Intelligence-Based Security in Private Industry Front Cover

Intelligence-Based Security in Private Industry

  • Length: 187 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2015-06-15
  • ISBN-10: 1498722032
  • ISBN-13: 9781498722032
  • Sales Rank: #4232445 (See Top 100 Books)
Description

In Intelligence-Based Security in Private Industry, Thomas A. Trier identifies the inherent need and desire for intelligence-based security that exists throughout the private security industry. He provides a general overview of intelligence-based security and specific implementation guidelines to reduce private businesses’ risk and vulnerability to criminal activities.

This book is practical and informational, demonstrating real applications of the concepts, theories, and methods of gathering and acting upon information that may suggest a threat to a company. It explains the difference between risk assessments, vulnerability assessments, and threat assessments, defines external and internal threats, and outlines how strategies to address either form of threat differ. It also establishes an outline of four key parts to an effective intelligence program: assessment, evaluation, analysis, and mitigation.

Trier illustrates concepts and strategies with specific examples of his past experiences using and developing intelligence-based plans to improve security systems. He provides these case studies as guides to developing similar programs in your company because, as he points out, “any capable adversary with the intent to attack also is running its own intelligence program.”

Using in-house intelligence-based security can make you better prepared against physical and virtual threats, ranging from theft of goods to identity theft. It allows you to have more critical information at hand prior to a possible incident and to make more informed decisions in anticipation of or response to threats. Intelligence-Based Security in Private Industry shows you how to acquire this information and how to use it for your protection.

Table of Contents

Section I Introduction
Chapter 1 Intelligence Descriptions
Chapter 2 Intelligence Background
Chapter 3 Advantages Of An Intelligence- Based Program
Chapter 4 Corporate Security Capabilities Assessment

Section II—Assessing The Security Program
Chapter 5 Evaluate Capabilities
Chapter 6 Recommend Security Standards

Section III—Building Consensus
Chapter 7 Initiate Collaboration Of Cyber Security And Others
Chapter 8 Liaise With Industry Partners And Law Enforcement
Chapter 9 Show Success
Chapter 10 Engage Executive Management

Section IV Planning An Enterprise-Wide Assessment
Chapter 11 External Threats
Chapter 12 Industry Threats
Chapter 13 Internal Threats
Chapter 14 Vulnerabilities

Section V Compiling The Assessment
Chapter 15 Planning And Resources
Chapter 16 Conduct An Intelligence Program Assessment

Section VI—Enterprise Mitigation And Risk
Chapter 17 Minimize Risk
Chapter 18 Develop A Strategic Plan
Chapter 19 Develop A Tactical Plan
Chapter 20 Communication

Section VII Implementation: Case Studies
Chapter 21 Utility Company Execution
Chapter 22 Other Examples Of Execution
Chapter 23 Follow-Up

To access the link, solve the captcha.