preview

The Department Of Homeland Security

Better Essays
HLSS302 Progress Assignment
Ericlee F. Albarran
American Public University System

The Department of Homeland Security (DHS) Risk Lexicon (2010) states that “risk is a key organizing principle for homeland security strategies, programs, efforts, and activities” (p. 1). This means that risk management is a decision making tool that allows for the DHS to intelligently and efficiently make planning choices based on threat level priorities. Some of the choices that are made using risk management are where to allocate both physical and financial resources, types of training initiatives for a specific threat, technological initiatives and strategic planning for risk mitigation and asset defense. One of the largest factors when
…show more content…
In his statement to House Committee on Homeland Security, Transportation Security Subcommittee, Administrator Neffenger, identified a need to address vulnerabilities that were uncovered during findings from the Office of the Inspector General (OIG), some of the findings included lack of training proficiency on critical equipment (Neffenger, 2015). Using risk management the TSA identified a vulnerability in their daily operations by uncovering the lack of training and led them assign a risk priority for it based on the consequence (weapons being smuggled onto aircraft) and the threat of it being used by an adversary. Training is critical resource in risk management. When a risk is identified it is important to decide if funded training will help mitigate the risk to a negligible level. There is no point to having the most cutting edge technology in support of homeland security if the qualified personnel are not in place to use them. If an agency has been allocated the newest 2017 model piece of equipment and it has been deemed essential to mitigate new threats. How important is that piece of equipment if all the staff members are only certified and proficient on the 2015 model? With both resources being allocated and qualified personnel in place a new threat has emerged in the information age. As we continue to rely more on technology, it is important to mitigate the security risks that come with
Get Access