UID:
almafu_9960074074002883
Umfang:
1 online resource (xxvii, 270 pages) :
,
illustrations (some color)
ISBN:
9780128020586
,
012802058X
,
9780128020197
,
0128020199
Serie:
Gale eBooks
Inhalt:
This book provides readers with the proven strategies, methods, and techniques they need to present ideas and a sound business case for improving or enhancing security resilience to senior management.
Anmerkung:
Description based upon print version of record.
,
Front Cover; Building a Corporate Culture of Security: Strategies For Strengthening Organizational Resiliency; Copyright; Dedication; Contents; About the Author; Foreword; Preface; An Idea Is Born; What Could Possibly Make This Book Unequivocally Different?; This Book Is as Important as You Want It to Be; Anyone in a Responsible Leadership Position Can Benefit from Reading This Book; Features and Benefits; Organization and Presentation Is Important to Understand the Big Picture; Acknowledgments; 1 - Introduction; Overview; Building Security Resilience and Developing Relationships
,
But What Do Ability, Capability, and Preparedness Really Mean?How Do We Relate Security Goals to Business?; Can We Speak Intelligently About the Threat Environment?; Watch Out for Stumbling Blocks; Experience and Knowledge Base of Senior Decision-Makers Can Cause Us to Trip; What Do We Do with Misguided Executive Decision-Making?; Experience of Security Professionals; Vulnerability Creep-in Just Showed Up-It Wasn't Here Before; Conclusion; 2 - Strategies That Create Your Life Line; Overview; A Need Exists to Create a Set of Uniform Security Strategies; Part I: General Security Strategies
,
Part II: Special Security StrategiesSecurity Strategies and Guiding Principles; Ensure Public Safety, Public Confidence, and Services; Encourage and Facilitate Partnering Internally and Externally; Interface with Other Corporate Programs; Safety Program; Human Resources and Capital Investment; Business Continuity Planning; Capital Improvement Program; Use Unique Criteria Associated with Protection; Exploring Methods to Authenticate and Verify Personnel Identity; Coordinating Interoperability Standards to Ensure Compatibility of Communication Systems; Security Technologies and Expertise
,
Encourage and Facilitate Meaningful Information SharingSafeguard Privacy and Constitutional Freedoms; Security Policy; Security Authority, Responsibility, and Accountability; Conclusion; 3 - The Many Faces of Vulnerability Creep-in; Overview; Vulnerability Creep-in Eludes Many Security Professionals; Strategic Security Deficiencies Top the List; Some Executives Have No Clue What Security Is About; Executives Struggle to Grasp Essential Principles of Security Planning; Executives Exhibit Little Knowledge of the "Duty to Care Principle"
,
The Disruptive Influence of Inexperienced Executives in Security ActivitiesMany Security Professionals Lead from Behind; Weak Security Managers Must Enhance Skill Sets to Match the Business Environment; Programmatic Security Weaknesses Rank Second Place; Security Units are Vulnerable to Poor Leadership and Management; Security Creditability and Competency Hangs in the Balance; High Turnover Rates Take a Toll on Historical Perspective; Ineffective Planning and Development Plagues Security Organizations; Security Planning, Policies, and Practices Lack Strategic Vision, Balance, and Purpose
,
Protocols are Poorly Constructed, Poorly Written, and Difficult to Understand
,
English
Sprache:
Englisch
Bookmarklink