Security Risk Management Aide-Mémoire


Book Description

"All models are wrong. Some are useful." - George BoxThe Security Risk Management Aide-Mémoire is a book full of models and tools to help security professionals to brief clients, conduct security risk assessments, facilitate workshops, draft reports, and more. Much of it is from the Security Risk Management Body of Knowledge with some new material reflecting updates such as ISO31000:2018 Risk Management Standard.The book addresses all domains of security risk management but assumes you are already familiar with the contents and the specifics of your profession. The tools and models are complementary. Pick the ones that work best for you and ignore the rest or keep them in your back pocket for another day. You can read selected chapters and download the graphics and models for free from www.srmam.com




Security Risk Management Body of Knowledge


Book Description

A framework for formalizing risk management thinking in today¿s complex business environment Security Risk Management Body of Knowledge details the security risk management process in a format that can easily be applied by executive managers and security risk management practitioners. Integrating knowledge, competencies, methodologies, and applications, it demonstrates how to document and incorporate best-practice concepts from a range of complementary disciplines. Developed to align with International Standards for Risk Management such as ISO 31000 it enables professionals to apply security risk management (SRM) principles to specific areas of practice. Guidelines are provided for: Access Management; Business Continuity and Resilience; Command, Control, and Communications; Consequence Management and Business Continuity Management; Counter-Terrorism; Crime Prevention through Environmental Design; Crisis Management; Environmental Security; Events and Mass Gatherings; Executive Protection; Explosives and Bomb Threats; Home-Based Work; Human Rights and Security; Implementing Security Risk Management; Intellectual Property Protection; Intelligence Approach to SRM; Investigations and Root Cause Analysis; Maritime Security and Piracy; Mass Transport Security; Organizational Structure; Pandemics; Personal Protective Practices; Psych-ology of Security; Red Teaming and Scenario Modeling; Resilience and Critical Infrastructure Protection; Asset-, Function-, Project-, and Enterprise-Based Security Risk Assessment; Security Specifications and Postures; Security Training; Supply Chain Security; Transnational Security; and Travel Security.




Principles of Project Finance


Book Description

The Second Edition of this best-selling introduction for practitioners uses new material and updates to describe the changing environment for project finance. Integrating recent developments in credit markets with revised insights into making project finance deals, the second edition offers a balanced view of project financing by combining legal, contractual, scheduling, and other subjects. Its emphasis on concepts and techniques makes it critical for those who want to succeed in financing large projects. With extensive cross-references and a comprehensive glossary, the Second Edition presents anew a guide to the principles and practical issues that can commonly cause difficulties in commercial and financial negotiations. - Provides a basic introduction to project finance and its relationship with other financing techniques - Describes and explains: sources of project finance; typical commercial contracts (e.g., for construction of the project and sale of its product or services) and their effects on project-finance structures; project-finance risk assessment from the points of view of lenders, investors, and other project parties; how lenders and investors evaluate the risks and returns on a project; the rôle of the public sector in public-private partnerships and other privately-financed infrastructure projects; how all these issues are dealt with in the financing agreements




Public-Private Partnerships


Book Description

Over the last decade or so, private-sector financing through public-private partnerships (PPPs) has become increasingly popular around the world as a way of procuring and maintaining public-sector infrastructure, in sectors such as transportation (roads, bridges, tunnels, railways, ports, airports), social infrastructure (hospitals, schools, prisons, social housing) public utilities (water supply, waste water treatment, waste disposal), government offices and other accommodation, and other specialised services (communications networks or defence equipment). This book, based on the author's practical experience on the public- and private-sector sides of the table, reviews the key policy issues which arise for the public sector in considering whether to adopt the PPP procurement route, and the specific application of this policy approach in PPP contracts, comparing international practices in this respect. It offers a systematic and integrated approach to financing PPPs within this public-policy framework, and explains the project-finance techniques used for this purpose. The book deals with both the Concession and PFI models of PPP, and provides a structured introduction for those who are new to the subject, whether in the academic, public-sector, investment, finance or contracting fields, as well as an aide memoire for those developing PPP policies or negotiating PPPs. The author focuses on practical concepts, issues and techniques, and does not assume any prior knowledge of PPP policy issues or financing techniques. The book describes and explains:* The different types of PPPs and how these have developed* Why PPPs are attractive to governments* General policy issues for the public sector in developing a PPP programme* PPP procurement procedures and bid evaluation* The use of project-finance techniques for PPPs* Sources of funding* Typical PPP contracts and sub-contracts, and their relationship with the project's financial structure * Risk assessment from the points of view of the public sector, investors, lenders and other project parties* Structuring the investment and debt financing* The key issues in negotiating a project-finance debt facility. In addition the book includes an extensive glossary, as well as cross-referencing.*Reviews the PPP policy framework and development from an international perspective*Covers public- and private-sector financial analysis, structuring and investment in PPPs*No prior knowledge of project financing required




Economic Security: Neglected Dimension of National Security ?


Book Description

On August 24-25, 2010, the National Defense University held a conference titled “Economic Security: Neglected Dimension of National Security?” to explore the economic element of national power. This special collection of selected papers from the conference represents the view of several keynote speakers and participants in six panel discussions. It explores the complexity surrounding this subject and examines the major elements that, interacting as a system, define the economic component of national security.




Executive Protection


Book Description

Foreword -- Executive protection training: machismo, mirages, myths and money -- Introduction to the principles of protection -- Teamwork -- The legal issues -- Defining the mission & identifying critical assets -- The asset survey -- Identify primary threats & define the adversary -- Defining the adversary's method of operation -- Common denominators of attackers -- Target identification -- Vulnerability assessment of targets -- General emergency planning -- Gathering policies & procedures -- Principles for principals -- Post operations-- Foreign travel & kidnapping -- Terrorism -- The only executive protection checklist you will ever need -- Assessing & managing violent behavior.




CISSP: Certified Information Systems Security Professional Study Guide


Book Description

Totally updated for 2011, here's the ultimate study guide for the CISSP exam Considered the most desired certification for IT security professionals, the Certified Information Systems Security Professional designation is also a career-booster. This comprehensive study guide covers every aspect of the 2011 exam and the latest revision of the CISSP body of knowledge. It offers advice on how to pass each section of the exam and features expanded coverage of biometrics, auditing and accountability, software security testing, and other key topics. Included is a CD with two full-length, 250-question sample exams to test your progress. CISSP certification identifies the ultimate IT security professional; this complete study guide is fully updated to cover all the objectives of the 2011 CISSP exam Provides in-depth knowledge of access control, application development security, business continuity and disaster recovery planning, cryptography, Information Security governance and risk management, operations security, physical (environmental) security, security architecture and design, and telecommunications and network security Also covers legal and regulatory investigation and compliance Includes two practice exams and challenging review questions on the CD Professionals seeking the CISSP certification will boost their chances of success with CISSP: Certified Information Systems Security Professional Study Guide, 5th Edition.




Disaster Risk Management Systems Analysis


Book Description

Disaster Risk Management (DRM) combines, through a management perspective, the concept of prevention, mitigation and preparedness with response to the rising frequency and severity of natural hazards and disasters. This guide provides a set of tools that have been developed and tested in field projects, with particular reference to disaster-prone areas and vulnerable sectors and population groups.--Publisher's description.




Business Cases for Risk Management


Book Description

In over 25 years of managing risks across a range of disciplines and industries, I have in only one instance, had adequate resources to implement appropriate risk strategies. That was following a terrorist attack on the Jakarta Embassy when the government of the day, insisted that all our overseas missions would be protected to a minimum standard. At the time, I was Manager, Property and Security for the Australian Trade Commission with a remit spanning 60 nations. In a few short months, my team and I built a $56 million budget, and for a short period, our greatest challenge was spending the money fast enough to meet the program timelines. For the rest of my career, the biggest challenge has been finding adequate funding - and I have to say, that with research, practice and dedication, I've become rather good at it. Even without having met you, I'm going to suggest that finding sufficient funds to do what you know you need to do, is probably your biggest challenge right now. This book was designed with one purpose in mind - to help you get the resources you need to support the right risk treatments. It was born when a friend of mine asked me one day, "how can I demonstrate the business case for my risk treatments?" That simple question proved much more difficult to answer than I would have thought. It did however, prompt me to change one of my master's electives to conduct a research project into the business case for investments in risk management. That in turn, lead me to create a training course the topic, and before long, the workbook from that course became this book. The book draws on research from a range of disciplines and using generous color graphics, is designed to take you through the full process of initiating, researching, developing, analysing, writing and finally presenting a business case. Although the focus is on business cases for risk treatments, you don't need to be a risk expert and the same concepts are applicable to any business case. It's been designed with simple tips to get you started including: - The 4C's of defining a problem? - The 4A's of defining a recommended solution - ESIEAP (The Hierarchy of Controls) to determine which type of risk treatment is better? - The 8 simple steps that you can do on a single sheet of paper to determine whether your proposed business case has merit. - How to use the 4A's, 4C's and ESIEAP to spot a poor business case in under 5 minutes (including self-assessing your business case before the boss does). If you've been struggling to get your IT project, portfolio planning, safety, security or finance business cases funded, then this is the book for you. In just a few short hours you can know all you need to know to develop a great business case.




50 Foot Challenges


Book Description

This is an illustrated color guide to common foot conditions for podiatry students and clinicians. It covers common pathologies and refers to treatmetns. The text takes a case study approach with an illustration or two from each case. (Midwest).