Chapter 1: Becoming an Entrepreneur in the Security Business
1.3 Linking business intelligence to our operating environment
1.6 Targeting consumer markets and marketing
1.8 Reviewing operations management
2.2 Company structures, corporate returns and regulation
Chapter 2: Becoming a Developed Security Manager
2.4 Fitting security into a wider context of resilience
2.6 Management and balancing important priorities
2.7 Adding value: Developing the business that clients require
2.9 The requirement for professional proficiency
Chapter 3: Security Legislation and Regulation
3.4 Other UK laws relating to security management
3.5 Other UK laws relating to corporate management and workplaces
3.6 International law, conflict and human rights
3.7 Prominent business laws related to international business
Chapter 4: Private Investigations
4.2 Role of private investigators
4.3 Affidavits and process serving
4.9 Evidence: What is it? Why is evidence so flawed?
Chapter 5: Information Security
5.2 Why target our information?
5.3 Intelligence and espionage
5.6 Mitigation: Developing a security policy
Chapter 6: Protective Security
6.2 Methods of risk assessment
6.3 How to conduct a person-focused threat assessment
6.4 Ethos and expectations of protective security roles; ‘adaptive practitioners’
6.5 Anti-piracy; market, counter-measures and agencies
6.7 Managing people in protective security environments
Chapter 7: Safe Business Travel
7.2 Government help and basics
7.3 Before you go: Safety and security tips
7.4 Reporting and responding to crime in-country
7.6 Kidnap for ransom, kidnap and countermeasures
7.7 Corporate liability laws and business travel
7.8 Protective security approaches to travel security
Chapter 8: Personal and Organisational Resilience
8.3 Personal resilience initiatives in the workplace
8.4 Developing team resilience from personal resilience techniques
8.5 Crisis management and personal resilience
8.6 Crisis management and communications
8.7 Social media and crisis management