How to Develop and Implement a Security Master Plan

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $89.55
Usually ships in 1-2 business days
(Save 9%)
Other sellers (Hardcover)
  • All (4) from $89.55   
  • New (2) from $89.55   
  • Used (2) from $123.36   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$89.55
Seller since 2008

Feedback rating:

(4464)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
New Book. Shipped from UK within 4 to 14 business days. Established seller since 2000.

Ships from: Horcott Rd, Fairford, United Kingdom

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$101.00
Seller since 2008

Feedback rating:

(17562)

Condition: New
Brand New, Perfect Condition, Please allow 4-14 business days for delivery. 100% Money Back Guarantee, Over 1,000,000 customers served.

Ships from: Westminster, MD

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$123.36
Seller since 2008

Feedback rating:

(17562)

Condition: Like New
Brand New, Perfect Condition, Please allow 4-14 business days for delivery. 100% Money Back Guarantee, Over 1,000,000 customers served.

Ships from: Westminster, MD

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$124.65
Seller since 2014

Feedback rating:

(5)

Condition: Very Good
2014 Hardback NEAR FINE This listing is a new book, a title currently in-print which we order directly and immediately from the publisher. Print on Demand title, produced to ... the highest standard, and there would be a delay in dispatch of around 15 working days. *****PLEASE NOTE: This item is shipping from an authorized seller in Europe. In the event that a return is necessary, you will be able to return your item within the US. To learn more about our European sellers and policies see the BookQuest FAQ section***** Read more Show Less

Ships from: Stroud, Glos, United Kingdom

Usually ships in 1-2 business days

  • Canadian
  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by

Overview

Engage Stakeholders with a Long-Term Solution

The goal: Convince executive management to "buy in" to your security program, support it, and provide the largest possible amount of funding.

The solution: Develop a meticulously detailed long-term plan that sells decision-makers on the dire need for your program, and then maps out its direction and required budget.

Assess and Outline Security Risks to Map Out Mitigation Strategies
This practical guide details how to construct a customized, comprehensive five-year corporate security plan that synchronizes with the strategies of any business or institution. The author explains how to develop a plan and implementation strategy that aligns with an organization’s particular philosophies, strategies, goals, programs, and processes. Readers learn how to outline risks and then formulate appropriate mitigation strategies. This guide provides tested, real-world'solutions on how to:

  • Conduct an effective, efficient assessment of the site and security personnel, meticulously addressing the particular needs of many different environments
  • Make decisions about security philosophies, strategies, contract relationships, technology, and equipment replacement
  • Interview executive and security management to determine their concerns, educate them, and ensure that they buy in to your plan
  • Use all gathered data to construct and finalize the Security Master Plan and then implement it into the management of the business

Apply Insights from an Expert with Global Experience at the Highest Level
Author Tim Giles worked at IBM for 31 years serving as Director of Security for the company’s operations in the United States and Canada, as well as Latin America and Asia-Pacific. His immeasurable experience and insight provide readers with an extraordinarily comprehensive understanding that they can use to design and execute a highly effective, tailored security program.

Read More Show Less

Editorial Reviews

From the Publisher
This practical guide details how to construct a customized, comprehensive, five-year corporate security plan that synchronizes with the strategies of any business or institution.
– In ASIS Dynamics, May/June 2009

In this well-written, well-organized book, author Timothy D. Giles, CPP, PSP, provides a thorough overview of how to develop a five-year security master plan that aligns with both an organization’s security philosophy and its overall business plan. … In addition to explanation of data collection and analysis procedures, the text features an outline of a plan document including guidelines for how to address the budget and establishing a return on investment, as well as a discussion on how to approach the final recommendations’ presentation. … A valuable appendix includes guidelines for dealing with workplace violence issues, material on executive protection, self-assessment templates, and an example of a format for a consulting proposal. … It is an excellent road map for security professionals to use as a benchmark relative to their own practices and would also be an excellent text for students assigned to evaluate a security program.
—George Okaty, Director of Safety & Security, Tidewater Community College, Virginia, in Security Magazine, September 2010

Read More Show Less

Product Details

  • ISBN-13: 9781420086256
  • Publisher: Taylor & Francis
  • Publication date: 12/16/2008
  • Edition description: New Edition
  • Pages: 352
  • Product dimensions: 6.40 (w) x 9.30 (h) x 1.00 (d)

Table of Contents

The Business of Security

Why Should You Develop a Security Master Plan?

Engaging the Stakeholders

What Should Your Security Philosophies Be?

Contract Security Relationship

What Should Your Security Strategies Be?

Technology Migration Strategy

Equipment Replacement Schedules

Evaluate the Business’s Risks

Potential Risks to the Business

Defining What Your Risks Are

Information Gathering

The Workplace Violence Risk and Beyond

Domestic Violence in the Workplace

Other Risk Factors

Risks of Fraud and Corruption

Theft Risks

Overseas-Related Risks

Acts of Nature

Information Sources

Human Resources and the Security Plan

Reacting to a Defined Risk

Placing a Value on the Impact of Risk

Conducting a Site Security Assessment — Part 1

Assessing Aspects of Security Administration

Documenting Post Orders and Procedures

Security Personnel Selection and Staffing Considerations

Employee Selection and Staffing Considerations

Application Form

Security Manual Documentation

Security Education Awareness

Contract Management and Audit

Conducting a Site Security Assessment — Part 2

Assessing Aspects of Physical Security

Exterior Security Assessment — Vehicle Access Controls

Parking Lot Security

Proper Use of Signage

Security Processing Operations — Visitor and Contractor Controls

Proper Use of Lighting

Barriers, Doors, and Building Perimeters

Mechanical Locking Systems — Locks and Keys

Submaster System

Key Administration

Security Officer Patrols

Security Officer Review

Crime Prevention Through Environmental Design

Security Staffing

Monitoring and Administering Physical Protection Systems

Stationary and High-Visibility Posts

Emergency Response Capabilities

Training

Conducting a Site Security Assessment — Part 3

Assessing the Electronic systems

Event Driven

Fully Integrated

Closed Circuit Television

Access Control Systems

Access Control System Policy

Alarm Sensors and Reporting

Radio Systems

Technology Status — Current and Future

Conducting a Site Security Assessment — Part 4

Assessing Information Protection

Information Security Protection Programs

Computer and Network Security Ownership

Security and Computer Use Standards for Employees

Security Requirements

Implementing a Classification System

Investigation Requirements

Processing Departing Employees

Information Asset Security

System Misuse

Summary — Information Protection

Government Regulations

Conducting an Assessment of the Security Organization

Reporting Structure

The Security Organization’s Structure

Mixed Security Forces

Separation of Duties

Other Issues

Security Skills

Evaluating the Security Officers

Evaluating the Shift Supervisors

Evaluating the CSO or Director of Security

Evaluating the Other Security Positions

Staffing Levels

Armed versus Unarmed Officers

Determining What Prevention, Crisis Management, and Recovery Programs Exist

Prevention and Recovery Programs

Business Intelligence Information

Crisis Management Planning

Corporate Reputation Crisis Plan

Corporate Investigations: Fraud, Financial, Criminal, Computer, and Network

Due Diligence Processes

Emergency Response Planning and Testing

Business Continuity and Disaster Recovery

Executive Protection Program

Internal Audit and Business Controls, Monitoring Programs, and Fraud and

Pre-employment Screening and Drug Testing

Risk Assessment Process (Annually)

Security Systems and Procedures

Terrorism, Bioterrorism, and the DHS: Threat Advisory System Response

Workplace Violence Prevention Program

References

Interviewing Executive and Security Management

Interview Executive Management to Understand Their Concerns and Issues

The Approach

Interpreting the Interview Answers

The Importance of Listening

Where to Start the Process

Beginning the Interview

Educating the Executives and Ensuring Their Buy-In

Interview Security Management to Understand Their Concerns and Issues

Review and Evaluate All Security-Related Contracts and the Information Protection Program

Security Business Contracts

Contractual Right to Audit

Contract Bid Process

Auditing Security-Related Contracts

Reviewing the Information Protection Programs

After-Hours Checks

IT Information Protection

Disaster Recovery Program Review

Information Security Awareness Training

Investigation Requirements

Review of Exit Interview Process

Information Asset Security Review

Constructing the Security Master Plan Document

Compiling, Organizing, and Evaluating the Information Gathered

Developing Your Recommendations

Initial Draft Review with Security Management

Recommendation with Solutions

Developing and Refining Security Philosophies, Strategies, and Goals

Involving the Stakeholders

Documenting the Master Plan

Developing the Recommendations Presentation

Estimating Cost Impacts

Project Management Skills

Typical Contents of a Security Master Plan

Content Listing and Organization

Structural Focus

Budgeting Focus

Establishing an ROI

Finalizing the Security Master Plan Process

The Recommendations Presentation

Where to Begin

Setting Your Goals

Asking the Tough Questions

Submitting the Finalized Security Master Plan

Utilizing Your Plan in Managing Your Business

Utilizing Your Plan for Periodic Quality Checks

It Is All about Timing

Keeping the Plan in Sync with the Business

Testing Your Plan Against the Latest Technology

Benchmarking and Business Process (Matrix) Management

Best of Breed

Business Process (Matrix) Management

Appendices

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)