3.6 Integrating organizational and national strategies

 < Day Day Up > 



IT managers will play a key role in determining the level and type of security needed for their organizations. Action Checklist Number 3 (see Table 3.1) shows the steps that IT managers, in conjunction with other departmental managers, should take to help integrate their organizations' security strategies with The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets.

Table 3.1: Action Checklist Number 3

Action Item

Status (e.g., Completed, Pending, or N/A)

Conduct a structured threat assessment to determine if the organization is a component of the critical national infrastructure.

 

Conduct a structured threat assessment to determine the level of dependency on components of the critical national infrastructure.

 

Conduct a structured threat assessment to determine the proximity of the organization's facilities to facilities or structures that are components of the critical national infrastructure.

 

Initiate a security-improvement process.

 

Establish an internal organization process to monitor technology development, standards for technology use, and technologies that have been tested and proven effective.

 

The next chapter focuses on information sharing that can occur between federal, state, local, and private entities to improve homeland security.



 < Day Day Up > 



Implementing Homeland Security for Enterprise IT
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net