Part I: The Old and New World of the Security Professional
Chapter 1. It’s a New Century and a New World
- Abstract
- Introduction to the New World
- Summary
- End Notes
Chapter 2. New and Old Threats to Corporate Assets, and What to Do About Them
- Abstract
- Introduction to the World of Threats, Vulnerabilities, and Risks to Corporate Assets
- Threats
- The Work Environment Has Changed
- Case Study
- Motivations of Threat Agents, the Attackers
- Vulnerabilities
- Risks
- Summary
- End Notes
Chapter 3. A Short History of Corporate Security and Law Enforcement
- Abstract
- Introduction to the World of Security and Law Enforcement
- Definition of Security and Its Environment
- Historical Overview of the Origins of Security
- A Short History of Law Enforcement and Its Relationship to Security
- The Changing Security and Business Environment
- Summary
- End Notes
Chapter 4. The Corporate Security Profession
- Abstract
- The Need for Corporate Security
- Corporate Security Today
- The Role of the Corporate Security Professional
- The Required Skills of the Security Professional
- What Kind of People Are Needed?
- Why the Corporate Security Professional?
- Where Is Security’s Place in the Corporation?
- Summary
- End Notes
Part II: The Corporate Security Manager
Chapter 5. The International Widget Corporation (IWC)
- Abstract
- Introduction
- IWC Background Information
- Key Elements for the CSM to Consider
- Getting to Know IWC
- IWC’s Business Plans
- IWC CAPP Planning
- IWC Departments of Primary Importance to the CSM
- IWC Vision, Mission, and Quality Statements
- Summary
- End Note
Chapter 6. The Corporate Security Manager’s Role
- Abstract
- Introduction to the World of the IWC CSM
- CSM Leadership
- Management Versus Leadership
- Customer Expectations
- Executive Management Expectations of a CSM
- Plans
- The SBP’S Specific Goals for the CSM
- IWC TBP
- IWC ABP
- CSM Expectations of Executive Management
- Working with Executive Management
- Working with Corporate Peers
- Dealing with Office Politics
- Representing the Corporation to the Community
- Dealing with the News Media
- Summary
- End Notes
Chapter 7. Establishing and Managing a Corporate Security Department
- Abstract
- Establishing IWC’s Security Department
- Duties and Responsibilities
- Planning
- Staffing a Security Organization
- Budgeting
- Controlling
- Working with Your Managers
- Working with Your Employees
- Managing Conflict
- Dealing with Satellite Offices in the United States
- Dealing with Satellite Offices in Foreign Lands
- Case Study
- Quality, Process Improvement, and Metrics Management: Assessing Organizational Performance
- Summary
- End Notes
Part III: The Corporate Security Functions
Chapter 8. Administrative Security
- Abstract
- Introduction
- Corporate Security Department Projects
- The IWC Corporate Assets Protection Plan
- Corporate Asset Protection Policies
- Procedures
- Summary
- End Notes
Chapter 9. Physical Security
- Abstract
- Definition of Physical Security
- Security in Layers
- Outer Layers of Protection
- Inner Layers
- Access Controls
- Physical Security Costs
- Physical Risk Assessments
- Physical Security for Classified Government Contracts
- Summary
- End Note
Chapter 10. Outsourced or Proprietary Security?
- Abstract
- Outsourcing: A Definition
- General Information
- The Advantages and Disadvantages of a Proprietary Security Organization
- The Advantages and Disadvantages of an Outsourced Security Organization
- Candidate Security Functions for Outsourcing
- Sample Outsourcing Analysis
- Case Study
- Summary
Chapter 11. Personnel Security
- Abstract
- Introduction
- Preemployment and BIs
- Sensitive Positions
- Conducting Preemployment BIs
- Adverse Information
- Workplace Violence Prevention
- Workplace Violence Case Study
- Workplace Violence Prevention Program
- Causes of Violent Behavior
- Changes in Behavior or Appearance
- Crisis Levels and Recommended Actions
- What the CSM and Security Managers Can Do To Prevent Workplace Violence
- What Employees Can Do To Prevent Workplace Violence
- Workplace Violence Response
- A Checklist for the Elements of a Good Personnel Security Program
- Summary
- End Notes
Chapter 12. Security Education and Awareness Training
- Abstract
- Introduction
- Developing a Security Education and Awareness Training Program (SEATP)
- Automation and Online Information Sharing
- Summary
- End Note
Chapter 13. Fire Protection
- Abstract
- Introduction to Fire Protection
- Fire Prevention and Protection
- Vulnerability to Fire
- Risks
- Fire Prevention and Protection Program—The Elements of IWC’s Effective Program
- Fire Regulations
- Outsourcing Fire Prevention and/or Suppression
- Summary
- End Notes
Chapter 14. Contingency Planning
- Abstract
- Introduction
- Contingency Planning Program
- Emergency Response
- Crisis Management
- Business Continuity
- Summary
- End Note
Chapter 15. Investigations
- Abstract
- Introduction to IWC’s Investigations Organization
- Managing the Investigations Organization
- Investigations Organization Mission, Vision, and Quality Statements
- Crime Prevention Principles
- Crime Prevention Organizational Responsibilities
- IWC Investigations Organization Duties and Responsibilities
- The Investigations Organization’s Strategic, Tactical, and Annual Plans
- Crime Prevention Program and Organization
- Crime Inquiries and Investigative Functions
- Sources, Networking, and Liaison
- A Crime Occurs—Should You Call Law Enforcement?
- Summary
- End Notes
Chapter 16. Government Security
- Abstract
- Introduction
- Why Discuss National Security as Part of Corporate Security?
- International Widget Corporation and Government Agency Contract
- National Security Classified Information
- Assets Protection Requirements in the National Security Arena
- Assets Protection Objective in the National Security Environment
- Responsibilities
- Collective Assets Protection Controls
- The Appointment of the Corporation’s Focal Point for Government Contract Program Assets Protection
- National Industrial Security Program (NISP)
- Homeland Security
- International Widget Corporation Government Contract Award Notification
- Summary
- End Notes
Chapter 17. Information Security
- Abstract
- Introduction
- Three Basic Categories of Information
- Determining the Value of Information
- Case Study—A Process for Determining Information Value
- The Protection of Automated Information and High-Technology Equipment
- IAPS Organization Responsibilities
- IAPS Management Job Description
- IAPS Staff Job Descriptions
- Information Assurance and Protection Program
- Summary
- End Notes
Chapter 18. Executive Protection
- Abstract
- An Introduction to Executive Protection
- Why Executive Protection?
- The Threats and Risks
- Know the Protectee
- The Protector
- Advance Work
- Transportation
- Home, Office, and Automobile
- Mail and Packages
- Issues and Concerns
- Summary
- End Notes
Chapter 19. Event Security
- Abstract
- Introduction
- Advance Work—Preplanning
- Security Operations
- Physical Security
- Information Security
- Staff and Executive Protection
- Contingencies
- Summary
Part IV: The Security Profession Now and in the Future
Chapter 20. How to Develop and Maintain a Corporate Security Career Development Program
- Abstract
- Introduction
- The CSM’s Career Development
- Establishing and Managing a Corporate Security Career Development Program
- Summary
- End Note
Chapter 21. Security Professionals—What You Can Do to Help Others
- Abstract
- Introduction
- Lectures
- Writing
- Associations
- Educational Institutions
- Mentoring
- Summary
- End Notes
Chapter 22. Ethics and the Corporate Security Professional
- Abstract
- Introduction
- Codes of Ethics
- Code of Ethics
- Corporate Ethics, Standards of Conduct, Business Practices, and Corporate Values
- Impact of Ethics on the Corporate Assets Protection Program
- Summary
- End Notes
Chapter 23. The Future of the Corporate Security Profession
- Abstract
- Introduction
- It’s a New Century and a New World
- Global Competition
- Summary
- End Notes