|
Showing 1 - 4 of
4 matches in All Departments
Threats in Context: Identify, Analyze, Anticipate begins with the
premise that a risk assessment is relevant primarily-and hinges
upon-the correct evaluation of the threat. According to the author,
all the other stages of the risk evaluation are, in fact, dependent
on getting the understanding and measurement of the threat right.
Despite this truism, many risk assessment methods (i.e., the
process of determining the threat) tend to rush through a vague
typology, offer minimal classifications, utilize an often-outdated
list of potential malevolent actions-all of which are based on
precedent occurrences. There should be a way to improve on this: a
way to provide security practitioners and analysts better tools to
deal with the task of analyzing threats and risk and to prepare for
such contingencies appropriately. The book begins with a
retrospective on the threats from the 1960s through to the present.
The list is long and includes hijackings and airport attacks,
piracy, drug smuggling, attacks on trains, pipelines, city-wide
multi-site attacks, road attacks, workplace shootings, lone wolf
attacks, drone attacks, bombings, IEDs, sniper attacks, random
stabbings, and more. Terrorism, workplace violence, and active
shooter scenarios all present asymmetric problems and unique
challenges that require new ways of thinking, operationally, of
risk to properly prevent, mitigate, and respond to such threats.
The author demonstrates how to develop an appropriate methodology
to define both current and emerging threats, providing a five-step
process to self-evaluate-to determine an organization's, a
location's, or a facility's threats and to plan risk mitigation
strategies to accurately identify, minimize, and neutralize such
threats. Coverage progressively builds from correctly identifying
the root threats-both global and local-to a subsequent
understanding of the corollary relationship between threat,
vulnerability, and risk, with the threat serving as the fundamental
cornerstone of the risk evaluation. As such, Threats in Context
will serve as a pivotal resource to security professionals from all
backgrounds serving in a variety of fields and industries.
Threats in Context: Identify, Analyze, Anticipate begins with the
premise that a risk assessment is relevant primarily-and hinges
upon-the correct evaluation of the threat. According to the author,
all the other stages of the risk evaluation are, in fact, dependent
on getting the understanding and measurement of the threat right.
Despite this truism, many risk assessment methods (i.e., the
process of determining the threat) tend to rush through a vague
typology, offer minimal classifications, utilize an often-outdated
list of potential malevolent actions-all of which are based on
precedent occurrences. There should be a way to improve on this: a
way to provide security practitioners and analysts better tools to
deal with the task of analyzing threats and risk and to prepare for
such contingencies appropriately. The book begins with a
retrospective on the threats from the 1960s through to the present.
The list is long and includes hijackings and airport attacks,
piracy, drug smuggling, attacks on trains, pipelines, city-wide
multi-site attacks, road attacks, workplace shootings, lone wolf
attacks, drone attacks, bombings, IEDs, sniper attacks, random
stabbings, and more. Terrorism, workplace violence, and active
shooter scenarios all present asymmetric problems and unique
challenges that require new ways of thinking, operationally, of
risk to properly prevent, mitigate, and respond to such threats.
The author demonstrates how to develop an appropriate methodology
to define both current and emerging threats, providing a five-step
process to self-evaluate-to determine an organization's, a
location's, or a facility's threats and to plan risk mitigation
strategies to accurately identify, minimize, and neutralize such
threats. Coverage progressively builds from correctly identifying
the root threats-both global and local-to a subsequent
understanding of the corollary relationship between threat,
vulnerability, and risk, with the threat serving as the fundamental
cornerstone of the risk evaluation. As such, Threats in Context
will serve as a pivotal resource to security professionals from all
backgrounds serving in a variety of fields and industries.
Strategic Security will help security managers, and those aspiring
to the position, to think strategically about their job, the
culture of their workplace, and the nature of security planning and
implementation. Security professionals tend to focus on the
immediate (the urgent) rather than the important and essential-too
often serving as "firefighters" rather than strategists. This book
will help professionals consider their roles, and structure their
tasks through a strategic approach without neglecting their career
objectives. Few security management books for professionals in the
field focus on corporate or industrial security from a strategic
perspective. Books on the market normally provide "recipes,"
methods or guidelines to develop, plans, policies or procedures.
However, many do so without taking into account the personal
element that is supposed to apply these methods. In this book, the
authors helps readers to consider their own career development in
parallel with establishing their organisation security programme.
This is fundamental to becoming, and serving as, a quality,
effective manager. The element of considering career objectives as
part-and-parcel to this is both unique to only this book and vital
for long-term career success. The author delineates what makes
strategic thinking different in a corporate and security
environment. While strategy is crucial in the running of a company,
the traditional attitude towards security is that it has to fix
issues quickly and at low cost. This is an attitude that no other
department would tolerate, but because of its image, security
departments sometimes have major issues with buy-in and from
top-management. The book covers the necessary level of strategic
thinking to put their ideas into practice. Once this is achieved,
the strategic process is explained, including the need to build the
different steps into this process-and into the overarching business
goals of the organisation-will be demonstrated. The book provides
numerous hand-on examples of how to formulate and execute the
strategic master plan for the organization. The authors draws on
his extensive experience and successes to serve as a valuable
resource to all security professionals looking to advance their
careers in the field.
Strategic Security will help security managers, and those aspiring
to the position, to think strategically about their job, the
culture of their workplace, and the nature of security planning and
implementation. Security professionals tend to focus on the
immediate (the urgent) rather than the important and essential-too
often serving as "firefighters" rather than strategists. This book
will help professionals consider their roles, and structure their
tasks through a strategic approach without neglecting their career
objectives. Few security management books for professionals in the
field focus on corporate or industrial security from a strategic
perspective. Books on the market normally provide "recipes,"
methods or guidelines to develop, plans, policies or procedures.
However, many do so without taking into account the personal
element that is supposed to apply these methods. In this book, the
authors helps readers to consider their own career development in
parallel with establishing their organisation security programme.
This is fundamental to becoming, and serving as, a quality,
effective manager. The element of considering career objectives as
part-and-parcel to this is both unique to only this book and vital
for long-term career success. The author delineates what makes
strategic thinking different in a corporate and security
environment. While strategy is crucial in the running of a company,
the traditional attitude towards security is that it has to fix
issues quickly and at low cost. This is an attitude that no other
department would tolerate, but because of its image, security
departments sometimes have major issues with buy-in and from
top-management. The book covers the necessary level of strategic
thinking to put their ideas into practice. Once this is achieved,
the strategic process is explained, including the need to build the
different steps into this process-and into the overarching business
goals of the organisation-will be demonstrated. The book provides
numerous hand-on examples of how to formulate and execute the
strategic master plan for the organization. The authors draws on
his extensive experience and successes to serve as a valuable
resource to all security professionals looking to advance their
careers in the field.
|
|