The DNA of Executive Protection Site Security


Book Description

An in-depth read in relation to executive protection with a focus on site security, The DNA of Executive Protection - Site Security is essential for anyone new to executive protection or requiring advanced instruction on major event planning. If you want to excel as an executive protection professional, you need a thorough understanding of site security protocols, vulnerabilities, and best practices. An executive’s activities are all site based, where the VIP is either at a site, arriving or departing from a site, or travelling through one. Thus, the backbone, or DNA of executive protection is site security. Need a tool to assist with site security assessment and planning? This book includes: 1. Six activity-based categories to help determine when site security resources are warranted 2. Effective ways to establish and build relationships with each of the seven site stakeholder groups 3. Information on access control and accreditation, including assessment of examples 4. Two new protective assessment tools: the facility selection assessment and the strategic site arrival and departure assessment 5. A comprehensive guide to site vulnerability assessments, to identify, review, and evaluate physical security vulnerabilities 6. Effective actions to take if an adversary gains access to the event site 7. A detailed site security guide that outlines 60-areas a site commander should have considered and covered off on game day As site commander, your goal is to be the security subject matter expert at your event site. This book will help you achieve that goal.




Introduction to Executive Protection


Book Description

Since its original publication in 1998, Introduction to Executive Protection has been considered the bible of the executive security industry. Now in its 4th edition, this new volume, conceived and developed by Dale L. June, drawing from his experiences in the United States Secret Service, law enforcement & the private sector, has been reworked and revised with new content, chapters, and input with over 60% new material. Much more than simply an introduction, this book is a powerful learning tool, with the author now joined by Elijah Shaw, one of the foremost experts in working globally with celebrities and other high net-worth VIP’s. The authors include real world examples of bodyguards working with politicians and religious figures, and dealing with everything from stalking to assassination attempts. This volume further digs into the tactics and the mindset necessary for protectors to mitigate the risk of it happening to their clients. Packed with tips for successfully navigating the corporate, celebrity & dignitary sectors, the reader will find in-depth discussions on a variety of topics, ranging from setting up estate security plans, to working in and around private jets. The world is changing daily, and as both an educational and resource tool, this book is sure to provide new outlooks for both the experienced and the newcomer alike. ** What the Industry is Saying about the New Edition ** "A comprehensive look at executive protection, the profession, and methods of practice. This 4th edition is worth the read." Monica Duperon Rodriguez Sr. Manager, Global Corporate Security and Risk Management (Executive Protection & Solutions) LinkedIn "It is important we don't forget the basic principals & foundations. This book is a great reminder." Charles Randolph LTC (RET) President, International Protective Security Board (IPSB) Dale and Elijah have forgotten more about the business of Protective Services than most will ever learn." Mark 'SIX' James Author, Defensive Handgun II "This is absolutely one of the top books I point to for people who are interested in getting into the profession." Harlan 'Hucky' Austin Founder, Bodyguard Careers




Mergers and Acquisitions Security


Book Description

In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly reshape themselves continually exploring new markets and developing new products. When they can't expand into new markets or develop new products on their own, they seek alternatives. These alternatives include merging with or acquiring other companies to create a single more capable company. Companies acquire other companies for a wide variety of reasons. In some cases company survival may actually be the reason. What does this condition mean to the security professional? In the course of mergers and acquisitions, security plays a vital role in helping to make the endeavor successful. There are numerous titles on the business aspects of M&A such as the ones listed below. However, this unique book focuses on the role security plays in helping to make a merger, acquisition or divestiture successful. It addresses the fundamental security elements that are required to support the effort. In addition, it provides an integrated "how to" approach to implementing M&A security complete with methods and processes that have been quickly and cost-effectively implemented.- First book available that focuses on the role of the Security Manager in M&A - Case studies that highlight the role of the security manager; cases include both best practices as well as illustrations of nightmare examples of what NOT to do - Lead author is an expert that has participated in/managed security for more than 20 high-profile and large-scale acquisitions - Model processes, procedures, checklists, charts and sample forms all serve to ease immediate analysis and implementation in a merger or acquisition




The Manager's Handbook for Corporate Security


Book Description

The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, Second Edition, guides readers through today's dynamic security industry, covering the multifaceted functions of corporate security and providing managers with advice on how to grow not only their own careers, but also the careers of those they manage on a daily basis. This accessible, updated edition provides an implementation plan for establishing a corporate security program, especially for those who have little or no knowledge on the topic. It also includes information for intermediate and advanced professionals who are interested in learning more about general security, information systems security, and information warfare. - Addresses today's complex security industry, the role of the security manager, the diverse set of corporate security functions, and skills for succeeding in this dynamic profession - Outlines accessible, comprehensive implementation plans for establishing asset protection programs - Provides tactics for intermediate and advanced professionals on the topics of general security, information systems security, and information warfare - Offers new perspectives on the future of security and evolving expectations of security professionals




Risk Analysis and the Security Survey


Book Description

As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of Risk Analysis and the Security Survey. Broder and Tucker guide you through analysis to implementation to provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updating and covering new content. Understand the most fundamental theories surrounding risk control, design, and implementation by reviewing topics such as cost/benefit analysis, crime prediction, response planning, and business impact analysis--all updated to match today's current standards. This book will show you how to develop and maintain current business contingency and disaster recovery plans to ensure your enterprises are able to sustain loss are able to recover, and protect your assets, be it your business, your information, or yourself, from threats. - Offers powerful techniques for weighing and managing the risks that face your organization - Gives insights into universal principles that can be adapted to specific situations and threats - Covers topics needed by homeland security professionals as well as IT and physical security managers




Retail Crime, Security, and Loss Prevention


Book Description

Retail Crime, Security, and Loss Prevention is destined to become the "go to" source of crime- and loss prevention- related information in the retail industry. Written and edited by two nationally recognized retail security experts and enhanced with 63 contributions by others who contribute expertise in specialized areas, this book provides over 150 definitions of loss prevention terms, and discusses topics ranging from accident investigations, counterfeit currency, emergency planning, and workplace violence to vendor frauds. No other single work contains such a wealth of retail security information. The co-authors are Charles "Chuck Sennewald, CSC, CPP former Director of Security at The Broadway Department Stores, a major division of Carter Hawley Hale Stores, Inc., founder of the IAPSC and author of numerous security industry books, and John Christman, CPP, former VP and Director of Security for Macy's West. They have put in one book a wealth of information, techniques, procedures and source material relative to retail crime and loss prevention which will prove an invaluable reference work for professionals at all levels within the industry. - Tables, current industry figures, and statistics fully articulate the impact of loss prevention and theft in the retail setting - Case examples from the authors' own experience illustrate real-world problems and connect theory to practice - The most complete book available on retail security




The Protected


Book Description

“When I was the Director of Central Intelligence, I relied on Mike and his colleagues to keep me and my family safe around the world.” – George Tenet Former Director Central Intelligence Agency Close personal protection can often mean the difference between life and death. But for too many protectees or practitioners, understanding the world of executive protection (EP) can be an intimidating and unfamiliar prospect. The Protected is an inside view of personal security, intelligence and executive protection written by someone who has lived it for more than 30 years. In this book, former CIA Special Agent and security specialist Michael Trott demonstrates how much EP depends on training, experience, proper intelligence, lessons learned, one’s ability to operate both alone and in a team, and – perhaps most importantly – adopting the proper mindset. Aimed at protectees, practitioners and all those with an interest in EP, The Protected contains valuable insight on: • Determining your personal risk profile (i.e., your why) • How the global risk environment affects your personal security • Establishing a durable and effective protection program • The subtle nuances of providing successful close protection • Important EP methodologies, philosophies, complexities and mindsets • The people who protect others and their unique perspectives







Introduction to Policing


Book Description

Focusing on the thought-provoking, contemporary issues that underscore the challenging world of policing, this easy-to-understand text balances theory, research, and practice to give students a comprehensive overview of both the foundations of policing and the expanded role of today’s police officers. The engaging writing style and stories from the field, coupled with unique coverage of the issues of policing in multicultural communities the impact of globalization on policing, make this book a must have for policing courses




Cyber Privacy


Book Description

"Chilling, eye-opening, and timely, Cyber Privacy makes a strong case for the urgent need to reform the laws and policies that protect our personal data. If your reaction to that statement is to shrug your shoulders, think again. As April Falcon Doss expertly explains, data tracking is a real problem that affects every single one of us on a daily basis." —General Michael V. Hayden, USAF, Ret., former Director of CIA and NSA and former Principal Deputy Director of National Intelligence You're being tracked. Amazon, Google, Facebook, governments. No matter who we are or where we go, someone is collecting our data: to profile us, target us, assess us; to predict our behavior and analyze our attitudes; to influence the things we do and buy—even to impact our vote. If this makes you uneasy, it should. We live in an era of unprecedented data aggregation, and it's never been more difficult to navigate the trade-offs between individual privacy, personal convenience, national security, and corporate profits. Technology is evolving quickly, while laws and policies are changing slowly. You shouldn't have to be a privacy expert to understand what happens to your data. April Falcon Doss, a privacy expert and former NSA and Senate lawyer, has seen this imbalance in action. She wants to empower individuals and see policy catch up. In Cyber Privacy, Doss demystifies the digital footprints we leave in our daily lives and reveals how our data is being used—sometimes against us—by the private sector, the government, and even our employers and schools. She explains the trends in data science, technology, and the law that impact our everyday privacy. She tackles big questions: how data aggregation undermines personal autonomy, how to measure what privacy is worth, and how society can benefit from big data while managing its risks and being clear-eyed about its cost. It's high time to rethink notions of privacy and what, if anything, limits the power of those who are constantly watching, listening, and learning about us. This book is for readers who want answers to three questions: Who has your data? Why should you care? And most important, what can you do about it?