How to develop and implement a security master plan /
Presents an understanding of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies, and how to focus on both effectiveness and efficiency while conducting a site security assessment. This work constructs a five year plan that is synchronized with the...
Autor principal: | |
---|---|
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton, Fla. :
Auerbach,
©2009.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Security Master Plan Process
- Intent of the Master Plan
- 1. The Business of Security
- 2. Evaluate the Business's Risks
- 3. Conducting a Site Security Assessment
- Part 1
- 4. Conducting a Site Security Assessment
- Part 2
- 5. Conducting a Site Security Assessment
- Part 3
- 6. Conducting a Site Security Assessment
- Part 4
- 7. Conducting an Assessment of the Security Organization
- 8. Determining What Prevention, Crisis Management, and Recovery Programs Exist
- 9. Interviewing Executive and Security Management
- 10. Review and Evaluate All Security-Related Contracts and the Information Protection Program
- 11. Constructing the Security Master Plan Document
- 12. Typical Contents of a Security Master Plan
- 13. Finalizing the Security Master Plan Process
- 14. Utilizing Your Plan in Managing Your Business
- App. A. Workplace Violence Guidelines
- App. B. Executive and Employee Protection
- App. C. Security Assessment or Self-Assessment Document
- App. D. Risk/Security Management & Consulting
- App. E. Basic Physical Security Standards
- App. F. Sample Termination Checklist
- App. G. Crisis Management Emergency Planning Checklist.