Over 10 mio. titler Fri fragt ved køb over 499,- Hurtig levering Forlænget returret til 31/01/25

Building a Corporate Culture of Security

- Strategies for Strengthening Organizational Resiliency

  • Format
  • Bog, paperback
  • Engelsk

Beskrivelse

Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency provides readers with the proven strategies, methods, and techniques they need to present ideas and a sound business case for improving or enhancing security resilience to senior management. Presented from the viewpoint of a leading expert in the field, the book offers proven and integrated strategies that convert threats, hazards, risks, and vulnerabilities into actionable security solutions, thus enhancing organizational resiliency in ways that executive management will accept. The book delivers a much-needed look into why some corporate security practices programs work and others don’t. Offering the tools necessary for anyone in the organization charged with security operations, Building a Corporate Culture of Security provides practical and useful guidance on handling security issues corporate executives hesitate to address until it’s too late.

Læs hele beskrivelsen
Detaljer
Størrelse og vægt
  • Vægt500 g
  • coffee cup img
    10 cm
    book img
    15,2 cm
    22,9 cm

    Findes i disse kategorier...

    Se andre, der handler om...

    Performance Trafficking Partnering Governance Manipulation TARGET Espionage Training Leadership Commitment Assassination Smuggling Arrogance Intelligence Ethics Efficiency Integrity Management Organizational structure Reliability Responsibility Risk Prevention Authority Instruction Awareness Effectiveness Protection Relevance Deficiency Validity Accountability Public safety System integration Organizational resilience Resilience insider Radicalization Decisión Biological Future leaders Risk and Uncertainty State-sponsored Best Practices Characteristics Consequence Interoperability Response Probability theory Process thinking Compatibility User friendly Human factors engineering Economic impact Professional Capability Security Planning Weakness Vulnerability Comprehensive Strategic thinking Response and recovery Chemical Mitigation strategies Trustworthy Competency Change-Management Timeliness Information sharing Evaluation Criteria Course design Investment strategies Candid Body of knowledge Collateral damage Inefficiency Continual improvement Self-Appraisal Criticality Analysis Inadequacy Accountable Training needs analysis Adversary planning considerations and productivity breaches Build a business case Detect and assess capitulation Conflicting requirements Chain reaction relationship Deter and delay counterproductive Event-driven recovery procedures Drills and exercises Critical sensitive information Concept of technology application Consequence Analysis constitutional freedom Consequence loss Detection and assessment processes Devastate Delay penetration resistance Intangible strategy Ineffectiveness Human side of enterprise Emergency Preparedness Planning Event-driven response procedures management perspective Manage tension measurement and evaluation Maintenance and logistics concept malicious Management language First impressions count Operational competencies Objectives and tests Policies and protocols performance outcomes Performance standard Probability versus likelihood Quality performance factors Preparedness initiatives Performance effectiveness Principle of timeliness Probability of occurrence Prevention and protection techniques Risk-based metrics Risk-based platform Job Performance Criteria Responsibility and accountability Prioritize action plan public confidence Security design and engineering planning Security emergency planning Security emergency planning considerations Security terminology Response and recover Risk assumptions Risk-based versus operational metrics Special security training Human fallacies Management and leadership characteristics Social behavior patterns Threat and vulnerability analysis Inspection and testing Threat condition levels Verbal visionary Training methodology Traits and attributes Vulnerability creep-in Triggering response events Value and meaning Threat estimate profile Message delivery Prioritizing security response Reporting and alerting system risk exposure Technical security assessment Security Awareness Training Preparing for security emergencies Preventive Maintenance Set of uniform strategies What works?Work and social interactions Risk Metrics Risk Treatments Security assessment model Security resilience Trained personnel requirements
    Machine Name: SAXO082