Home Page Icon
Home Page
Table of Contents for
The Security Consultant’s Handbook
Close
The Security Consultant’s Handbook
by Richard Bingley
The Security Consultant's Handbook
Cover
Title
Copyright
Acknowledgements
About the Author
Abbreviations
Foreword
Contents
Chapter 1: Becoming an Entrepreneur in the Security Business
1.1 Context
1.2 Competitive intelligence
1.3 Linking business intelligence to our operating environment
1.4 Examining appropriate intellectual property rights (IPR) in order to protect business ideas and enterprise
1.5 Emerging markets
1.6 Targeting consumer markets and marketing
1.7 Business funding
1.8 Reviewing operations management
1.9 Business networking
2.0 Social media marketing
2.1 Negotiation
2.2 Company structures, corporate returns and regulation
References
Chapter 2: Becoming a Developed Security Manager
2.1 Context
2.2 Role of security director
2.4 Fitting security into a wider context of resilience
2.5 Sub-disciplines of organisational resilience: Security, emergency planning and business continuity
2.6 Management and balancing important priorities
2.7 Adding value: Developing the business that clients require
2.8 Why do businesses fail?
2.9 The requirement for professional proficiency
References
Chapter 3: Security Legislation and Regulation
3.1 Context
3.2 Types of law in UK
3.3 UK human rights laws
3.4 Other UK laws relating to security management
3.5 Other UK laws relating to corporate management and workplaces
3.6 International law, conflict and human rights
3.7 Prominent business laws related to international business
References
VIDEOS
Chapter 4: Private Investigations
4.1 Context
4.2 Role of private investigators
4.3 Affidavits and process serving
4.4 Tracing missing people
4.5 Surveillance techniques
4.6 Technical surveillance
4.7 Witness statements
4.8 Crime scene analysis
4.9 Evidence: What is it? Why is evidence so flawed?
References
Chapter 5: Information Security
5.1 Context
5.2 Why target our information?
5.3 Intelligence and espionage
5.4 Internal risks
5.5 Cyber security
5.6 Mitigation: Developing a security policy
References
Chapter 6: Protective Security
6.1 Context
6.2 Methods of risk assessment
6.3 How to conduct a person-focused threat assessment
6.4 Ethos and expectations of protective security roles; ‘adaptive practitioners’
6.5 Anti-piracy; market, counter-measures and agencies
6.6 Firearms
6.7 Managing people in protective security environments
References
Chapter 7: Safe Business Travel
7.1 Context
7.2 Government help and basics
7.3 Before you go: Safety and security tips
7.4 Reporting and responding to crime in-country
7.5 Business travel insurance
7.6 Kidnap for ransom, kidnap and countermeasures
7.7 Corporate liability laws and business travel
7.8 Protective security approaches to travel security
7.9 Due diligence
References
Chapter 8: Personal and Organisational Resilience
8.1 Context
8.2 Personal resilience
8.3 Personal resilience initiatives in the workplace
8.4 Developing team resilience from personal resilience techniques
8.5 Crisis management and personal resilience
8.6 Crisis management and communications
8.7 Social media and crisis management
8.8 Crisis management standards and guidance
References
ITG Resources
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Copyright
Next
Next Chapter
Acknowledgements
DEDICATION
For my grandparents, Daphne Hart (1927-2011) and Ian Harrison
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset