How to Develop and Implement a Security Master Plan
Autor Timothy Gilesen Limba Engleză Hardback – 17 dec 2008
The goal: Convince executive management to "buy in" to your security program, support it, and provide the largest possible amount of funding.
The solution: Develop a meticulously detailed long-term plan that sells decision-makers on the dire need for your program, and then maps out its direction and required budget.
Assess and Outline Security Risks to Map Out Mitigation Strategies
This practical guide details how to construct a customized, comprehensive five-year corporate security plan that synchronizes with the strategies of any business or institution. The author explains how to develop a plan and implementation strategy that aligns with an organization’s particular philosophies, strategies, goals, programs, and processes. Readers learn how to outline risks and then formulate appropriate mitigation strategies. This guide provides tested, real-world solutions on how to:
- Conduct an effective, efficient assessment of the site and security personnel, meticulously addressing the particular needs of many different environments
- Make decisions about security philosophies, strategies, contract relationships, technology, and equipment replacement
- Interview executive and security management to determine their concerns, educate them, and ensure that they buy in to your plan
- Use all gathered data to construct and finalize the Security Master Plan and then implement it into the management of the business
Author Tim Giles worked at IBM for 31 years serving as Director of Security for the company’s operations in the United States and Canada, as well as Latin America and Asia-Pacific. His immeasurable experience and insight provide readers with an extraordinarily comprehensive understanding that they can use to design and execute a highly effective, tailored security program.
Preț: 830.55 lei
Preț vechi: 1012.86 lei
-18% Nou
Puncte Express: 1246
Preț estimativ în valută:
158.95€ • 165.59$ • 132.16£
158.95€ • 165.59$ • 132.16£
Carte tipărită la comandă
Livrare economică 08-22 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781420086256
ISBN-10: 1420086251
Pagini: 374
Ilustrații: 45 b/w images and 2 tables
Dimensiuni: 156 x 234 x 28 mm
Greutate: 0.68 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 1420086251
Pagini: 374
Ilustrații: 45 b/w images and 2 tables
Dimensiuni: 156 x 234 x 28 mm
Greutate: 0.68 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Professional and Professional Practice & DevelopmentCuprins
The Business of Security. Evaluate the Business’s Risks. Conducting a Site Security Assessment — Part 1. Conducting a Site Security Assessment — Part 2. Conducting a Site Security Assessment — Part 3. Conducting a Site Security Assessment — Part 4. Conducting an Assessment of the Security Organization. Determining What Prevention, Crisis Management, and Recovery Programs Exist. Interviewing Executive and Security Management. Review and Evaluate All Security-Related Contracts and the Information Protection Program. Constructing the Security Master Plan Document. Typical Contents of a Security Master Plan. Finalizing the Security Master Plan Process. Utilizing Your Plan in Managing Your Business. Appendices.
Recenzii
This practical guide details how to construct a customized, comprehensive, five-year corporate security plan that synchronizes with the strategies of any business or institution.
– In ASIS Dynamics, May/June 2009
In this well-written, well-organized book, author Timothy D. Giles, CPP, PSP, provides a thorough overview of how to develop a five-year security master plan that aligns with both an organization’s security philosophy and its overall business plan. … In addition to explanation of data collection and analysis procedures, the text features an outline of a plan document including guidelines for how to address the budget and establishing a return on investment, as well as a discussion on how to approach the final recommendations’ presentation. … A valuable appendix includes guidelines for dealing with workplace violence issues, material on executive protection, self-assessment templates, and an example of a format for a consulting proposal. … It is an excellent road map for security professionals to use as a benchmark relative to their own practices and would also be an excellent text for students assigned to evaluate a security program.
—George Okaty, Director of Safety & Security, Tidewater Community College, Virginia, in Security Magazine, September 2010
– In ASIS Dynamics, May/June 2009
In this well-written, well-organized book, author Timothy D. Giles, CPP, PSP, provides a thorough overview of how to develop a five-year security master plan that aligns with both an organization’s security philosophy and its overall business plan. … In addition to explanation of data collection and analysis procedures, the text features an outline of a plan document including guidelines for how to address the budget and establishing a return on investment, as well as a discussion on how to approach the final recommendations’ presentation. … A valuable appendix includes guidelines for dealing with workplace violence issues, material on executive protection, self-assessment templates, and an example of a format for a consulting proposal. … It is an excellent road map for security professionals to use as a benchmark relative to their own practices and would also be an excellent text for students assigned to evaluate a security program.
—George Okaty, Director of Safety & Security, Tidewater Community College, Virginia, in Security Magazine, September 2010
Descriere
Written for corporation security officers, this work is designed to help them garner executive support and increased funding for their security programs. It provides a thorough examination of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies and how to focus on both effectiveness and efficiency while conducting a site security assessment. The author constructs a comprehensive five-year plan that is synchronized with the strategies of a business or institution. This is a valuable reference tool for security professionals of small and large corporations, as well as for consultants in the field.