women that will
Col. Randy Larson, renown author and Director of the Weapons of Mass Destruction (WMD) Center, speaks on an in-depth prospective of the field of homeland security and factors that drive the continued efforts to address future threats to the nation for the 21 century. The area of focus presented in the interview are the various ways an individual may enter the field but are not limited to a particular area of study. For example, health care, agriculture, or political science, there is essential no set track for finding a career in homeland security. Challenges surrounding area of homeland security are the mounting financial burdens and the need for the appointment of leadership at a national executive level to address this realistic future threat. Despite these concerns, evidence suggests quality system practices can assist in guiding theses area and the adoption of tools that support quality improvement when addressing homeland security and future concerns.
There is a lot of complexity in understanding risk management and its correlation to homeland security. Risk management is a way to approach the fact that securing the homeland is not certain and there are unknown variables in every aspect of life; risk management is a way to narrow down the focus based on quantifiable information determining probability against capability. Risk management plays and integral role in homeland security. Risk management is employed using a formula described in the NIPP for establishing a narrow scope to make the best decision about protecting infrastructure. The risk management formula lays down the foundation to make the most reasonable determination based on the potential consequences, vulnerability, and
Physical security cannot be wholly successful without the human factor element and the active support of these user groups. For example, when the aim is to protect a critical facility from attack or to provide access control for an office building it is necessary to engage people on the proper use of any security systems that are in place, for instance security alarms. If the alarm goes off and employees have no idea what it signifies
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.