Where is training needed?
<--- Score
58. Who should resolve the Capability security issues?
<--- Score
59. Are employees recognized for desired behaviors?
<--- Score
60. Are there Capability security problems defined?
<--- Score
61. What activities does the governance board need to consider?
<--- Score
62. What is the problem and/or vulnerability?
<--- Score
63. What is the smallest subset of the problem you can usefully solve?
<--- Score
64. Is the quality assurance team identified?
<--- Score
65. Looking at each person individually – does every one have the qualities which are needed to work in this group?
<--- Score
66. Do you have/need 24-hour access to key personnel?
<--- Score
67. What is the recognized need?
<--- Score
68. Have you identified your Capability security key performance indicators?
<--- Score
69. What training and capacity building actions are needed to implement proposed reforms?
<--- Score
70. Why the need?
<--- Score
71. Who else hopes to benefit from it?
<--- Score
72. How are training requirements identified?
<--- Score
73. How do you identify subcontractor relationships?
<--- Score
74. How many trainings, in total, are needed?
<--- Score
75. Why is this needed?
<--- Score
76. Who defines the rules in relation to any given issue?
<--- Score
77. As a sponsor, customer or management, how important is it to meet goals, objectives?
<--- Score
78. Will it solve real problems?
<--- Score
79. What Capability security coordination do you need?
<--- Score
80. Does your organization need more Capability security education?
<--- Score
81. Whom do you really need or want to serve?
<--- Score
82. How do you recognize an objection?
<--- Score
83. What situation(s) led to this Capability security Self Assessment?
<--- Score
84. How are you going to measure success?
<--- Score
85. Do you need different information or graphics?
<--- Score
86. Who needs to know about Capability security?
<--- Score
87. What is the Capability security problem definition? What do you need to resolve?
<--- Score
88. Which issues are too important to ignore?
<--- Score
89. Are there regulatory / compliance issues?
<--- Score
90. When a Capability security manager recognizes a problem, what options are available?
<--- Score
91. Consider your own Capability security project, what types of organizational problems do you think might be causing or affecting your problem, based on the work done so far?
<--- Score
92. Who needs what information?
<--- Score
93. Did you miss any major Capability security issues?
<--- Score
94. Would you recognize a threat from the inside?
<--- Score
95. What problems are you facing and how do you consider Capability security will circumvent those obstacles?
<--- Score
96. What else needs to be measured?
<--- Score
97. Will Capability security deliverables need to be tested and, if so, by whom?
<--- Score
Add up total points for this section: _____ = Total points for this section
Divided by: ______ (number of statements answered) = ______ Average score for this section
Transfer your score to the Capability security Index at the beginning of the Self-Assessment.
CRITERION #2: DEFINE:
INTENT: Formulate the stakeholder problem. Define the problem, needs and objectives.
In my belief, the answer to this question is clearly defined:
5 Strongly Agree
4 Agree
3 Neutral
2 Disagree
1 Strongly Disagree
1. Have all basic functions of Capability security been defined?
<--- Score
2. What are the boundaries of the scope? What is in bounds and what is not? What is the start point? What is the stop point?
<--- Score
3. Have specific policy objectives been defined?
<--- Score
4. What is the context?
<--- Score
5. What is in scope?
<--- Score
6. How have you defined all Capability security requirements first?
<--- Score
7. What are the rough order estimates on cost savings/opportunities that Capability security brings?
<--- Score
8. Is special Capability security user knowledge required?
<--- Score
9. Are approval levels defined for contracts and supplements to contracts?
<--- Score
10. Do you have a Capability security success story or case study ready to tell and share?
<--- Score
11. Scope of sensitive information?
<--- Score
12. What is the scope?
<--- Score
13. How do you hand over Capability security context?
<---