- Each chapter can be read in five minutes or less, and is written by or contains insights from experienced security leaders.
- Can be used to find illustrations and examples you can use to deal with a relevant issue.
- Brings together the diverse experiences of proven security leaders in one easy-to-read resource.
New or experienced security managers and executives; security practitioners and consultants; business managers and executives with security program oversight; instructors of and students in security programs
Table of Contents
Part 1: The Skills Needed for Successful Security Leadership
Chapter 1. The Art of Leadership
1.1 What is Good Security Leadership?
1.2 What Knowledge, Skills, and Characteristics do you Need?
1.3 Where Can you Get those Skills?
1.4 Can Leadership be Learned?
Chapter 2. Be the Great Motivator
2.1 It’s Not Always Easy
2.2 Learn as You Go
Chapter 3. Becoming a Business Leader
3.1 The Elements of Leadership
3.2 Aerodynamic Security
3.3 Focused, Online Training
3.4 Educational Resources
3.5 Custom Programs
3.6 Business will Become the Language of Dialogue
3.7 Everyone is a Leader
Chapter 4. Finding Time: Time Management Strategies for the Busy Security Leader
4.1 Don’t Reinvent the Wheel
4.2 Learn from those Who’ve been there
4.3 Build a Staff you can Count on
Chapter 5. Leading Up: Or, How to Build a Positive Relationship with Your Manager
5.1 Be a Leader First
5.2 The Role Goes Beyond Security
5.3 Number of Incidents is Not the Only Metric
5.4 Proactive Communication
5.5 Are you Leading Up?
Chapter 6. Understanding Your Corporate Culture
Chapter 7. Rebuilding Influence after Corporate Restructuring
Chapter 8. Managing Expectations
Chapter 9. Running Security Like a Business
Chapter 10. Becoming a Next Generation Security Leader
10.1 Assess to Find the Best Executive Development Resources
10.2 Finding a Job that Enables Next Generation Leadership
Part 2: Building Your Toolkit
Chapter 11. Developing Meaningful Security Metrics
11.1 Are your Metrics Tied to Business Goals?
11.2 Do any of your Metrics Show Value by Reliably Measuring Avoided Costs?
11.3 Do you Collect both Forward-Looking and Backward-Looking Metrics?
11.4 Do Metrics Measure Direct and Indirect Impacts?
11.5 Are you Creating Metrics in a Vacuum or Soliciting the help of other Functions?
11.6 Do your Metrics Tell a Story?
Chapter 12. Setting Realistic Goals That Align with Business Interests
Chapter 13. The New Security Assessment
Chapter 14. Expect the Best: Evaluating Your Security Staff
Chapter 15. Business Evolution Requires Active Security Alignment
Chapter 16. Emerging Issue Awareness
16.1 Challenges to Emerging Issue Awareness
16.2 Tips for Staying Aware
Chapter 17. Planning for Change
17.1 Stronger Influence and Better Security
17.2 Align, Align, Align
17.3 Security as a Nimble Function
17.4 Efficiency vs. Flexibility
Chapter 18. Reinventing Security
18.1 Common Circumstances of Reinvention
18.2 Milestones to Reach
18.3 How to Lead Reinvention
Part 3: Looking Forward
Chapter 19. Security’s Role in Corporate Social Responsibility
19.1 Why Security?
19.2 What’s in it for you?
19.3 How to Get a CSR Program Started
Chapter 20. Advances and Stalemates in Security
Chapter 21. Addressing the Knowledge Transfer Gap
21.1 Seven Characteristics of a Knowledge-Sharing Program
Chapter 22. Eleven Ways to Encourage Strategic Thinking
Chapter 23. Risk at High Velocity
Chapter 24. What Will Security Look Like in 2020?
24.1 How should Security Evolve to Excel in this Environment?
24.2 What Security 2020 Could Be: A Case Study
24.3 Elements of 2020 Security
About the Editor, Authors, and Frequent Insight Contributors
About Elsevier’s Security Executive Council Risk Management Portfolio