How to Develop and Implement a Security Master Plan

Book description

Written for corporation security officers, this work is designed to help them garner executive support and increased funding for their security programs. It provides a thorough examination of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies and how to focus on both effectiveness and efficiency while conducting a site security assessment. The author constructs a comprehensive five-year plan that is synchronized with the strategies of a business or institution. This is a valuable reference tool for security professionals of small and large corporations, as well as for consultants in the field.

Table of contents

  1. Front cover (1/2)
  2. Front cover (2/2)
  3. CONTENTS (1/2)
  4. CONTENTS (2/2)
  5. AUTHOR PAGE
  6. INTRODUCTION
  7. SECURITY MASTER PLAN PROCESS
  8. INTENT OF THE MASTER PLAN
  9. Chapter 1. The Business of Security (1/3)
  10. Chapter 1. The Business of Security (2/3)
  11. Chapter 1. The Business of Security (3/3)
  12. Chapter 2. Evaluate the Business's Risks (1/4)
  13. Chapter 2. Evaluate the Business's Risks (2/4)
  14. Chapter 2. Evaluate the Business's Risks (3/4)
  15. Chapter 2. Evaluate the Business's Risks (4/4)
  16. Chapter 3. Conducting a Site Security Assessment - Part I (1/3)
  17. Chapter 3. Conducting a Site Security Assessment - Part I (2/3)
  18. Chapter 3. Conducting a Site Security Assessment - Part I (3/3)
  19. Chapter 4. Conducting a Site Security Assessment - Part 2 (1/6)
  20. Chapter 4. Conducting a Site Security Assessment - Part 2 (2/6)
  21. Chapter 4. Conducting a Site Security Assessment - Part 2 (3/6)
  22. Chapter 4. Conducting a Site Security Assessment - Part 2 (4/6)
  23. Chapter 4. Conducting a Site Security Assessment - Part 2 (5/6)
  24. Chapter 4. Conducting a Site Security Assessment - Part 2 (6/6)
  25. Chapter 5. Conducting a Site Security Assessment - Part 3 (1/5)
  26. Chapter 5. Conducting a Site Security Assessment - Part 3 (2/5)
  27. Chapter 5. Conducting a Site Security Assessment - Part 3 (3/5)
  28. Chapter 5. Conducting a Site Security Assessment - Part 3 (4/5)
  29. Chapter 5. Conducting a Site Security Assessment - Part 3 (5/5)
  30. Chapter 6. Conducting a Site Security Assessment - Part 4 (1/6)
  31. Chapter 6. Conducting a Site Security Assessment - Part 4 (2/6)
  32. Chapter 6. Conducting a Site Security Assessment - Part 4 (3/6)
  33. Chapter 6. Conducting a Site Security Assessment - Part 4 (4/6)
  34. Chapter 6. Conducting a Site Security Assessment - Part 4 (5/6)
  35. Chapter 6. Conducting a Site Security Assessment - Part 4 (6/6)
  36. Chapter 7. Conducting an Assessment of the Security Organization (1/4)
  37. Chapter 7. Conducting an Assessment of the Security Organization (2/4)
  38. Chapter 7. Conducting an Assessment of the Security Organization (3/4)
  39. Chapter 7. Conducting an Assessment of the Security Organization (4/4)
  40. Chapter 8. Determining What Prevention, Crisis Managment, and Recovery Programs Exist (1/4)
  41. Chapter 8. Determining What Prevention, Crisis Managment, and Recovery Programs Exist (2/4)
  42. Chapter 8. Determining What Prevention, Crisis Managment, and Recovery Programs Exist (3/4)
  43. Chapter 8. Determining What Prevention, Crisis Managment, and Recovery Programs Exist (4/4)
  44. Chapter 9. Interviewing Executive and Security Management (1/2)
  45. Chapter 9. Interviewing Executive and Security Management (2/2)
  46. Chapter 10. Review and Evaluate All Security-Related Contracts and the Information Protection Program (1/3)
  47. Chapter 10. Review and Evaluate All Security-Related Contracts and the Information Protection Program (2/3)
  48. Chapter 10. Review and Evaluate All Security-Related Contracts and the Information Protection Program (3/3)
  49. Chapter 11. Constructing the Security Master Plan Document (1/3)
  50. Chapter 11. Constructing the Security Master Plan Document (2/3)
  51. Chapter 11. Constructing the Security Master Plan Document (3/3)
  52. Chapter 12. Typical Contents of a Security Master Plan (1/2)
  53. Chapter 12. Typical Contents of a Security Master Plan (2/2)
  54. Chapter 13. Finalizing the Security Master Plan Process (1/2)
  55. Chapter 13. Finalizing the Security Master Plan Process (2/2)
  56. Chapter 14. Utilizing Your Plan in Managing Your Business (1/4)
  57. Chapter 14. Utilizing Your Plan in Managing Your Business (2/4)
  58. Chapter 14. Utilizing Your Plan in Managing Your Business (3/4)
  59. Chapter 14. Utilizing Your Plan in Managing Your Business (4/4)
  60. Appendix A: WORKPLACE VIOLENCE GUIDELINES (1/5)
  61. Appendix A: WORKPLACE VIOLENCE GUIDELINES (2/5)
  62. Appendix A: WORKPLACE VIOLENCE GUIDELINES (3/5)
  63. Appendix A: WORKPLACE VIOLENCE GUIDELINES (4/5)
  64. Appendix A: WORKPLACE VIOLENCE GUIDELINES (5/5)
  65. Appendix B: EXECUTIVE AND EMPLOYEE PROTECTION (1/2)
  66. Appendix B: EXECUTIVE AND EMPLOYEE PROTECTION (2/2)
  67. Appendix C: Security Assessment or Self-Assessment Document (1/8)
  68. Appendix C: Security Assessment or Self-Assessment Document (2/8)
  69. Appendix C: Security Assessment or Self-Assessment Document (3/8)
  70. Appendix C: Security Assessment or Self-Assessment Document (4/8)
  71. Appendix C: Security Assessment or Self-Assessment Document (5/8)
  72. Appendix C: Security Assessment or Self-Assessment Document (6/8)
  73. Appendix C: Security Assessment or Self-Assessment Document (7/8)
  74. Appendix C: Security Assessment or Self-Assessment Document (8/8)
  75. APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (1/7)
  76. APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (2/7)
  77. APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (3/7)
  78. APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (4/7)
  79. APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (5/7)
  80. APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (6/7)
  81. APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (7/7)
  82. Appendix E: BASIC PHYSICAL SECURITY STANDARDS (1/2)
  83. Appendix E: BASIC PHYSICAL SECURITY STANDARDS (2/2)
  84. Appendix F: Sample Termination Checklist
  85. Appendix G: CRISIS MANAGEMENT EMERGENCY PLANNING CHECKLIST (1/2)
  86. Appendix G: CRISIS MANAGEMENT EMERGENCY PLANNING CHECKLIST (2/2)
  87. INDEX (1/2)
  88. INDEX (2/2)
  89. Back cover

Product information

  • Title: How to Develop and Implement a Security Master Plan
  • Author(s): Timothy Giles
  • Release date: December 2008
  • Publisher(s): Auerbach Publications
  • ISBN: 9781420086263