Developing a Comprehensive Security Program: Elements, Characteristics, and Leadership

· ·
· Elsevier
电子书
12
符合条件

关于此电子书

Developing a Comprehensive Security Program answers the question common among security managers, "What is a model security program, and how does our program compare to it?" In this seven-minute Proven Practices presentation, narrator Elizabeth Lancaster outlines the baseline elements of a security program, which have been defined by experienced Security Executive Council members and research. This presentation is not sector-specific--meaning it's applicable for all organizations and industries. In addition to the baseline security program elements, Lancaster also discusses business-aligned program elements, program characteristics, a program maturity model, and the skills and knowledge the security department needs to possess. Developing a Comprehensive Security Program may be used as a benchmark for existing programs and to educate senior management. It also provides a general understanding of the security function as it currently exists. Developing a Comprehensive Security Program is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. - The seven-minute, visual PowerPoint presentation with audio narration format is excellent for group learning - Information is drawn from the many years of collective knowledge and experience of the Security Executive Council community - Identifies program characteristics and the knowledge areas and skills security leaders should possess

作者简介

Bob Hayes has more than 25 years of experience developing security programs and providing security services for corporations, including eight years as the CSO at Georgia Pacific and nine years as security operations manager at 3M. His security experience spans the manufacturing, distribution, research and development, and consumer products industries as well as national critical infrastructure organizations. Additionally, he has more than 10 years of successful law enforcement and training experience in Florida and Michigan. Bob is a recognized innovator in the security field and was named as one of the "25 Most Influential People in the Security Industry in 2007 by Security magazine. He is a frequent speaker at key industry events. He is a leading expert on security issues and has been quoted by such major media outlets as the Wall Street Journal and Forbes. Bob is currently the managing director of the Security Executive Council.Kathleen Kotwica has a PhD in experimental psychology from DePaul University and has had a career as a researcher and knowledge strategist. Her experience includes positions as information architecture consultant at a New England consulting firm, director of online research at CXO Media (IDG), and research associate at Children's Hospital in Boston. She has authored and edited security industry trade and business articles and has spoken at security-related conferences including CSO Perspectives, SecureWorld Expo, ASIS, and CSCMP. In her current role as EVP and chief knowledge strategist at the Security Executive Council she leads the development and production of Council tools, solutions, and publications. She additionally conducts industry research and analysis to improve security and risk management practices.Liz Lancaster is the director of member services and projects for the Security Executive Council, an innovative problem-solving research and services organization. She is responsible for planning, processes and project management around the member services program. As members' direct communication link to development of Council strategic initiatives, member services is key to the process of helping members and their staffs make an impact in the areas of security that are important to them, their business and industry. Liz brings 25 years of combined risk management, business and consulting experience in investigations, access control systems, design and project management, security server finance, sales and administration, commonwealth and public/private corporation emergency response planning, uniform guard services and corporate security staff training and development, executive travel safety and risk assessments.She has held positions with the Massachusetts Department of Correction; assigned to the Office of Investigations institutional internal affairs division; Applied Risk Management LLP as a Sr. Technical Consultant; Boston Scientific Corporation as Manager of Security Integration and Investigations; Astra Pharmaceuticals LP as Security Project Leader; and Stratus Computer, Inc. in continuous availability server sales and finance.Liz holds a master of arts (1995) and a bachelor of science (1992) in Criminal Justice Administration from the University of Massachusetts. She is a member of the Women in Criminal Justice Organization, Risk Analysis Group Integrated Risk Solutions, Balanced Scorecard Collaborative, and ASIS International. Liz is Council Staff Editorial Advisor for Security Technology Executive magazine and has authored several articles in industry trade magazines.

为此电子书评分

欢迎向我们提供反馈意见。

如何阅读

智能手机和平板电脑
只要安装 AndroidiPad/iPhone 版的 Google Play 图书应用,不仅应用内容会自动与您的账号同步,还能让您随时随地在线或离线阅览图书。
笔记本电脑和台式机
您可以使用计算机的网络浏览器聆听您在 Google Play 购买的有声读物。
电子阅读器和其他设备
如果要在 Kobo 电子阅读器等电子墨水屏设备上阅读,您需要下载一个文件,并将其传输到相应设备上。若要将文件传输到受支持的电子阅读器上,请按帮助中心内的详细说明操作。