+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Risk Analysis and the Security Survey. Edition No. 4

  • Book

  • October 2018
  • Elsevier Science and Technology
  • ID: 1951629

As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of Risk Analysis and the Security Survey.� Broder and Tucker guide you through�analysis to�implementation�to provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updating and covering new content.� Understand the most fundamental theories surrounding risk control, design, and implementation by reviewing topics such as cost/benefit analysis, crime prediction, response planning, and business impact analysis--all updated to match today's current standards.

This book will show you how to develop and maintain current business contingency and disaster recovery plans to ensure your enterprises are able to sustain loss are able to recover, and protect your assets, be it your business, your information,�or yourself,�from threats.

Table of Contents

Part I: The Treatment and Analysis of Risk1: Risk2: Vulnerability and Threat Identification3: Risk Measurement4: Quantifying and Prioritizing Loss Potential 5: Cost/Benefit Analysis6: Other Risk Analysis Methodologies7: The Security Survey: An Overview8: Management Audit Techniques and the Preliminary Survey9: The Survey Report10: Crime Prediction11: Determining Insurance Requirements

Part II: Emergency Managment and Business Continuity Planning12: Emergency Management: A Brief Introduction13: Mitigation and Preparedness14: Response Planning15: Business Impact Analysis16: Business Continuity Planning17: Plan Documentation18: Crisis Management Planning for Kidnap, Ransom, and Extortion19: Monitoring Safeguards20: The Security Consultant

Appendix A: Security Survey Work SheetsAppendix B: Sample Kidnap and Ransom Contingency PlanAppendix C: Security Systems Specifications

Authors

James F. Broder James F. Broder, CFE, CPP, FACFE, Independent Security Consultant, San Marino, CA, USA. James F. Broder, CFE, CPP, FACFE, has more than 40 years experience in security and law

enforcement. He has worked as a security executive, instructor, and consultant as well as having

served in Vietnam as a Police Advisor in the Counter Insurgency Directorate, Vietnamese

National Police. A former FBI Special Agent and employee for the US State Department, U.S. House of Representatives, Washington D.C. Mr. Broder is considered to be one of the most highly respected security authorities in the United States. Eugene Tucker President, Praetorian Protective Services� LLC, California, USA. Eugene (Gene) Tucker, CPP, CFE, CBCP, CHST, is co-author of Butterworth Heinemann's Risk Analysis and the Security Survey, 4th edition. He is qualified as a Certified Continuity Manager (CCM) - ISO 22301 Lead Implementer and as an ISO 22301 Lead Auditor, and has extensive international experience as a corporate manager, investigator, trainer and consultant in security, safety, and business continuity planning.