Book description
Written for corporation security officers, this work is designed to help them garner executive support and increased funding for their security programs. It provides a thorough examination of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies and how to focus on both effectiveness and efficiency while conducting a site security assessment. The author constructs a comprehensive five-year plan that is synchronized with the strategies of a business or institution. This is a valuable reference tool for security professionals of small and large corporations, as well as for consultants in the field.
Table of contents
- Front cover (1/2)
- Front cover (2/2)
- CONTENTS (1/2)
- CONTENTS (2/2)
- AUTHOR PAGE
- INTRODUCTION
- SECURITY MASTER PLAN PROCESS
- INTENT OF THE MASTER PLAN
- Chapter 1. The Business of Security (1/3)
- Chapter 1. The Business of Security (2/3)
- Chapter 1. The Business of Security (3/3)
- Chapter 2. Evaluate the Business's Risks (1/4)
- Chapter 2. Evaluate the Business's Risks (2/4)
- Chapter 2. Evaluate the Business's Risks (3/4)
- Chapter 2. Evaluate the Business's Risks (4/4)
- Chapter 3. Conducting a Site Security Assessment - Part I (1/3)
- Chapter 3. Conducting a Site Security Assessment - Part I (2/3)
- Chapter 3. Conducting a Site Security Assessment - Part I (3/3)
- Chapter 4. Conducting a Site Security Assessment - Part 2 (1/6)
- Chapter 4. Conducting a Site Security Assessment - Part 2 (2/6)
- Chapter 4. Conducting a Site Security Assessment - Part 2 (3/6)
- Chapter 4. Conducting a Site Security Assessment - Part 2 (4/6)
- Chapter 4. Conducting a Site Security Assessment - Part 2 (5/6)
- Chapter 4. Conducting a Site Security Assessment - Part 2 (6/6)
- Chapter 5. Conducting a Site Security Assessment - Part 3 (1/5)
- Chapter 5. Conducting a Site Security Assessment - Part 3 (2/5)
- Chapter 5. Conducting a Site Security Assessment - Part 3 (3/5)
- Chapter 5. Conducting a Site Security Assessment - Part 3 (4/5)
- Chapter 5. Conducting a Site Security Assessment - Part 3 (5/5)
- Chapter 6. Conducting a Site Security Assessment - Part 4 (1/6)
- Chapter 6. Conducting a Site Security Assessment - Part 4 (2/6)
- Chapter 6. Conducting a Site Security Assessment - Part 4 (3/6)
- Chapter 6. Conducting a Site Security Assessment - Part 4 (4/6)
- Chapter 6. Conducting a Site Security Assessment - Part 4 (5/6)
- Chapter 6. Conducting a Site Security Assessment - Part 4 (6/6)
- Chapter 7. Conducting an Assessment of the Security Organization (1/4)
- Chapter 7. Conducting an Assessment of the Security Organization (2/4)
- Chapter 7. Conducting an Assessment of the Security Organization (3/4)
- Chapter 7. Conducting an Assessment of the Security Organization (4/4)
- Chapter 8. Determining What Prevention, Crisis Managment, and Recovery Programs Exist (1/4)
- Chapter 8. Determining What Prevention, Crisis Managment, and Recovery Programs Exist (2/4)
- Chapter 8. Determining What Prevention, Crisis Managment, and Recovery Programs Exist (3/4)
- Chapter 8. Determining What Prevention, Crisis Managment, and Recovery Programs Exist (4/4)
- Chapter 9. Interviewing Executive and Security Management (1/2)
- Chapter 9. Interviewing Executive and Security Management (2/2)
- Chapter 10. Review and Evaluate All Security-Related Contracts and the Information Protection Program (1/3)
- Chapter 10. Review and Evaluate All Security-Related Contracts and the Information Protection Program (2/3)
- Chapter 10. Review and Evaluate All Security-Related Contracts and the Information Protection Program (3/3)
- Chapter 11. Constructing the Security Master Plan Document (1/3)
- Chapter 11. Constructing the Security Master Plan Document (2/3)
- Chapter 11. Constructing the Security Master Plan Document (3/3)
- Chapter 12. Typical Contents of a Security Master Plan (1/2)
- Chapter 12. Typical Contents of a Security Master Plan (2/2)
- Chapter 13. Finalizing the Security Master Plan Process (1/2)
- Chapter 13. Finalizing the Security Master Plan Process (2/2)
- Chapter 14. Utilizing Your Plan in Managing Your Business (1/4)
- Chapter 14. Utilizing Your Plan in Managing Your Business (2/4)
- Chapter 14. Utilizing Your Plan in Managing Your Business (3/4)
- Chapter 14. Utilizing Your Plan in Managing Your Business (4/4)
- Appendix A: WORKPLACE VIOLENCE GUIDELINES (1/5)
- Appendix A: WORKPLACE VIOLENCE GUIDELINES (2/5)
- Appendix A: WORKPLACE VIOLENCE GUIDELINES (3/5)
- Appendix A: WORKPLACE VIOLENCE GUIDELINES (4/5)
- Appendix A: WORKPLACE VIOLENCE GUIDELINES (5/5)
- Appendix B: EXECUTIVE AND EMPLOYEE PROTECTION (1/2)
- Appendix B: EXECUTIVE AND EMPLOYEE PROTECTION (2/2)
- Appendix C: Security Assessment or Self-Assessment Document (1/8)
- Appendix C: Security Assessment or Self-Assessment Document (2/8)
- Appendix C: Security Assessment or Self-Assessment Document (3/8)
- Appendix C: Security Assessment or Self-Assessment Document (4/8)
- Appendix C: Security Assessment or Self-Assessment Document (5/8)
- Appendix C: Security Assessment or Self-Assessment Document (6/8)
- Appendix C: Security Assessment or Self-Assessment Document (7/8)
- Appendix C: Security Assessment or Self-Assessment Document (8/8)
- APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (1/7)
- APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (2/7)
- APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (3/7)
- APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (4/7)
- APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (5/7)
- APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (6/7)
- APPENDIX D: RISK/SECURITY MANAGEMENT & CONSULTING (7/7)
- Appendix E: BASIC PHYSICAL SECURITY STANDARDS (1/2)
- Appendix E: BASIC PHYSICAL SECURITY STANDARDS (2/2)
- Appendix F: Sample Termination Checklist
- Appendix G: CRISIS MANAGEMENT EMERGENCY PLANNING CHECKLIST (1/2)
- Appendix G: CRISIS MANAGEMENT EMERGENCY PLANNING CHECKLIST (2/2)
- INDEX (1/2)
- INDEX (2/2)
- Back cover
Product information
- Title: How to Develop and Implement a Security Master Plan
- Author(s):
- Release date: December 2008
- Publisher(s): Auerbach Publications
- ISBN: 9781420086263
You might also like
book
8 Steps to Better Security
Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 …
book
Advanced Persistent Training : Take Your Security Awareness Program to the Next Level
Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance …
book
Practical Service Level Management: Delivering High-Quality Web-Based Services
Measure, manage, and improve the speed and reliability of web services Complete reference for creating relevant, …
book
The Universal Service Desk (USD) - Implementing, Controlling and Improving Service Delivery
The Universal Service Desk (USD) – Implementing, controlling and improving service delivery defines what a USD …