Security and risk management are principally concerned with the protection and conservation of corporate assets and resources. The task of protection continues to be an increasingly complex one in a time when technology is creating new products (and thus risk) at an explosive rate. Add this to the crime rate -- now aggravated by domestic and international terrorism -- and the importance of risk analysis and evaluation to design proper protection becomes self-evident. With an awareness of the growing threat of global terrorism, the third edition of RISK ANALYSIS AND THE SECURITY SURVEY has been completely updated. It includes two new chapters covering disaster recover planning, mitigation, and the evolving methodologies that are a result of the Homeland Security Act. The following topics will also be added and covered among the various chapters: contingency planning, testing of disaster response plan, managing during a crisis, maintaining and testing a response plan (team drills, etc.), bomb threats and suicide bombings, and prevention techniques to better prepare business for new post 9/11 security risks.

Key Features

- Covers Business Impact Analysis (BIA), Project Planning, Data Collection, Data Analysis and Report of Findings, and Prediction of Criminal Behavior - Presents updated statistical information and practical case examples - Helps professionals and students produce more effective results-oriented security surveys


PRIMARY MARKET: (audience) Students in security management courses; Security Managers, other security professionals SECONDARY MARKET: (audience) Business professionals at all levels concerned with security, risk mitigation, and the management aspects of security operations.

Table of Contents

TABLE OF CONTENTS Chapter 1: Risk Chapter 2: Vulnerability and Threat Identification Chapter 3: Risk Measurement Chapter 4: Quantifying and Prioritizing Loss Potential Chapter 5: Cost/Benefit Analysis Chapter 6: Other Risk Analysis Methodologies Chapter 7: The Security Survey: An Overview Chapter 8: Management Audit Techniques and the Preliminary Survey Chapter 9: The Survey Report Chapter 10: Crime Prediction Chapter 11: Determining Insurance Requirements Chapter 12: Mitigation and Preparedness Chapter 13: Response Planning Chapter 14: Business Continuity Planning Chapter 15: Business Impact Analysis Chapter 16: Plan Documentation Chapter 17: Crisis Management Planning for Kidnap, Ransom and Extortion Chapter 18: Monitoring Safeguards Chapter 19: The Security Consultant APPENDICES A. Security Survey Work Sheets B. Danger Signs of Fraud, Embezzlement, and Theft C. Professional Practices for Business Continuity Planners D. Sample BIA Introduction Letter E Sample Kidnap and Ransom Contingency Plan F. How to Establish Notice G. Communicating with the Media H. Security System Specifications I. Sample Introduction Memorandum: Disaster Recovery Planning


eBook ISBN:

About the author

James F. Broder

James F. Broder, CFE, CPP, FACFE, has more than 40 years experience in security and law enforcement. He has worked as a security executive, instructor, and consultant as well as having served in Vietnam as a Police Advisor in the Counter Insurgency Directorate, Vietnamese National Police. A former FBI Special Agent and employee for the US State Department, U.S. House of Representatives, Washington D.C. Mr. Broder is considered to be one of the most highly respected security authorities in the United States.

Affiliations and Expertise

James F. Broder, CFE, CPP, FACFE, Independent Security Consultant, San Marino, CA, USA


Security is an element of risk management, asserts James F. Broder in the third edition of his classic Risk Analysis and the Security Survey. And he ably backs up that statement in this wonderfully written book, which should be required reading for all current and future security professionals.-Jerry D. Loghry, Security Management, March 2007