INFORMATION IN THIS CHAPTER:
• How to create an in-transit security plan that is customizable to an ever-changing logistics environment
• A breakdown of the topics required for a comprehensive in-transit security plan and methods for assessing in-transit security risk
• How to apply a layered security approach to a multitier, multivendor distribution model
• Use of technology in logistics and transportation security programs
Envision a company that manufactures and distributes cargo considered by any measure to be high value and theft-attractive. The company fully understands the desire by criminals to steal its product and has a state-of-the-art security program at its facilities.
In place are towering perimeter barriers, ...