Skip to:Content
|
Bottom
Cover image for How to develop and implement a security master plan
Title:
How to develop and implement a security master plan
Personal Author:
Publication Information:
Boca Raton, FL : Auerbach Publications, 2009
Physical Description:
xxii, 351 p. : ill. ; 25 cm.
ISBN:
9781420086256

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010205762 TH9705 G54 2009 Open Access Book Book
Searching...
Searching...
30000010270291 TH9705 G54 2009 Open Access Book Book
Searching...

On Order

Summary

Summary

Engage Stakeholders with a Long-Term Solution

The goal: Convince executive management to "buy in" to your security program, support it, and provide the largest possible amount of funding.

The solution: Develop a meticulously detailed long-term plan that sells decision-makers on the dire need for your program, and then maps out its direction and required budget.

Assess and Outline Security Risks to Map Out Mitigation Strategies
This practical guide details how to construct a customized, comprehensive five-year corporate security plan that synchronizes with the strategies of any business or institution. The author explains how to develop a plan and implementation strategy that aligns with an organization's particular philosophies, strategies, goals, programs, and processes. Readers learn how to outline risks and then formulate appropriate mitigation strategies. This guide provides tested, real-world solutions on how to:

Conduct an effective, efficient assessment of the site and security personnel, meticulously addressing the particular needs of many different environments Make decisions about security philosophies, strategies, contract relationships, technology, and equipment replacement Interview executive and security management to determine their concerns, educate them, and ensure that they buy in to your plan Use all gathered data to construct and finalize the Security Master Plan and then implement it into the management of the business

Apply Insights from an Expert with Global Experience at the Highest Level
Author Tim Giles worked at IBM for 31 years serving as Director of Security for the company's operations in the United States and Canada, as well as Latin America and Asia-Pacific. His immeasurable experience and insight provide readers with an extraordinarily comprehensive understanding that they can use to design and execute a highly effective, tailored security program.


Table of Contents

The Business of Security
Why Should You Develop a Security Master Plan?
Engaging the Stakeholders
What Should Your Security Philosophies Be?
Contract Security Relationship
What Should Your Security Strategies Be?
Technology Migration Strategy Equipment
Replacement Schedules Evaluate the BusinessG++s Risks
Potential Risks to the Business
Defining What Your Risks Are Information Gathering
The Workplace Violence Risk and Beyond Domestic
Violence in the Workplace Other Risk Factors
Risks of Fraud and Corruption Theft
Risks Overseas-Related
Risks Acts of Nature Information Sources
Human Resources and the Security Plan
Reacting to a Defined
Risk Placing a Value on the Impact of Risk Conducting a Site
Security Assessment G++
Part 1 Assessing Aspects of Security
Administration Documenting
Post Orders and Procedures Security
Personnel Selection and Staffing Considerations Employee
Selection and Staffing Considerations
Application Form Security
Manual Documentation Security
Education Awareness Contract
Management and Audit Conducting a Site
Security Assessment G++
Part 2 Assessing Aspects of Physical Security
Exterior Security
Assessment G++ Vehicle
Access Controls
Parking Lot
Security Proper
Use of Signage Security
Processing Operations G++ Visitor and Contractor Controls
Proper Use of Lighting Barriers, Doors, and Building Perimeters
Mechanical Locking Systems
G++ Locks and Keys Submaster System
Key Administration Security Officer
Patrols Security Officer
Review Crime
Prevention Through Environmental
Design Security Staffing Monitoring and Administering
Physical Protection Systems
Stationary and High-Visibility Posts Emergency Response Capabilities
Training Conducting a Site Security Assessment G++
Part 3 Assessing the Electronic systems
Event Driven Fully Integrated
Closed Circuit Television Access Control Systems
Access Control System
Policy Alarm Sensors and Reporting Radio Systems
Technology Status G++ Current and Future Conducting a Site
Security Assessment G++
Part 4 Assessing Information
Protection Information
Security Protection Programs
Computer and Network Security Ownership
Security and Computer
Use Standards for Employees Security
Requirements Implementing a Classification System
Investigation Requirements Processing
Departing Employees Information Asset Security System Misuse
Summary
G++ Information Protection
Government Regulations Conducting an Assessment of the Security
Organization Reporting Structure
The Security OrganizationG++s Structure
Mixed Security Forces Separation of Duties Other Issues
Security Skills Evaluating the Security Officers
Evaluating the Shift Supervisors Evaluating the CSO or Director of Security
Evaluating the Other Security Positions
Staffing Levels Armed versus Unarmed Officers
Determining What Prevention, Crisis Management, and Recovery Programs
Exist Prevention and Recovery Programs Business
Intelligence Information Crisis Management Planning
Corporate Reputation Crisis Plan
Corporate Investigations: Fraud, Financial, Criminal, Computer, and Network Due Diligence Processe
Go to:Top of Page