Learn to measure risk and develop a plan to protect employees and company interests by applying the advice and tools in Risk and Security Management: Protecting People and Sites Worldwide. In a world concerned with global terrorism, instability of emerging markets, and hazardous commercial operations, this book shines as a relevant and timely text with a plan you can easily apply to your organization. Find a series of strategic to granular level policies, systems, and concepts which identify and address risk, enabling business to occur in a manner which best protects you and your company.
"It is, in fact, a relevant and timely book that provides practical instruction regarding the need to assess risk and implement protection of a company′s assets to safeguard its people and facilities. What sets this book above others on its topic is its emphasis on programs that avoid the waste of time, effort, and resources." ( Bookviews.com, October 2008)
Preface.
Acknowledgements.
Chapter 1. Risk Consultancy and Security Management.
Project Planning.
Balancing Service Delivery.
Company and Vendor Relationships.
Consultant′s Objectives.
Consultant Skill Areas.
Principle Consultant Errors.
Chapter 2. Initiating New Contracts.
Business Cycle.
Proposals.
Proposal Concepts.
Proposal Process.
Analyzing the Request for Proposal
Proposal.
Evaluating the Proposal.
Proposal Production.
Chapter 3. Service Delivery and Quality Assurance.
Common Vendor and Company Failings.
Understanding the Activity.
Service Delivery Support.
Managing Service Delivery.
Quality Assurance Plans.
Reports and Returns.
Management Systems.
Management Considerations.
Coordination with External Agencies.
Media Management.
Personnel and Training.
Contract Management
Chapter 4. Threat Evaluation and Risk Management.
Risk Areas.
Risk Management Plans.
Implementing the Risk Management Plan.
Risk Assessment.
Impact Assessments.
Risk Levels.
Presenting Risk.
Contingency Planning.
Crisis Management.
Crisis Management Team Levels and Structures.
Crisis Management Team Structure.
Incident Response Teams.
Crisis Management Tools.
Types of Crisis Management Responses.
Post–Incident Review.
Monitoring the Risk Management Program.
Chapter 5. Scope of Risk.
Nonphysical Threats.
Physical Risks.
Domestic Terrorism.
Chapter 6. Consultancy Services.
Due Diligence.
Investigations.
Forensics.
Information Security.
Screening.
Security Management Design.
Security Structural Design.
Crisis Management.
Governance and Development.
Political Analysis.
Security Consulting Services.
Auditing Consultancy.
Chapter7. Project Management.
Project Failure.
Project Life Cycle.
Project Planning.
Project Design.
Project Start Up.
Project Initiation.
Project Management Structures.
Risk and Security Project Management.
Management Catagories.
Project Controls.
Project Integration.
Chapter 8. Mobile Security Services.
Understanding the Need.
PSD Structuring.
Management Principles.
Process Interfaces.
Innovations.
PSD Tactical Principles.
Mobile Security Conduct.
PSD Personnel Selection.
Medical Provision.
Vehicle Considerations.
Convoys.
Chapter 9. Facility Security Services.
Fixed Camps and Forward Operating Bases.
Mobile Facility Security.
Facility Security Management.
Relief in Place.
Security Considerations.
Layering Security.
Physical Security Structures.
Security Surveillance and Lighting.
Conventional Security Policies.
Evacuation Planning.
Chapter 10. Evacuation Planning.
Evacuation Principles.
Evacuation Plan Elements.
Evacuation Management.
Process Planning.
Evacuation Triggers.
Alert States.
Evacuation Plan Components.
Recovery Management.
Chapter 11. Disaster Response Management.
Humanitarian Operating Environment.
Working with Governments.
Management Preparation.
Principles of Disaster Response.
Stages of Disasters.
Disaster Management.
Preparedess Plans.
Mobilization.
Sustainment and Demobilization.
Chapter 12. Security Documents and Exhibits.
Consultancy Process.
Intelligence Reviews.
Threat Assessments.
Security Surveys.
Operations Order or Mobilization Plans.
Security Plan.
Security Audit.
Incident Management Plans.
Chapter 13. Government versus Commercial Contracting.
Differences between U.S. Government and Commercial Contracts.
Government Contracting.
Market Size and Scope.
U.S. Government Structure for Acquisition.
Acquisitions.
Federal Acquisition Regulation System.
Contracting Authorities.
Procurement Method.
RFP and the Uniform Contract Format.
Evaluation.
Contract Award and Administration.
Types of Contract.
Index.
Michael Blyth is a former Royal Marine Commando officer and has held/holds commercial vice president appointments both in operations as well as business strategies within two major international risk consulting and security companies. He has eighteen years of experience and a master′s degree in security and risk management. He is highly experienced in providing corporate risk mitigation and vulnerability assessments, crisis management plans, and a wide spectrum of security documents within high–risk environments for ambassadors, major oil and gas programs, communications network corporations, government organizations, development agencies, and a myriad of construction activities, effectively placing risk management into the context of a client′s commercial activity and budget constraints. He speaks on security and risk throughout the world, has been published in several security industry magazines, and has lived or worked in over thirty countries.
Praise for Risk and Security ManagementProtecting People and Sites Worldwide
"Blyth has produced a comprehensive guide to the increasingly important issues of asset security and corporate risk management worldwide. Drawing on practical examples gathered over years of government and private sector experience, he provides tangible illustrations of the points made. An engaging and well–written text for security experts and other professionals tackling a specialized, yet broad–ranging subject. This book provided me with a fresh perspective on many issues that confront global organizations on a daily basis."
Joe Pugh, Head of European Project Management, Panasonic
"While we can never eliminate all risk, Blyth provides insight into effective mitigation strategy and risk management that can help you meet your company requirements. This book is a must–read for companies considering working in new areas or expanding operations effectively leveraging the capabilities of security vendors to safeguard company operations, as well as the safety, welfare, and health of employees."
Timothy Bowen, Director of Global Investigations and Security, BearingPoint, Inc.
"A handbook for companies pursuing business opportunities in challenging, high–risk environments. Mike blends smart security risk management with company objectives to ensure the protection of life, assets, and reputation, supporting business success and continuity. This book is a great read and should be part of every security professional′s library."
Glenn McLea, Corporate Security Director, Parsons Corporation
"An excellent book . . . exploding some of the myths surrounding the security industry. Mike articulates extremely well the complexity of operating in challenging environments with limited resources and commercial drivers. He highlights the key strategic and operational drivers that enable tactical success organizational convergence, risk identification, contingency planning, and ultimately a robust crisis–management methodology, coupled with good business sense."
Matt Bray, Head of Business Continuity, BAA Heathrow
"This book is a most interesting read and of immense value to both the practitioner and those in leadership roles who require an extensive knowledge of risk and security management. I strongly recommend this book to all security practitioners and consultants as an excellent repository of risk and security management know–how."
Tom Mulhall, Director of Security Programmes, Loughborough University
1997-2024 DolnySlask.com Agencja Internetowa