Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010205762 | TH9705 G54 2009 | Open Access Book | Book | Searching... |
Searching... | 30000010270291 | TH9705 G54 2009 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Engage Stakeholders with a Long-Term Solution
The goal: Convince executive management to "buy in" to your security program, support it, and provide the largest possible amount of funding.
The solution: Develop a meticulously detailed long-term plan that sells decision-makers on the dire need for your program, and then maps out its direction and required budget.
Assess and Outline Security Risks to Map Out Mitigation Strategies
This practical guide details how to construct a customized, comprehensive five-year corporate security plan that synchronizes with the strategies of any business or institution. The author explains how to develop a plan and implementation strategy that aligns with an organization's particular philosophies, strategies, goals, programs, and processes. Readers learn how to outline risks and then formulate appropriate mitigation strategies. This guide provides tested, real-world solutions on how to:
Apply Insights from an Expert with Global Experience at the Highest Level
Author Tim Giles worked at IBM for 31 years serving as Director of Security for the company's operations in the United States and Canada, as well as Latin America and Asia-Pacific. His immeasurable experience and insight provide readers with an extraordinarily comprehensive understanding that they can use to design and execute a highly effective, tailored security program.
Table of Contents
The Business of Security |
Why Should You Develop a Security Master Plan? |
Engaging the Stakeholders |
What Should Your Security Philosophies Be? |
Contract Security Relationship |
What Should Your Security Strategies Be? |
Technology Migration Strategy Equipment |
Replacement Schedules Evaluate the BusinessG++s Risks |
Potential Risks to the Business |
Defining What Your Risks Are Information Gathering |
The Workplace Violence Risk and Beyond Domestic |
Violence in the Workplace Other Risk Factors |
Risks of Fraud and Corruption Theft |
Risks Overseas-Related |
Risks Acts of Nature Information Sources |
Human Resources and the Security Plan |
Reacting to a Defined |
Risk Placing a Value on the Impact of Risk Conducting a Site |
Security Assessment G++ |
Part 1 Assessing Aspects of Security |
Administration Documenting |
Post Orders and Procedures Security |
Personnel Selection and Staffing Considerations Employee |
Selection and Staffing Considerations |
Application Form Security |
Manual Documentation Security |
Education Awareness Contract |
Management and Audit Conducting a Site |
Security Assessment G++ |
Part 2 Assessing Aspects of Physical Security |
Exterior Security |
Assessment G++ Vehicle |
Access Controls |
Parking Lot |
Security Proper |
Use of Signage Security |
Processing Operations G++ Visitor and Contractor Controls |
Proper Use of Lighting Barriers, Doors, and Building Perimeters |
Mechanical Locking Systems |
G++ Locks and Keys Submaster System |
Key Administration Security Officer |
Patrols Security Officer |
Review Crime |
Prevention Through Environmental |
Design Security Staffing Monitoring and Administering |
Physical Protection Systems |
Stationary and High-Visibility Posts Emergency Response Capabilities |
Training Conducting a Site Security Assessment G++ |
Part 3 Assessing the Electronic systems |
Event Driven Fully Integrated |
Closed Circuit Television Access Control Systems |
Access Control System |
Policy Alarm Sensors and Reporting Radio Systems |
Technology Status G++ Current and Future Conducting a Site |
Security Assessment G++ |
Part 4 Assessing Information |
Protection Information |
Security Protection Programs |
Computer and Network Security Ownership |
Security and Computer |
Use Standards for Employees Security |
Requirements Implementing a Classification System |
Investigation Requirements Processing |
Departing Employees Information Asset Security System Misuse |
Summary |
G++ Information Protection |
Government Regulations Conducting an Assessment of the Security |
Organization Reporting Structure |
The Security OrganizationG++s Structure |
Mixed Security Forces Separation of Duties Other Issues |
Security Skills Evaluating the Security Officers |
Evaluating the Shift Supervisors Evaluating the CSO or Director of Security |
Evaluating the Other Security Positions |
Staffing Levels Armed versus Unarmed Officers |
Determining What Prevention, Crisis Management, and Recovery Programs |
Exist Prevention and Recovery Programs Business |
Intelligence Information Crisis Management Planning |
Corporate Reputation Crisis Plan |
Corporate Investigations: Fraud, Financial, Criminal, Computer, and Network Due Diligence Processe |