Narrow your search
Listing 1 - 10 of 18 << page
of 2
>>
Sort by

Book
Workplace security playbook : the new manager's guide to security risk
Author:
ISBN: 1299847366 9781299847361 9780124172449 012417244X 9780124172456 0124172458 Year: 2013 Publisher: Oxford : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Workplace Security Playbook: The New Manager's Guide to Security Risk is a set of comprehensive risk management guidelines for companies that have other business functions coordinating security. When an employee without a security background is charged with the protection of people, facilities, or assets, the Workplace Security Playbook can be his or her go-to resource for security procedures and recommendations. Business risks are not static: They change and grow as a company changes and grows. New technology, increasing business competition, and social and cultural de


Digital
Workplace security playbook : the new manager's guide to security risk
Author:
ISBN: 1299847366 9781299847361 9780124172449 012417244X Year: 2013 Publisher: Waltham, MA Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Workplace Security Playbook: The New Manager's Guide to Security Risk is a set of comprehensive risk management guidelines for companies that have other business functions coordinating security. When an employee without a security background is charged with the protection of people, facilities, or assets, the Workplace Security Playbook can be his or her go-to resource for security procedures and recommendations. Business risks are not static: They change and grow as a company changes and grows. New technology, increasing business competition, and social and cultural developments all contribute to new security risks and trends. With this in mind, the Workplace Security Playbook focuses on performance guidelines, rather than prescriptive standards. Using performance guidelines helps assess the individual, changing business and security needs that a manager may face. The easily implementable recommendations included in this book are categorized by issues. In addition to security performance guidelines, topics include the elements of a facility security program, how to conduct security surveys and validation testing, steps for performing workplace investigations and inspections, and procedures for emergency and special security situations. An entire chapter is dedicated to describing the resources available to a new security manager, and another provides an outline for building a customized reference source of local security information. The Workplace Security Playbook is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Chapters are categorized by issues for easy reference, and include the fundamentals of a security program up to high-level procedures. Guidelines are specifically designed for companies that have other business functions coordinating security. Emphasizes performance guidelines (rather than standards) that describe the basic levels of performance that will strengthen business operations while accommodating what resources are currently available.

Keywords


Book
Crisis management at the speed of the Internet : trend report
Authors: ---
ISBN: 1299442684 0124115918 012411587X 9780124115910 9780124115873 Year: 2013 Publisher: Amsterdam ; Boston : Elsevier : Security Executive Council,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation. Within minutes, the online consumer community can propel a company into an image crisis, brand damage, and a financial disaster-even if the viral information isn't factual. It is critical that an organization respond quickly and decisively to crises in online media. The report explores examples of companies that have experienced this kind of impact, and describes practical, strate


Book
International security programs benchmark report : research report
Authors: ---
ISBN: 1299453201 0124116116 0124115934 9780124116115 9781299453203 9780124115934 Year: 2013 Publisher: Amsterdam ; Boston : Elsevier : Security Executive Council,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The International Security Programs Benchmark Report presents and analyzes the findings of a broad survey conducted by the Security Executive Council of corporate international security programs. The report identifies the types of international security baseline programs in place for a range of company sizes, and describes the organizational perception of security's role and capability. The data suggest that international security programs are greatly affected by the company size and the location of the security department within the organization, whether as part of the executive, le


Book
Nine practices of the successful security leader : research report
Authors: ---
ISBN: 129944315X 0124165656 0124116493 9780124165656 9781299443150 9780124116498 Year: 2013 Publisher: Amsterdam : Elsevier : Security Executive Council,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Nine Practices of the Successful Security Leader lays out a series of best practices for security managers. Collected from interviews with security leaders at public and private sector organizations, ranging from small- and mid-size all the way up to large international entities, these practices are a sampling of what is vital and what works. Recommendations such as close communication with management, alignment of security agendas with business goals, and creating internal awareness programs are just some of the effective initiatives detailed in the report. With this information, se


Book
Bring your own device (BYOD) to work : trend report
Authors: ---
ISBN: 1299403093 0124116108 0124115926 9780124116108 9780124115927 9781299403093 Year: 2013 Publisher: Oxford : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources such as email, file servers, and databases. BYOD presents unique challenges in data privacy, confidentiality, security, productivity, and acceptable use that must be met proactively by information security professionals. This report provides solid background on the practice, origi


Digital
Crisis management at the speed of the internet : trend report
Authors: ---
ISBN: 9780124115910 0124115918 Year: 2013 Publisher: Boston Security Executive Council

Loading...
Export citation

Choose an application

Bookmark

Abstract

Provides an overview of the potentially harmful impact of social media communication on corporate reputation, explores examples of companies that have experienced this kind of impact, and describes practical, strategic methods for mitigating and resolving a crisis, including cross-functional team readiness and internal communications training.

Keywords

Business policy


Digital
Business continuity programs : state of the industry report
Authors: ---
ISBN: 9780128009093 0128009098 Year: 2014 Publisher: Amsterdam Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the Business Continuity State of the Industry Report, authors Herbert Mattord and Michael Whitman provide a comprehensive overview of recent research and news related to business continuity programs. Using the most recent surveys, reports, and research data available, the authors provide an objective analysis of the state of business continuity today. The report covers events that have shaped the industry, including natural, economic, and technological disasters; the perspective of business continuity from top management executives; business continuity job descriptions and compensation data; the legal and regulatory environment; and emerging trends. It brings together what fragmented bits of information are currently available into one easy-to-read document. The Business Continuity State of the Industry Report is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Saves you time by bringing together the most important pieces of research and news into one document. Can be used for a quick update on what business continuity programs look like today, what trends exist, and what resources are available for addressing gaps. Includes appendices that cover business continuity key terms, industry events, job descriptions and compensation trend data, and more.

Keywords

Business policy

Measuring customer satisfaction
Author:
ISBN: 087389362X Year: 1997 Publisher: Milwaukee ASQC quality press

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Bring your own device (BYOD) to work : trend report
Authors: ---
ISBN: 9780124116108 0124116108 1299403093 9781299403093 Year: 2013 Publisher: Waltham, Mass Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources such as email, file servers, and databases. BYOD presents unique challenges in data privacy, confidentiality, security, productivity, and acceptable use that must be met proactively by information security professionals. This report provides solid background on the practice, original research on its pros and cons, and actionable recommendations for implementing a BYOD program. Successful programs are cross-functional efforts including information technology, human resources, finance, legal, security, and business operating teams. This report is a valuable resource to any security professional considering a BYOD program. Presents research data associated with BYOD and productivity in the workplace. Describes BYOD challenges, risks, and liabilities. Makes recommendations for the components a clearly communicated BYOD program should contain.

Listing 1 - 10 of 18 << page
of 2
>>
Sort by