SharePoint: Unique Solutions for Homeland Security Partners

SharePoint: Unique Solutions for Homeland Security Partners

SharePoint: Unique Solutions for Homeland Security Partners

As information sharing has become more common across local, state, and federal agencies, homeland security partners need tools to manage this critical data. SharePoint has emerged as an information sharing tool that can assist emergency managers, law enforcement agencies, and others across the homeland security enterprise with the sharing of sensitive data with internal and external partners, quickly and securely.

SharePoint’s customizable web-based platform is multi-faceted and provides a wide range of capabilities. Features such as document sharing and collaboration, secure file management with the ability to restrict users or user groups, customizable interfaces to meet unique mission requirements, and database management tools to include alerts and notifications could greatly benefit homeland security professionals.

Examples of how agencies can use SharePoint:

  • Emergency management professionals can use SharePoint to track equipment across a geographic distance. Equipment that is distributed to multiple agencies and multiple locations can be catalogued or monitored for expiration dates, and individual team members can provide updates
  • Emergency managers tasked with continuity of operations (COOP) planning can use SharePoint as a document library. Using SharePoint, maintaining COOP plans, contacts, and other documentation makes disaster planning for individual departments or across multiple agencies possible
  • Law enforcement agencies can use SharePoint to process information in real-time to manage complex investigations and provide situational awareness across multiple agencies.  Tools created in SharePoint allow multiple agencies to simultaneously input information for major cases, including AMBER and human trafficking alerts, into a central repository, allowing multiple agencies to collaboratively monitor threats
  • Special event planners can use SharePoint to manage large events. During the preparation phase, sensitive information such as contact lists and facility graphics can be placed in SharePoint to facilitate collaboration among security personnel.  During the operational phase, SharePoint can transition into a tool used for real-time incident monitoring for first responders
  • First responders and emergency managers can centralize training logs via SharePoint across jurisdictions or locations

The solutions SharePoint provides for homeland security professionals are as diverse as the agencies that use them. Tailorable tools – customized with the critical needs of homeland security partners in mind – can help agencies prepare for and respond to critical natural disasters and large-scale security events.

About Arc Aspicio
Arc Aspicio is a management, strategy, and technology consulting firm that takes a mission-oriented approach to complex client challenges. As a rapidly growing company, Arc Aspicio has a bold strategy for 2016-2018 that drives growth through new capabilities in strategy, design, human capital, data analytics, information sharing, cybersecurity, and strategic communications. The company is known for a strong, collaborative culture that values gratitude – for its clients and its great team. And, #welovedogs! Follow us on Twitter @arcaspicio or learn more at www.arcaspicio.com.

Contributors

Keith Rossmiller |

Keith joined Arc Aspicio in June 2016. Keith Rossmiller was a career intelligence professional serving 20 years in the U.S. Army, retiring in 2015. During his career, Keith supervised teams responsible for conducting analysis relative to counterterrorism, political, economic, social, cultural, physical, geographic, technical, and military issues within the global community.  Outside of work, Keith is a certified dog trainer and volunteers at a local animal shelter. 

Reinventing Strategy

Reinventing Strategy

Since the GPRA Modernization Act in 2010, agencies across the Federal Government have raced to establish new Strategic Plans in response to incoming Presidential Administrations and agency leaders. Developing a new Strategic Plan is incredibly exciting for an agency. Leaders can redefine priorities, frontline managers can improve mission performance, and employees can better engage with the mission. Strategy, however, is so much more than just a Strategic Plan.

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

As the Government continually looks for ways to increase efficiency and encourage innovation, Information Technology (IT) is emerging as a solution to these needs. Recent Federal guidance mandates all agencies to adopt a new framework for better understanding IT costs. Technology Business Management (TBM) is a framework that incorporates IT departments into the overall business network, shifting away from treating IT as an independent unit. This provides a clear way to evaluate and manage IT, running IT as a business and communicating the value of new IT investments.

Behavioral Science – Using Behavioral Science to Affect Action

Behavioral Science – Using Behavioral Science to Affect Action

How do organizations encourage behavior change in their customers? Increasingly, they focus on customer experience, and as a consequence employ behavioral science methodologies. At the heart of behavioral science is the consideration of how an organization can make small investments that generate incremental savings/returns while considering both customers and organizational benefits. One example is Transportation Security Administration’s (TSA) Pre✓® and U.C. Customs and Border Protection’s Global Entry programs.

Launching into #Action Through Strategy

Launching into #Action Through Strategy

As a new employee, your first company-wide meeting can make you nervous. This was how I felt.

Arc Aspicio’s recent Strategy Launch Day was so well planned and it involved participants so that I learned that I had nothing to worry about! The company treats each employee equally and equips even the newest joiners with the information and skills they need to have a meaningful experience

What Being a Consultant Means to Me

What Being a Consultant Means to Me

As a Consulting Associate at Arc Aspicio, I provide expertise and insight to help clients solve difficult problems. To be successful, a consultant does not need only to be a subject matter expert on their client’s industry and needs - though this often ends up happening over time.

Captivate Your Audience Through Design+Data

Captivate Your Audience Through Design+Data

So often, senior leaders must communicate their strategic and simple vision in a world of growing complexity. They must make decisions – and frequently explain them – based on an enterprise view of their data. It’s getting easier to do this these days through data visualizations and infographics that speak to specific employee and stakeholder audiences. Design+Data is what we call it at Arc Aspicio.

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

With an exponential increase in the types and quantities of data, organizations need defined strategies and techniques to manage data as an enterprise asset. To create enterprise-wide use of data, a Chief Data Officer (CDO) needs a clear data agenda for leadership and the whole organization to address current and future needs. CDOs should follow this six-part data plan to achieve short term capability gains and plot a path to greater enterprise data maturity.

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Cybersecurity, managing and protecting computer systems from attacks, is evolving just as quickly as the techniques hackers use to cause damage. Historically, the public and private sectors believed that stronger technology and more advanced computer systems alone were enough to prevent attacks. As new trends emerge and the technologies used to both conduct and prevent hackings improve, cybersecurity strategies must remain agile, trying new tactics to counter changing threats.

Hacking Back – Do the Benefits Outweigh the Risks?

Hacking Back – Do the Benefits Outweigh the Risks?

With the increased frequency and sophistication of cyber-attacks worldwide, companies and executives are becoming frustrated with a traditional focus on defensive tactics. As a result, some private sector actors are taking a more active role in cybersecurity by “hacking back” – hacking against the very groups that are attacking their systems in retaliation or to retrieve stolen data. As hacking back rises in popularity, it is important to consider a number of political and legal issues and the risks to counter-terrorism efforts.