Synopses & Reviews
Risk and Security Management
Protecting People and Sites Worldwide
Whether companies face challenges supporting USAID programs in Pakistan or Kosovo; seek to conduct health projects for DFID in Nigeria or Sudan; support reconstruction, development, or hydrocarbon initiatives in Afghanistan and Iraq; operate commercial enterprises in crime-ridden regions of Mexico and Kazakhstan; or are entering new and uncertain market regions such as Libya, Risk and Security Management: Protecting People and Sites Worldwide presents security experts and other professionals with guidance in understanding how risk management and security services can best be used to enable businesses to flow seamlessly and productively, even under the most challenging conditions.
Informed by the author's eighteen years of professional experience in this arena, Risk and Security Management reveals the fundamentals of risk consultancy and security management for the domestic and global security professional. It offers the essential tools needed to assess risk and manage security services for a company.
Filled with concepts, frameworks, and observations to make for more efficient and effective risk and security management, this practical book:
Captures how companies and their vendors can develop relationships, understanding, and quality assurance to better support the management of risk
Provides a premise for understanding business activities, which can then be placed into a risk management and security services context
Supports both companies and vendors in maximizing organic resources
Presents a framework for ensuring that business continuity is achieved through the protection of people, resources, and reputation
Discusses insights into the scope of risk that many companies face in varying degrees
Explains the unique service of risk consulting
Demonstrates how the alignment of business and security project management is critical for activities to succeed within any business environment
As corporations seek to grow and increase value, they move into areas of the world that are considered perilous or uncertain, requiring guidance on recognizing the various risks involved with a new business enterprise, as well as how to secure their physical space and personnel. Risk and Security Management provides that guidance.
Synopsis
With a world concerned about global terrorism, instability of emerging markets, hazardous commercial operations, Risk and Security Management is a relevant and timely book presenting a plan for assessment of risk and protection of the security of the company so that financial benefits can be derived. This book expertly reveals how to measure risk and security and provides a program eliminating unnecessary time, effort and resources. Security managers and consultants, HR directors, CEOs are provided practical guidance on successful operation of a corporate risk and security management program.
Synopsis
With worldwide business and government activities impacted by global terrorism, political uncertainties, and criminal hazards, companies and agencies operating in existing or emerging markets face a wide spectrum of threats to their reputation and operations. Risk and Security Managementprovides a series of strategic to granular level policies, plans, systems, and concepts which identify and address risk, enabling business to occur in a manner which best protects the company's interests and employees, within defined tolerance, budget, and operating parameters. CEOs, Risk and Security Directors, Business and Program Managers, and HR and Contracting officers are provided practical guidance on corporate to project level risk mitigation and security management.
Synopsis
Learn to measure risk and develop a plan to protect employees and company interests by applying the advice and tools in Risk and Security Management: Protecting People and Sites Worldwide. In a world concerned with global terrorism, instability of emerging markets, and hazardous commercial operations, this book shines as a relevant and timely text with a plan you can easily apply to your organization. Find a series of strategic to granular level policies, systems, and concepts which identify and address risk, enabling business to occur in a manner which best protects you and your company.
About the Author
Michael Blyth is a former Royal Marine Commando officer and has held/holds commercial vice president appointments both in operations as well as business strategies within two major international risk consulting and security companies. He has eighteen years of experience and a master's degree in security and risk management. He is highly experienced in providing corporate risk mitigation and vulnerability assessments, crisis management plans, and a wide spectrum of security documents within high-risk environments for ambassadors, major oil and gas programs, communications network corporations, government organizations, development agencies, and a myriad of construction activities, effectively placing risk management into the context of a client's commercial activity and budget constraints. He speaks on security and risk throughout the world, has been published in several security industry magazines, and has lived or worked in over thirty countries.
Table of Contents
Preface.
Acknowledgements.
Chapter 1. Risk Consultancy and Security Management.
Project Planning.
Balancing Service Delivery.
Company and Vendor Relationships.
Consultant's Objectives.
Consultant Skill Areas.
Principle Consultant Errors.
Chapter 2. Initiating New Contracts.
Business Cycle.
Proposals.
Proposal Concepts.
Proposal Process.
Analyzing the Request for Proposal
Proposal.
Evaluating the Proposal.
Proposal Production.
Chapter 3. Service Delivery and Quality Assurance.
Common Vendor and Company Failings.
Understanding the Activity.
Service Delivery Support.
Managing Service Delivery.
Quality Assurance Plans.
Reports and Returns.
Management Systems.
Management Considerations.
Coordination with External Agencies.
Media Management.
Personnel and Training.
Contract Management
Chapter 4. Threat Evaluation and Risk Management.
Risk Areas.
Risk Management Plans.
Implementing the Risk Management Plan.
Risk Assessment.
Impact Assessments.
Risk Levels.
Presenting Risk.
Contingency Planning.
Crisis Management.
Crisis Management Team Levels and Structures.
Crisis Management Team Structure.
Incident Response Teams.
Crisis Management Tools.
Types of Crisis Management Responses.
Post-Incident Review.
Monitoring the Risk Management Program.
Chapter 5. Scope of Risk.
Nonphysical Threats.
Physical Risks.
Domestic Terrorism.
Chapter 6. Consultancy Services.
Due Diligence.
Investigations.
Forensics.
Information Security.
Screening.
Security Management Design.
Security Structural Design.
Crisis Management.
Governance and Development.
Political Analysis.
Security Consulting Services.
Auditing Consultancy.
Chapter7. Project Management.
Project Failure.
Project Life Cycle.
Project Planning.
Project Design.
Project Start Up.
Project Initiation.
Project Management Structures.
Risk and Security Project Management.
Management Catagories.
Project Controls.
Project Integration.
Chapter 8. Mobile Security Services.
Understanding the Need.
PSD Structuring.
Management Principles.
Process Interfaces.
Innovations.
PSD Tactical Principles.
Mobile Security Conduct.
PSD Personnel Selection.
Medical Provision.
Vehicle Considerations.
Convoys.
Chapter 9. Facility Security Services.
Fixed Camps and Forward Operating Bases.
Mobile Facility Security.
Facility Security Management.
Relief in Place.
Security Considerations.
Layering Security.
Physical Security Structures.
Security Surveillance and Lighting.
Conventional Security Policies.
Evacuation Planning.
Chapter 10. Evacuation Planning.
Evacuation Principles.
Evacuation Plan Elements.
Evacuation Management.
Process Planning.
Evacuation Triggers.
Alert States.
Evacuation Plan Components.
Recovery Management.
Chapter 11. Disaster Response Management.
Humanitarian Operating Environment.
Working with Governments.
Management Preparation.
Principles of Disaster Response.
Stages of Disasters.
Disaster Management.
Preparedess Plans.
Mobilization.
Sustainment and Demobilization.
Chapter 12. Security Documents and Exhibits.
Consultancy Process.
Intelligence Reviews.
Threat Assessments.
Security Surveys.
Operations Order or Mobilization Plans.
Security Plan.
Security Audit.
Incident Management Plans.
Chapter 13. Government versus Commercial Contracting.
Differences between U.S. Government and Commercial Contracts.
Government Contracting.
Market Size and Scope.
U.S. Government Structure for Acquisition.
Acquisitions.
Federal Acquisition Regulation System.
Contracting Authorities.
Procurement Method.
RFP and the Uniform Contract Format.
Evaluation.
Contract Award and Administration.
Types of Contract.
Index.