Workplace Security Playbook. The New Manager's Guide to Security Risk
β Scribed by Bob Hayes (Eds.)
- Publisher
- Elsevier
- Year
- 2013
- Tongue
- English
- Leaves
- 88
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Workplace Security Playbook: The New Manager's Guide to Security Risk is a set of comprehensive risk management guidelines for companies that have other business functions coordinating security. When an employee without a security background is charged with the protection of people, facilities, or assets, the Workplace Security Playbook can be his or her go-to resource for security procedures and recommendations.
Business risks are not static: They change and grow as a company changes and grows. New technology, increasing business competition, and social and cultural developments all contribute to new security risks and trends. With this in mind, the Workplace Security Playbook focuses on performance guidelines, rather than prescriptive standards. Using performance guidelines helps assess the individual, changing business and security needs that a manager may face.
The easily implementable recommendations included in this book are categorized by issues. In addition to security performance guidelines, topics include the elements of a facility security program, how to conduct security surveys and validation testing, steps for performing workplace investigations and inspections, and procedures for emergency and special security situations. An entire chapter is dedicated to describing the resources available to a new security manager, and another provides an outline for building a customized reference source of local security information.
TheΒ Workplace Security PlaybookΒ is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and ''how-to'' guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
- Chapters are categorized by issues for easy reference, and include the fundamentals of a security program up to high-level procedures
- Guidelines are specifically designed for companies that have other business functions coordinating security
- Emphasizes performance guidelines (rather than standards) that describe the basic levels of performance that will strengthen business operations while accommodating what resources are currently available
β¦ Table of Contents
Content:
Front-matter, Pages i,iii
Copyright, Page iv
Executive Summary, Page vii
Introduction, Page ix, Bob Hayes
Chapter 1 - Security Performance Guidelines, Pages 1-7, Bob Hayes
Chapter 2 - Elements of a Facility Security Program, Pages 9-13, Bob Hayes
Chapter 3 - Surveys and Validations, Pages 15-17, Bob Hayes
Chapter 4 - Investigation Guidelines, Pages 19-25, Bob Hayes
Chapter 5 - Inspection Guidelines, Pages 27-45, Bob Hayes
Chapter 6 - Emergency Procedures, Pages 47-64, Bob Hayes
Chapter 7 - Special Security Situations, Pages 65-73, Bob Hayes
Chapter 8 - Security Management Resources, Pages 75-77, Bob Hayes
Chapter 9 - Implementing Your Security Program, Pages 79-87, Bob Hayes
About Contributing Editor, Page 89
About Elsevierβs Security Executive Council Risk Management Portfolio, Pages 91-92
π SIMILAR VOLUMES
Terrorist or criminal attack, fire emergency, civil or geographic disruption, or major electrical failureβrecent years have witnessed an increase in the number of natural disasters and man-made events that have threatened the livelihoods of businesses and organizations worldwide. Security Managerβs
"This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the count
"This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the count
''This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the coun
How much do you know about getting and staying secure in a rapidly changing techno world? Before you answer that, let's ask a much more important question. "How much don't you know about staying secure?" This book will help re-enforce many of the threats that you already know about, as well as intro