| |
| |
Foreword | |
| |
| |
Preface | |
| |
| |
Acknowledgments | |
| |
| |
Introduction | |
| |
| |
| |
The Old and New World of the Security Professional | |
| |
| |
| |
It's a New Century and a New World | |
| |
| |
Introduction to the New World | |
| |
| |
Summary | |
| |
| |
| |
New and Old Threats to Corporate Assets, and What to Do about Them | |
| |
| |
Introduction to the World of Threats, Vulnerabilities, and Risks to Corporate Assets | |
| |
| |
Threats | |
| |
| |
The Work Environment Has Changed | |
| |
| |
Case Study | |
| |
| |
Motivations of Threat Agents, the Attackers | |
| |
| |
Vulnerabilities | |
| |
| |
Risks | |
| |
| |
Summary | |
| |
| |
| |
A Short History of Corporate Security and Law Enforcement | |
| |
| |
Introduction to the World of Security and Law Enforcement | |
| |
| |
Definition of Security and Its Environment | |
| |
| |
Historical Overview of the Origins of Security | |
| |
| |
A Short History of Law Enforcement and Its Relationship to Security | |
| |
| |
The Changing Security and Business Environment | |
| |
| |
Summary | |
| |
| |
| |
The Corporate Security Profession | |
| |
| |
The Need for Corporate Security | |
| |
| |
Corporate Security Today | |
| |
| |
The Role of the Corporate Security Professional | |
| |
| |
The Required Skills of the Security Professional | |
| |
| |
What Kind of People Are Needed? | |
| |
| |
Why the Corporate Security Professional? | |
| |
| |
Where Is Security's Place in the Corporation? | |
| |
| |
Summary | |
| |
| |
| |
The Corporate Security Manager | |
| |
| |
| |
The International Widget Corporation (IWC) | |
| |
| |
Introduction | |
| |
| |
IWC Background Information | |
| |
| |
Key Elements for the CSM to Consider | |
| |
| |
Getting to Know IWC | |
| |
| |
IWC's Business Plans | |
| |
| |
IWC CAPP Planning | |
| |
| |
IWC Departments of Primary Importance to the CSM | |
| |
| |
IWC Vision, Mission, and Quality Statements | |
| |
| |
Summary | |
| |
| |
| |
The Corporate Security Manager's Role | |
| |
| |
Introduction to the World of the IWC CSM | |
| |
| |
CSM Leadership | |
| |
| |
Management versus Leadership | |
| |
| |
Customer Expectations | |
| |
| |
Executive Management Expectations of a CSM | |
| |
| |
Plans | |
| |
| |
The SBP's Specific Goals for the CSM | |
| |
| |
IWC Tactical Business Plan (TBP) | |
| |
| |
IWC Annual Business Plan (ABP) | |
| |
| |
CSM Expectations of Executive Management | |
| |
| |
Working with Executive Management | |
| |
| |
Working with Corporate Peers | |
| |
| |
Dealing with Office Politics | |
| |
| |
Representing the Corporation to the Community | |
| |
| |
Dealing with the News Media | |
| |
| |
Summary | |
| |
| |
| |
Establishing and Managing a Corporate Security Department | |
| |
| |
Establishing IWC's Security Department | |
| |
| |
Duties and Responsibilities | |
| |
| |
Planning | |
| |
| |
Staffing a Security Organization | |
| |
| |
Budgeting | |
| |
| |
Controlling | |
| |
| |
Working with Your Managers | |
| |
| |
Working with Your Employees | |
| |
| |
Managing Conflict | |
| |
| |
Dealing with Satellite Offices in the United States | |
| |
| |
Dealing with Satellite Offices in Foreign Lands | |
| |
| |
Case Study | |
| |
| |
Quality, Process Improvement, and Metrics Management: Assessing Organizational Performance | |
| |
| |
Summary | |
| |
| |
| |
The Corporate Security Functions | |
| |
| |
| |
Administrative Security | |
| |
| |
Introduction | |
| |
| |
Corporate Security Department Projects | |
| |
| |
The IWC Corporate Assets Protection Plan | |
| |
| |
Corporate Asset Protection Policies | |
| |
| |
Procedures | |
| |
| |
Summary | |
| |
| |
| |
Physical Security | |
| |
| |
Definition of Physical Security | |
| |
| |
Security in Layers | |
| |
| |
Outer Layers of Protection | |
| |
| |
Inner Layers | |
| |
| |
Access Controls | |
| |
| |
Physical Security Costs | |
| |
| |
Physical Risk Assessments | |
| |
| |
Physical Security for Classified Government Contracts | |
| |
| |
Summary | |
| |
| |
| |
Outsourced or Proprietary Security? | |
| |
| |
Outsourcing: A Definition | |
| |
| |
General Information | |
| |
| |
The Advantages and Disadvantages of a Proprietary Security Organization | |
| |
| |
The Advantages and Disadvantages of an Outsourced Security Organization | |
| |
| |
Candidate Security Functions for Outsourcing | |
| |
| |
Sample Outsourcing Analysis | |
| |
| |
Case Study | |
| |
| |
Summary | |
| |
| |
| |
Personnel Security | |
| |
| |
Introduction | |
| |
| |
Preemployment and Background Investigations | |
| |
| |
Sensitive Positions | |
| |
| |
Conducting Preemployment Background Investigations | |
| |
| |
Adverse Information | |
| |
| |
Workplace Violence Prevention | |
| |
| |
Workplace Violence Case Study | |
| |
| |
Workplace Violence Prevention Program | |
| |
| |
Causes of Violent Behavior | |
| |
| |
Changes in Behavior or Appearance | |
| |
| |
Crisis Levels and Recommended Actions | |
| |
| |
What the CSM and Security Managers Can Do to Prevent Workplace Violence | |
| |
| |
What Employees Can Do to Prevent Workplace Violence | |
| |
| |
Workplace Violence Response | |
| |
| |
A Checklist for the Elements of a Good Personnel Security Program | |
| |
| |
Summary | |
| |
| |
| |
Security Education and Awareness Training | |
| |
| |
Introduction | |
| |
| |
Developing a Security Education and Awareness Training Program (SEATP) | |
| |
| |
Automation and Online Information Sharing | |
| |
| |
Summary | |
| |
| |
| |
Fire Protection | |
| |
| |
Introduction to Fire Protection | |
| |
| |
Fire Prevention and Protection | |
| |
| |
Vulnerability to Fire | |
| |
| |
Risks | |
| |
| |
Fire Prevention and Protection Program--The Elements of IWC's Effective Program | |
| |
| |
Fire Regulations | |
| |
| |
Outsourcing Fire Prevention and/or Suppression | |
| |
| |
Summary | |
| |
| |
| |
Contingency Planning | |
| |
| |
Introduction | |
| |
| |
Contingency Planning Program | |
| |
| |
Emergency Response | |
| |
| |
Crisis Management | |
| |
| |
Business Continuity | |
| |
| |
Summary | |
| |
| |
| |
Investigations | |
| |
| |
Introduction to IWC's Investigations Organization | |
| |
| |
Managing the Investigations Organization | |
| |
| |
Investigations Organization Mission, Vision, and Quality Statements | |
| |
| |
Crime Prevention Principles | |
| |
| |
Crime Prevention Organizational Responsibilities | |
| |
| |
IWC Investigations Organization Duties and Responsibilities | |
| |
| |
The Investigations Organization's Strategic, Tactical, and Annual Plans | |
| |
| |
Crime Prevention Program and Organization | |
| |
| |
Crime Inquiries and Investigative Functions | |
| |
| |
Sources, Networking, and Liaison | |
| |
| |
A Crime Occurs--Should You Call Law Enforcement? | |
| |
| |
Summary | |
| |
| |
| |
Government Security | |
| |
| |
Introduction | |
| |
| |
Why Discuss National Security as Part of Corporate Security? | |
| |
| |
IWC and Government Agency Contract | |
| |
| |
National Security Classified Information | |
| |
| |
Assets Protection Requirements in the National Security Arena | |
| |
| |
Assets Protection Objective in the National Security Environment | |
| |
| |
Responsibilities | |
| |
| |
Collective Assets Protection Controls | |
| |
| |
The Appointment of the Corporation's Focal Point for Government Contract Program Assets Protection | |
| |
| |
National Industrial Security Program (NISP) | |
| |
| |
Homeland Security | |
| |
| |
National Infrastructure Protection Center (NIPC) | |
| |
| |
IWC Government Contract Award Notification | |
| |
| |
Summary | |
| |
| |
| |
Information Security | |
| |
| |
Introduction | |
| |
| |
Three Basic Categories of Information | |
| |
| |
Determining the Value of Information | |
| |
| |
Case Study--A Process for Determining Information Value | |
| |
| |
The Protection of Automated Information and High-Technology Equipment | |
| |
| |
IAPS Organization Responsibilities | |
| |
| |
IAPS Management Job Description | |
| |
| |
IAPS Staff Job Descriptions | |
| |
| |
Information Assurance and Protection Program (IAPP) | |
| |
| |
Summary | |
| |
| |
| |
Executive Protection | |
| |
| |
An Introduction to Executive Protection | |
| |
| |
Why Executive Protection? | |
| |
| |
The Threats and Risks | |
| |
| |
Know the Protectee | |
| |
| |
The Protector | |
| |
| |
Advance Work | |
| |
| |
Transportation | |
| |
| |
Home, Office, and Automobile | |
| |
| |
Mail and Packages | |
| |
| |
Issues and Concerns | |
| |
| |
Summary | |
| |
| |
| |
Event Security | |
| |
| |
Introduction | |
| |
| |
Advance Work--Pre-Planning | |
| |
| |
Security Operations | |
| |
| |
Physical Security | |
| |
| |
Information Security | |
| |
| |
Staff and Executive Protection | |
| |
| |
Contingencies | |
| |
| |
Summary | |
| |
| |
| |
The Security Profession Now and in the Future | |
| |
| |
| |
How to Develop and Maintain a Corporate Security Career Development Program | |
| |
| |
Introduction | |
| |
| |
The Corporate Security Manager's Career Development | |
| |
| |
Establishing and Managing a Corporate Security Career Development Program | |
| |
| |
Summary | |
| |
| |
| |
Security Professionals--What You Can Do to Help Others | |
| |
| |
Introduction | |
| |
| |
Lectures | |
| |
| |
Writing | |
| |
| |
Associations | |
| |
| |
Educational Institutions | |
| |
| |
Mentoring | |
| |
| |
Summary | |
| |
| |
| |
Ethics and the Corporate Security Professional | |
| |
| |
Introduction | |
| |
| |
Codes of Ethics | |
| |
| |
Corporate Ethics, Standards of Conduct, Business Practices, and Corporate Values | |
| |
| |
Impact of Ethics on the Corporate Assets Protection Program | |
| |
| |
Summary | |
| |
| |
| |
The Future of the Corporate Security Profession | |
| |
| |
Introduction | |
| |
| |
It's a New Century and a New World | |
| |
| |
Summary | |
| |
| |
About the Authors | |
| |
| |
Index | |