In consultation with [Information Technology Services] and other responsible organizational units, the Coordinator is to develop and implement effective procedures for preventing, detecting, and responding to actual and attempted attacks, intrusions, and other systems failures.