CONTENTS

Chapter 1: Becoming an Entrepreneur in the Security Business

1.1 Context

1.2 Competitive intelligence

1.3 Linking business intelligence to our operating environment

1.4 Examining appropriate intellectual property rights (IPR) in order to protect business ideas and enterprise

1.5 Emerging markets

1.6 Targeting consumer markets and marketing

1.7 Business funding

1.8 Reviewing operations management

1.9 Business networking

2.0 Social media marketing

2.1 Negotiation

2.2 Company structures, corporate returns and regulation

References

Chapter 2: Becoming a Developed Security Manager

2.1 Context

2.2 Role of security director

2.4 Fitting security into a wider context of resilience

2.5 Sub-disciplines of organisational resilience: Security, emergency planning and business continuity

2.6 Management and balancing important priorities

2.7 Adding value: Developing the business that clients require

2.8 Why do businesses fail?

2.9 The requirement for professional proficiency

References

Chapter 3: Security Legislation and Regulation

3.1 Context

3.2 Types of law in UK

3.3 UK human rights laws

3.4 Other UK laws relating to security management

3.5 Other UK laws relating to corporate management and workplaces

3.6 International law, conflict and human rights

3.7 Prominent business laws related to international business

References

VIDEOS

Chapter 4: Private Investigations

4.1 Context

4.2 Role of private investigators

4.3 Affidavits and process serving

4.4 Tracing missing people

4.5 Surveillance techniques

4.6 Technical surveillance

4.7 Witness statements

4.8 Crime scene analysis

4.9 Evidence: What is it? Why is evidence so flawed?

References

Chapter 5: Information Security

5.1 Context

5.2 Why target our information?

5.3 Intelligence and espionage

5.4 Internal risks

5.5 Cyber security

5.6 Mitigation: Developing a security policy

References

Chapter 6: Protective Security

6.1 Context

6.2 Methods of risk assessment

6.3 How to conduct a person-focused threat assessment

6.4 Ethos and expectations of protective security roles; ‘adaptive practitioners’

6.5 Anti-piracy; market, counter-measures and agencies

6.6 Firearms

6.7 Managing people in protective security environments

References

Chapter 7: Safe Business Travel

7.1 Context

7.2 Government help and basics

7.3 Before you go: Safety and security tips

7.4 Reporting and responding to crime in-country

7.5 Business travel insurance

7.6 Kidnap for ransom, kidnap and countermeasures

7.7 Corporate liability laws and business travel

7.8 Protective security approaches to travel security

7.9 Due diligence

References

Chapter 8: Personal and Organisational Resilience

8.1 Context

8.2 Personal resilience

8.3 Personal resilience initiatives in the workplace

8.4 Developing team resilience from personal resilience techniques

8.5 Crisis management and personal resilience

8.6 Crisis management and communications

8.7 Social media and crisis management

8.8 Crisis management standards and guidance

References

ITG Resources

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset