
Security Risk Assessment
Managing Physical and Operational Security
- 1st Edition - July 22, 2014
- Imprint: Butterworth-Heinemann
- Author: John M. White
- Language: English
- Paperback ISBN:9 7 8 - 0 - 1 2 - 8 0 0 2 2 1 - 6
- eBook ISBN:9 7 8 - 0 - 1 2 - 8 0 0 9 1 7 - 8
Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. A good security assessm… Read more
Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteSecurity Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization.
A good security assessment is a fact-finding process that determines an organization’s state of security protection. It exposes vulnerabilities, determines the potential for losses, and devises a plan to address these security concerns. While most security professionals have heard of a security assessment, many do not know how to conduct one, how it’s used, or how to evaluate what they have found.
Security Risk Assessment offers security professionals step-by-step guidance for conducting a complete risk assessment. It provides a template draw from, giving security professionals the tools needed to conduct an assessment using the most current approaches, theories, and best practices.
- Discusses practical and proven techniques for effectively conducting security assessments
- Includes interview guides, checklists, and sample reports
- Accessibly written for security professionals with different levels of experience conducting security assessments
Security managers, security consultants, and students taking security management courses
- Acknowledgments
- About the Author
- Preface
- Chapter 1. Introduction to Security Risk Assessments
- What Is a Security Risk Assessment?
- Security Risk Assessment Intent
- Who Will Conduct the Assessment?
- How Often Do I Need to Complete an Assessment?
- How Long Will This Process Take?
- Chapter 2. Preassessment Planning
- Services Agreement
- Project Management
- Identify the Participants
- Project Schedule
- Budgeting Considerations
- Project Assumptions
- Deliverables
- Chapter 3. Project Management
- Security Management versus Security Consultant
- Internal Personnel
- Security Consultants
- Chapter 4. Defining the Project Scope
- The Project Scope
- Measurement Standards
- Locations Included
- Chapter 5. Information Gathering
- Internal Sources
- External Sources
- Staff Survey
- Project Interviews
- Chapter 6. Physical Security Assessment
- Kickoff Meeting
- Interviews
- Conducting the Assessment
- Building Exterior
- Building Interior
- Chapter 7. Security Department Operations
- Management Review
- Security Culture
- Management Span of Control
- Security Management Plan
- Statutory and Regulatory Requirements
- Security Staff Scheduling
- Security Patrol Operations
- Security Policies
- Security Recordkeeping
- Security Incident Report Follow-Up
- Chapter 8. Security Training
- Staff Security Awareness Training
- Security Officer Training
- Training Documentation
- Frequency of Training
- Professional Certifications
- Training Resources
- Summary
- Chapter 9. Workplace Violence Risks and Vulnerabilities
- Violence Indicators
- Suspect Profiling
- Workplace Violence Risk Assessment
- Documentation Review
- Threat Assessment Team
- Prevention Strategies
- Risk Foreseeability
- Summary
- Chapter 10. Financial Risk Assessment
- Financial Asset Management
- Cash Handling
- Paid Parking
- Lost and Found
- Transportation of Money
- Fiduciary Responsibility
- Chapter 11. Security Technology Assessment
- Locks and Keys
- Security Cameras
- Security Alarms
- Mass Notification Systems
- Security Officer Equipment
- Specialized Security Equipment
- Summary
- Chapter 12. Access Control
- Lock and Key Control
- Cipher Locks
- Electronic Card Access Control
- Door Hardware
- Visitor Management
- Crime Prevention through Environmental Design (CPTED)
- Geographic Considerations
- Biometrics
- Chapter 13. Legal Considerations and Prevention Strategies
- Litigation Avoidance
- Crime Prevention
- Loss Prevention Strategies
- Security Vulnerability Analysis
- Threat Identification
- Summary
- Chapter 14. Contracted Services
- Police Services and Contracted Staffing
- Electronic Security Contractors: Installs and Maintenance
- Background Investigation Firms
- Parking Management Firms
- Document Shredding Services
- Contract Security Services
- Summary
- Chapter 15. The Security Risk Assessment Report
- Report Writing
- Components of the Assessment Report
- Chapter 16. Conclusion
- Implementation Project Management
- Project Team
- Challenges
- Implementation Phase
- Tracking Change
- Measuring Outcomes
- Let’s Do It Again
- Index
- Edition: 1
- Published: July 22, 2014
- No. of pages (Paperback): 230
- Imprint: Butterworth-Heinemann
- Language: English
- Paperback ISBN: 9780128002216
- eBook ISBN: 9780128009178
JW
John M. White
White is Board Certified in Security Management as a Certified Protection Professional (CPP), and he is a Certified Healthcare Protection Administrator (CHPA), the two highest certifications in the security profession. He is also a member of the International Association of Chiefs of Police, National Association of Chiefs of Police, The International Association for Professional Security Consultants, ASIS International, International Association for Healthcare Security & Safety, and several other professional groups. He has also presented as a security expert at an international security conference.
White has been published in the Journal of Healthcare Protection Management, International Association for Healthcare Safety & Security, Rusting Publications, on numerous occasions, and in the association’s monthly Directions magazine. He has also been published in the ASIS International’s Security Management magazine.