The Manager's Handbook for Corporate Security - 2nd Edition - ISBN: 9780128046043, 9780128046135

The Manager's Handbook for Corporate Security

2nd Edition

Establishing and Managing a Successful Assets Protection Program

Authors: Edward Halibozek Gerald Kovacich
eBook ISBN: 9780128046135
Paperback ISBN: 9780128046043
Imprint: Butterworth-Heinemann
Published Date: 23rd January 2017
Page Count: 498
Tax/VAT will be calculated at check-out Price includes VAT (GST)
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
96.32
67.42
67.42
67.42
67.42
67.42
77.06
77.06
72.99
51.09
51.09
51.09
51.09
51.09
58.39
58.39
120.00
84.00
84.00
84.00
84.00
84.00
96.00
96.00
85.95
60.16
60.16
60.16
60.16
60.16
68.76
68.76
Unavailable
Price includes VAT (GST)
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

The Manager’s Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, Second Edition, guides readers through today’s dynamic security industry, covering the multifaceted functions of corporate security and providing managers with advice on how to grow not only their own careers, but also the careers of those they manage on a daily basis.

This accessible, updated edition provides an implementation plan for establishing a corporate security program, especially for those who have little or no knowledge on the topic. It also includes information for intermediate and advanced professionals who are interested in learning more about general security, information systems security, and information warfare.

Key Features

  • Addresses today’s complex security industry, the role of the security manager, the diverse set of corporate security functions, and skills for succeeding in this dynamic profession
  • Outlines accessible, comprehensive implementation plans for establishing asset protection programs
  • Provides tactics for intermediate and advanced professionals on the topics of general security, information systems security, and information warfare
  • Offers new perspectives on the future of security and evolving expectations of security professionals

Readership

Physical and Information Corporate Security Managers, Supervisors, Executives, and other Practitioners. Security Management students

Table of Contents

Part I: The Old and New World of the Security Professional

Chapter 1. It’s a New Century and a New World

  • Abstract
  • Introduction to the New World
  • Summary
  • End Notes

Chapter 2. New and Old Threats to Corporate Assets, and What to Do About Them

  • Abstract
  • Introduction to the World of Threats, Vulnerabilities, and Risks to Corporate Assets
  • Threats
  • The Work Environment Has Changed
  • Case Study
  • Motivations of Threat Agents, the Attackers
  • Vulnerabilities
  • Risks
  • Summary
  • End Notes

Chapter 3. A Short History of Corporate Security and Law Enforcement

  • Abstract
  • Introduction to the World of Security and Law Enforcement
  • Definition of Security and Its Environment
  • Historical Overview of the Origins of Security
  • A Short History of Law Enforcement and Its Relationship to Security
  • The Changing Security and Business Environment
  • Summary
  • End Notes

Chapter 4. The Corporate Security Profession

  • Abstract
  • The Need for Corporate Security
  • Corporate Security Today
  • The Role of the Corporate Security Professional
  • The Required Skills of the Security Professional
  • What Kind of People Are Needed?
  • Why the Corporate Security Professional?
  • Where Is Security’s Place in the Corporation?
  • Summary
  • End Notes

Part II: The Corporate Security Manager

Chapter 5. The International Widget Corporation (IWC)

  • Abstract
  • Introduction
  • IWC Background Information
  • Key Elements for the CSM to Consider
  • Getting to Know IWC
  • IWC’s Business Plans
  • IWC CAPP Planning
  • IWC Departments of Primary Importance to the CSM
  • IWC Vision, Mission, and Quality Statements
  • Summary
  • End Note

Chapter 6. The Corporate Security Manager’s Role

  • Abstract
  • Introduction to the World of the IWC CSM
  • CSM Leadership
  • Management Versus Leadership
  • Customer Expectations
  • Executive Management Expectations of a CSM
  • Plans
  • The SBP’S Specific Goals for the CSM
  • IWC TBP
  • IWC ABP
  • CSM Expectations of Executive Management
  • Working with Executive Management
  • Working with Corporate Peers
  • Dealing with Office Politics
  • Representing the Corporation to the Community
  • Dealing with the News Media
  • Summary
  • End Notes

Chapter 7. Establishing and Managing a Corporate Security Department

  • Abstract
  • Establishing IWC’s Security Department
  • Duties and Responsibilities
  • Planning
  • Staffing a Security Organization
  • Budgeting
  • Controlling
  • Working with Your Managers
  • Working with Your Employees
  • Managing Conflict
  • Dealing with Satellite Offices in the United States
  • Dealing with Satellite Offices in Foreign Lands
  • Case Study
  • Quality, Process Improvement, and Metrics Management: Assessing Organizational Performance
  • Summary
  • End Notes

Part III: The Corporate Security Functions

Chapter 8. Administrative Security

  • Abstract
  • Introduction
  • Corporate Security Department Projects
  • The IWC Corporate Assets Protection Plan
  • Corporate Asset Protection Policies
  • Procedures
  • Summary
  • End Notes

Chapter 9. Physical Security

  • Abstract
  • Definition of Physical Security
  • Security in Layers
  • Outer Layers of Protection
  • Inner Layers
  • Access Controls
  • Physical Security Costs
  • Physical Risk Assessments
  • Physical Security for Classified Government Contracts
  • Summary
  • End Note

Chapter 10. Outsourced or Proprietary Security?

  • Abstract
  • Outsourcing: A Definition
  • General Information
  • The Advantages and Disadvantages of a Proprietary Security Organization
  • The Advantages and Disadvantages of an Outsourced Security Organization
  • Candidate Security Functions for Outsourcing
  • Sample Outsourcing Analysis
  • Case Study
  • Summary

Chapter 11. Personnel Security

  • Abstract
  • Introduction
  • Preemployment and BIs
  • Sensitive Positions
  • Conducting Preemployment BIs
  • Adverse Information
  • Workplace Violence Prevention
  • Workplace Violence Case Study
  • Workplace Violence Prevention Program
  • Causes of Violent Behavior
  • Changes in Behavior or Appearance
  • Crisis Levels and Recommended Actions
  • What the CSM and Security Managers Can Do To Prevent Workplace Violence
  • What Employees Can Do To Prevent Workplace Violence
  • Workplace Violence Response
  • A Checklist for the Elements of a Good Personnel Security Program
  • Summary
  • End Notes

Chapter 12. Security Education and Awareness Training

  • Abstract
  • Introduction
  • Developing a Security Education and Awareness Training Program (SEATP)
  • Automation and Online Information Sharing
  • Summary
  • End Note

Chapter 13. Fire Protection

  • Abstract
  • Introduction to Fire Protection
  • Fire Prevention and Protection
  • Vulnerability to Fire
  • Risks
  • Fire Prevention and Protection Program—The Elements of IWC’s Effective Program
  • Fire Regulations
  • Outsourcing Fire Prevention and/or Suppression
  • Summary
  • End Notes

Chapter 14. Contingency Planning

  • Abstract
  • Introduction
  • Contingency Planning Program
  • Emergency Response
  • Crisis Management
  • Business Continuity
  • Summary
  • End Note

Chapter 15. Investigations

  • Abstract
  • Introduction to IWC’s Investigations Organization
  • Managing the Investigations Organization
  • Investigations Organization Mission, Vision, and Quality Statements
  • Crime Prevention Principles
  • Crime Prevention Organizational Responsibilities
  • IWC Investigations Organization Duties and Responsibilities
  • The Investigations Organization’s Strategic, Tactical, and Annual Plans
  • Crime Prevention Program and Organization
  • Crime Inquiries and Investigative Functions
  • Sources, Networking, and Liaison
  • A Crime Occurs—Should You Call Law Enforcement?
  • Summary
  • End Notes

Chapter 16. Government Security

  • Abstract
  • Introduction
  • Why Discuss National Security as Part of Corporate Security?
  • International Widget Corporation and Government Agency Contract
  • National Security Classified Information
  • Assets Protection Requirements in the National Security Arena
  • Assets Protection Objective in the National Security Environment
  • Responsibilities
  • Collective Assets Protection Controls
  • The Appointment of the Corporation’s Focal Point for Government Contract Program Assets Protection
  • National Industrial Security Program (NISP)
  • Homeland Security
  • International Widget Corporation Government Contract Award Notification
  • Summary
  • End Notes

Chapter 17. Information Security

  • Abstract
  • Introduction
  • Three Basic Categories of Information
  • Determining the Value of Information
  • Case Study—A Process for Determining Information Value
  • The Protection of Automated Information and High-Technology Equipment
  • IAPS Organization Responsibilities
  • IAPS Management Job Description
  • IAPS Staff Job Descriptions
  • Information Assurance and Protection Program
  • Summary
  • End Notes

Chapter 18. Executive Protection

  • Abstract
  • An Introduction to Executive Protection
  • Why Executive Protection?
  • The Threats and Risks
  • Know the Protectee
  • The Protector
  • Advance Work
  • Transportation
  • Home, Office, and Automobile
  • Mail and Packages
  • Issues and Concerns
  • Summary
  • End Notes

Chapter 19. Event Security

  • Abstract
  • Introduction
  • Advance Work—Preplanning
  • Security Operations
  • Physical Security
  • Information Security
  • Staff and Executive Protection
  • Contingencies
  • Summary

Part IV: The Security Profession Now and in the Future

Chapter 20. How to Develop and Maintain a Corporate Security Career Development Program

  • Abstract
  • Introduction
  • The CSM’s Career Development
  • Establishing and Managing a Corporate Security Career Development Program
  • Summary
  • End Note

Chapter 21. Security Professionals—What You Can Do to Help Others

  • Abstract
  • Introduction
  • Lectures
  • Writing
  • Associations
  • Educational Institutions
  • Mentoring
  • Summary
  • End Notes

Chapter 22. Ethics and the Corporate Security Professional

  • Abstract
  • Introduction
  • Codes of Ethics
  • Code of Ethics
  • Corporate Ethics, Standards of Conduct, Business Practices, and Corporate Values
  • Impact of Ethics on the Corporate Assets Protection Program
  • Summary
  • End Notes

Chapter 23. The Future of the Corporate Security Profession

  • Abstract
  • Introduction
  • It’s a New Century and a New World
  • Global Competition
  • Summary
  • End Notes

Details

No. of pages:
498
Language:
English
Copyright:
© Butterworth-Heinemann 2017
Published:
Imprint:
Butterworth-Heinemann
eBook ISBN:
9780128046135
Paperback ISBN:
9780128046043

About the Author

Edward Halibozek

Edward Halibozek is currently a security consultant and part-time instructor for California State University, Fullerton. He retired from Northrop Grumman Corporation in August, 2011 after more than 26 years with the company. His most recent position was the Vice President of Security. Mr. Halibozek chaired the Northrop Grumman Security Council, which is the company’s key deliberative body for security, contingency planning, investigations and fire services. He was also responsible for Executive Protection services. Mr. Halibozek served as a member of the National Industrial Security Program Policy Advisory Council (NISPAC). Mr. Halibozek holds a Master of Science degree in Criminal Justice from California State University and an MBA from Pepperdine University.

Affiliations and Expertise

Part-time instructor, California State University, Fullerton, CA, USA

Gerald Kovacich

Dr. Gerald L. Kovacich has more than 40 years of experience in industrial, business and government security, investigations, information systems security, and information warfare, both in the U.S. Government as a special agent, in international corporations, and subsequently as an international consultant and lecturer. He retired as the Information Warfare Technologist, Northrop Grumman Corporation to pursue a career as an international consultant, lecturer and writer.

Affiliations and Expertise

Security consultant, lecturer, and author, Oak Harbor, WA, USA