Our Roles and Responsibilities to Homeland Security
The Kellogg’s Company has two sets of responsibilities to Homeland Security objectives, as we fill two roles in the Food and Agriculture. First, as a part the Food and Agriculture Sector, we are compliant with industry responsibilities as assigned by HSPD-7; ensuring asset protection, conducting vulnerability and risk reduction, and staffing a reliable continuity of operations (COOP) plan. Second, as a Sector Coordination Council member, we are compliant with the responsibilities defined in the governing charter; detecting potential threats to the food supply, assessing threat information, and providing timely warnings to our partners / developing implementing countermeasures (DHS SCC , 5-6).
The Steps We Take to Ensure Full Coverage of HLS Expectations
The Kellogg’s Company is committed to the improvement of the Food and Agriculture Sector security through full compliance to the concepts of HSPD-7, by being a member of the SCC, and through giving monetary contribution to the advancement of the sector’s programs.
To protect our assets, as outlined for the food and agriculture industry in HSPD-7, we have in...
... middle of paper ...
...ieve it is time to hold another working group and consider incorporating new partners into the Food and Agriculture Sector Coordinating Council.
In conclusion, The Kellogg’s Company is committed to the security of the Food and Agriculture Sector through being an industry leader in HSPD-7 compliance efforts, membership of the Food and Agriculture Sector Coordinating council, our personal business practices, and through monetary and intellectual contribution to the betterment of security in our sector. Again, we believe the contents of this document to be protected by the Protected Critical Infrastructure Information (PCII) rules. Should you find any information that is not protected by PCII, please inform us immediately. We hope that this report satisfies your inquiry and look forward to our continued partnership with the Department of Homeland Security.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Information Technology (IT) managers are constantly tasked with evaluating their organization’s overall security posture and reporting the greatest vulnerabilities to leadership. Senior management is often surprised to hear that the greatest vulnerability within an organization is not a misconfigured firewall or a virus being forwarded across an internal e-mail server, but rather a human being. When compared to a piece of hardware or software, a human user is easily the single most targeted weakness within an organization.... [tags: Computer and Information Security]
2352 words (6.7 pages)
- Final Exam Essay 3 The C&A process should be relatively easy to understand, be consistent in its application, and be applied continuously in its implementation. First, certification is the comprehensive assessment of the technical and nontechnical security features and other safeguards of a system that are associated with its use to establish the extent to which an information system meets a set of minimum security requirements. The Certification Phase of the C&A process includes a system analysis to identify weaknesses in the operation of the system, as well as an analysis of the potential vulnerabilities of these weaknesses.... [tags: Risk, Security, Computer security, Vulnerability]
994 words (2.8 pages)
- Why do we need management’s support for information security. Doesn’t IT own information security. The technical side is important, but management’s role cannot be overlooked. Thornton states that management has to drive information security. Why does management need to drive this policy. The management team is legally responsible for any breaches that occur. Plus, senior management has a fiduciary responsibility to the company’s assets. Our management can provide the necessary resources, including finances and personnel, needed to implement policy.... [tags: Information Security Essays]
2590 words (7.4 pages)
- IT Security Policy Framework The NIST Cybersecurity Framework is a set of voluntary standards, guidelines, and practices. Small and medium size businesses benefit the most from using the NIST (SP 800-53) security framework. Much like larger size businesses, small and medium businesses normally house sensitive personal data, and proprietary and financial information. This means they are increasingly becoming targets for cyber criminals who recognize that smaller businesses may be easier to penetrate as they may lack the institutional knowledge and resources that larger companies have to protect their information.... [tags: Security, Computer security, Risk management]
1190 words (3.4 pages)
- This project has ignited many plans and visions in me to improve my community development responsibility. I believe our communities are often faced with unprecedented challenges that need solutions; which often lies in the hands of same inhabitant of the community. I believe this class has opened my eyes to see what I can do to join our government in leading our community towards a productive and positive direction. In our community, we have had to deal with various social problems that has threatened our wellbeing as humans and most especially the children.... [tags: Leadership, Situational leadership theory]
795 words (2.3 pages)
- Customers are the end users of a company’s goods and services (1). They are possibly the largest stakeholder group that can be greatly affected by corporate social irresponsibility. They depend on businesses to meet their expectations, and businesses depend on them to bring them revenue. When customers place a value on a company’s goods and services, they trust that the business will give them what they are paying for. If the company does not perform to customers’ expectations, they will place a reputation on the company, and possibly spread that reputation amongst other customers of that same company.... [tags: Social Responsibility Essays]
1014 words (2.9 pages)
- The system development life cycle, also know as the SDLC, is the process of designing and developing a system or software to meet certain requirements. (“System development life,”). This cycle involves many different phases, in which the system is planned, analyzed, designed, implemented, and tested. There are five major phases in the system development life cycle: systems planning, systems analysis, systems design, systems implementation, and systems security and support. Each of these phases has a particular responsibility and certain tasks are perfumed in each phase.... [tags: SDLC, software, system security, IT]
1089 words (3.1 pages)
- The Effectiveness of International Aid in the Development Process If an individual was having trouble in some way, wouldn’t one’s natural instinct be to help him or her out. This does not merely apply to persons, but also on a larger basis. All over the world, countries are suffering from many problems. The majority of these sufferers are ELDCs (Economically Less Developed Countries). Whether their crises may involve starvation or refugees, these nations struggle for an economical or social stability.... [tags: Papers]
1440 words (4.1 pages)
- Organizations realize that it is important to attract highly skilled and qualified employees, because these employees are a necessary component of the competitive advantage that organizations want to achieve (Greening & Turban, 2000). Corporate Social Responsible actions of an organization can be a manner to attract highly skilled and qualified employees, because prior research assumes that organization’s CSR activities comprise a legitimate and compelling way to attract them (Bhattacharya et al., 2008).... [tags: Business Management ]
1314 words (3.8 pages)
- Initiation Phase A new year has begun and all the up-to-date models of cars have been released. The question arises whether to upgrade a current car or buy a brand new model. Things to consider are improvements upon the current car or buy a new car for the enhancements and expected performance. The initiation phase of the United States Department of Justice (DoJ) System Development Life Cycle (SDLC) is similar to this situation. Management of a business or organization determines that it is necessary to enhance a business process through the application of the computer system or information technology.... [tags: Project Planning Development]
1074 words (3.1 pages)
- Comparison Between Keats And Anthem For Doomed Youth By Wilfred Owen
- United Healthcare And Healthcare Care
- Quixote De La Mancha Don Quixote
- The Negative Impacts Of Meeting With Employees That Can Not See A Positive Foundation Within The Organization
- Islam : The Second Largest Religion
- Recognition Strategy For Its Improved Performance