O'Reilly logo

Security Risk Assessment by John M. White

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Security Department Operations

Abstract

One of the often asked questions of business administrators is, how do I know if my security program is functioning or being managed appropriately? Many times as part of a security risk assessment you may be asked to review the actual security department operations. The review may include reviewing the management practices, staffing levels, budget, policies, post orders and many other possible parts of the program. Whether you work as an internal staff member, or a security consultant, you will find information in this chapter on how to conduct an impartial and unbiased review of an existing security program.

Keywords

Patrol operations; Recordkeeping; Security culture; Security department operations; ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required