Developing a Comprehensive Security Program: Elements, Characteristics, and Leadership
1/5
()
Currently unavailable
Currently unavailable
About this ebook
Developing a Comprehensive Security Program answers the question common among security managers, "What is a model security program, and how does our program compare to it?" In this seven-minute Proven Practices presentation, narrator Elizabeth Lancaster outlines the baseline elements of a security program, which have been defined by experienced Security Executive Council members and research.
This presentation is not sector-specific--meaning it's applicable for all organizations and industries. In addition to the baseline security program elements, Lancaster also discusses business-aligned program elements, program characteristics, a program maturity model, and the skills and knowledge the security department needs to possess. Developing a Comprehensive Security Program may be used as a benchmark for existing programs and to educate senior management. It also provides a general understanding of the security function as it currently exists.
Developing a Comprehensive Security Program is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
- The seven-minute, visual PowerPoint presentation with audio narration format is excellent for group learning
- Information is drawn from the many years of collective knowledge and experience of the Security Executive Council community
- Identifies program characteristics and the knowledge areas and skills security leaders should possess
Bob Hayes
Bob Hayes has more than 25 years of experience developing security programs and providing security services for corporations, including eight years as the CSO at Georgia Pacific and nine years as security operations manager at 3M. His security experience spans the manufacturing, distribution, research and development, and consumer products industries as well as national critical infrastructure organizations. Additionally, he has more than 10 years of successful law enforcement and training experience in Florida and Michigan. Bob is a recognized innovator in the security field and was named as one of the “25 Most Influential People in the Security Industry in 2007 by Security magazine. He is a frequent speaker at key industry events. He is a leading expert on security issues and has been quoted by such major media outlets as the Wall Street Journal and Forbes. Bob is currently the managing director of the Security Executive Council.
Read more from Bob Hayes
Business Continuity: Playbook Rating: 0 out of 5 stars0 ratingsNine Practices of the Successful Security Leader: Research Report Rating: 0 out of 5 stars0 ratingsInternational Security Programs Benchmark Report: Research Report Rating: 3 out of 5 stars3/5Corporate Security Organizational Structure, Cost of Services and Staffing Benchmark: Research Report Rating: 0 out of 5 stars0 ratingsCrisis Management at the Speed of the Internet: Trend Report Rating: 0 out of 5 stars0 ratingsBring Your Own Device (BYOD) to Work: Trend Report Rating: 0 out of 5 stars0 ratingsSmart Partners: Building Successful Relationships in Business and Life Rating: 4 out of 5 stars4/5Wolves of the Yukon Rating: 3 out of 5 stars3/5Blood Bath Casino Rating: 0 out of 5 stars0 ratings
Related to Developing a Comprehensive Security Program
Related ebooks
Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders Rating: 5 out of 5 stars5/5Data Breach Preparation and Response: Breaches are Certain, Impact is Not Rating: 0 out of 5 stars0 ratingsThe Chief Security Officer’s Handbook: Leading Your Team into the Future Rating: 0 out of 5 stars0 ratingsActive Shooter: Preparing for and Responding to a Growing Threat Rating: 0 out of 5 stars0 ratingsInformation Protection Playbook Rating: 0 out of 5 stars0 ratingsSecurity Careers: Skills, Compensation, and Career Paths Rating: 0 out of 5 stars0 ratingsSecurity Metrics Management: Measuring the Effectiveness and Efficiency of a Security Program Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Effective Management: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsMeasures and Metrics in Corporate Security Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Success: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsMeasuring and Communicating Security's Value: A Compendium of Metrics for Enterprise Protection Rating: 0 out of 5 stars0 ratingsCCSP (ISC)2 Certified Cloud Security Professional Official Study Guide Rating: 0 out of 5 stars0 ratingsInformation Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis Rating: 0 out of 5 stars0 ratingsThe Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program Rating: 0 out of 5 stars0 ratingsCorporate Security Management: Challenges, Risks, and Strategies Rating: 5 out of 5 stars5/5Information Security Management Principles Rating: 3 out of 5 stars3/5Building an Effective Cybersecurity Program, 2nd Edition Rating: 0 out of 5 stars0 ratingsSecurity Risk Management: Building an Information Security Risk Management Program from the Ground Up Rating: 4 out of 5 stars4/5The Definitive Guide to the C&A Transformation Process: The First Publication of a Comprehensive View of the C&A Transformation Rating: 0 out of 5 stars0 ratingsInsider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within Rating: 0 out of 5 stars0 ratingsSecurity Risk Assessment: Managing Physical and Operational Security Rating: 5 out of 5 stars5/5The Basics of IT Audit: Purposes, Processes, and Practical Information Rating: 4 out of 5 stars4/5Insider Threat: Prevention, Detection, Mitigation, and Deterrence Rating: 5 out of 5 stars5/5Client-Side Attacks and Defense Rating: 0 out of 5 stars0 ratingsThreat Forecasting: Leveraging Big Data for Predictive Analysis Rating: 0 out of 5 stars0 ratingsDirecting the Agile Organisation: A lean approach to business management Rating: 0 out of 5 stars0 ratingsWorkplace Security Playbook: The New Manager's Guide to Security Risk Rating: 0 out of 5 stars0 ratingsSecurity Operations Management Rating: 0 out of 5 stars0 ratingsSecurity for Business Professionals: How to Plan, Implement, and Manage Your Company’s Security Program Rating: 0 out of 5 stars0 ratings
True Crime For You
Under the Bridge Rating: 4 out of 5 stars4/5Devil's Knot: The True Story of the West Memphis Three Rating: 4 out of 5 stars4/5Waco: David Koresh, the Branch Davidians, and A Legacy of Rage Rating: 4 out of 5 stars4/5Manhunt: The 12-Day Chase for Lincoln's Killer: An Edgar Award Winner Rating: 4 out of 5 stars4/5Hollywood's Dark History: Silver Screen Scandals Rating: 4 out of 5 stars4/5Mindhunter: Inside the FBI's Elite Serial Crime Unit Rating: 4 out of 5 stars4/5The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government Rating: 5 out of 5 stars5/5My Story Rating: 4 out of 5 stars4/5The Ivy League Counterfeiter Rating: 4 out of 5 stars4/5The Devil and Harper Lee Rating: 4 out of 5 stars4/5Dead Mountain: The Untold True Story of the Dyatlov Pass Incident Rating: 4 out of 5 stars4/5Breaking Free: How I Escaped Polygamy, the FLDS Cult, and My Father, Warren Jeffs Rating: 4 out of 5 stars4/518 Tiny Deaths: The Untold Story of Frances Glessner Lee and the Invention of Modern Forensics Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5An Assassin in Utopia: The True Story of a Nineteenth-Century Sex Cult and a President's Murder Rating: 4 out of 5 stars4/5Out of the Wreckage Rating: 4 out of 5 stars4/5The Foundling: The True Story of a Kidnapping, a Family Secret, and My Search for the Real Me Rating: 4 out of 5 stars4/5Confession of a Serial Killer: The Untold Story of Dennis Rader, the BTK Killer Rating: 4 out of 5 stars4/5400 Things Cops Know: Street-Smart Lessons from a Veteran Patrolman Rating: 4 out of 5 stars4/5Journey Into Darkness Rating: 4 out of 5 stars4/5Without Pity: Ann Rule's Most Dangerous Killers Rating: 4 out of 5 stars4/5The Best New True Crime Stories: Small Towns Rating: 3 out of 5 stars3/5Wicked New Orleans: The Dark Side of the Big Easy Rating: 4 out of 5 stars4/5Fallen Idols: A Century of Screen Sex Scandals Rating: 4 out of 5 stars4/5Accused: British Witches throughout History Rating: 4 out of 5 stars4/5
Reviews for Developing a Comprehensive Security Program
1 rating0 reviews