The final step in the mission-based analysis is to identify corrective actions, categorized as either no/low cost or those requiring resources. It is crucial that the offices (e.g., police, facilities, IT) responsible for implementing these actions are identified.
Analysis Method Must be Thorough
There are scores of security analysis methodologies in use in the military, businesses and the public sector. These plans, if thorough, will consider:
- What are the agency’s mission priorities?
- What is the nature of the threat?
- Which assets require priority protection?
- Which inputs are available to achieve each mission?
- Which inputs have the greatest effect on the greatest number of priority outputs?
- What are the priorities of corrective actions?
However an agency elects to implement its security responsibilities, it must plan, then work hard to implement it and finally reevaluate security on a periodic basis to account for the dynamic security environment.
Lt. John Weinstein, a District Commander with northern Virginia Community College’s Police Department, is certified by Virginia’s Department of Criminal Justice Services as a firearms instructor and he is his department’s lead firearms instructor. He also conducts firearms training at two local police academies. Weinstein has numerous firearms training materials that are available upon request.
If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!
Leave a Reply