Professional Security Management A Strategic Guide 1st Edition by Charles Swanson – Ebook PDF Instant Download/Delivery: 9780367339616 ,0367339617
Full download Professional Security Management A Strategic Guide 1st Edition after payment
Product details:
ISBN 10: 0367339617
ISBN 13: 9780367339616
Author: Charles Swanson
Professional Security Management A Strategic Guide 1st Edition Table of contents:
1 Private security and the development of the security manager
Policing and law enforcement
The United Kingdom
The Metropolitan Police Service (MPS)
The US
The UK police post-2008/09
The next great recession
The dark figure of crime
The private security sector
Private security companies (PSC)
The 2012 London Olympics
The development of the security manager
Management
Security management
The cultural debate
2 Security risk management and strategic business awareness
The security professional and risk management
Risk management responsibilities
Crisis management and the security manager
Strategic business awareness and the security manager
Income generation
3 Critical security areas
3.1 Security risk management
Security
International security
Timeline
Personal security – extrapolating from above section
National security
International security
Globalisation
A potted history
Walls and castles
Risk
Risk perception
Risk perception case study: 9/11
The security risk assessment
Competent persons and the security risk assessment
Subject matter expertise
Risk component parts
Assets
Brand and reputation
Threats: capability combined with intent
Vulnerability
Likelihood
Impact
Risk treatment and control measures
Reduce the risk
Avoid the risk
Risk transference
Residual risk
Risk acceptance
Risk communication
Exercise Brave Defender: security and risk management
Scenario
Britcom UK: 1 Canada Fields
Security systems at 1 Canada Fields
Access control
Intruder detection system (IDS)
Britcom plc
Unique selling point
Internal – SWOT
External – PESTLE
Synopsis
Task
3.2 Crime Prevention Through Environmental Design (CPTED) and Situational Crime Prevention (SCP)
CPTED
Situational Crime Prevention
Situational Crime Prevention activities
Routine Activity Theory (RAT)
Rational Choice Theory
Synopsis
3.3 Physical and electronic security systems
Defence in depth (DiD)
Defence in depth (continued)
The surrounding environment
Perimeter
Fencing
Security lighting
External access control
Building fabric and construction
Physical security standards
Reception areas
Electronic systems
Closed circuit television (CCTV)
Perimeter intruder detection systems (PIDS) and intruder detection systems (IDS)
Internal access control
Radio frequency identification (RFID)
Synopsis
3.4 The security survey and the security audit
The security survey
Competency levels
The security surveyor
My vision – the professional security surveyor
Registered security surveyor/auditor
Synopsis
3.5 Business resilience
Risk management
Management policies, procedures, and practices
Communicating, consulting, and establishing the context
Identifying, analysing, evaluating, treating, monitoring, and reviewing risk
Treating, monitoring, and reviewing the risk
Identification of residual risks
Monitoring and reviewing risk
Crisis management
The crisis management plan (CMP)
Phases of a crisis
Pre-crisis – preventing the crisis from occurring
The financial crisis of 2008
Operational crisis – containment and control
Post-crisis phase
The crisis management team (CMT)
CMT members
CMT lead
Human resources lead (director)
Legal advisor
Public relations (PR) and communications lead
Security and safety
Operations and logistics
Business administration and finance
The role of the crisis management team
Crisis communications
Senior management response
Synopsis
Exercise Noble Response
Phase 1
Phase 2
Phase 3
Phase 4
Phase 5
Phase 6
Phase 7
Phase 8
Phase 9
Phases 1 to 7 – summary
Reflection on the above
Phase 1
Phase 2
Phase 3
Phase 4
Phase 5
Phase 6
Phase 7
Phase 8
Phase 9
Résumé
Terrorist threat level: SEVERE
Phase 10
Phase 11
Disaster management
Disaster management and the disaster management cycle
The Disaster Management Life Cycle
Business continuity
Business
Business Continuity Planning (BCP) and Business Continuity Management Systems (BCMS)
The Business Continuity Plan (BCP)
Synopsis
3.6 The chief security officer (CSO) and the chief information security officer (CISO)
The CSO
The CISO
Synopsis
3.7 Cybercrime and the cyberthreat
The cyberthreat
The Internet of Things
Synopsis
3.8 Critical national infrastructure
Interdependency
Risk and critical infrastructures (CI)
Threats to critical infrastructures
Physical threats
Fukushima Daiichi
Physical
Cyber
The protection of critical infrastructure (CI)
Cyber-NHS and ransomware
Synopsis
Task
3.9 Terrorism and counterterrorism
Definitions and identification of terrorism
The psychology and rationale of terrorism
Radicalisation and de-radicalisation
Radicalisation
De-radicalisation and disengagement
Terrorist methods of operation and attack platforms
Irish terrorism
The troubles
The Fenians
Partition
1969 – the Apprentice Boys march
The Provisional Irish Republican Army (PIRA)
The corporal killings
PIRA external operations
Jihad
Islamic Jihadi terrorism
Extreme right-wing terrorism
Left-wing ideologies
State-sponsored terrorism
State patronage
State assistance
Synopsis
Task
3.10 Aviation and maritime security management
Aviation security
Maritime security
International terrorism
MV Limburg
USS Cole1
The ISPS Code
Maritime Transportation Security Act (MTSA) of 2002 – USA
Container Security Initiative (CSI) – US
Customs Trade Partnership Against Terrorism (C-TPAT) – USA
World Customs Organisation (WCO) Framework of Standards to Secure and Facilitate Trade (SAFE)
Authorised Economic Operator (AEO) – EU
Maritime security – piracy
Synopsis
Task
3.11 Supply chain security management
Intermodal transportation
Synopsis
3.12 Hostile environment awareness
Beirut
Synopsis
3.13 Strategic business awareness
Britcom plc
Synopsis
Task
3.14 Fraud and fraud investigations
Concern – 2018
PwC’s 2018 Global Economic Crime and Fraud Survey
Fraud
Types of fraud
Synopsis and task
3.15 Retail loss and prevention methods
The British Retail Consortium (BRC)
Context and trends
Violence and abuse
Theft and damage
Fraud
Cyber
Retail loss prevention
Members of staff
Organised criminals
Opportunist criminals
Mitigation
Involve the right people with the right approach
Venice and the unions
The right people
Resistance
Choose activities and topics
Plan and execute
Synopsis
3.16 Workplace investigations
Evidence
Legislation
Civil law
Criminal law
Acts of Parliament
The investigation
Planning
Procedural transparency
Synopsis
Tasks
3.17 Academic and vocational qualifications
SIA front line training
Common security industry knowledge
Security guarding specialist module
Conflict management module
The Regulated Qualifications Framework (RQF)
Foundation degree
Bachelor’s degree (BA/BSc)
Master’s degree (MA/MSc/MLitt/MPhil)
PhD
Chartered status
ASIS International
3.18 Conclusion
People also search for Professional Security Management A Strategic Guide 1st Edition:
certified security management professional
certified security management professional csmp
professional aviation security and risk management
security risk management professional certification
security risk management professional
Tags: Charles Swanson, Professional Security Management, Strategic Guide