Strategic Security Management

A Risk Assessment Guide for Decision Makers


  • Karim Vellani, CPP, CSC, earned his M.S. from Sam Houston State University in Criminal Justice Management. He is a member of the International Association of Crime Analysis, International Association of Professional Security Consultants, and ASIS International., President, Threat Analysis Group, LLC, Sugar Land, TX

Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organization’s assets, giving decision makers the foundation needed to climb the next step up the corporate ladder.Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures. Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald.
View full description


Security managers, security consultants, other security professionals, and students in security and business programs.


Book information

  • Published: October 2006
  • ISBN: 978-0-12-370897-7


"This book takes on the ambitious goal of bridging the gap between theory and reality in risk-assessment-based security management - and achieves it handily." (Jack Dowling, Security Management) "Two words describe this text: information packed. The intended audience is a large one, including security professionals, security managers with decision-making responsibilty, and criminal justice students. This book is a valuable asset for them all." (Jack Dowling, Security Management)

Table of Contents

Chapter 1: Data Driven SecurityChapter 2: Asset Identification and Security InventoryChapter 3: Threat AssessmentsChapter 4: Crime AnalysisChapter 5: Vulnerability AssessmentChapter 6: Risk AssessmentChapter 7: Information Technology Risk ManagementChapter 8: PreventionChapter 9: Security Measures: Polices & ProceduresChapter 10: Security Measures: Physical SecurityChapter 11: Security Measures: Deploying Physical Security MeasuresChapter 12: Security Measures: PersonnelChapter 13: Project ManagementChapter 14: Premises Security Liability Chapter 15: Forensic SecurityChapter 16: Ethics in SecurityAppendix A: Certified Security Consultant’s (CSC) Code of EthicsAppendix B: International Association of Professional Security Consultant’s Forensic MethodologyAppendix C: Sample Risk Assessment ReportAppendix D: Crime Analysis Reports