Physical Security Strategy and Process PlaybookEdited by
- John Kingsley-Hefty
The Physical Security Strategy and Process Playbook is a concise yet comprehensive treatment of physical security management in the business context. It can be used as an educational tool, help a security manager define security requirements, and serve as a reference for future planning.
This book is organized into six component parts around the central theme that physical security is part of sound business management. These components include an introduction to and explanation of basic physical security concepts; a description of the probable security risks for more than 40 functional areas in business; security performance guidelines along with a variety of supporting mitigation strategies; performance specifications for each of the recommended mitigation strategies; guidance on selecting, implementing, and evaluating a security system; and lists of available physical security resources.
The Physical Security Strategy and Process Playbook is an essential resource for anyone who makes security-related decisions within an organization, and can be used as an instructional guide for corporate training or in the classroom.
The Physical Security Strategy and Process Playbook is a part of Elseviers Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
Mid- to upper-level security managers; any employee who makes security-related decisions, such as security coordinators; security managers; facility, department, and unit managers; managers responsible for choosing security solutions; information technology (IT) managers; engineering specialists; information security coordinators; auditors; and corporate real estate professionals.
Paperback, 160 Pages
Published: September 2013
Chapter 1: Physical Security Concepts
Chapter 2: Functional Areas and Security Risks
Chapter 3: Security Performance Guidelines and OptionsChapter 4: Performance Specifications
Chapter 5: Systems Implementation and EvaluationChapter 6: Physical Security Resources