Listing 1 - 10 of 18 | << page >> |
Sort by
|
Choose an application
Workplace Security Playbook: The New Manager's Guide to Security Risk is a set of comprehensive risk management guidelines for companies that have other business functions coordinating security. When an employee without a security background is charged with the protection of people, facilities, or assets, the Workplace Security Playbook can be his or her go-to resource for security procedures and recommendations. Business risks are not static: They change and grow as a company changes and grows. New technology, increasing business competition, and social and cultural de
Industrial safety. --- System safety. --- Violence in the workplace --- Prevention. --- Industrial accidents --- Industries --- Job safety --- Occupational hazards, Prevention of --- Occupational health and safety --- Occupational safety and health --- Prevention of industrial accidents --- Prevention of occupational hazards --- Safety, Industrial --- Safety engineering --- Safety measures --- Safety of workers --- Accidents --- System safety --- Safety, System --- Safety of systems --- Systems safety --- Industrial safety --- Systems engineering --- Prevention --- Work environment --- Security measures. --- Protection. --- Security measures
Choose an application
Workplace Security Playbook: The New Manager's Guide to Security Risk is a set of comprehensive risk management guidelines for companies that have other business functions coordinating security. When an employee without a security background is charged with the protection of people, facilities, or assets, the Workplace Security Playbook can be his or her go-to resource for security procedures and recommendations. Business risks are not static: They change and grow as a company changes and grows. New technology, increasing business competition, and social and cultural developments all contribute to new security risks and trends. With this in mind, the Workplace Security Playbook focuses on performance guidelines, rather than prescriptive standards. Using performance guidelines helps assess the individual, changing business and security needs that a manager may face. The easily implementable recommendations included in this book are categorized by issues. In addition to security performance guidelines, topics include the elements of a facility security program, how to conduct security surveys and validation testing, steps for performing workplace investigations and inspections, and procedures for emergency and special security situations. An entire chapter is dedicated to describing the resources available to a new security manager, and another provides an outline for building a customized reference source of local security information. The Workplace Security Playbook is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Chapters are categorized by issues for easy reference, and include the fundamentals of a security program up to high-level procedures. Guidelines are specifically designed for companies that have other business functions coordinating security. Emphasizes performance guidelines (rather than standards) that describe the basic levels of performance that will strengthen business operations while accommodating what resources are currently available.
Choose an application
Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation. Within minutes, the online consumer community can propel a company into an image crisis, brand damage, and a financial disaster-even if the viral information isn't factual. It is critical that an organization respond quickly and decisively to crises in online media. The report explores examples of companies that have experienced this kind of impact, and describes practical, strate
Internetworking (Telecommunication) -- Examinations -- Study guides. --- Management --- Business & Economics --- Management Styles & Communication --- Corporate image. --- Corporations --- Public relations. --- Corporate public relations --- Public relations --- Company image --- Corporate identity --- Industrial design coordination --- Internetworking (Telecommunication) --- Crisis management. --- Social media.
Choose an application
The International Security Programs Benchmark Report presents and analyzes the findings of a broad survey conducted by the Security Executive Council of corporate international security programs. The report identifies the types of international security baseline programs in place for a range of company sizes, and describes the organizational perception of security's role and capability. The data suggest that international security programs are greatly affected by the company size and the location of the security department within the organization, whether as part of the executive, le
Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Private security services. --- Private security companies --- Private security industry --- Protection services, Private --- Security companies, Private --- Security industry, Private --- Security services, Private --- Crime prevention --- Security systems --- Police, Private --- Private military companies --- Security consultants --- Corporations --- Business --- Security measures. --- Data processing
Choose an application
Nine Practices of the Successful Security Leader lays out a series of best practices for security managers. Collected from interviews with security leaders at public and private sector organizations, ranging from small- and mid-size all the way up to large international entities, these practices are a sampling of what is vital and what works. Recommendations such as close communication with management, alignment of security agendas with business goals, and creating internal awareness programs are just some of the effective initiatives detailed in the report. With this information, se
Management --- Business & Economics --- Management Styles & Communication --- Industries --- Risk management. --- Corporations --- Private security services. --- Security measures. --- Private security companies --- Private security industry --- Protection services, Private --- Security companies, Private --- Security industry, Private --- Security services, Private --- Crime prevention --- Security systems --- Police, Private --- Private military companies --- Security consultants --- Insurance --- Industrial security measures
Choose an application
Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources such as email, file servers, and databases. BYOD presents unique challenges in data privacy, confidentiality, security, productivity, and acceptable use that must be met proactively by information security professionals. This report provides solid background on the practice, origi
Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Mobile communication systems. --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- Vehicles --- Vehicular communication systems --- Radio --- Wireless communication systems --- Communication systems --- Information technology --- Computer networks --- Mobile computing. --- Management. --- Security measures. --- Access control.
Choose an application
Provides an overview of the potentially harmful impact of social media communication on corporate reputation, explores examples of companies that have experienced this kind of impact, and describes practical, strategic methods for mitigating and resolving a crisis, including cross-functional team readiness and internal communications training.
Choose an application
In the Business Continuity State of the Industry Report, authors Herbert Mattord and Michael Whitman provide a comprehensive overview of recent research and news related to business continuity programs. Using the most recent surveys, reports, and research data available, the authors provide an objective analysis of the state of business continuity today. The report covers events that have shaped the industry, including natural, economic, and technological disasters; the perspective of business continuity from top management executives; business continuity job descriptions and compensation data; the legal and regulatory environment; and emerging trends. It brings together what fragmented bits of information are currently available into one easy-to-read document. The Business Continuity State of the Industry Report is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Saves you time by bringing together the most important pieces of research and news into one document. Can be used for a quick update on what business continuity programs look like today, what trends exist, and what resources are available for addressing gaps. Includes appendices that cover business continuity key terms, industry events, job descriptions and compensation trend data, and more.
Choose an application
Consumer satisfaction --- Questionnaires --- Statistical methods
Choose an application
Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources such as email, file servers, and databases. BYOD presents unique challenges in data privacy, confidentiality, security, productivity, and acceptable use that must be met proactively by information security professionals. This report provides solid background on the practice, original research on its pros and cons, and actionable recommendations for implementing a BYOD program. Successful programs are cross-functional efforts including information technology, human resources, finance, legal, security, and business operating teams. This report is a valuable resource to any security professional considering a BYOD program. Presents research data associated with BYOD and productivity in the workplace. Describes BYOD challenges, risks, and liabilities. Makes recommendations for the components a clearly communicated BYOD program should contain.
Listing 1 - 10 of 18 | << page >> |
Sort by
|