Risk Management is the process that a company goes through to define organizational assets, threats and vulnerabilities and devise ways to protect them. According to Roper, the importance of risk management as a single function, for an organization is becoming more and more understood within the upper levels of business management (Roper, 1999). Additionally, CEO’s, COO’s and CFO’s worldwide know that every decision will have pros and cons that will carry some degree of risk (“Risk Management”, n.d.).
When looking at the process of undertaking a homeland assessment for an organization each stage, it just as critical as the others and each interlock with the other to produce a stable plan of actions for the organization (Masses, O”Neil, & Rollins, 2007). The stage of the leadership evaluating their needs for a homeland security plan by the utilization of the organizational overview to determine is just as relevant to looking at their outside relationships to vendors, buyers, and suppliers for the organization that takes place in the eight steps for successful assessment implementation and manual use (Fisher, 2004). We see in these eight actions that they are also just as essential elements that must be evaluated and hold the same amount of weight in the assessment process. The leadership assessment score, is from the Baldrige Categories, shows us that it results are just as vital as that of the customer and market focus as well as the business results that are produced from the
Risk management would help to identify and then manage threats that could severely impact or bring down the organization. "This could be done by reviewing operations of the organization, identifying potential threats to the organization and the likelihood of their occurrence, and then taking appropriate actions to address the most likely threats" (McNamara, C., 1999).
Bullock, J., Haddow, G., Coppola, D. (2013). Introduction to Homeland Security Principles of all-hazards risk management (4th ed)
Due to the limited resources of the Secret Services, the assistance by the state level officials in risk management is to identify the risks and threats, prioritize them, and direct the federal, state, and local resources to act to minimize the likelihood of their occurrence and mitigate their consequences (Steiner, 2009). This process enables the stat leader to prioritize mitigation steps that can be taken based on the potential occurrence of risk and the economic and political capital available to such action (Steiner, 2009). Responses to risks such as Mark’s threats could fall in the major categories of prevention, protection, and response. In this intelligence is used to understand the threat as part of the risk-management process in which both current intelligence and longer term threat analysis are required to plan for management to make executive decisions and actions before such a crisis
Security risk management is “the culture, processes and structures that are directed towards maximizing benefits and minimizing disbenefits in security, consistent with achieving business objectives”. (Australia, 2006) And where security is defined as: “the preparedness, protection and preservation of people, property and information both tangible and intangible”(Australia, 2006). Although Brooks (2009) claims that security cannot easily be defined, this text will consider the above definitions from the Handbook of Security Risk Management from Australian and New Zealand standards as true. If this definition is true, what can prevent an organisation from achieving its objectives? One answer might be the effects of risks. How is risk defined?
You are a member of a Homeland Security Task Force. You unit’s assignment is to investigate terrorist activities on U.S. soil. Your unit receives information that a terrorist cell has been activated in a major metropolitan city. However, the location and details of their mission is unknown. Subsequent to the alert, a local police department in your jurisdiction has apprehended a potential suspect on unrelated charges. The arrest was made at an abandoned warehouse that contained one laptop computer. Based on information revealed in the interrogation, it is believed the location, mission, and identities of the terrorist cell are contained in the laptop. Complete the following tasks:
“The Department of Homeland Security would lead the federal government’s efforts in preparing for and
Sam Freeman Jr
Introduction to Homeland Security (CJUS254-1504A-02)
Professor Stephen Smith
Unit 3- Individual Project
October 26, 2015
To: Chief of Staff for Homeland Security
From: Special Agent Sam Freeman (ICE)
Subject: Information Paper on Homeland Security
Sir/Ma’am in recent discussions you advised me to conduct some research on Homeland Security agencies that possibly could overlap within the departments and determine which areas could be consolidated?
a) ISIS involvement in homeland attack activity will probably continue as disgruntled underground extremists draw inspiration from ISIS's global appeal.
b) Homeland “lone wolf” attacks could motivate others to replicate opportunistic attacks with little or no warning, diminishing our ability to detect terrorist operational planning and readiness.