Front Cover -- The Manager's Handbook for Corporate Security -- Copyright Page -- Dedication -- HTU -- Contents -- About the Authors -- Other Books by Authors -- Other Books by Edward P. Halibozek and Dr. Gerald L. Kovacich -- By Dr. Gerald L. Kovacich -- By Edward P. Halibozek -- Foreword -- Preface -- Acknowledgments -- Introduction -- I. The Old and New World of the Security Professional -- 1 It's a New Century and a New World -- Introduction to the New World -- Political Revolutions -- Europe -- Asia -- The Americas -- The Middle East -- Economic Revolution -- Revolution in Military Affairs -- Human Revolution -- Revolution in High Technology (Technology at the Cutting Edge) -- How Did We Get from Adam to Internet? -- Birth of the Internet -- Corporate Organizational Effects -- The Global Information Infrastructure (GII) -- GII-Why Is It Important to the Security Professional? -- Summary -- End Notes -- 2 New and Old Threats to Corporate Assets, and What to Do About Them -- Introduction to the World of Threats, Vulnerabilities, and Risks to Corporate Assets -- Threats -- Natural Threats -- Man-Made Threats -- The Work Environment Has Changed -- Case Study -- Motivations of Threat Agents, the Attackers -- Types of Attackers -- Vulnerabilities -- Risks -- Corporate Assets Protection Through a Risk Management Program -- What Is Risk Management as It Relates to Protecting Corporate Assets? -- Assets Protection Risk Assessments -- Assets Protection Risk Analysis -- Risk Management Process Goals -- Managing and Reducing Risks to Corporate Assets -- Program for Managing Assets Protection Risks -- Summary -- End Notes -- 3 A Short History of Corporate Security and Law Enforcement -- Introduction to the World of Security and Law Enforcement -- Definition of Security and Its Environment -- Historical Overview of the Origins of Security
Hunter-Gatherers -- Feudal Societies: Middle Ages Through the 19th Century -- The 20th Century -- Case Study: Short History of the United States' Defense Industry Security Program in the 1990s -- Security in the Private Sector After the Cold War -- A Short History of Law Enforcement and Its Relationship to Security -- The Changing Security and Business Environment -- Summary -- End Notes -- 4 The Corporate Security Profession -- The Need for Corporate Security -- Corporate Security Today -- The Role of the Corporate Security Professional -- The Required Skills of the Security Professional -- What Kind of People Are Needed? -- Why the Corporate Security Professional? -- Where Is Security's Place in the Corporation? -- Summary -- End Notes -- II. The Corporate Security Manager -- 5 The International Widget Corporation (IWC) -- Introduction -- IWC Background Information -- Key Elements for the CSM to Consider -- Getting to Know IWC -- IWC's Business Plans -- Strategic Business Plan -- Key Elements of IWC's SBP That the CSM Should Consider -- Tactical Business Plan -- Key Elements of IWC's TBP That the CSM Should Consider -- Annual Business Plan -- History of IWC's CSM -- Key Element of IWC's ABP That the CSM Should Consider -- IWC CAPP Planning -- IWC Departments of Primary Importance to the CSM -- IWC Vision, Mission, and Quality Statements -- Vision Statement -- IWC's Vision Statement -- Mission Statement -- IWC's Mission Statement -- Quality Statement -- IWC Quality Statement -- Summary -- End Note -- 6 The Corporate Security Manager's Role -- Introduction to the World of the IWC CSM -- CSM Leadership -- Management Versus Leadership -- Customer Expectations -- Internal Customers -- External Customers -- Executive Management Expectations of a CSM -- Plans -- Strategic Business Plan (SBP)
IWC Annual Profits for the Next 7 Years Should Increase by 7% per Year -- IWC's Market-share Goal Is an Average Increase of 2% per Year -- IWC Will Have a Paperless Office Within 7 Years -- IWC Will Expand Its Operations and Establish an Equal Business Presence in Asia, Europe, and the Americas -- IWC Will Acquire Competitors and Suppliers Where It Is Clearly Shown That They Will Support IWC's Goal of Being the Dominan... -- Mergers and Acquisitions -- What Are Mergers and Acquisitions? -- What Is the Security Role in a Merger or Acquisition? -- Premerger Support -- Postmerger -- The SBP'S Specific Goals for the CSM -- IWC TBP -- IWC ABP -- CSM Expectations of Executive Management -- Working with Executive Management -- Working with Corporate Peers -- Dealing with Office Politics -- Representing the Corporation to the Community -- Dealing with the News Media -- Summary -- End Notes -- 7 Establishing and Managing a Corporate Security Department -- Establishing IWC's Security Department -- Designing the Security Department -- Come to Work with a Plan -- Security's Vision, Mission, and Quality Statements -- Duties and Responsibilities -- Planning -- Staffing a Security Organization -- Hiring Security Professionals -- Experience and Skills -- Judgment and Trustworthiness -- Firing or Terminating an Employee -- Budgeting -- Controlling -- Working with Your Managers -- Working with Your Employees -- Collaborating -- Team Building -- Communicating -- Motivation -- Delegating -- Goal Setting -- Evaluating -- Managing Conflict -- Dealing with Satellite Offices in the United States -- Dealing with Satellite Offices in Foreign Lands -- Case Study -- Quality, Process Improvement, and Metrics Management: Assessing Organizational Performance -- Process Management -- Performance Management -- Using Technology to Deliver Security Services
How to Use Information Technology to Deliver Security Services -- Quality and Oversight -- Summary -- End Notes -- III. The Corporate Security Functions -- 8 Administrative Security -- Introduction -- Corporate Security Department Projects -- The IWC Corporate Assets Protection Plan -- Corporate Asset Protection Policies -- Procedures -- Summary -- End Notes -- 9 Physical Security -- Definition of Physical Security -- Security in Layers -- Outer Layers of Protection -- Grounds -- Roads -- Fences, Walls, Gates, and Other Barriers -- Fences -- Walls -- Natural Barriers -- Gates -- Other Openings -- Buildings and Doors -- Parking -- Lighting -- Surveillance -- Alarms -- Inner Layers -- Buildings, Doors, Windows, and Glass -- Locks, Keys, and Combinations -- Roofs -- Areas, Rooms, Containers, and Safes -- Access Controls -- What Should Be Controlled? -- Vehicles -- Employees -- Vendors, Suppliers, Customers, and Visitors -- How Do You Control Them? -- Vehicle and Personnel Gates -- Building Lobbies and Doors -- Interior Areas and Rooms -- Badges -- Guards -- Alarms and Surveillance Within the Inner Layer -- Physical Security Costs -- Physical Risk Assessments -- Physical Security for Classified Government Contracts -- Summary -- End Note -- 10 Outsourced or Proprietary Security? -- Outsourcing: A Definition -- General Information -- The Advantages and Disadvantages of a Proprietary Security Organization -- Pros -- Cons -- The Advantages and Disadvantages of an Outsourced Security Organization -- Pros -- Cons -- Candidate Security Functions for Outsourcing -- Sample Outsourcing Analysis -- Initial Analysis -- Detailed Analysis -- Cost -- Quality -- Experience -- Probability of Failure -- Consequence of Failure -- Final Outsourcing Decision -- Case Study -- Summary -- 11 Personnel Security -- Introduction -- Preemployment and BIs
Basics of Preemployment Checks -- What Are Preemployment BIs? -- Why Do Preemployment BIs? -- Foreign Applicants -- Who Do We Do Them For? -- A Minimum Standard for Preemployment BIs -- Prior Employment History -- Education History and Achievement Verification -- Review of Public Records -- Making the Assessment or Evaluation for Hire -- Sensitive Positions -- Conducting Preemployment BIs -- Adverse Information -- Workplace Violence Prevention -- Workplace Violence Case Study -- Workplace Violence Prevention Program -- Causes of Violent Behavior -- Changes in Behavior or Appearance -- Crisis Levels and Recommended Actions -- What the CSM and Security Managers Can Do To Prevent Workplace Violence -- What Employees Can Do To Prevent Workplace Violence -- Workplace Violence Response -- A Checklist for the Elements of a Good Personnel Security Program -- Preemployment BIs -- Workplace Violence Prevention Program -- Summary -- End Notes -- 12 Security Education and Awareness Training -- Introduction -- Developing a Security Education and Awareness Training Program (SEATP) -- An Overview of the SEATP Project Plan -- Marketing Techniques and Strategies for a SEATP -- It Is Just Another Product -- Stimulating the Consumer to Buy -- Negative -- Positive -- Selling the Product Through Communications Media -- Briefings -- Booklets: Handbooks, Pamphlets, and Guides -- Assets Protection Handbook for IWC Employees -- Personal Safety and Security Travel Guide -- Information Protection Pocket Guide -- Awareness Media-Message Reinforcement -- Automation and Online Information Sharing -- Summary -- End Note -- 13 Fire Protection -- Introduction to Fire Protection -- Fire Prevention and Protection -- Vulnerability to Fire -- Risks -- Fire Prevention and Protection Program-The Elements of IWC's Effective Program -- Fire Prevention Plan -- Fire Safety