The Future of Security The Enterprise Security Competency Model

Size: px
Start display at page:

Download "The Future of Security The Enterprise Security Competency Model"

Transcription

1 The Future of Security The Enterprise Security Competency Model

2 Making security more secure In the United States, security is a $410 billion industry, 1 and globally it is one of the fastest growing fields. 2 Today, careers in the enterprise security industry 3 play critical roles in the protection of national and global economies. However, despite its size and importance, the security industry did not have a clear set of competencies and skills to help the workforce develop with expanding roles and responsibilities until now. The College of Security and Criminal Justice at University of Phoenix, in collaboration with ASIS Foundation, has written and published a competency model for the enterprise security industry. This model is now the first comprehensive security model for enterprise security organizations and their workforce. As the field continues to grow, professionals can develop and adapt with it. 1 See ASIS International and the Institute of Finance & Management (IOFM), The United States Security Industry: Size and Scope, Insights, Trends, and Data. 2 Security Industry is led by two industry subsectors: 1) cybersecurity and 2) operational security, also known as enterprise security. This brief and model address the competencies required of operational security workers, and the U.S. Department of Labor Cybersecurity Industry Competency Model governs cybersecurity workforce competencies. 3 The security industry is segmented into two district domains: operational security and IT security. This competency model and supporting brief addresses the operational security domain. For more information on IT security, please see the U.S. DOL CyberSecurity Industry Draft Model. Draft available upon request.

3 The Enterprise Security Industry Competency Model This pyramid represents the core competencies required by industry practitioners, as recognized by the U.S. Department of Labor. There are five tiers in the security model, and competencies become more specialized. The base of the model includes introductory foundational competencies, the middle embodies industry-related competencies and the top portrays the occupation-related competencies. Management competencies Occupation-specific requirements Occupation-specific management competencies Tier 5: Industry-sector technical competencies Loss prevention Banking and finance Engineering and design Government services Hospitality and entertainment Health care Manufacturing Service sales and equipment Transportation Utilities Tier 4: Industry-wide technical competencies Risk management Compliance and legal aspects Personnel security and continuity Physical security Cyber and information security Crisis management Investigations Case management Globalization and cultural awareness Governance Tier 3: Workplace competencies Teamwork Planning and organizing Innovative and strategic thinking Problem-solving and decision-making Working with tools and technology Business acumen Tier 2: Academic competencies Security fundamentals Business foundations Critical and analytical thinking STEM literacy Reading and writing Communication Tier 1: Personal effectiveness competencies Interpersonal skills and teamwork Integrity Professionalism Initiative Adaptability and flexibility Dependability and reliability Lifelong learning

4 Tier 1 Personal Effectiveness Competencies This tier includes personal attributes essential for all life roles, which can be used to define an individual s character. Interpersonal Skills and Teamwork Displaying skills to work with others from diverse backgrounds. Demonstrating concern for others Demonstrating insight into behavior Maintaining open communication Respecting diversity Integrity Displaying accepted social and work behaviors. Behaving ethically Acting fairly Taking responsibility Professionalism Maintaining a professional demeanor at work. Demonstrating self-control Maintaining a professional appearance Maintaining a positive attitude Initiative Demonstrating a willingness to work. Persisting Taking initiative Setting challenging goals Working independently Adaptability and Flexibility Displaying the capability to adapt to new, different, or changing requirements. Employing unique analyses Entertaining new ideas Dealing with ambiguity Dependability and Reliability Displaying responsible behaviors at work. Fulfilling obligations Attending to details Complying with policies and procedures Lifelong Learning Displaying a willingness to learn and apply new knowledge and skills. Demonstrating an interest in learning Participating in training Anticipating changes in work Identifying career interests We ve aligned with the ASIS Foundation so that, as our students receive their academic credentialing through the University of Phoenix, they also receive a professional credentialing that s recognized out there in the industry.

5 $410 B Between 2013 and 2014, the security industry has gone from a $350 billion industry to a $410 billion industry.

6 Tier 2 Academic Competencies Primarily learned in an educational setting and likely apply to all industries. Security Fundamentals Understanding and applying basic security principles to the security of the enterprise or a specific structure, system or process. Planning, organizing, directing and managing a security program Developing, managing or conducting threat analyses Evaluating current security methods Business Foundations Understanding basic business principles, trends and economics. Critical and Analytical Thinking Using logic, reasoning, and analysis to address problems. Reasoning Mental agility STEM Literacy (Science, Technology, Engineering, Mathematics) Understanding and applying science, technology, engineering and mathematics to work within individual roles and responsibilities and in collaborating with allied workers. Science: Using scientific rules and methods to solve problems. Technology: Using technology tools such as software, computers, communication devices and related applications to input, retrieve, monitor, measure and communicate information. Understand terminology and demonstrate familiarity Define: Frame a problem that needs information in order to be solved Access: Search and retrieve appropriate information relative to the task Manage: Apply an organizational or classification system to organize retrieved information Engineering: Using applications of scientific, economic, social and practical knowledge in order to enhance, design, plan and inspect the security of systems, processes and the physical structures. Project planning Prioritize tasks Create milestones Mathematics: Using mathematics to express ideas, implement metrics, create fiscal projections and solve problems. Reading and Writing Understanding written sentences and paragraphs in work-related documents. Using standard English to compile information and prepare written reports. Comprehension Attention to detail Application Organization and development Mechanics Tone Communication Giving full attention to what others are saying, and communicating in English well enough to be understood by others. Listening Communication Two-way communication Persuasion/influence 41,000 In 2014, there were 41,000 jobs in the security field; however, only 6,000 degrees were issued. There s a big opportunity to provide academic background to the security industry.

7 Tier 3 Workplace Competencies To respond to workforce development challenges, the ASIS Foundation, collaborated with the University of Phoenix, and engaged in multiple research initiatives to identify the specific professional competencies and skills that are required to respond to the security risks that enterprises are most likely to face over the next five years. The goal of these research efforts was to establish consensus on which security competencies are needed across industries to close the skills gap by defining clearer career pathways for tomorrow s professionals. This tier contains motives and traits, as well as interpersonal and self-management styles. Teamwork Working cooperatively with others to complete work assignments. Acknowledging team membership and role Establishing productive relationships Identifying with the team and its goals Resolving conflicts Planning and Organizing Planning and prioritizing work to manage time effectively and accomplish assigned tasks. Planning Prioritizing Allocating resources Project management Innovative and Strategic Thinking Generating innovative and creative solutions. Employ unique analyses and generate new, innovative ideas in complex areas Reframe problems in a different light to find fresh approaches Entertain wide-ranging possibilities Problem-Solving and Decision-Making Identifying the problem Locating, gathering, and organizing relevant information Generating alternatives Choosing a solution Implementing the solution Working with Tools and Technology Selection and application Keeping current Business Acumen Situational awareness Business practices Business ethics

8 Tier 4 Industry-Wide Technical Competencies Covers the broad knowledge, skills and abilities from which workers across the industry can benefit. Risk Management Demonstrating the ability to identify threats/risks and vulnerabilities taking into account the frequency, probability, speed of development, severity and reputational impact to achieve a holistic view of risk across the entity. Classifying risks Identifying the organization s risk exposures from both internal and external sources Assessing an organization s risk exposure over multiple assets Compliance and Legal Aspects Developing and maintaining security policies, procedures and practices that comply with relevant elements of criminal, civil, administrative and regulatory law to minimize adverse legal consequences. Personnel Security and Business Continuity Developing, implementing and managing systems and security practices that protect people and practices to ensure enterprise continuity and risk resilience. Physical Security Measures that are designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm, involving the use of multiple layers of interdependent systems and techniques. Cyber and Information Security The practice of protecting physical and electronic information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. Crisis Management The process by which an enterprise deals with a critical incident or major event that threatens to harm the organization, its property, assets, systems, continuity and or people. Investigations The methodology the enterprise undertakes to collect and preserve information and evidence and document in reports to enable the enterprise to make reliable decisions in response to situations, events and effectively interface with stakeholders including but not limited to legal representatives and systems and human resource representatives. Case Management A system to manage, analyze, report and present findings from investigations for internal enterprise stakeholders and external systems. Globalization and Cultural Awareness Integrating cultures and global dynamics into security systems, metrics and responses. Governance Specialty areas providing leadership, management, direction and/ or development, and advocacy so that individual and organization may effectively conduct security work.

9 Tier 5 Industry-Sector Technical Areas Workforce roles frequently aligned to a specialty area. Loss Prevention Practices to reduce preventable losses and secure corporate systems, policies and procedures to mitigate losses caused by deliberate or inadvertent human actions. Banking and Finance A specialized security field including retail banking, mortgage, credit/debit cards, Internet banking, commercial and consumer lending to stock brokerages, insurance companies, and other financial institutions requiring a sophisticated application of various regulatory agencies. Engineering and Design Focusing on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. Government Services Special services ranging from the protection of classified information, to the protection of buildings, people and assets from employees to contractors, grantees and licensees of the U.S. government. Hospitality and Entertainment Security professionals operate in hospitality, hotel, lodging, entertainment, event and gaming applying risk and personnel management, budgeting and finance, and a host of other areas within this specialization. Health Care Security in the health care industry involves hospitals, long-term care facilities, clinics, pharmaceuticals and nursing homes with a work environment oriented toward patient protection and service, and may also include safety and community emergency management, supply chain security, pharmaceutical security and other areas of specialization. Manufacturing The manufacturing and industrial sectors, as well as food and beverage production and processing, warehouse and distribution, facilities and operations can be susceptible to industry security risks including workplace threats and violence, theft and pilferage, counterfeiting, sabotage, terrorist attack, trespassing, activist disruption, vandalism, contamination. Services Sales and Equipment A specialized area of security-related products and services resulting from emerging threats and evolving high technology. Transportation This niche area of security includes shipping, carrying, railroads, highways, freight, trucking, tourism, air cargo, ports and other transportation domains with unit standards for security within the industry. Utilities This field deals with security operations within telecommunications, water, electric, and nuclear power plants and related private corporations. Even though sources of power differ, there are common facilities to all utility operations. Tier 6 & 7 Management-Related Competencies Occupation-Specific Management Competencies These upper tiers help to define performance in a workplace, design competency-based curriculum, and articulate the requirements for an occupational credential such as a license or certification.

10 Competency-Related Courses at University of Phoenix Tier 1 Personal Effectiveness Competencies SEC 321 Survey of Security Specializations This course identifies and contrasts the benefits of proprietary and contract security operations and introduces the student to a variety of security specializations. It also examines the purposes, objectives, procedures, risks and types of organizations associated with the respective specializations. Tier 2 Academic Competencies SEC 371 Finance and Budgeting Practices This course provides the student with an understanding of the various elements of a program budget; the process of budget development, justification and presentation; and principles of contract preparation. Special emphasis is given to these processes, procedures and practices in relation to securityoriented environments. Tier 3 Workplace Competencies SEC 351 Legal and Regulatory Issues in Security Management This course examines legal, regulatory, ethical and policy issues that influence the work performance of security personnel. It also discusses the potential consequences of noncompliance for individuals and institutions. Tier 4 Industry-Wide Technical Competencies SEC 411 Physical Security This course provides the student with an understanding of the various levels of security that can be employed for the protection of people, property and data housed in physical facilities. Tier 5 Industry-Sector Technical Competencies SEC 240 Loss Prevention and Asset Protection This course is an introduction and general overview of loss prevention and asset protection strategies and programs. Students will learn the basic principles and methodologies involved with the prevention of shrinkage or loss and the protection of an organization s physical assets. Students will be introduced to basic theories and concepts, key terms and definitions, and current critical issues. Additionally, this course provides an overview of integrated security systems, workplace violence threats, emergency plans and procedures, and how to conduct interviews and investigations.

11 The security industry is projected to grow 13 percent between 2012 and Excluding security guards, industry growth will be closer to 23 percent. Through the College of Security and Criminal Justice, University of Phoenix prepares its students to reach for their goals and rewarding careers. For more information about each of these programs, including on-time completion rates, the median debt incurred by students who completed the program and other important information, please visit phoenix.edu/programs/gainful-employment. While widely available, not all programs are available in all locations or in both online and on-campus formats. University of Phoenix is accredited by the Higher Learning Commission ( For more information about University of Phoenix accreditations and licensures, please visit The University s Central Administration is located at 1625 W. Fountainhead Pkwy., Tempe, AZ Online Campus: 3157 E. Elwood St., Phoenix, AZ Florida: Licensed by the Florida Commission for Independent Education, License No Georgia: Authorized under the Nonpublic Postsecondary Educational Institutions Act of Illinois: University of Phoenix is authorized to operate as a post-secondary educational institution by the Illinois Board of Higher Education, 1 N. Old State Capitol Plaza, Ste. 333, Springfield, IL , Indiana: Fully authorized by the Indiana Commission for Postsecondary Proprietary Education. AC Indianapolis Campus: 7999 Knue Rd., Stes. 100 & 500, Indianapolis, IN 46250; Northwest Indiana Campus: 8401 Ohio St., Merrillville, IN Ohio: Registration Number Cleveland Main Campus: 3401 Enterprise Pkwy., Ste. 250, Beachwood, OH Oklahoma: College credit granted by University of Phoenix. Transferability of credit is at the discretion of the receiving institution. It is the student s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student s choice. Puerto Rico: University of Phoenix operates under a renewal license granted by the Puerto Rico Council on Education. South Carolina: Licensed by the South Carolina Commission on Higher Education. South Carolina Campus: 1001 Pinnacle Point Dr., Columbia, SC Tennessee: Knoxville Campus: Sherrill Blvd., Ste. 120, Knoxville, TN 37932; Memphis Campus: 65 Germantown Ct., Ste. 100, Cordova, TN 38018; Nashville Campus: 616 Marriott Dr., Ste. 150, Nashville, TN Chattanooga Learning Center: 1208 Pointe Centre Dr., Chattanooga, TN 37421; Clarksville Learning Center: 141 Chesapeake Dr., Clarksville, TN 37040; Murfreesboro Learning Center: 2615 Medical Center Pkwy., Murfreesboro, TN Virginia: University of Phoenix is certified to operate by the State Council of Higher Education for Virginia (SCHEV). Richmond Virginia Beach Campus: 9750 W. Broad St., Glen Allen, VA University of Phoenix, Inc. All rights reserved. CJS-4441

Hospitality Advisory Council Report. February 2015 Chicago, Illinois

Hospitality Advisory Council Report. February 2015 Chicago, Illinois Hospitality Advisory Council Report February 2015 Chicago, Illinois Because leadership skills are grown over time, exposing all levels of staff to growth opportunities can encourage more loyalty, retention

More information

Your guide to a better future.

Your guide to a better future. Your guide to a better future. Welcome to University of Phoenix, where we re committed to your success. We d like to thank you for your interest in attending University of Phoenix. This guide is designed

More information

Welcome to the Military Division. We re dedicated to serving those who serve our nation.

Welcome to the Military Division. We re dedicated to serving those who serve our nation. Military Division Welcome to the Military Division. We re dedicated to serving those who serve our nation. The University of Phoenix Military Division is nearly 900 advisors strong, many with military

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

OPERATIONAL SECURITY INDUSTRY COMPETENCY MODEL

OPERATIONAL SECURITY INDUSTRY COMPETENCY MODEL OPERATIONAL SECURITY INDUSTRY COMPETENCY MODEL The Operational Security Industry Competency Model, 1 written by Apollo Education Group University of Phoenix in partnership with the ASIS Foundation, and

More information

Continuing Teacher Education

Continuing Teacher Education Continuing Education Online Course Schedule July, August, September 2012 Continuing Teacher Education Graduate Level Continuing Teacher Education Courses AUT 500 Foundations of Autism Spectrum Disorders

More information

ASAE s Job Task Analysis Strategic Level Competencies

ASAE s Job Task Analysis Strategic Level Competencies ASAE s Job Task Analysis Strategic Level Competencies During 2013, ASAE funded an extensive, psychometrically valid study to document the competencies essential to the practice of association management

More information

Career Opportunities in the Security Industry

Career Opportunities in the Security Industry Spring Conference 2013 Developing Future Leaders for Tomorrow s Challenges Career Opportunities in the Security Industry Mike Rock Division Director Asset Protection Wal-Mart (773) 380 3764 mike.rock@wal-mart.com

More information

Iowa. CONTENT STANDARDS and BENCHMARKS. Business and Administration

Iowa. CONTENT STANDARDS and BENCHMARKS. Business and Administration Iowa CONTENT STANDARDS and BENCHMARKS Business and Administration 2001 Business, Information Management, and Marketing Career Pathway Framework Illustration of Program Possibilities Occupational Cluster

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Bryan Rolle Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Apply today: strayer.edu/apply FLEXIBLE /

More information

Electronic Health Records (EHR) Competency Model. Ryan Merclean rmerclean@jbsinternational.com

Electronic Health Records (EHR) Competency Model. Ryan Merclean rmerclean@jbsinternational.com Electronic Health Records (EHR) Competency Model Ryan Merclean rmerclean@jbsinternational.com Today Competency Model Initiative Background Competency Model Basics and Building Blocks Model Model Development

More information

Competency Requirements for Executive Director Candidates

Competency Requirements for Executive Director Candidates Competency Requirements for Executive Director Candidates There are nine (9) domains of competency for association executives, based on research conducted by the American Society for Association Executives

More information

UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter

UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter Pennsylvania State System of Higher Education California University of Pennsylvania UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter Version [1.0] 1/29/2013 Revision History

More information

K - 12 Principal & Superintendent

K - 12 Principal & Superintendent BOSA COMPETENCY MATRIX Minnesota Administrative Licensure K - 12 Principal & Superintendent WINONA STATE UNIVERSITY COLLEGE OF EDUCATION DEPARTMENT OF EDUCATIONAL LEADERSHIP Name: Place of Employment Mailing

More information

Event Planning COURSE OUTLINE

Event Planning COURSE OUTLINE Event Planning COURSE OUTLINE 1. Course Title: Event Planning 2. CBEDS Title: Food and Hospitality Services 3. CBEDS Number: 44 4. Job Titles: Event Planner Wedding Planner Convention Planner Personal

More information

OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc.

OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc. OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc.) Description of Position (As defined by the CSCSC Stakeholder

More information

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND

More information

Rubric for Evaluating Colorado s Specialized Service Professionals: School Nurses

Rubric for Evaluating Colorado s Specialized Service Professionals: School Nurses Rubric for Evaluating Colorado s Specialized Service Professionals: School Nurses Definition of an Effective School Nurse Effective school nurses are vital members of the education team. They are properly

More information

Business Management COURSE OUTLINE

Business Management COURSE OUTLINE Management COURSE OUTLINE 1. Course Title: Management 2. CBEDS Title: Management 3. CBEDS Number: 4637 4. Job Titles: Bill & Account Collector Billing & Posting Clerk and Machine Operator Brokerage Clerk

More information

Culinary Arts Cooperative Vocational Education COURSE OUTLINE

Culinary Arts Cooperative Vocational Education COURSE OUTLINE Culinary Arts Cooperative Vocational Education COURSE OUTLINE 1. Course Title: Culinary Arts Cooperative Vocational Education 2. CBEDS Title: Food and Hospitality Services 3. CBEDS Number: 4420 4. Job

More information

Career and Financial Management (2003 Curriculum)

Career and Financial Management (2003 Curriculum) Career and Financial Management (2003 Curriculum) The recently created course tentatively entitled "Career and Financial Management" is a one-half unit requirement that will replace the current Introduction

More information

15 Guiding Principles

15 Guiding Principles Health, Safety, Environment and Corporate Social Responsibility 15 Guiding Principles 2013 Message from President and CEO 0 New Gold has a complementary portfolio of assets in different countries and cultures

More information

Demonstrate an ability to utilize generally accepted accounting principles and managerial/cost accounting practices.

Demonstrate an ability to utilize generally accepted accounting principles and managerial/cost accounting practices. Accounting NAU s Bachelor of Science degree in Accounting is designed to help students prepare for the Certified Public Accountant (CPA) exam and have an exciting career in the financial sector. Currently,

More information

Federal Bureau of Investigation s Integrity and Compliance Program

Federal Bureau of Investigation s Integrity and Compliance Program Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established

More information

Ohio Standards for School Counselors

Ohio Standards for School Counselors Adopted by state board of education of ohio October, Ohio Standards for School Counselors Ohio Standards for School Counselors ii Contents Section I: Overview of the Ohio Standards for School Counselors...

More information

Calhoun County EMA. Job Description EMERGENCY MANAGEMENT OFFICER-I

Calhoun County EMA. Job Description EMERGENCY MANAGEMENT OFFICER-I Calhoun County EMA Job Description EMERGENCY MANAGEMENT OFFICER-I Definition The Emergency Management Officer I performs professional and administrative work in support of programs and projects pertaining

More information

Comprehensive Emergency Management Education 604.528.5800 1.877.528.5591

Comprehensive Emergency Management Education 604.528.5800 1.877.528.5591 Bachelor of Emergency & Security Management Studies prepare yourself and your team with the most accessible, customizable emergency management training from Canada s Leading Public Safety Educator Comprehensive

More information

Approval of New Programs under the Postsecondary Authorization Act

Approval of New Programs under the Postsecondary Authorization Act T N N S S H I G H R D U C A T I O N C O M M I S S I O N DAT: April 20, 2006 SUBJCT: Agenda Item: I..3. Approval of New Programs under the Postsecondary Authorization Act ACTION RCOMMNDD: Approval BACKGROUND

More information

Video Game Design (3 Teams per state, 2 team members minimum)

Video Game Design (3 Teams per state, 2 team members minimum) Content Area Standard Strand 21st-Century Life & Careers 9.4 Career and Technical Education: All students who complete a career and technical education program will acquire academic and technical skills

More information

Foundations of Restaurant Management & Culinary Arts (Level One) 2011 Correlated to: Texas TEKS for 130.224. Restaurant Management (High School)

Foundations of Restaurant Management & Culinary Arts (Level One) 2011 Correlated to: Texas TEKS for 130.224. Restaurant Management (High School) Subchapter I. Hospitality and Tourism 130.224. Restaurant Management (One-Half to One Credit). (a) General requirements. This course is recommended for students in Grades 10-12. Recommended prerequisite:

More information

RIVERSIDE COUNTY OFFICE OF EDUCATION COURSE OUTLINE. Entrepreneurship and Innovation II. CBEDS Number: 4126. Job Title(s):

RIVERSIDE COUNTY OFFICE OF EDUCATION COURSE OUTLINE. Entrepreneurship and Innovation II. CBEDS Number: 4126. Job Title(s): RIVERSIDE COUNTY OFFICE OF EDUCATION CO1.rpt COURSE OUTLINE 8/26/2015 10:59:24AM 1 of 8 Course: 12523 RCOE Virtual Enterprise CBEDS Title: Entrepreneurship and Innovation II CBEDS Number: 4126 Job Title(s):

More information

Approval of New Programs under the Postsecondary Authorization Act

Approval of New Programs under the Postsecondary Authorization Act T E N N E S S E E H I G H E R E D U C A T I O N C O M M I S S I O N DATE: January 27, 2011 SUBJECT: Agenda Item: I.C. Approval of New Programs under the Postsecondary Authorization Act ACTION RECOMMENDED:

More information

Approval of New Programs under the Postsecondary Authorization Act

Approval of New Programs under the Postsecondary Authorization Act T E N N E S S E E H I G H E R E D U C A T I O N C O M M I S S I O N DATE: April 23, 2009 SUBJECT: Agenda Item: I.A.3. Approval of New Programs under the Postsecondary Authorization Act ACTION RECOMMENDED:

More information

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012 Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives Initiation date: January 2012 Completion date: June 2012 Nomination submitted by: Samuel A. Nixon

More information

Approval of New Programs under the Postsecondary Authorization Act

Approval of New Programs under the Postsecondary Authorization Act T E N N E S S E E H I G H E R E D U C A T I O N C O M M I S S I O N DATE: November 16, 2006 SUBJECT: Agenda Item: I.D.2. Approval of New Programs under the Postsecondary Authorization Act ACTION RECOMMENDED:

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

BUSINESS ADMINISTRATION (Non-EMBA) COURSES Student Learning Outcomes 1

BUSINESS ADMINISTRATION (Non-EMBA) COURSES Student Learning Outcomes 1 BUSINESS ADMINISTRATION (Non-EMBA) COURSES Student Learning Outcomes 1 BA 100: Exploration of Business 1. Explain the culture of higher education. 2. Undertake critical examination and self-reflection

More information

Purchase College Information Security Program Charter January 2008

Purchase College Information Security Program Charter January 2008 January 2008 Introduction When an organization implements an information security program, it raises the question of what is to be written, and how much is sufficient. SUNY Information Security Initiative

More information

Audit of NRC s Network Security Operations Center

Audit of NRC s Network Security Operations Center Audit of NRC s Network Security Operations Center OIG-16-A-07 January 11, 2016 All publicly available OIG reports (including this report) are accessible through NRC s Web site at http://www.nrc.gov/reading-rm/doc-collections/insp-gen

More information

Apply today: strayer.edu COLLEGE OF BUSINESS MASTER OF SCIENCE IN HUMAN RESOURCE MANAGEMENT RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu COLLEGE OF BUSINESS MASTER OF SCIENCE IN HUMAN RESOURCE MANAGEMENT RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Jeanetta Swanson Student COLLEGE OF BUSINESS MASTER OF SCIENCE IN HUMAN RESOURCE MANAGEMENT Apply today: strayer.edu FLEXIBLE / AFFORDABLE / VALUABLE STRAYER

More information

Evaluating a Safety Degree Curriculum Using Job Analysis for Professional Safety Practice

Evaluating a Safety Degree Curriculum Using Job Analysis for Professional Safety Practice Session No. A407 Evaluating a Safety Degree Curriculum Using Job Analysis for Professional Safety Practice Background Roger L. Brauer, Ph.D., CSP, PE, CPE Executive Director Board of Certified Safety Professionals

More information

OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc.

OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc. OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc.) Description of Position (As defined by the CSCSC Stakeholder

More information

Guide to PEO Due Diligence

Guide to PEO Due Diligence Guide to PEO Due Diligence John Iorillo, Ambrose Co CEO & Co Founder www.ambrose.com 1 855 AMBROSE (262 7673) info@ambrosegroup.com Boca Raton, FL Los Angeles, CA New York, NY Short Hills, NJ Stamford,

More information

Get Confidence in Mission Security with IV&V Information Assurance

Get Confidence in Mission Security with IV&V Information Assurance Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Leann Atoigue Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Approval of New Programs under the Postsecondary Authorization Act

Approval of New Programs under the Postsecondary Authorization Act T N N S S H I G H R D U C A T I O N C O M M I S S I O N DAT: November 18, 2004 SUBJCT: Agenda Item: I.C.2. Approval of New Programs under the Postsecondary Authorization Act ACTION RCOMMNDD: Approval BACKGROUND

More information

OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc.

OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc. OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc.) Position: Description of Position (As defined by the

More information

Daymar Disclosures - Information Pages

Daymar Disclosures - Information Pages Daymar Disclosures - Information Pages Final regulations published in the Federal Register by the U.S. Department of Education require institutions that participate in the student financial assistance

More information

Implementation Date Fall 2008. Marketing Pathways

Implementation Date Fall 2008. Marketing Pathways PROGRAM CONCENTRATION: CAREER PATHWAY: COURSE TITLE: Marketing, Sales & Service Optional Course for All Marketing Pathways Marketing Research In this course, high school students will gain an understanding

More information

Profile of California s Teaching Standards

Profile of California s Teaching Standards Profile of California s Teaching Standards This profile of California s teaching standards supplements the report, Updated multistate review of professional teaching standards, published by the Regional

More information

FNS41510 Certificate IV in Life Insurance

FNS41510 Certificate IV in Life Insurance FNS41510 Certificate IV in Life Insurance Revision Number: 1 FNS41510 Certificate IV in Life Insurance Modification History Description This qualification is designed to reflect the role of persons carrying

More information

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013 State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council

More information

2015-16 Rubric for Evaluating Colorado s Specialized Service Professionals: School Nurses

2015-16 Rubric for Evaluating Colorado s Specialized Service Professionals: School Nurses 2015-16 Rubric for Evaluating Colorado s Specialized Service Professionals: School Nurses Definition of an Effective School Nurse Effective school nurses are vital members of the education team. They are

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Nine Probation Officer Competencies. Alberta Justice & Solicitor General

Nine Probation Officer Competencies. Alberta Justice & Solicitor General Nine Probation Officer Competencies 2014 Officer 1. Managing Information & People The ability to interact with others to access, retrieve, input analyze, apply, interpret and process information for investigative

More information

SBEC/TExES Framework for Principal Certification

SBEC/TExES Framework for Principal Certification SBEC/TExES Framework for Principal Certification The following SBEC Principal Domains, Competencies and supporting standards represent the knowledge, skills and dispositions principal candidates should

More information

Associate s Degree Program

Associate s Degree Program Information Technology-Computer Network Systems Associate s Degree Program The ITT Technical Institutes offer a variety of career-focused curricula. This sheet helps describe the Associate s Degree program

More information

Description of the ten core competencies

Description of the ten core competencies Description of the ten core competencies You can use this document as a reference when assessing competency development on the Competency Assessment form. Introduction to competencies Competencies are

More information

School of Business Bachelor Of Science In Business With A Concentration In Marketing. Required Course of Study

School of Business Bachelor Of Science In Business With A Concentration In Marketing. Required Course of Study School of Business Bachelor Of Science In Business With A Concentration In Marketing The Bachelor of Science in Business (BSB) undergraduate degree program is designed to prepare graduates with the requisite

More information

[STAFF WORKING DRAFT]

[STAFF WORKING DRAFT] S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE

More information

Education for the Future.

Education for the Future. CJ 7/11 Education for the Future. The seven schools of study at the ITT Technical Institutes 4 (School of Information Technology, School of Electronics Technology, School of Drafting and Design, School

More information

Examinable Competencies: A Progress Report. The 2010 University-Public Service Roundtable October 25, 2010 RDIMS 897338

Examinable Competencies: A Progress Report. The 2010 University-Public Service Roundtable October 25, 2010 RDIMS 897338 Examinable Competencies: A Progress Report The 2010 University-Public Service Roundtable October 25, 2010 RDIMS 897338 1 Context The federal government is focused on continuing its commitment to supporting

More information

National Occupational Standards. Compliance

National Occupational Standards. Compliance National Occupational Standards Compliance NOTES ABOUT NATIONAL OCCUPATIONAL STANDARDS What are National Occupational Standards, and why should you use them? National Occupational Standards (NOS) are statements

More information

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7 PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255

More information

A. Amridge University Montgomery, AL 1200 Taylor Rd, Montgomery, Alabama 36117

A. Amridge University Montgomery, AL 1200 Taylor Rd, Montgomery, Alabama 36117 T E N N E S S E E H I G H E R E D U C A T I O N C O M M I S S I O N DATE: April 24, 2014 SUBJECT: 1 Agenda Item: I.B.3. Approval of New Programs under the Postsecondary Authorization Act ACTION RECOMMENDED:

More information

OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc.

OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc. OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc.) Description of Position (As defined by the CSCSC Stakeholder

More information

Change Management Practitioner Competencies

Change Management Practitioner Competencies 1 change-management-institute.com Change Management Institute 2008 Reviewed 2010, 2012 Change Management Practitioner Competencies The Change Management Practitioner competency model sets an independent

More information

Legislative Language

Legislative Language Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting

More information

APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES

APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES APICS INSIGHTS AND INNOVATIONS ABOUT THIS REPORT This report examines the role that supply chain risk management plays in organizations

More information

HUMAN SERVICES MANAGEMENT COMPETENCIES

HUMAN SERVICES MANAGEMENT COMPETENCIES HUMAN SERVICES MANAGEMENT COMPETENCIES A Guide for Non-Profit and For Profit Agencies, Foundations and Academic Institutions Prepared by: Anthony Hassan, MSW, Ed.D. William Waldman, MSW Shelly Wimpfheimer,

More information

Succession Planning - Recruitment

Succession Planning - Recruitment Succession Planning - Recruitment Business Continuity and Resilience Consulting Services Building Resiliency one Organization at a Time Overview Important Terms Introduction Basic Objects for Resiliency

More information

High School B13 Desktop Publishing & Computer Graphics Curriculum Essentials Document

High School B13 Desktop Publishing & Computer Graphics Curriculum Essentials Document High School B13 Desktop Publishing & Computer Graphics Curriculum Essentials Document Boulder Valley School District Department of CTEC June 2012 Introduction Desktop Publishing teaches students the tools

More information

Software Development

Software Development Software Development Associate s Degree The ITT Technical Institutes offer a variety of career-focused curricula. This sheet helps describe the associate s degree program in Software Development 1 offered

More information

Daymar Disclosures - Information Page

Daymar Disclosures - Information Page Daymar Disclosures - Information Page Final regulations published in the Federal Register by the U.S. Department of Education require institutions that participate in the student financial assistance programs

More information

Dear Colleagues, Best Regards, Pamela L. Quinones, RDH, BS

Dear Colleagues, Best Regards, Pamela L. Quinones, RDH, BS A Letter from the 2011-2012 ADHA President Dear Colleagues, Partnering with ADEA to develop the Core Competencies for Graduate Dental Hygiene Education was a very positive and rewarding experience for

More information

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT John Deere Supply Chain Risk Management INTERVIEWS Glen Schwab Director of Supply Management Robert Smola Manager, Supply Chain Risk The Next New Things

More information

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009 National Security & Homeland Security Councils Review of National Cyber Security Policy Submission of the Business Software Alliance March 19, 2009 Question # 1: What is the federal government s role in

More information

Master Level Competency Model

Master Level Competency Model Change Manager Master Level Competency Model The Change Manager Master competency model sets an independent industry benchmark for SENIOR level change management practitioners. The model was launched in

More information

Clayton State University Master of Health Administration Program Fall 2009 Assessment

Clayton State University Master of Health Administration Program Fall 2009 Assessment Clayton State University Master of Health Administration Program Fall 2009 Assessment MHA Program Mission: The mission of the Health Care Management program is to prepare ethical and socially responsible

More information

COMMITTEE ON POSTSECONDARY EDUCATIONAL INSTITUTIONS Agenda for October 15, 2015. Sparta, TN B. Musicians Institute Guitar Craft Academy

COMMITTEE ON POSTSECONDARY EDUCATIONAL INSTITUTIONS Agenda for October 15, 2015. Sparta, TN B. Musicians Institute Guitar Craft Academy COMMITTEE ON POSTSECONDARY EDUCATIONAL INSTITUTIONS Agenda for October 15, 2015 I. Approval of Minutes II. New Institutions (Authorization Recommendations) Total new institutions for your consideration:

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

National Academy Foundation

National Academy Foundation Certifying College and Career Readiness Mike Henson Director, District Engagement National Academy Foundation Agenda NAF Overview College and Career Readiness Levels of Certification District Readiness

More information

Scope and Sequence. Hospitality and Tourism. Cluster:

Scope and Sequence. Hospitality and Tourism. Cluster: Scope and Sequence Cluster: Course Name: Course Description: Course Requirements: Hospitality and Tourism 130.223 Hotel Management (One-Half to One Credit) This course focuses on the knowledge and skills

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

IT Employment Identifying Skills and Opportunities. Presentation to MCCWDTA IT Sub-Group September 17, 2012

IT Employment Identifying Skills and Opportunities. Presentation to MCCWDTA IT Sub-Group September 17, 2012 IT Employment Identifying Skills and Opportunities Presentation to MCCWDTA IT Sub-Group September 17, 2012 US DOL Competency Model for IT Draft 9/7/2012 US DOL Competency Model for IT Draft 9/7/2012 Tier

More information

FNS41512 Certificate IV in Life Insurance

FNS41512 Certificate IV in Life Insurance FNS41512 Certificate IV in Life Insurance Release 2 FNS41512 Certificate IV in Life Insurance Modification History Release Release 2 Release 1 Comments This version released with FNS10 Financial Services

More information

Leadership-related Competencies

Leadership-related Competencies -related Competencies Excerpts from the Competency Index for the Library Field http://www.webjunction.org/competencies/articles/content/67024491 Compiled by WebJunction June 2009 Copyright 2009, OCLC Online

More information

Approval of New Programs under the Postsecondary Authorization Act

Approval of New Programs under the Postsecondary Authorization Act T E N N E S S E E H I G H E R E D U C A T I O N C O M M I S S I O N DATE: July 25, 2013 SUBJECT: 1 Agenda Item: I.C.2. Approval of New Programs under the Postsecondary Authorization Act ACTION RECOMMENDED:

More information

Defining the Gap: The Cybersecurity Governance Study

Defining the Gap: The Cybersecurity Governance Study Defining the Gap: The Cybersecurity Governance Study Sponsored by Fidelis Cybersecurity Independently conducted by Ponemon Institute LLC Publication Date: June 2015 Ponemon Institute Research Report Defining

More information

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 James.Costello@srpnet.com James J. Costello Director, Enterprise IT Security April 8,

More information

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9

More information

Credential Level(s) Offered

Credential Level(s) Offered Curriculum Standard for Health Science: Therapeutic and Diagnostic Services Career Cluster: Health Science ** Cluster Description: Planning, managing, and providing therapeutic services, diagnostic services,

More information

OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc.

OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc. OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc.) Description of Position (As defined by the CSCSC Stakeholder

More information