Strategic Security Management: A Risk Assessment Guide for Decision Makers

Front Cover
Elsevier, Nov 27, 2006 - Business & Economics - 416 pages

Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organization’s assets, giving decision makers the foundation needed to climb the next step up the corporate ladder.

Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures.

Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald.

  • Provides clear direction on how to meet new business demands on the security professional
  • Guides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the program
  • Covers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each
 

Contents

DataDriven Security
1
Asset Identification and Security Inventory
11
Threat Assessments
27
Crime Analysis
51
Vulnerability Assessments
85
Risk Assessments
109
Information Technology Risk Management
133
Prevention
159
Project Management
251
Premises Security Liability
265
Forensic Security
285
Ethics in Security Consulting
305
Certified Security ConsultantSM Code of Ethics
319
Best Practice 2 Forensic Methodology of the International Association of Professional Security Consultants
323
Risk Assessment Report
327
Crime Analysis Report
343

Security Measures Policies and Procedures
173
Security Measures Physical Security
183
Security Measures Deploying Physical Security
217
Security Measures Personnel
231
Bibliography
357
Recommended Reading
361
Index
375
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page 19 - A criticality assessment is a process designed to systematically identify and evaluate important assets and infrastructure in terms of various factors, such as the mission and significance of a target. For example, nuclear power plants, key bridges, and major computer networks might be identified as "critical" in terms of their importance to national security, economic activity, and public safety. In addition, facilities might be critical at certain times, but not others. For example, large sports...

About the author (2006)

Karim H. Vellani, CPP, CSC, earned his M.S. from Sam Houston State University in Criminal Justice Management. He is a member of the International Association of Crime Analysis, International Association of Professional Security Consultants, and ASIS International. Currently he serves as President of Threat Analysis Group, LLC, based in Sugar Land, TX, USA.

Bibliographic information