1 / 8

NAS Logistics Vulnerabilities

NAS Logistics Vulnerabilities. Joe McClure, Steve Blue; FAA Logistics Center Tom Landers, Simin Pulat, Stephanie Cox, Mustafa Pulat; University of Oklahoma Randall Kirk; Global Concepts. NAS Logistics Vulnerabilities. Goals: Evaluate Process/IT, and Stock Vulnerabilities

blake
Download Presentation

NAS Logistics Vulnerabilities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NAS Logistics Vulnerabilities Joe McClure, Steve Blue; FAA Logistics Center Tom Landers, Simin Pulat, Stephanie Cox, Mustafa Pulat; University of Oklahoma Randall Kirk; Global Concepts

  2. NAS Logistics Vulnerabilities • Goals: Evaluate Process/IT, and Stock Vulnerabilities Make Recommendations for Improvement • A Two Phase Approach Phase I: “Low-hanging fruit” Phase II: Detailed Analysis

  3. NAS Logistics Vulnerabilities • Process Vulnerability – Phase I Approach: Process Owner Interviews Initial Vulnerability/Criticality Evaluations LSF&TR Processes IT Support Experiences/ Knowledge

  4. NAS Logistics Vulnerabilities • Process Vulnerability–Phase II (planned) Approach: Operator Interviews Visual Observations Vendor Contacts Phase I Input Final Vulnerability/Criticality Evaluations Enhanced View

  5. NAS Logistics Vulnerabilities • Process Vulnerability – Phase I Results Recommendations based on: Elements Proactive Protective Duplicative Contingent Reactive

  6. NAS Logistics Vulnerabilities • Stock Vulnerability – Phase I Approach: • Define Addressable NSNs • Identify Critical NSNs • Prioritize Within “Critical” • Develop Stocking Alternatives

  7. NAS Logistics Vulnerabilities • Stock Vulnerability – Phase II (Planned) Approach: 1. Increase Scope to Identify All Critical NSNs 2. Explore Additional Stocking Options

  8. NAS Logistics Vulnerabilities • Stock Vulnerability – Phase I Results Critical NSNs Recommendations Based On Stocking Options

More Related