Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Functional Management 2010 Worldwide Security Conference.

Similar presentations


Presentation on theme: "Security Functional Management 2010 Worldwide Security Conference."— Presentation transcript:

1 Security Functional Management 2010 Worldwide Security Conference

2 Security Functional Management Security Resource Management Management Decision Package (MDEP) GPSI - Personnel Security Investigations (PSI) projections and billing validation - Army Central Clearance Facility (A/CCF) operations - Army Investigative Enterprise Solution (AIES) resource implementation Management Decision Package (MDEP) QSEC - Security specialist civ-pay (not exclusive to all 0080s) - Training / Travel - Operational Equipment Building the Program Objective Memorandum (POM) - Initial Programming - Command Participation - Program Evaluation Groups (PEGs) - POM - OSD Review - Program Decision Memorandums (PDMs)

3 Security Manpower Model Decision Point 91 / 59 - ACOMs, ASCCs, and DRUs will independently manage and execute their security programs - IMCOM will provide internal security support and will not be a service provider to Commands unless specifically delineated in MOAs/MOUs  Model Development - Security Manpower Model will allow re-alignment of security resources (Table of Distribution and Allowances (TDA)) in order for commands to execute mission and provide a validated manpower model to use for security resourcing - Installation support and resources remain in place until TDA re-alignment Security Functional Management

4 Command working with USAMAA Planning and Front End Analysis Data Collection, Analysis/ Validation Product Development/ Recommendations Validate and Approve Requirements Model Review and Accreditation (ASA M&RA) Phase 1-2Phase 5Phase 4Phase months Model Application Phase 6 Command working with G-37/FMP & USAMAA Model Implementation (G-37/FM) Model Implementation Phase 7 Scope the Study / Approach Identify Mission Select Functions for Analysis Establish Timelines Continue/Finalize Analysis Finalize Process Improvements and Assess their Impact Risk Assessment Workforce Mix Analysis Recommendations Verify Final Validation and Verification (Models and Studies) Staff Products Reclama Adjudication Decision Brief  Command applies model and develops the proposed TDA organization  TDA baseline confirmed  Schedule 8 Dir, FM will direct how and when the model will be applied and submitted during the Command Plan process Apply to SAMAS and document requirement Title 10 USC, Sec 129 requires that the generating force be managed solely based on workload and within available funding days Collect Data Validate Mission Validate Workload Conduct Process Improvement Develop Modeling Approaches Security Functional Management

5 Mr. Andrew (Drew) McCall Security Functional Manager HQDA, ODCS, G Security Functional Management


Download ppt "Security Functional Management 2010 Worldwide Security Conference."

Similar presentations


Ads by Google