1 option
Professional security management : a strategic guide / Charles Swanson.
- Format:
- Book
- Author/Creator:
- Swanson, Charles, author.
- Language:
- English
- Subjects (All):
- Private security services--Management.
- Private security services.
- Physical Description:
- 1 online resource (329 pages)
- Edition:
- 1st ed.
- Place of Publication:
- London ; New York, New York : Routledge, [2021]
- Summary:
- "Historically, security managers have tended to be sourced from either the armed forces or law enforcement. But the increasing complexity of the organisations employing them, along with the technologies employed by them, is forcing an evolution and expansion of the role, and security managers must meet this challenge in order to succeed in their field, as well as protect the assets of their employers. Risk management, crisis management, continuity management, strategic business operations, data security, IT and business communications all fall under the purview of the security manager. This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses. It covers the basics of strategy, risk, and technology from the perspective of the security manager, focusing only one the "need to know". The reader will benefit from an understanding of how risk management aligns its functional aims with the strategic goals and operations of the organisation. This essential book supports professional vocational accreditation and qualifications, such as the Chartered Security Professional (CSyP), or Certified Protection Professional (CPP), and advises on pathways to higher education qualifications in the fields of Security and Risk Management. It is ideal for any risk manager looking to further their training and development, as well as being complementary for Risk and Security Management programs with a focus on practice"-- Provided by publisher.
- Contents:
- Cover
- Half Title
- Title
- Copyright
- Dedication
- Contents
- List of figures
- List of tables
- Acknowledgements
- Introduction
- Thinking like a criminal
- Aims
- Security management
- Exercise Brave Defender
- 1 Private security and the development of the security manager
- Policing and law enforcement
- The United Kingdom
- The Metropolitan Police Service (MPS)
- The US
- The UK police post-2008/09
- The next great recession
- The dark figure of crime
- The private security sector
- Private security companies (PSC)
- The 2012 London Olympics
- The development of the security manager
- Management
- The cultural debate
- 2 Security risk management and strategic business awareness
- The security professional and risk management
- Risk management responsibilities
- Crisis management and the security manager
- Strategic business awareness and the security manager
- Income generation
- 3 Critical security areas
- 3.1 Security risk management
- Security
- International security
- Timeline
- Personal security - extrapolating from above section
- National security
- Globalisation
- A potted history
- Walls and castles
- Risk
- Risk perception
- Risk perception case study: 9/11
- The security risk assessment
- Competent persons and the security risk assessment
- Subject matter expertise
- Risk component parts
- Assets
- Brand and reputation
- Threats: capability combined with intent
- Vulnerability
- Likelihood
- Impact
- Risk treatment and control measures
- Reduce the risk
- Avoid the risk
- Risk transference
- Residual risk
- Risk acceptance
- Risk communication
- Exercise Brave Defender: security and risk management
- Scenario
- Britcom UK: 1 Canada Fields
- Security systems at 1 Canada Fields
- Access control.
- Intruder detection system (IDS)
- Britcom plc
- Unique selling point
- Internal - SWOT
- External - PESTLE
- Synopsis
- Task
- 3.2 Crime Prevention Through Environmental Design (CPTED) and Situational Crime Prevention (SCP)
- CPTED
- Situational Crime Prevention
- Situational Crime Prevention activities
- Routine Activity Theory (RAT)
- Rational Choice Theory
- 3.3 Physical and electronic security systems
- Defence in depth (DiD)
- Defence in depth (continued)
- The surrounding environment
- Perimeter
- Fencing
- Security lighting
- External access control
- Building fabric and construction
- Physical security standards
- Reception areas
- Electronic systems
- Closed circuit television (CCTV)
- Perimeter intruder detection systems (PIDS) and intruder detection systems (IDS)
- Internal access control
- Radio frequency identification (RFID)
- 3.4 The security survey and the security audit
- The security survey
- Competency levels
- The security surveyor
- My vision - the professional security surveyor
- Registered security surveyor/auditor
- 3.5 Business resilience
- Risk management
- Management policies, procedures, and practices
- Communicating, consulting, and establishing the context
- Identifying, analysing, evaluating, treating, monitoring, and reviewing risk
- Treating, monitoring, and reviewing the risk
- Identification of residual risks
- Monitoring and reviewing risk
- Crisis management
- The crisis management plan (CMP)
- Phases of a crisis
- Pre-crisis - preventing the crisis from occurring
- The financial crisis of 2008
- Operational crisis - containment and control
- Post-crisis phase
- The crisis management team (CMT)
- CMT members
- CMT lead
- Human resources lead (director)
- Legal advisor
- Public relations (PR) and communications lead.
- Security and safety
- Operations and logistics
- Business administration and finance
- The role of the crisis management team
- Crisis communications
- Senior management response
- Exercise Noble Response
- Phase 1
- Phase 2
- Phase 3
- Phase 4
- Phase 5
- Phase 6
- Phase 7
- Phase 8
- Phase 9
- Phases 1 to 7 - summary
- Reflection on the above
- Résumé
- Terrorist threat level: SEVERE
- Phase 10
- Phase 11
- Disaster management
- Disaster management and the disaster management cycle
- The Disaster Management Life Cycle
- Business continuity
- Business
- Business Continuity Planning (BCP) and Business Continuity Management Systems (BCMS)
- The Business Continuity Plan (BCP)
- 3.6 The chief security officer (CSO) and the chief information security officer (CISO)
- The CSO
- The CISO
- 3.7 Cybercrime and the cyberthreat
- The cyberthreat
- The Internet of Things
- 3.8 Critical national infrastructure
- Interdependency
- Risk and critical infrastructures (CI)
- Threats to critical infrastructures
- Physical threats
- Fukushima Daiichi
- Physical
- Cyber
- The protection of critical infrastructure (CI)
- Cyber-NHS and ransomware
- 3.9 Terrorism and counterterrorism
- Definitions and identification of terrorism
- The psychology and rationale of terrorism
- Radicalisation and de-radicalisation
- Radicalisation
- De-radicalisation and disengagement
- Terrorist methods of operation and attack platforms
- Irish terrorism
- The troubles
- The Fenians
- Partition
- 1969 - the Apprentice Boys march
- The Provisional Irish Republican Army (PIRA)
- The corporal killings
- PIRA external operations
- Jihad
- Islamic Jihadi terrorism.
- Extreme right-wing terrorism
- Left-wing ideologies
- State-sponsored terrorism
- State patronage
- State assistance
- 3.10 Aviation and maritime security management
- Aviation security
- Maritime security
- International terrorism
- MV Limburg
- USS Cole
- The ISPS Code
- Maritime Transportation Security Act (MTSA) of 2002 - USA
- Container Security Initiative (CSI) - US
- Customs Trade Partnership Against Terrorism (C-TPAT) - USA
- World Customs Organisation (WCO) Framework of Standards to Secure and Facilitate Trade (SAFE)
- Authorised Economic Operator (AEO) - EU
- Maritime security - piracy
- 3.11 Supply chain security management
- Intermodal transportation
- 3.12 Hostile environment awareness
- Beirut
- 3.13 Strategic business awareness
- 3.14 Fraud and fraud investigations
- Concern - 2018
- PwC's 2018 Global Economic Crime and Fraud Survey
- Fraud
- Types of fraud
- Synopsis and task
- 3.15 Retail loss and prevention methods
- The British Retail Consortium (BRC)
- Context and trends
- Violence and abuse
- Theft and damage
- Retail loss prevention
- Members of staff
- Organised criminals
- Opportunist criminals
- Mitigation
- Involve the right people with the right approach
- Venice and the unions
- The right people
- Resistance
- Choose activities and topics
- Plan and execute
- 3.16 Workplace investigations
- Evidence
- Legislation
- Civil law
- Criminal law
- Acts of Parliament
- The investigation
- Planning
- Procedural transparency
- Tasks
- 3.17 Academic and vocational qualifications
- SIA front line training
- Common security industry knowledge
- Security guarding specialist module
- Conflict management module.
- The Regulated Qualifications Framework (RQF)
- Foundation degree
- Bachelor's degree (BA/BSc)
- Master's degree (MA/MSc/MLitt/MPhil)
- PhD
- Chartered status
- ASIS International
- 3.18 Conclusion
- Bibliography
- Index.
- Notes:
- Description based on print version record.
- ISBN:
- 0-429-32306-9
- 1-000-08056-0
- 9780429323065
- OCLC:
- 1141922842
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.