How To Write A Book On Risk Management
|
|
- Meredith Wells
- 3 years ago
- Views:
Transcription
1 National Center for Risk and Economic Analysis of Terrorism Events CREATE FY2015 (Year 11) Call for White Papers CREATE, the DHS-sponsored Center of Excellence at the University of Southern California, seeks 2-3 page White Papers (WP) on research projects in risk analysis, economics assessment, and operations research in risk management. Awards of up to $100,000 per award are expected. The anticipated period of performance is FY15: 7/1/14 to 6/30/15. White Papers must conform to the format provided below, and are due by 5pm PST October 15, 2013 to CREATE s mission is to use research, education and outreach to help the nation deter, prevent and mitigate attacks and provide resilience. CREATE s mission now includes cyber threats and greater examination of natural disasters and major accidents. CREATE seeks innovative projects with high potential for research transition of results to homeland security practitioners. Proposed research projects must address one of the four interrelated themes described below. Preferred projects will use and expand direct liaisons with homeland security agencies and user groups. A project s ultimate success will be the creation of research results and intellectual products that help the homeland security enterprise effectively and efficiently improve the nation s security. Proposers are referred to the CREATE website, for current and past projects so as to make their submissions as relevant, complementary, and integrated as possible. Some examples and suggestions are contained in the sections below. 1. Risk Analysis - Management of Risks from Intelligent, Adaptive Adversaries: extend game theory, risk analysis, terrorist preference modeling and decision analysis to account for the strategic nature of terrorist decision-making with regard to countermeasures; the integration of intelligence and data mining (including big data and social networks); explore cyber terrorism economic impact. e.g., describe clear transition paths and alignment between adaptive adversary models and specific risk models that support DHS components. 2. Risk Perception and Communication: examine the dynamics of public response, behavioral effects, societal amplification of consequences, and risk and crisis communication in reducing the transmission and consequences of fear and other indirect impacts of terrorism, both preceding and after events. e.g., examine risk message/inoculation impact for a range of TSA scenarios/threat vectors, examine behavioral economic impacts of near-miss events with/without risk messaging, conduct public and decision-maker risk perception surveys and impact of inoculation messages. e.g., improved communication of risk analysis and associated recommendations to Congress, DHS Senior Leadership and the public is increasingly important given heightened budget pressures and reliance on partnerships with the private sector and citizens to help identify, prepare for and recover from homeland security threats and hazards a white paper on this topic should review the state of the art and practice in the private sector and across the US government in communication of analysis, as it might apply to key topics for the homeland security enterprise. This review could begin by interviewing selected DHS representatives (as identified by DHS leadership) to identify the key topics that will be the focal point of the effort. The review should evaluate state of the art methods of risk communication. The results should include specific recommendations for improving the effectiveness of communications for each topic. 1
2 National Center for Risk and Economic Analysis of Terrorism Events 3. Economic Consequences and Costs: develop tools to assess consequences of terrorism, natural disasters and major accidents, especially their direct and indirect economic impacts, explore options for building resilience and business continuity, measuring non-market valuations, and the use of behavioral economics to examine the impact of how individuals respond to threats and hazards, including the role for alternative risk mitigation and resilience strategies. e.g., conduct multi-disciplinary research (economics/computer scientists) to yield computational advances in high performance computing for economic analytic applications. Develop CGE models that permit fast and scalable consequence estimates for a wider variety of scenarios. DHS is interested in CGE models that are designed to run over a variety of parameter spaces, generate the associated space of CGE output estimates and able to generate distributions of CGE outcomes, which could then be resampled for other risk modeling needs, or used to generate reduced form estimating equations. e.g., DHS makes decisions for a broad portfolio of threats and hazards that pose diverse combinations of varied consequences, including fatalities, illnesses/injuries, direct and indirect economic impacts, social impacts, psychological impacts, environmental impacts, human rights impacts, confidence in government, and more. DHS routinely estimates fatalities, illnesses/injuries and economic impacts, but has varying time frames for consequences (e.g., immediate to 72-hours post event, 1-year post event, 5-year post event). The remaining impacts are typically far more difficult to quantify, let alone systematically analyze - a primary focus of this WP should be on trading off fatalities, illnesses/injuries, and economic impacts. DHS is requesting: 1) review the state of the art and literature from a wide variety of risk related disciplines including classical risk analysis, decision sciences, enterprise risk management, strategic management, etc. 2) review practice across the US government and other international governments, and 3) summarize the review. Based on this review, make recommendations for how to appropriately trade off these consequences consistently, comparably, and transparently for the threats and hazards addressed in the homeland security mission space, and provide support for these recommendations. For example, if the value of a statistical life (VSL) is appropriate to consider for DHS, what should that VSL be, does it differ across threats or hazards (e.g., terrorist attack versus hurricane), and why. As a second example, are there documented ranges of willingness to pay to avoid values for various types of events in the DHS mission space? Ideally, the values can be used in regulatory economic analyses. A secondary focus of this white paper should be on reviewing the state of the art and literature, as well as the practice across the US government and other international governments, in estimating and considering the remaining consequences (environmental, psychological, social, etc.). Based on this review, offer recommendations for making progress in both estimating and considering these additional consequence types. 4. Operations Research in Risk Management: investigate and apply new analytical approaches to assess the benefits of risk management programs across all hazards, threats and target domains and inform policy decisions; use complex system analysis to examine the effect of feedback mechanisms, such as the adaptive adversary and deterrence effects, etc. 2
3 National Center for Risk and Economic Analysis of Terrorism Events e.g., develop tools that permit dynamic elicitation and capture of decision maker values / risk preferences and implications for integrating into Enterprise Risk Models, develop peerreviewed standards for consequence measurement scales. A panel of internal reviewers and CREATE s Federal Coordinating Committee (FCC) will evaluate all WP projects. Projects deemed suitable will be notified by October 31, 2013 and invited to submit 5-page Extended White Papers due November 30, Selected Extended White Papers will be invited to be presented to CREATE s Scientific Advisory Committee (SAC) on January 23, Successful Extended White Papers will be notified by February 15 and invited to submit Full Proposals by February 28. Instructions for the Extended White Papers and the Full Proposals will be included with the invitations. Formal proposals are not requested at this time, as only selected Extended White Papers will be invited to submit Full Proposals. There will be no extensions and no exceptions to this schedule. The criteria for evaluation during all stages of the application process are: 1. Relevance to CREATE and DHS missions (25%) 2. Scientific quality of research (25%) 3. Feasibility and transition potential (25%) 4. Appropriateness of budget (15%), and 5. Qualifications of investigators (10%). CREATE will review the Full Proposals for completeness and budgetary feasibility, and recommend a funding rank order based on COE mission relevance. CREATE will forward the ranked full proposals to DHS which will evaluate the proposals based on DHS mission relevance and availability of funds and make the final decision. Calendar October 15, 2013 October 31 November 30 December 31 3-page White Papers Due at CREATE@usc.edu Invitations to submit 5-page Extended White Papers 5-page EWPs Due at CREATE@usc.edu Invitations to present EWPs to SAC January 23-24, 2014 SAC presentations February 15 February 28 Invitations to submit Full Proposals, including SOW, budget and institutional letter of commitment (subcontractors) Full Proposals Due at CREATE@usc.edu 3
4 CREATE White Paper Format (Example) Project Title (Risk-Based Allocation of BioSecurity Resources) 1-2 sentence summary description (e.g., This project will develop methods for using the output of threat assessment models to optimally allocate resources to counter bioterrorism.) Project Technical Description (items 1 through 13 not to exceed 3 pages, exclusive of bios) Keywords: Bioterrorism, budgeting, risk modeling, mathematical programming 1. Theme Area: Identify applicable theme 2. Principal Investigator: Your Name 3. Institution: Your Institution 4. Co-Investigators: Other contributors names and institutions. 5. Brief Description: (1-paragraph description) The purpose of this research is to improve methods for risk-based allocation of resources to counterterrorism measures. This work Representative Figure builds on efforts to develop threat assessments for such areas as biological weapons attacks by using those threat assessments as inputs to models designed to help DHS optimally allocate investments intended to counter bioterrorism. In addition, we will address the problem of allocating state grants for emergency responders. The purpose of this work is to provide sound analytical guidance to decision makers regarding the most effective way to obtain maximum impact from a given funding level. 6. Objectives: (Clear expression of purpose and goals.) This research will: (a) develop one or more comprehensive methodologies for risk-based resource allocation among discrete counterterrorism measures; (b) perform feasibility testing of these methods through application to actual data on bioterrorism threat reduction measures; (c) develop one or more comprehensive methodologies for allocation funding where the decisions are selection of continuous funding levels rather than discrete counter measures; (d) perform feasibility testing of these methods through application to the problem of allocating state grants for emergency responders; (e) summarize and evaluate the conceptual and practical soundness of alternative risk-based resource allocation strategies, including comparing the methods developed to allocations developed by other methods and approaches. 7. Interfaces to CREATE Projects: (How will your project integrate with other Center projects). This work will maintain a close interface with CREATE s PortSec risk analysis and economics project in evaluating the security resource allocations. 8. Previous or current work relevant to the proposed project. We are working with the Infrastructure Protection division of the DHS to use their RAMCAP methodology for prioritizing risks, and with the California Office of Homeland Security to implement a pilot study to prioritize California sites in terms of risks and risk reductions. We also plan to collaborate with Lawrence Livermore National Laboratories HOPS program to provide risk assessments. 4
5 CREATE White Paper Format (Example) 9. Major Products and Customers: (What are the major products of this effort, and who are the primary clients that are interested in the results.) Project deliverables will consist of a report that will: (a) develop one or more comprehensive methodologies for risk-based resource allocation among discrete counterterrorism measures; (b) perform feasibility testing of these methods through application to actual data on bioterrorism threat reduction measures; and (c) develop one or more comprehensive methodologies for allocation funding where the decisions are selection of continuous funding levels rather than discrete counter measures. Customers: DHS IP; DHS ORD; California OHS Products will include: Risk assessment methodology for prioritizing projects and programs and to gauge the cost/effectiveness of investments in risk reductions; research publications and reports. 10. Technical Approach: (Describe technical approach to achieve research objectives.) The methods developed will build on previous research on decision analysis methods for resource allocation and the use of mathematical programming for optimal resource allocation. Consequence assessment models and risk reduction assessments will be based on a mix of methodologies including probabilistic risk analysis, economic analysis, and qualitative assessments by experts, as appropriate. Methods for combining these assessments will be grounded in the theory and methods of multiattribute utility and value models. The overall resource allocation framework uses mathematical programming including linear, nonlinear, and integer programming. (continue, expand as necessary, within page limit guidelines) 11. References: 12. Major Milestones and Dates: (Key progress management steps and schedule) 1. Develop risk and consequence measures to reflect the impact of terrorism events and a multidimensional risk index that combines these diverse risk and consequence measures based on policy makers judgments about the relative severity of consequences -- March Incorporate the risk reduction measures into a risk allocation model that takes into account both the effectiveness of various alternatives and their cost -- June Conduct case study for bioterrorism risk reduction -- August Explore extensions of model to account for continuous expenditure levels -- September Budget: (1-2 paragraph narrative to accompany project cost). This one-year project will be conducted for $50,000. This will cover one month of salary for the PI and one graduate assistant. The budget would allow for one trip to attend a meeting at USC, one trip to DC, and one trip to a conference to present results. The budget would also allow for a limited materials and supply budget for project-related expenses. 14. Brief Bios (PI and up to two Co-PI s): One page maximum for each PI and each Co-PI. 5
6 Current CREATE Project Progress Report Additional Requirement for Currently Funded CREATE Projects (Not Counted in Page Count Limit Described Above) Please provide a 2-3 page Progress Report for your project according to the format below. Title of Your Project, PI s Name 1. Research Accomplishments [Summarize research results in 1-2 paragraphs. If you have multiple sub-projects, please provide 1-2 paragraphs for each sub-project] 2. Applied Relevance [Summarize applied relevance (utility to DHS or other government agencies) of each sub-project paragraphs per sub-project] 3. Collaborative Projects [Describe any collaborations with other CREATE projects, collaborative projects with other DHS Centers of Excellence, Minority Serving Institutions, local law enforcement, other NSF grants, etc. -- not more than 1-2 paragraphs] 4. Research Products [List a) publications, b) presentations, and, c) software tools, models and products developed during the reporting period.] 5. Transition Products [List all research transitioned to user community during the reporting period, identify who is using it, and describe how it is being used.] 6. Education and Outreach Products [Number of students supported and students involved in projects, list conferences sponsored or co-sponsored, list participation in committee work, identify substantive contacts with DHS and other Federal agencies, meetings with government entities and non-create organizations, etc.] 7. Current Expenditures [How are your expenditures coming along? Are you on schedule to completely use your budget by 9/30/2013?] 6
Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach
Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach Executing a Critical Infrastructure Risk Management Approach Risk is defined as the potential for an unwanted outcome resulting
More informationThe Strategic Importance, Causes and Consequences of Terrorism
The Strategic Importance, Causes and Consequences of Terrorism How Terrorism Research Can Inform Policy Responses Todd Stewart, Ph.D. Major General, United States Air Force (Retired) Director, Program
More informationI N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216 A Consistent Approach for Security Risk Assessments of Dams and Related Critical Infrastructure J. Darrell Morgeson Jason A. Dechant Yev Kirpichevsky
More informationWater Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary
More informationRelationship to National Response Plan Emergency Support Function (ESF)/Annex
RISK MANAGEMENT Capability Definition Risk Management is defined by the Government Accountability Office (GAO) as A continuous process of managing through a series of mitigating actions that permeate an
More informationTEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
More informationPROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM Don Dickinson Phoenix Contact USA P.O. Box 4100 Harrisburg, PA 17111 ABSTRACT Presidential Executive Order 13636 Improving
More informationTESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August
More informationSTANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices
A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards
More informationState Homeland Security Strategy (2012)
Section 1 > Introduction Purpose The purpose of the State Homeland Security Strategy (SHSS) is to identify statewide whole community priorities to achieve and sustain a strengthened ability to prevent,
More informationAcademic Program Assessment Plan Certificate: Homeland Security Studies
Academic Program Assessment Plan Certificate: Homeland Security Studies Department of History and Political Science College of Humanities and Social Sciences Colorado State University-Pueblo Plan appended
More informationEstablishing A Secure & Resilient Water Sector. Overview. Legislative Drivers
Establishing A Secure & Resilient Water Sector December 14-15, 2010 LWQTC Overview Key Drivers Legislation Presidential Directives AWWA & Sector Initiatives Standards & Guidance Mutual Aid & Assistance
More informationDHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
More informationThreat and Hazard Identification and Risk Assessment
Threat and Hazard Identification and Risk Assessment Background/Overview and Process Briefing Homeland Security Preparedness Technical Assistance Program May 2012 PPD-8 Background A linking together of
More informationTESTIMONY. Analyzing Terrorism Risk HENRY WILLIS CT-252. November 2005
TESTIMONY Analyzing Terrorism Risk HENRY WILLIS CT-252 November 2005 Testimony presented before the House Homeland Security Committee, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
More informationRISK AND RESILIENCE $58,000,000 +$38,000,000 / 190.0%
RISK AND RESILIENCE $58,000,000 +$38,000,000 / 190.0% Overview The economic competiveness and societal well-being of the United States depend on the affordability, availability, quality, and reliability
More informationSubject: National Preparedness
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-8 Subject: National Preparedness Purpose (1) This directive establishes
More informationFlooding Emergency Response Exercise
Flooding Emergency Response Exercise James Woodward, Senior Exercise Planner California Emergency Management Agency 3650 Schriever Ave. Mather, CA 95655 Cell: (916) 439-3546 Email: james.woodward@calema.ca.gov
More informationDepartment of Homeland Security
11 Department of Homeland Security Jodi Lieberman American Physical Society HIGHLIGHTS The FY 2015 Department of Homeland Security (DHS) Science and Technology Directorate (S&T) request totals $1.1 billion,
More informationHomeland Security R&D Roadmapping Risk-based Methodological Options
SANDIA REPORT SAND2008-7828 Unclassified Unlimited Release Distributed December 2008 Homeland Security R&D Roadmapping Risk-based Methodological Options Larry D. Brandt Prepared by Sandia National Laboratories
More informationConstructing Urban Vulnerability Index for Major U.S. Cities
CREATE Research Archive Research Project Summaries 2009 Constructing Urban Vulnerability Index for Major U.S. Cities Haydar Kurban Howard University, HKURBAN@HOWARD.EDU Mika Kato Howard University, mkato@howard.edu
More informationRisk Steering Committee. DHS Risk Lexicon. September 2008. Homeland Security
Risk Steering Committee DHS Risk Lexicon September 2008 Homeland Security This document is presented on behalf of the Department of Homeland Security Risk Steering Committee, chaired by the Under Secretary
More informationWMD Terrorism Risk Assessment in the Department of Homeland Security. Why Risk Assessment? Probabilistic Risk Assessment
WMD Terrorism Risk Assessment in the Department of Homeland Security Why Risk Assessment? Joint U.S. EPA and DHS Conference On Real-World Applications and Solutions for Microbial Risk Assessment Steve
More informationFlyntGroup.com. Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk
Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk 2012 The Flynt Group, Inc., All Rights Reserved FlyntGroup.com Enterprise Risk Management and Business
More informationTerrorist Protection Planning Using a Relative Risk Reduction Approach*
BNL-71383-2003-CP Terrorist Protection Planning Using a Relative Risk Reduction Approach* Session VIII: Technology Forum Focus Groups Dr. Joseph P. Indusi Nonproliferation and National Security Department
More informationTable of Contents PERFORMANCE REVIEWS STRATEGIC REVIEWS
SECTION 270 PERFORMANCE AND STRATEGIC REVIEWS Table of Contents 270.1 To which agencies does this section apply? 270.2 What is the purpose of this section? PERFORMANCE REVIEWS 270.3 What is the purpose
More informationPART I. NOMINATOR PART II. SHORT ANSWERS
PART I. NOMINATOR First Name: David Last Name: Reese Organization: DHS, Office of Safety and Environmental Programs Project Title: [None Submitted] Submitted by: Federal Agency Date Received: 06/15/2011
More informationWhich cybersecurity standard is most relevant for a water utility?
Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:
More informationOverview of Homeland Security Funding. Paul Van Lenten, Jr. House Appropriations Committee November 13, 2006
Overview of Homeland Security Funding Paul Van Lenten, Jr. House Appropriations Committee November 13, 2006 Presentation Outline Overview of Federal Homeland Security Programs State Role in Homeland Security
More informationMethods for Assessing Vulnerability of Critical Infrastructure
March 2010 Methods for Assessing Vulnerability of Critical Infrastructure Project Leads Eric Solano, PhD, PE, RTI International Statement of Problem Several events in the recent past, including the attacks
More informationMSE 6201, Homeland Security Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.
MSE 6201, Homeland Security Course Syllabus Course Description Comprehensive examination of homeland security, terrorism, domestic security, emergency preparedness, and border and transportation security.
More informationTable of Contents ESF-12-1 034-00-13
Table of Contents Primary Coordinating Agency... 2 Local Supporting Agencies... 2 State, Regional, and Federal Agencies and Organizations... 2 Purpose... 3 Situations and Assumptions... 4 Direction and
More informationH. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
More informationProgram Overview. BOSC Homeland Security Subcommittee Meeting August 25, 2015
1 Program Overview BOSC Homeland Security Subcommittee Meeting August 25, 2015 2 Tuesday, August 25 8:00 Welcome Mr. Thomas Tracy, Designated Federal Official 8:15 Introductions and Review of Charge Questions
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationDuring the Clinton administration, the
8 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129, PAGES 8-12, OCTOBER 2004 Assessing the Vulnerabilities of U.S. Drinking Water Systems Jeffrey J. Danneels and Ray E. Finley Sandia National Laboratories
More informationOVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak
March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland
More informationYampolskiy, Analysis of Cyber Infrastructure Authentication Failure Vulnerabilities to Inform Security Decisions
CREATE FY2016 Statement of Work Yampolskiy, Analysis of Cyber Infrastructure Authentication Failure Vulnerabilities to Inform Security Decisions In this project, we develop and apply a model for estimating
More informationNational Infrastructure Protection Center
National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities
More informationSection VI Principles of Laboratory Biosecurity
Section VI Principles of Laboratory Biosecurity Since the publication of the 4th edition of BMBL in 1999, significant events have brought national and international scrutiny to the area of laboratory security.
More informationTransportation Security Administration Enterprise Risk Management. ERM Policy Manual. August 2014
Transportation Security Administration Enterprise Risk Management ERM Policy Manual August 2014 1 Contents Abbreviations...4 Introduction...5 Purpose of this document...6 ERM Objective...7 Enterprise Risk
More informationOhio Homeland Security Strategic Plan 2013-2016
GOAL 1 Strengthen Ohio s intelligence and information sharing system for the detection and prevention of threats to public safety. Objective 1.1 Support continued development of the information sharing
More informationDEPARTMENT OF HOMELAND SECURITY
DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $39.5 billion, a decrease of 0.5 percent or $191 million, below the 2012 enacted level. The Budget continues strong investments in core homeland
More informationThe Cost-Benefit Analysis of Terrorism Security
CREATE Research Archive Research Project Summaries 2008 Cost and Benefits of Eit Monitoring Programs Henry H. Willis hwillis@rand.org Follow this and additional works at: http://research.create.usc.edu/project_summaries
More informationENTERPRISE RISK MANAGEMENT FRAMEWORK
ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...
More informationProject Management Guidelines
Project Management Guidelines Overview Section 86-1506 (5) directs the NITC to adopt guidelines regarding project planning and management. The goal of project management is to achieve the objectives of
More informationNo. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
More informationJay Grant AAPA Federal Lobbyist Director, Port Security Council
AAPA Security & Safety Seminar Jay Grant AAPA Federal Lobbyist Director, Port Security Council July 28, 2005 Port Security Council A legislative coalition established to serve as a single voice for the
More informationSecurity Vulnerability Assessment
Security Vulnerability Assessment Deter, Detect, Delay, Respond the elements for minimizing your operational risk. A detailed SVA assists you to understand how best to do so. Security Vulnerability Assessment
More informationOverview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements
Overview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements Jim Weldin Delaware League of Local Governments 1 Homeland Security Grant Funding
More informationGAO QUADRENNIAL HOMELAND SECURITY REVIEW. Enhanced Stakeholder Consultation and Use of Risk Information Could Strengthen Future Reviews
GAO United States Government Accountability Office Report to Congressional Requesters September 2011 QUADRENNIAL HOMELAND SECURITY REVIEW Enhanced Stakeholder Consultation and Use of Risk Information Could
More informationv. 03/03/2015 Page ii
The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course
More informationInfrastructure Protection Gateway
Infrastructure Protection Gateway Our Nation s critical infrastructure is essential to sustaining our security, the economy, and the American way of life. The Department of Homeland Security (DHS), National
More informationObservations on OMB s Proposed Risk Assessment Bulletin. Reflections on Terrorism Risk and Homeland Security
Observations on OMB s Proposed Risk Assessment Bulletin Reflections on Terrorism Risk and Homeland Security Dr L James Valverde, Jr Director, Economics and Risk Management Insurance Information Institute
More informationDEPARMTMENT OF HOMELAND SECURITY AUTHORIZATION BILL FOR FY 2008 AND FY 2009 SECTION-BY-SECTION
DEPARMTMENT OF HOMELAND SECURITY AUTHORIZATION BILL FOR FY 2008 AND FY 2009 SECTION-BY-SECTION TITLE I: AUTHORIZATION OF APPROPRIATIONS Sec. 101. Authorization of Appropriations. This section authorizes
More informationArizona Department of Homeland Security
Arizona Department of Homeland Security Arizona Integrated Planning System (AZIPS) Five-Year Strategic Plan 2013-2018 SEPTEMBER 2012 MISSION STATEMENT The mission of the Arizona Department of Homeland
More informationEducation & Training Plan. Texas A&M International University (TAMIU)
Office of Continuing Education 5201 University Boulevard Laredo, TX 78041 http://www.tamiu.edu/ce Contact: Jacqueline H. Arguidegui 956.326.3068 ce@tamiu.edu Education & Training Plan Texas A&M International
More informationTHE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
More informationHOMELAND SECURITY INTERNET SOURCES
I&S Internet Sources I&S HOMELAND SECURITY INTERNET SOURCES USEFUL SITES, PORTALS AND FORUMS Homeland Security Home Page http://www.whitehouse.gov/homeland/ A federal agency whose primary mission is to
More informationPreparing for the Convergence of Risk Management & Business Continuity
Preparing for the Convergence of Risk Management & Business Continuity Disaster Recovery Journal Webinar Series September 5, 2012 2012 Strategic BCP, Inc. All rights reserved. strategicbcp.com 1 Today
More informationINTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT PLAN (ISSM)
LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT PLAN (ISSM) Environment, Health and Safety Division Ernest Orlando Lawrence Berkeley National Laboratory University of California Berkeley, CA
More informationOffice of Professional & Continuing Education 301 OD Smith Hall Auburn, AL 36849 http://www.auburn.edu/mycaa Contact: Shavon Williams 334-844-3108
Student Full Name: Office of Professional & Continuing Education 301 OD Smith Hall Auburn, AL 36849 http://www.auburn.edu/mycaa Contact: Shavon Williams 334-844-3108 Auburn University is an equal opportunity
More informationBusiness Continuity Management Systems. Protecting for tomorrow by building resilience today
Business Continuity Management Systems Protecting for tomorrow by building resilience today Vital statistics 31% 40% of UK businesses have been affected by bad weather related transport problems, power
More informationFaculty member completing template Isaac Ghansah, Director of Center for Information Assurance
Program Minor in Information Security and Computer Forensics Department _Computer Science Number of students enrolled in the program in Fall, 2011 14 Faculty member completing template Isaac Ghansah, Director
More informationBUSINESS CONTINUITY PLANNING
Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,
More informationCYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering, and Education (CIF21) investment
More informationREPORT TO CONGRESS ON THE IMPLEMENTATION OF THE FY 2003 INTEROPERABLE COMMUNICATIONS EQUIPMENT GRANT PROGRAM
REPORT TO CONGRESS ON THE IMPLEMENTATION OF THE FY 2003 INTEROPERABLE COMMUNICATIONS EQUIPMENT GRANT PROGRAM Department of Homeland Security Emergency Preparedness & Response Directorate May 2003 Table
More informationHSEM Emergency Management Director s Qualification Curriculum, Emergency Management Certification and Elected/Appointed Officials Certificate Programs
HSEM Emergency Management Director s Qualification Curriculum, Emergency Management Certification and Elected/Appointed Officials Certificate Programs 1-16-2014 1 A Note from the Director Effective emergency
More informationRESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02
RESEARCH CALL TO DOE/FEDERAL LABORATORIES Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02 CONTACT: Diane Hooie, Project Manager TELEPHONE NUMBER: (304) 285-4524 FAX NUMBER: (304)
More informationDepartment of Homeland Security
11 Department of Homeland Security Lynn J. Daniels and Gerald L. Epstein American Association for the Advancement of Science HIGHLIGHTS The Department of Homeland Security (DHS) research and development
More informationDr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop
Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Harvard University, Leadership for Networked World Global Information Intelligence: http://globalinfointel.com SUB
More informationEVALUATION GUIDELINES
EVALUATION GUIDELINES Introduction This document outlines the reviewing process and defines the responsibilities of the participants in the process. It details a number of important issues, such as: FCT
More informationhttps://syracuseuniversity.qualtrics.com/controlpanel/ajax.php?action=getsurveyprintpre...
Page 1 of 7 SU - UMU Pilot Grant Program Driving Inspiration and Innovation through Collaboration Syracuse University- Upstate Medical University 2015 Pilot Grant Application Responding to society s most
More informationSECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
More informationNEBRASKA STATE HOMELAND SECURITY STRATEGY
NEBRASKA STATE HOMELAND SECURITY STRATEGY 2014-2016 Nebraska Homeland Security Policy Group/Senior Advisory Council This document provides an overall framework for what the State of Nebraska hopes to achieve
More informationSEC. 1301. STATEMENT OF POLICY ON MODERNIZATION OF ELECTRICITY GRID.
TITLE XIII--SMART GRID SEC. 1301. STATEMENT OF POLICY ON MODERNIZATION OF ELECTRICITY GRID. It is the policy of the United States to support the modernization of the Nation's electricity transmission and
More informationStep 1: Analyze Data. 1.1 Organize
A private sector assessment combines quantitative and qualitative methods to increase knowledge about the private health sector. In the analytic phase, the team organizes and examines information amassed
More informationRisk Management Fundamentals
Risk Management Fundamentals Homeland Security Risk Management Doctrine April 2011 LETTER FROM THE UNDER SECRETARY NATIONAL PROTECTION AND PROGRAMS DIRECTORATE In May 2010, the Secretary of Homeland Security
More informationProject Management Plan
Project Management Plan FY 2009 UASI Project Information Project Title Subgrantee Subgrant GIS Data Exchange District of Columbia [to be generated by SAA] Subgrant Award $600,000.00 Jurisdiction (if applicable)
More informationU.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District
U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District Securing the Nation s s critical infrastructures one community at a time Critical Infrastructure & Key Resources
More informationRisk Assessment and Risk Management: Necessary Tools for Homeland Security
Risk Assessment and Risk Management: Necessary Tools for Homeland Security Paul Rosenzweig and Alane Kochems Regardless of their political beliefs, Americans want to prevent another terrorist attack from
More informationJOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
More informationIndex to Charts: Guidance to Environmental Protection Agency (EPA) Research Funding
Index to Charts: Guidance to Environmental Protection Agency (EPA) Research Funding Chart #s Topic 3-6 Office of Research and Development Overview 7-10 National Center for Environmental Research Extramural
More informationREQUEST FOR PROPOSALS: CENTER FOR LONG-TERM CYBERSECURITY
102 S Hall Rd Berkeley, CA 94720 510-664-7506 cltc@berkeley.edu REQUEST FOR PROPOSALS: CENTER FOR LONG-TERM CYBERSECURITY The University of California, Berkeley Center for Long-Term Cybersecurity (CLTC)
More informationLegislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
More informationProgram Management Professional (PgMP) Examination Content Outline
Program Management Professional (PgMP) Examination Content Outline Project Management Institute Program Management Professional (PgMP ) Examination Content Outline April 2011 Published by: Project Management
More informationSempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of
More informationUNEDITED ADVANCE COPY. Decisions of the Plenary of the Platform adopted at its second session
UNEDITED ADVANCE COPY (Annex I to the report of the Plenary at its second session) Decisions of the Plenary of the Platform adopted at its second session IPBES-2/1: IPBES-2/2: IPBES-2/3: IPBES-2/4: Amendments
More informationOil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com
Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests
More informationThe Strategic National Risk Assessment in Support of PPD 8: A Comprehensive Risk-Based Approach toward a Secure and Resilient Nation
The Strategic National Risk Assessment in Support of PPD 8: A Comprehensive Risk-Based Approach toward a Secure and Resilient Nation Overview The Strategic National Risk Assessment (SNRA) was executed
More informationAssessment Profile: Establishing Curricular Categories for Homeland Security Education
Assessment Profile: Establishing Curricular Categories for Homeland Security Education During any examination or assessment of the subject, homeland security, it becomes quite evident that by the definition(s)
More informationNASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
More informationVenture Development Fund Request for Proposals
Venture Development Fund Request for Proposals Summary Oregon State University seeks to facilitate the further development of OSU applied innovations and commercialization. The purpose of this RFP is to
More informationCBO. Federal Funding for Homeland Security: An Update. What Is Homeland Security?
CBO A series of issue summaries from the Congressional Budget Office JULY 20, 2005 Federal Funding for Homeland Security: An Update The terrorist attacks of September 11, 2001, heightened Congressional
More informationDIVISION OF PUBLIC HEALTH DPH CONTRACT 24140 AMENDMENT 4
DIVISION OF PUBLIC HEALTH DPH CONTRACT 24140 AMENDMENT 4 The Department of Health Services, on behalf of the Division of Public Health and Brown County Health Department agree to amend their original agreement
More informationRisk Management Guide for Critical Infrastructure Sectors
Risk Management Guide for Critical Infrastructure Sectors Page 1 of 37 Version 1.0 Foreword Managing risk is a shared responsibility among all critical infrastructure stakeholders, including governments,
More informationH. R. ll IN THE HOUSE OF REPRESENTATIVES A BILL
F:\M\BARLET\BARLET_0.XML TH CONGRESS ST SESSION... (Original Signature of Member) H. R. ll To amend the Homeland Security Act of 00 to enhance the partnership between the Department of Homeland Security
More informationStatement #4/Managerial Cost Accounting Concepts and Standards for the Federal Government
Statement #4/Managerial Cost Accounting Concepts and Standards for the Federal Government Executive Office of the President Office of Management and Budget "Managerial Cost Accounting Concepts and Standards
More informationRIA and regulatory Impact Analysis
2011/SOM1/EC/WKSP2/005 Session 2 Setting the APEC Context for Using RIA Submitted by: United States Workshop on Using Regulatory Impact Analysis to Improve Transparency and Effectiveness in the Rulemaking
More information