You are previewing The Security Consultant's Handbook.
O'Reilly logo
The Security Consultant's Handbook

Book Description

A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organizational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities, and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. This book provides essential direction for those who want to succeed in security, either individually or as part of a team. It also aims to stimulate some fresh ideas and provide new market routes for security professionals who may feel that they are underappreciated and overexerted in traditional business domains. Product overview Distilling the author’s fifteen years’ experience as a security practitioner, and incorporating the results of some fifty interviews with leading security practitioners and a review of a wide range of supporting business literature, The Security Consultant’s Handbook provides a wealth of knowledge for the modern security practitioner, covering: Entrepreneurial practice (including business intelligence, intellectual property rights, emerging markets, business funding, and business networking) Management practice (including the security function’s move from basement to boardroom, fitting security into the wider context of organizational resilience, security management leadership, adding value, and professional proficiency) Legislation and regulation (including relevant UK and international laws such as the Human Rights Act 1998, the Data Protection Act 1998 and the Geneva Conventions) Private investigations (including surveillance techniques, tracing missing people, witness statements and evidence, and surveillance and the law) Information and cybersecurity (including why information needs protection, intelligence and espionage, cybersecurity threats, and mitigation approaches such as the ISO 27001 standard for information security management) Protective security (including risk assessment methods, person-focused threat assessments, protective security roles, piracy, and firearms) Safer business travel (including government assistance, safety tips, responding to crime, kidnapping, protective approaches to travel security and corporate liability) Personal and organizational resilience (including workplace initiatives, crisis management, and international standards such as ISO 22320, ISO 22301 and PAS 200) Featuring case studies, checklists, and helpful chapter summaries, The Security Consultant's Handbook aims to be a practical and enabling guide for security officers and contractors. Its purpose is to plug information gaps or provoke new ideas, and provide a real-world support tool for those who want to offer their clients safe, proportionate, and value-driven security services. About the author Richard Bingley is a senior lecturer in security and organizational resilience at Buckinghamshire New University, and co-founder of CSARN, the popular business security advisory network. He has more than fifteen years’ experience in a range of high-profile security and communications roles, including as a close protection operative at London’s 2012 Olympics and in Russia for the 2014 Winter Olympic Games. He is a licensed close protection operative in the UK, and holds a postgraduate certificate in teaching and learning in higher education. Richard is the author of two previous books: Arms Trade: Just the Facts (2003) and Terrorism: Just the Facts (2004).

Table of Contents

  1. Cover
  2. Title
  3. Copyright
  4. Acknowledgements
  5. About the Author
  6. Abbreviations
  7. Foreword
  8. Contents
  9. Chapter 1: Becoming an Entrepreneur in the Security Business
    1. 1.1 Context
    2. 1.2 Competitive intelligence
    3. 1.3 Linking business intelligence to our operating environment
    4. 1.4 Examining appropriate intellectual property rights (IPR) in order to protect business ideas and enterprise
    5. 1.5 Emerging markets
    6. 1.6 Targeting consumer markets and marketing
    7. 1.7 Business funding
    8. 1.8 Reviewing operations management
    9. 1.9 Business networking
    10. 2.0 Social media marketing
    11. 2.1 Negotiation
    12. 2.2 Company structures, corporate returns and regulation
    13. References
  10. Chapter 2: Becoming a Developed Security Manager
    1. 2.1 Context
    2. 2.2 Role of security director
    3. 2.4 Fitting security into a wider context of resilience
    4. 2.5 Sub-disciplines of organisational resilience: Security, emergency planning and business continuity
    5. 2.6 Management and balancing important priorities
    6. 2.7 Adding value: Developing the business that clients require
    7. 2.8 Why do businesses fail?
    8. 2.9 The requirement for professional proficiency
    9. References
  11. Chapter 3: Security Legislation and Regulation
    1. 3.1 Context
    2. 3.2 Types of law in UK
    3. 3.3 UK human rights laws
    4. 3.4 Other UK laws relating to security management
    5. 3.5 Other UK laws relating to corporate management and workplaces
    6. 3.6 International law, conflict and human rights
    7. 3.7 Prominent business laws related to international business
    8. References
    9. VIDEOS
  12. Chapter 4: Private Investigations
    1. 4.1 Context
    2. 4.2 Role of private investigators
    3. 4.3 Affidavits and process serving
    4. 4.4 Tracing missing people
    5. 4.5 Surveillance techniques
    6. 4.6 Technical surveillance
    7. 4.7 Witness statements
    8. 4.8 Crime scene analysis
    9. 4.9 Evidence: What is it? Why is evidence so flawed?
    10. References
  13. Chapter 5: Information Security
    1. 5.1 Context
    2. 5.2 Why target our information?
    3. 5.3 Intelligence and espionage
    4. 5.4 Internal risks
    5. 5.5 Cyber security
    6. 5.6 Mitigation: Developing a security policy
    7. References
  14. Chapter 6: Protective Security
    1. 6.1 Context
    2. 6.2 Methods of risk assessment
    3. 6.3 How to conduct a person-focused threat assessment
    4. 6.4 Ethos and expectations of protective security roles; ‘adaptive practitioners’
    5. 6.5 Anti-piracy; market, counter-measures and agencies
    6. 6.6 Firearms
    7. 6.7 Managing people in protective security environments
    8. References
  15. Chapter 7: Safe Business Travel
    1. 7.1 Context
    2. 7.2 Government help and basics
    3. 7.3 Before you go: Safety and security tips
    4. 7.4 Reporting and responding to crime in-country
    5. 7.5 Business travel insurance
    6. 7.6 Kidnap for ransom, kidnap and countermeasures
    7. 7.7 Corporate liability laws and business travel
    8. 7.8 Protective security approaches to travel security
    9. 7.9 Due diligence
    10. References
  16. Chapter 8: Personal and Organisational Resilience
    1. 8.1 Context
    2. 8.2 Personal resilience
    3. 8.3 Personal resilience initiatives in the workplace
    4. 8.4 Developing team resilience from personal resilience techniques
    5. 8.5 Crisis management and personal resilience
    6. 8.6 Crisis management and communications
    7. 8.7 Social media and crisis management
    8. 8.8 Crisis management standards and guidance
    9. References
  17. ITG Resources