| < Day Day Up > |
|
IT managers will play a key role in determining the level and type of security needed for their organizations. Action Checklist Number 3 (see Table 3.1) shows the steps that IT managers, in conjunction with other departmental managers, should take to help integrate their organizations' security strategies with The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets.
Action Item | Status (e.g., Completed, Pending, or N/A) |
---|---|
Conduct a structured threat assessment to determine if the organization is a component of the critical national infrastructure. | |
Conduct a structured threat assessment to determine the level of dependency on components of the critical national infrastructure. | |
Conduct a structured threat assessment to determine the proximity of the organization's facilities to facilities or structures that are components of the critical national infrastructure. | |
Initiate a security-improvement process. | |
Establish an internal organization process to monitor technology development, standards for technology use, and technologies that have been tested and proven effective. |
The next chapter focuses on information sharing that can occur between federal, state, local, and private entities to improve homeland security.
| < Day Day Up > |
|