2010 Worldwide Security Conference Security Functional Management Security

  • Slides: 5
Download presentation
2010 Worldwide Security Conference Security Functional Management

2010 Worldwide Security Conference Security Functional Management

Security Functional Management Security Resource Management • Management Decision Package (MDEP) GPSI - Personnel

Security Functional Management Security Resource Management • Management Decision Package (MDEP) GPSI - Personnel Security Investigations (PSI) projections and billing validation - Army Central Clearance Facility (A/CCF) operations - Army Investigative Enterprise Solution (AIES) resource implementation • Management Decision Package (MDEP) QSEC - Security specialist civ-pay (not exclusive to all 0080 s) - Training / Travel - Operational Equipment • Building the Program Objective Memorandum (POM) - Initial Programming - Command Participation - Program Evaluation Groups (PEGs) - POM - OSD Review - Program Decision Memorandums (PDMs)

Security Functional Management Security Manpower Model • Decision Point 91 / 59 - ACOMs,

Security Functional Management Security Manpower Model • Decision Point 91 / 59 - ACOMs, ASCCs, and DRUs will independently manage and execute their security programs - IMCOM will provide internal security support and will not be a service provider to Commands unless specifically delineated in MOAs/MOUs § Model Development - Security Manpower Model will allow re-alignment of security resources (Table of Distribution and Allowances (TDA)) in order for commands to execute mission and provide a validated manpower model to use for security resourcing - Installation support and resources remain in place until TDA re-alignment

Security Functional Management Title 10 USC, Sec 129 requires that the generating force be

Security Functional Management Title 10 USC, Sec 129 requires that the generating force be managed solely based on workload and within available funding Model Review and Accreditation (ASA M&RA) Command working with USAMAA 6 -12 months Phase 1 -2 Planning and Front End Analysis • Scope the Study / Approach • Identify Mission • Select Functions for Analysis • Establish Timelines Command working with G-37/FMP & USAMAA Model Implementation (G -37/FM) 30 -60 days Phase 3 Phase 4 Phase 5 Phase 6 Data Collection, Analysis/ Validation Product Development/ Recommendations Validate and Approve Requirements Model Application • Collect Data • Validate Mission • Validate Workload • Conduct Process Improvement • Develop Modeling Approaches • Continue/Finalize Analysis • Finalize Process Improvements and Assess their Impact • Risk Assessment • Workforce Mix Analysis • Recommendations • Verify • Final Validation and Verification (Models and Studies) • Staff Products • Reclama Adjudication • Decision Brief § Command applies model and develops the proposed TDA organization § TDA baseline confirmed § Schedule 8 Phase 7 Model Implementation • Dir, FM will direct how and when the model will be applied and submitted during the Command Plan process • Apply to SAMAS and document requirement

Security Functional Management Mr. Andrew (Drew) Mc. Call Security Functional Manager HQDA, ODCS, G-2

Security Functional Management Mr. Andrew (Drew) Mc. Call Security Functional Manager HQDA, ODCS, G-2 Andrew. Mc. Call@us. army. mil 703 -695 -2569