School Security: How to Build and Strengthen a School Safety Program, Second Edition emphasizes a proactive rather than reactive approach to school security. Readers are introduced to basic loss prevention and safety concepts, including how to communicate safety information to students and staff, how to raise security awareness, and how to prepare for emergencies. The book discusses how to positively influence student behavior, lead staff training programs, and write sound security policies. This book isn't just for security professionals and will help educators and school administrators without formal security training effectively address school risk. As school safety challenges continue to evolve with new daily stories surrounding security lapses, lockdowns, or violent acts taking place, this thoroughly revised edition will help explain how to make educational institutions a safer place to learn.
Ambulatory Surgery Center Safety Guidebook: Managing Code Requirements for Fire and Life Safety helps guide ASC administrative and security staff meet the requirements and standards of both federal and state authorities, including the Life Safety Code, a critical designation for facilities participating in Medicare (CMS) funding reimbursement. Designed for easy reference, the book assumes no code knowledge on the part of ASC staff, and provides guidance for the policies, emergency plans, drills, inspection, testing and maintenance of fire protection and building systems necessary for meeting Life Safety Code requirements. Through sample checklists and log sheets, and a systematic process for completing required documentation, the reader is directed through the crucial steps to achieving code compliance. The guide provides ASC staff the knowledge necessary to be in compliance with the Life Safety Code without the need for an outside security or safety consultant. Through this compliance, facilities remain licensed and qualified for Medicare reimbursement, ultimately improving the financial success of the ASC.
Security Operations Center Guidebook: A Practical Guide for a Successful SOC provides everything security professionals need to create and operate a world-class Security Operations Center. It starts by helping professionals build a successful business case using financial, operational, and regulatory requirements to support the creation and operation of an SOC. It then delves into the policies and procedures necessary to run an effective SOC and explains how to gather the necessary metrics to persuade upper management that a company’s SOC is providing value. This comprehensive text also covers more advanced topics, such as the most common Underwriter Laboratory (UL) listings that can be acquired, how and why they can help a company, and what additional activities and services an SOC can provide to maximize value to a company.
Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the author’s work that set the standard. This book contains important coverage of environmental design, security surveys, locks, lighting, and CCTV, the latest ISO standards for risk assessment and risk management, physical security planning, network systems infrastructure, and environmental design.
Physical Security: 150 Things You Should Know, Second Edition is a useful reference for those at any stage of their security career. This practical guide covers the latest technological trends for managing the physical security needs of buildings and campuses of all sizes. Through anecdotes, case studies, and documented procedures, the authors have amassed the most complete collection of information on physical security available. Security practitioners of all levels will find this book easy to use as they look for practical tips to understand and manage the latest physical security technologies, such as biometrics, IP video, video analytics, and mass notification, as well as the latest principles in access control, command and control, perimeter protection, and visitor management.
Building a Travel Risk Management Program: Traveler Safety and Duty of Care for Any Organization helps business and security professionals effectively manage traveler risk by showing them how to build a complete travel risk program. While global corporate travel risks are increasing exponentially, many security and business managers are not well-versed in the rapidly changing global landscape of travel risk, nor do they fully realize the multitude of risks their companies face if they don’t comply with their legal obligations—“duty of care"—for protecting their employees from foreseeable harm, which can cost a company in the form of extensive fines, productivity loss, business interruptions, stock price loss, litigation, and even potential bankruptcy. This book is the first to bridge the gap between the topics of travel management, security, and risk management. It serves as a reference point for working with other departments, including human resources and legal, paving the way for better internal cooperation for travel managers and security managers. In addition, it helps organizations craft a travel risk management program for their unique needs that incorporates the most important policies and procedures that help them comply with legal obligations.
Alarm Systems and Theft Prevention, Second Edition, recounts the sometimes sad, sometimes humorous, and nearly always unfortunate experiences of manufacturers, distributors, retailers, and individuals who have lost valuable merchandise, money, jewelry, or securities to criminal attacks. In most cases the losses occurred because there was a weak link: a vulnerability in the total security defense. The book presents in practical terms those weaknesses in physical security, alarm systems, or related security procedures that, when blended together, result in vulnerability. In addition to analyzing these cases and identifying the key elements of vulnerability, remedies for curing the weakness are also offered. Other sections of this book deal with the application, strengths, and limitations of security equipment. For the most part, equipment is presented from the practical viewpoint—what a security device or system will do (or not do) and how it should be applied and operated, rather than the detail of mechanical design, electrical circuitry, or laboratory theories. This book is written in layman's language and is intended to be read by people who supply, use, or need security services and equipment.
Securing the Outdoor Construction Site: Strategy, Prevention, and Mitigation offers a holistic view of security planning for vulnerable capital projects, providing the strategic and tactical plans needed to protect large areas with a minimum investment in personnel and equipment. This book is a one-stop reference that provides effective security strategies, methods, and tactics to mitigate the theft of equipment and how to avoid these incidents altogether. In addition, the book outlines the true costs of construction site theft to organizations in terms of lost time, equipment, and brand reputation, along with increased insurance premiums and danger to personnel. It lists the types of theft that regularly occur at sites, explores their underlying causes, and documents their worldwide financial significance. Finally, readers will learn how to conduct a construction site survey with loss prevention in mind, and how to budget for the unexpected.
According to Pinkerton—the leading provider of risk management services in the world—workplace violence is second only to cybersecurity as the top threat faced by organizations today. Incidents involving active shooters in the workplace are on the rise and becoming more violent and deadly. Active Shooter provides the tools necessary to identify potential violent individuals, along with the options and responses needed to save lives, reduce corporate liability, and recover from an active shooter event should it happen. Active Shooter begins with a brief history of active shooters and how they have changed over time. It shows why many perpetrators initiate attacks, what they often are thinking, and some of the indicators that could have been identified prior to the attack. The book shows how to develop an active shooter program in an organization, walking readers through the entire process including training exercises to test the efficiency of the program. With the uniquely private security perspective, Active Shooter illustrates how to communicate with law enforcement, government agencies, and the media in the event of active shooter incident. The book concludes with a discussion of how organizations can recover promptly after an incident, which is crucial for operational survival.
Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible assets, and people. The book merges business and security perspectives to help transform this often conflicted relationship into a successful and sustainable partnership. It combines security doctrine, business priorities, and best practices to uniquely answer the Who, What, Where, Why, When and How of corporate security. Corporate Security Management explores the diverse structures of security organizations in different industries. It shows the crucial corporate security competencies needed and demonstrates how they blend with the competencies of the entire organization. This book shows how to identify, understand, evaluate and anticipate the specific risks that threaten enterprises and how to design successful protection strategies against them. It guides readers in developing a systematic approach to assessing, analyzing, planning, quantifying, administrating, and measuring the security function.