Managing Security Overseas

Book description

Threats to multinational corporations come in two forms: natural and man-made. This book illustrates the types of risks that confront corporations when working outside of North America. It provides key tools and understanding that are required to do business in a safe and secure manner, no matter the level of risk. It walks through a logical framew

Table of contents

  1. Front cover
  2. CONTENTS (1/2)
  3. CONTENTS (2/2)
  4. PREFACE
  5. INTRODUCTION (1/2)
  6. INTRODUCTION (2/2)
  7. AUTHOR BIOGRAPHY
  8. Chapter 1. Challenges to Security Management in Companies with Global and High-Risk Operations (1/2)
  9. Chapter 1. Challenges to Security Management in Companies with Global and High-Risk Operations (2/2)
  10. Chapter 2. Travel Tracking and Intelligence Issues: It's 3:00 a.m.-Do You Know Where Your Expats Are? (1/2)
  11. Chapter 2. Travel Tracking and Intelligence Issues: It's 3:00 a.m.-Do You Know Where Your Expats Are? (2/2)
  12. Chapter 3. Risk Assessment Methodologies: The 5:00 p.m. Friday Telephone Call-"We've Got a Project Kicking Off Monday in Colombia" (1/6)
  13. Chapter 3. Risk Assessment Methodologies: The 5:00 p.m. Friday Telephone Call-"We've Got a Project Kicking Off Monday in Colombia" (2/6)
  14. Chapter 3. Risk Assessment Methodologies: The 5:00 p.m. Friday Telephone Call-"We've Got a Project Kicking Off Monday in Colombia" (3/6)
  15. Chapter 3. Risk Assessment Methodologies: The 5:00 p.m. Friday Telephone Call-"We've Got a Project Kicking Off Monday in Colombia" (4/6)
  16. Chapter 3. Risk Assessment Methodologies: The 5:00 p.m. Friday Telephone Call-"We've Got a Project Kicking Off Monday in Colombia" (5/6)
  17. Chapter 3. Risk Assessment Methodologies: The 5:00 p.m. Friday Telephone Call-"We've Got a Project Kicking Off Monday in Colombia" (6/6)
  18. Chapter 4. Protecting People Who Don't Believe They Need to Be Protected: "I Would Prefer to Go Low Profile" (1/4)
  19. Chapter 4. Protecting People Who Don't Believe They Need to Be Protected: "I Would Prefer to Go Low Profile" (2/4)
  20. Chapter 4. Protecting People Who Don't Believe They Need to Be Protected: "I Would Prefer to Go Low Profile" (3/4)
  21. Chapter 4. Protecting People Who Don't Believe They Need to Be Protected: "I Would Prefer to Go Low Profile" (4/4)
  22. Chapter 5. Security, Crisis Management, and Evacuation Planning: The 2:00 a.m. Friday Telephone Call-"The Missiles Are Flying All around Us!" (1/6)
  23. Chapter 5. Security, Crisis Management, and Evacuation Planning: The 2:00 a.m. Friday Telephone Call-"The Missiles Are Flying All around Us!" (2/6)
  24. Chapter 5. Security, Crisis Management, and Evacuation Planning: The 2:00 a.m. Friday Telephone Call-"The Missiles Are Flying All around Us!" (3/6)
  25. Chapter 5. Security, Crisis Management, and Evacuation Planning: The 2:00 a.m. Friday Telephone Call-"The Missiles Are Flying All around Us!" (4/6)
  26. Chapter 5. Security, Crisis Management, and Evacuation Planning: The 2:00 a.m. Friday Telephone Call-"The Missiles Are Flying All around Us!" (5/6)
  27. Chapter 5. Security, Crisis Management, and Evacuation Planning: The 2:00 a.m. Friday Telephone Call-"The Missiles Are Flying All around Us!" (6/6)
  28. Chapter 6. Crisis Management Do's and Don'ts: Pushing the Crisis Button (1/4)
  29. Chapter 6. Crisis Management Do's and Don'ts: Pushing the Crisis Button (2/4)
  30. Chapter 6. Crisis Management Do's and Don'ts: Pushing the Crisis Button (3/4)
  31. Chapter 6. Crisis Management Do's and Don'ts: Pushing the Crisis Button (4/4)
  32. Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (1/10)
  33. Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (2/10)
  34. Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (3/10)
  35. Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (4/10)
  36. Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (5/10)
  37. Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (6/10)
  38. Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (7/10)
  39. Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (8/10)
  40. Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (9/10)
  41. Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (10/10)
  42. Chapter 8. Predeployment and Security Awareness Training: "Tell Me Everything I Need to Know about This Country in about 15 Minutes' (1/6)
  43. Chapter 8. Predeployment and Security Awareness Training: "Tell Me Everything I Need to Know about This Country in about 15 Minutes' (2/6)
  44. Chapter 8. Predeployment and Security Awareness Training: "Tell Me Everything I Need to Know about This Country in about 15 Minutes' (3/6)
  45. Chapter 8. Predeployment and Security Awareness Training: "Tell Me Everything I Need to Know about This Country in about 15 Minutes' (4/6)
  46. Chapter 8. Predeployment and Security Awareness Training: "Tell Me Everything I Need to Know about This Country in about 15 Minutes' (5/6)
  47. Chapter 8. Predeployment and Security Awareness Training: "Tell Me Everything I Need to Know about This Country in about 15 Minutes' (6/6)
  48. Chapter 9. Establishing and Maintaining Contact and Coordination with Local, Regional, and International Authorities: "We Need a Favor, We Have People in Your Country That We Need Evacuated Now!" (1/2)
  49. Chapter 9. Establishing and Maintaining Contact and Coordination with Local, Regional, and International Authorities: "We Need a Favor, We Have People in Your Country That We Need Evacuated Now!" (2/2)
  50. Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (1/7)
  51. Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (2/7)
  52. Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (3/7)
  53. Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (4/7)
  54. Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (5/7)
  55. Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (6/7)
  56. Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (7/7)
  57. Chapter 11. Maximizing Your Security and Crisis Management Efficiency: "How to Be All Things to All People, and Keeping It Real" (1/4)
  58. Chapter 11. Maximizing Your Security and Crisis Management Efficiency: "How to Be All Things to All People, and Keeping It Real" (2/4)
  59. Chapter 11. Maximizing Your Security and Crisis Management Efficiency: "How to Be All Things to All People, and Keeping It Real" (3/4)
  60. Chapter 11. Maximizing Your Security and Crisis Management Efficiency: "How to Be All Things to All People, and Keeping It Real" (4/4)
  61. APPENDIX A: EMERGENCY MANAGEMENT PLAN (1/3)
  62. APPENDIX A: EMERGENCY MANAGEMENT PLAN (2/3)
  63. APPENDIX A: EMERGENCY MANAGEMENT PLAN (3/3)
  64. APPENDIX B: GENERAL STRIKE/PROTEST OVERVIEW (1/5)
  65. APPENDIX B: GENERAL STRIKE/PROTEST OVERVIEW (2/5)
  66. APPENDIX B: GENERAL STRIKE/PROTEST OVERVIEW (3/5)
  67. APPENDIX B: GENERAL STRIKE/PROTEST OVERVIEW (4/5)
  68. APPENDIX B: GENERAL STRIKE/PROTEST OVERVIEW (5/5)
  69. APPENDIX C: BOMB THREAT PROCEDURES (1/2)
  70. APPENDIX C: BOMB THREAT PROCEDURES (2/2)
  71. APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (1/8)
  72. APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (2/8)
  73. APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (3/8)
  74. APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (4/8)
  75. APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (5/8)
  76. APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (6/8)
  77. APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (7/8)
  78. APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (8/8)
  79. APPENDIX E: WORKPLACE VIOLENCE PROCEDURES
  80. INDEX (1/3)
  81. INDEX (2/3)
  82. INDEX (3/3)
  83. Back cover

Product information

  • Title: Managing Security Overseas
  • Author(s): Scott Alan Ast
  • Release date: August 2009
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439804681