From Corporate Security to Commercial Force
eBook - ePub

From Corporate Security to Commercial Force

A Business Leader's Guide to Security Economics

  1. 240 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

From Corporate Security to Commercial Force

A Business Leader's Guide to Security Economics

About this book

From Corporate Security to Commercial Force: A Business Leader's Guide to Security Economics addresses important issues, such as understanding security related costs, the financial advantages of security, running an efficient security organization, and measuring the impact of incidents and losses.The book guides readers in identifying, understanding, quantifying, and measuring the direct and economic benefits of security for a business, its processes, products, and consequently, profits. It quantifies the security function and explains the never-before analyzed tangible advantages of security for core business processes.Topics go far beyond simply proving that security is an expense for a company by providing business leaders and sales and marketing professionals with actual tools that can be used for advertising products, improving core services, generating sales, and increasing profits.- Highlights and offers insight on issues such as the role of security in advertising and its actual marketing appeal and sales potential- Features tools that can be implemented by readers in order to improve key business processes- Offers advice for improving key business processes, improving the reputation of the company, the marketing appeal of products, (or services) and helping to increase sales

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere β€” even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access From Corporate Security to Commercial Force by Marko Cabric in PDF and/or ePUB format, as well as other popular books in Business & Information Management. We have over one million books available in our catalogue for you to explore.

Information

Index

A
Absolute metrics, 74–75
Access control system, 189–193
convenience, 188
cost control, 189
electronic key cards, 190
safety, 188–189
time and attendance, 189
Actual index, 180
Advertising
personalized, 194, 196–197
security improvements, 152–153, 153
as target hardening tool, 155–156
Al-Qaeda in the Islamic Maghreb (AQIM), 22
Always Be Selling (ABS) principle, 123–124
Armed robberies of cigarettes, 163–164
Asymmetric dominance, 147–148
ATM skimming, 146
Availability of information security, 73
quantification of, 79–80
B
Bad investment versus risk, 44–45
Bank
loans to service providers, 124
of talents, 140–141
Barcodes, RFID technology in, 196–197
Basic human needs, Maslow Pyramid of, 151–152
Blueprint of loss, 65
Board of Directors, 95–96
Bonding, 204–205
Brand equity, 147–148
Brand integrity, 63
Budget(ing), 91–92, 207
cataloging services and cost, 91–92
exercises, 109–110
formula, 79
Business, 12–13
context, security concept and, 75
expenses, 102–103
leadership, 88
Business Acumen, 35–36
Business Analytics, 187
Business Continuity Management (BCM), 30, 32–33, 71–72
limits of, 136–137
resilience versus, 133–134, 134, 136–137
C
Capital Expenditure (CAPEX), 103
Capital expenses, 104
Centralized Model of Corporate Governance, 108–109
Chief Executive Officer (CEO), 95–96, 105–106
Chief Information Officer (CIO), 89–90, 95–96
Chief Information Security Officer (CISO), 81, 89–90, 93, 93, 95–96
Chief Security Officer (CSO), 29, 31, 93, 112, 173, 184–185
CIA triad, 71
Commercial mindset versus protection strategies, 105–106
position of security based on expenses type, 105
strategic planning, in quick-win commercial culture, 106
Commercial security, historical perspective of, 1
Communication, 98, 212
measurement of, 180–181
resilience, 141
vertical, 98
Competition, 156
Compliance, 47
Confidential customer data, 78
Confidentiality, 72
quantificatio...

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication and Appreciation
  6. About the Author
  7. Introduction
  8. Section I: Conceptualize
  9. Section II: Reevaluate
  10. Section III: Organize
  11. Section IV: Utilize
  12. Section V: Embrace
  13. Index