Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 2

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
This paper explores supply chain risk management (SCRM) integration into the enterprise risk management (ERM) program across the Department of Defense for three main reasons: responsibility, necessity, and visibility. Multiple laws, orders, policies, strategies, and standards hold Federal leaders responsible for their agencies' performance. The current global nature of the DoD's supply chain, its dependency on information technology, and the constant threats in the cyber realm make it necessary to integrate SCRM into the ERM program. Should DoD leadership lose sight of these threats, the impact on the enterprise could be catastrophic. As a result, DoD leaders must maintain the visibility of the supply chain as part of the ERM program. While many organizations have treated SCRM and ERM separately throughout the years, technology and the exponential growth of cyber threats have brought those days to a close. The importance of the supply chain to mission accomplishment, coupled with persistent threats in the cyber-realm, dictates the integration of SCRM and ERM as a requirement. This paper explains the issues above while giving multiple examples of why integration is imperative. Should the DoD make SCRM part of its ERM program, the chances of remaining a dominant global force will continue well into the future for Cybersecurity professionals working in U.S. organizations.
EN
Because presidential and congressional elections (hereinafter Federal elections) are State-administered activities with a Federal nexus, the Federal government should both reimburse and provide grants to the States when using their National Guards in their State Active Duty (SAD) status1 to perform cybersecurity assessments and testing before the election, provide general cybersecurity and immediate cyber support in response to a cyber-attack (if required) on Election Day, and provide any post-election support as necessary and appropriate. First, decision-makers must develop an election infrastructure protection plan that effectively utilizes the best assets in a whole-of-nation approach to help meet the three policy goals of election cybersecurity, "access, integrity, and security.'' Currently, there are gaps in election security that the National Guard is well-position and best-qualified to fill. Once the decision-makers agree on the approach, they can move on to the second step, which is to address how to best support the States in funding the activities through grants, reimbursement, or a combination of the two. This paper explains how the U.S. Constitution, along with specific Federal laws, support the thesis and proposes new legislation that Congress should pass to eliminate current confusion while promoting the unity of effort amongst all stakeholders.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.