
- 102 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Workplace Security Playbook: The New Manager's Guide to Security Risk is a set of comprehensive risk management guidelines for companies that have other business functions coordinating security. When an employee without a security background is charged with the protection of people, facilities, or assets, the Workplace Security Playbook can be his or her go-to resource for security procedures and recommendations.Business risks are not static: They change and grow as a company changes and grows. New technology, increasing business competition, and social and cultural developments all contribute to new security risks and trends. With this in mind, the Workplace Security Playbook focuses on performance guidelines, rather than prescriptive standards. Using performance guidelines helps assess the individual, changing business and security needs that a manager may face.The easily implementable recommendations included in this book are categorized by issues. In addition to security performance guidelines, topics include the elements of a facility security program, how to conduct security surveys and validation testing, steps for performing workplace investigations and inspections, and procedures for emergency and special security situations. An entire chapter is dedicated to describing the resources available to a new security manager, and another provides an outline for building a customized reference source of local security information.The Workplace Security Playbook is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.- Chapters are categorized by issues for easy reference, and include the fundamentals of a security program up to high-level procedures- Guidelines are specifically designed for companies that have other business functions coordinating security- Emphasizes performance guidelines (rather than standards) that describe the basic levels of performance that will strengthen business operations while accommodating what resources are currently available
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Security Performance Guidelines
Keywords
1.1 Performance Guidelines vs. Standards
1.2 Three-Step Decision-Making Process
Assess both your overall and specific security needs, and evaluate them in light of your business operations. What is the probability of a risk becoming reality? How critical would this be to you and the company as a whole? What is your degree of vulnerabilityāthe extent to which you cannot prevent or respond to the situation?
Once you have assessed your needs, go on to identify your end results and the measures you can use to achieve them. Do you want to reduce theft or vandalism, or limit your exposure to liability? These guidelines will help you identify your intended results, and then you can start to identify the specific options available to you.
Select and implement the right security measures. The options youāve identified may have trade-offs. Which of them can you support, both financially and operationally? What will best complement your overall security efforts and your business strategy and philosophy?
1.3 Performance Guidelines
1.3.1 Performance Guideline #1: Identify Areas and Levels of Security
1.3.2 Performance Guideline #2: Design Security into Your Facility and Operations
1.3.3 Performance Guideline #3: Control Physical Access to Your Site, Buildings, and Offices
1.3.4 Performance Guideline #4: Control Access to Proprietary Information
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Executive Summary
- Introduction
- Chapter 1. Security Performance Guidelines
- Chapter 2. Elements of a Facility Security Program
- Chapter 3. Surveys and Validations
- Chapter 4. Investigation Guidelines
- Chapter 5. Inspection Guidelines
- Chapter 6. Emergency Procedures
- Chapter 7. Special Security Situations
- Chapter 8. Security Management Resources
- Chapter 9. Implementing Your Security Program
- About Contributing Editor
- About Elsevierās Security Executive Council Risk Management Portfolio