Security and risk management are principally concerned with the protection and conservation of corporate assets and resources. The task of protection continues to be an increasingly complex one in a time when technology is creating new products (and thus risk) at an explosive rate. Add this to the crime rate -- now aggravated by domestic and international terrorism -- and the importance of risk analysis and evaluation to design proper ...
Security and risk management are principally concerned with the protection and conservation of corporate assets and resources. The task of protection continues to be an increasingly complex one in a time when technology is creating new products (and thus risk) at an explosive rate. Add this to the crime rate -- now aggravated by domestic and international terrorism -- and the importance of risk analysis and evaluation to design proper protection becomes self-evident.
With an awareness of the growing threat of global terrorism, the third edition of RISK ANALYSIS AND THE SECURITY SURVEY has been completely updated. It includes two new chapters covering disaster recover planning, mitigation, and the evolving methodologies that are a result of the Homeland Security Act. The following topics will also be added and covered among the various chapters: contingency planning, testing of disaster response plan, managing during a crisis, maintaining and testing a response plan (team drills, etc.), bomb threats and suicide bombings, and prevention techniques to better prepare business for new post 9/11 security risks.
- Covers Business Impact Analysis (BIA), Project Planning, Data Collection, Data Analysis and Report of Findings, and Prediction of Criminal Behavior
- Presents updated statistical information and practical case examples
- Helps professionals and students produce more effective results-oriented security surveys
Updating the 1984 edition, a security authority advocates a three- pronged approach to the fraud and abuse that costs US businesses some $400 billion annually: minimize security risks; minimize loss in the event a breach occurs; and develop/keep current contingency and disaster recovery plans. Appends security survey worksheets and information on danger signs of fraud, embezzlement, and theft; professional practices and resources for business continuity planners; sample introduction letters; a sample kidnap and ransom contingency plan; handling media inquiries; and security system specifications. Annotation c. Book News, Inc., Portland, OR (booknews.com)
From the Publisher
Security is an element of risk management, asserts James F. Broder in the third edition of his classic Risk Analysis and the Security Survey. And he ably backs up that statement in this wonderfully written book, which should be required reading for all current and future security professionals.-Jerry D. Loghry, Security Management, March 2007
Gene Tucker, CPP, CFE, CBCP, CHST, is co-author of Butterworth Heinemann’s Risk Analysis and the Security Survey, 4th edition. He is qualified as a Certified Continuity Manager (CCM) - ISO 22301 Lead Implementer and as an ISO 22301 Lead Auditor, and has extensive international experience as a corporate manager, investigator, trainer and consultant in security, safety, and business continuity planning.
James F. Broder, CFE, CPP, FACFE, has more than 40 years experience in security and law enforcement. He has worked as a security executive, instructor, and consultant as well as having served in Vietnam as a Police Advisor in the Counter Insurgency Directorate, Vietnamese
National Police. A former FBI Special Agent and employee for the US State Department, U.S. House of Representatives, Washington D.C. Mr. Broder is considered to be one of the most highly respected security authorities in the United States.
Chapter 1: Risk
Chapter 2: Vulnerability and Threat Identification
Chapter 3: Risk Measurement
Chapter 4: Quantifying and Prioritizing Loss Potential
Chapter 5: Cost/Benefit Analysis
Chapter 6: Other Risk Analysis Methodologies
Chapter 7: The Security Survey: An Overview
Chapter 8: Management Audit Techniques and the Preliminary Survey
Chapter 9: The Survey Report
Chapter 10: Crime Prediction
Chapter 11: Determining Insurance Requirements
Chapter 12: Mitigation and Preparedness
Chapter 13: Response Planning
Chapter 14: Business Continuity Planning
Chapter 15: Business Impact Analysis
Chapter 16: Plan Documentation
Chapter 17: Crisis Management Planning for Kidnap, Ransom and Extortion
Chapter 18: Monitoring Safeguards
Chapter 19: The Security Consultant
A. Security Survey Work Sheets
B. Danger Signs of Fraud, Embezzlement, and Theft
C. Professional Practices for Business Continuity Planners
D. Sample BIA Introduction Letter
E Sample Kidnap and Ransom Contingency Plan
F. How to Establish Notice
G. Communicating with the Media
H. Security System Specifications
I. Sample Introduction Memorandum: Disaster Recovery Planning