The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Kovacich and Halibozek offer you the benefit of more than 55 years of combined experience in government and corporate security. Throughout the book, the authors use a fictional global corporation as a model to provide continual real-world challenges and solutions. New and experienced managers alike will find a wealth of information and practical advice to help you develop strategic and tactical plans and manage your daily operations. * Contains real case examples to illustrate practical application of concepts* Thoroughly covers the integration of physical, computer and information security goals for complete security awareness* A handy reference for managers to quickly find and implement the security solutions they need

Author(s): Gerald L. Kovacich, Edward P. Halibozek
Edition: 1
Year: 2003

Language: English
Pages: 463

Front Cover......Page 1
The Manager’s Handbook for Corporate Security......Page 4
Copyright Page......Page 5
Contents......Page 8
Foreword......Page 16
Preface......Page 18
Acknowledgments......Page 20
Introduction......Page 22
PART I: THE OLD AND NEW WORLD OF THE SECURITY PROFESSIONAL......Page 24
Introduction to the New World......Page 26
Summary......Page 45
Introduction to the World of Threats, Vulnerabilities, and Risks to Corporate Assets......Page 48
Threats......Page 51
The Work Environment Has Changed......Page 53
Case Study......Page 55
Motivations of Threat Agents, the Attackers......Page 57
Vulnerabilities......Page 59
Risks......Page 60
Summary......Page 67
Introduction to the World of Security and Law Enforcement......Page 70
Definition of Security and Its Environment......Page 71
Historical Overview of the Origins of Security......Page 72
A Short History of Law Enforcement and Its Relationship to Security......Page 77
The Changing Security and Business Environment......Page 82
Summary......Page 83
The Need for Corporate Security......Page 86
The Role of the Corporate Security Professional......Page 90
The Required Skills of the Security Professional......Page 91
What Kind of People Are Needed?......Page 92
Where Is Security’s Place in the Corporation?......Page 93
Summary......Page 94
PART II: THE CORPORATE SECURITY MANAGER......Page 96
IWC Background Information......Page 98
Getting to Know IWC......Page 101
IWC’s Business Plans......Page 102
IWC Departments of Primary Importance to the CSM......Page 108
IWC Vision, Mission, and Quality Statements......Page 110
Summary......Page 111
Introduction to the World of the IWC CSM......Page 114
CSM Leadership......Page 115
Management versus Leadership......Page 116
Customer Expectations......Page 117
Executive Management Expectations of a CSM......Page 118
Plans......Page 120
The SBP’s Specific Goals for the CSM......Page 137
IWC Tactical Business Plan (TBP)......Page 138
IWC Annual Business Plan (ABP)......Page 139
CSM Expectations of Executive Management......Page 140
Working with Executive Management......Page 141
Working with Corporate Peers......Page 142
Dealing with Office Politics......Page 144
Representing the Corporation to the Community......Page 145
Dealing with the News Media......Page 147
Summary......Page 148
Establishing IWC’s Security Department......Page 150
Duties and Responsibilities......Page 157
Planning......Page 158
Staffing a Security Organization......Page 159
Budgeting......Page 164
Controlling......Page 166
Working with Your Managers......Page 169
Working with Your Employees......Page 170
Managing Conflict......Page 173
Dealing with Satellite Offices in the United States......Page 174
Dealing with Satellite Offices in Foreign Lands......Page 175
Quality, Process Improvement, and Metrics Management: Assessing Organizational Performance......Page 176
Summary......Page 181
PART III: THE CORPORATE SECURITY FUNCTIONS......Page 184
Introduction......Page 186
Corporate Security Department Projects......Page 187
The IWC Corporate Assets Protection Plan......Page 190
Corporate Asset Protection Policies......Page 194
Procedures......Page 203
Summary......Page 205
Definition of Physical Security......Page 208
Security in Layers......Page 209
Outer Layers of Protection......Page 210
Inner Layers......Page 219
Access Controls......Page 223
Physical Risk Assessments......Page 228
Summary......Page 229
Outsourcing: A Definition......Page 232
The Advantages and Disadvantages of a Proprietary Security Organization......Page 233
The Advantages and Disadvantages of an Outsourced Security Organization......Page 235
Candidate Security Functions for Outsourcing......Page 237
Sample Outsourcing Analysis......Page 239
Case Study......Page 248
Summary......Page 249
Preemployment and Background Investigations......Page 250
Sensitive Positions......Page 257
Conducting Preemployment Background Investigations......Page 258
Workplace Violence Prevention......Page 259
Workplace Violence Case Study......Page 261
Workplace Violence Prevention Program......Page 262
Changes in Behavior or Appearance......Page 263
Crisis Levels and Recommended Actions......Page 264
What the CSM and Security Managers Can Do to Prevent Workplace Violence......Page 265
Workplace Violence Response......Page 266
A Checklist for the Elements of a Good Personnel Security Program......Page 267
Summary......Page 268
Introduction......Page 270
Developing a Security Education and Awareness Training Program (SEATP)......Page 271
Automation and Online Information Sharing......Page 292
Summary......Page 294
Introduction to Fire Protection......Page 296
Fire Prevention and Protection......Page 297
Vulnerability to Fire......Page 298
Risks......Page 299
Fire Prevention and Protection Program— The Elements of IWC’s Effective Program......Page 300
Fire Regulations......Page 307
Summary......Page 308
Introduction......Page 310
Contingency Planning Program......Page 313
Emergency Response......Page 317
Crisis Management......Page 322
Business Continuity......Page 325
Summary......Page 329
Introduction to IWC’s Investigations Organization......Page 332
Investigations Organization Mission, Vision, and Quality Statements......Page 335
Crime Prevention Principles......Page 336
Crime Prevention Organizational Responsibilities......Page 337
IWC Investigations Organization Duties and Responsibilities......Page 338
The Investigations Organization’s Strategic, Tactical, and Annual Plans......Page 339
Crime Prevention Program and Organization......Page 344
Crime Inquiries and Investigative Functions......Page 346
Sources, Networking, and Liaison......Page 350
A Crime Occurs—Should You Call Law Enforcement?......Page 356
Summary......Page 358
Introduction......Page 360
Why Discuss National Security as Part of Corporate Security?......Page 362
IWC and Government Agency Contract......Page 363
National Security Classified Information......Page 364
Assets Protection Requirements in the National Security Arena......Page 365
Assets Protection Objective in the National Security Environment......Page 366
The Appointment of the Corporation’s Focal Point for Government Contract Program Assets Protection......Page 367
National Industrial Security Program (NISP)......Page 368
National Infrastructure Protection Center (NIPC)......Page 369
IWC Government Contract Award Notification......Page 370
Summary......Page 372
Introduction......Page 374
Three Basic Categories of Information......Page 377
Determining the Value of Information......Page 378
Case Study—A Process for Determining Information Value......Page 381
The Protection of Automated Information and High-Technology Equipment......Page 382
IAPS Organization Responsibilities......Page 387
IAPS Management Job Description......Page 388
IAPS Staff Job Descriptions......Page 389
Information Assurance and Protection Program (IAPP)......Page 390
Summary......Page 392
An Introduction to Executive Protection......Page 394
Why Executive Protection?......Page 395
The Threats and Risks......Page 396
The Protector......Page 399
Advance Work......Page 401
Transportation......Page 403
Home, Office, and Automobile......Page 404
Mail and Packages......Page 405
Issues and Concerns......Page 406
Summary......Page 407
Introduction......Page 408
Advance Work—Pre-Planning......Page 409
Security Operations......Page 410
Physical Security......Page 411
Information Security......Page 412
Contingencies......Page 414
Summary......Page 415
PART IV: THE SECURITY PROFESSION NOW AND IN THE FUTURE......Page 416
Introduction......Page 418
The Corporate Security Manager’s Career Development......Page 420
Establishing and Managing a Corporate Security Career Development Program......Page 425
Summary......Page 428
Introduction......Page 430
Lectures......Page 431
Writing......Page 434
Associations......Page 439
Mentoring......Page 442
Summary......Page 443
Introduction......Page 444
Codes of Ethics......Page 447
Corporate Ethics, Standards of Conduct, Business Practices, and Corporate Values......Page 451
Impact of Ethics on the Corporate Assets Protection Program......Page 452
Summary......Page 453
It’s a New Century and a New World......Page 454
Summary......Page 465
About the Authors......Page 468
Index......Page 470