- Filename: security-consulting.
- ISBN: 9780124016743
- Release Date: 2012-12-31
- Number of pages: 264
- Author: Charles A. Sennewald
- Publisher: Butterworth-Heinemann
Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, at no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption -- which could bring any business to it's knees -- has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in-depth security surveys so businesses will know exactly where security holes are present and where they need improvement to limit their exposure to various threats. The fourth edition of Security Consulting introduces security and law enforcement professionals to the career and business of security consulting. It provides new and potential consultants with the practical guidelines needed to start up and maintain a successful independent practice. Updated and expanded information is included on marketing, fees and expenses, forensic consulting, the use of computers, and the need for professional growth. Useful sample forms have been updated in addition to new promotion opportunities and keys to conducting research on the Web. The only book of its kind dedicated to beginning a security consulting practice from the ground-up Proven, practical methods to establish and run a security consulting business New chapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet The most up-to-date best practices from the IAPSC
- Filename: security-design-consulting.
- ISBN: 9780080493053
- Release Date: 2007-05-02
- Number of pages: 352
- Author: Brian Gouin
- Publisher: Butterworth-Heinemann
A crucial reference for the practicing or aspiring design consultant, Security Design Consulting brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, Security Design Consulting gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant’s important and growing role in an overall security program. * Focuses on consulting in security design, not security management * Provides sample service agreements, specifications, and reports to use as models * Emphasizes the highest technical and ethical standards for this increasingly crucial profession
- Filename: becoming-an-independent-security-consultant.
- ISBN: 0692717404
- Release Date: 2016-05-15
- Number of pages: 220
- Author: Michael Silva
The demand for security consulting services is at an all-time high. Organizations of all types face unprecedented challenges in dealing with workplace violence, internal and external theft, robbery and crimes of all varieties. These organizations need help in dealing with these challenges, and are reaching out to independent security consultants to assist them. Operating an independent security consulting practice can be a profitable and rewarding business for those with the right skills. Many people retiring from law enforcement, military, or security careers would like to enter the security consulting profession, but don't know how. These people have extensive skills in security and loss prevention, but don't know how to translate these skills into a successful security consulting practice. While they have some idea about the type of services that they would like to provide, they have no idea of how to go about selling these services, what to charge for them, or how to run a profitable security consulting business. It is for these people that this book was written. Within this book, Michael A. Silva, an independent security consultant with over thirty years of experience, provides practical "how-to" advice on how to start and run a successful security consulting practice. Pulling no punches, Michael tells what it takes to be a successful security consultant, and explains why so many new security consultants fail within the first eighteen months. Chapters in this book include: Chapter 1 - What is an Independent Security Consultant? Chapter 2 - A Week in the Life of a Security Consultant Chapter 3 - The Skills needed to be Successful Chapter 4 - Planning Your Consulting Practice Chapter 5 - Determining What and How to Charge Chapter 6 - Selling Security Consulting Services Chapter 7 - Proposal Writing for the Security Consultant Chapter 8 - Selling to Government Agencies Chapter 9 - Selling to Architects and Engineers Chapter 10 - Security Consulting Services That Sell Chapter 11 - Creating a Business Plan Chapter 12 - Taking the Plunge Chapter 13 - Taking Your Practice to the Next Level Chapter 14 - Continuing Education Chapter 15 - Avoiding Pitfalls and Common Mistakes This book is crammed with practical tips based on the actual day-to-day experiences of a working security consultant. Within this book, Michael tells you what works - and more importantly, what doesn't work. This book is specifically written for the person starting a one-person security consulting practice, and answers questions such as: - What types of skills do I need to be successful? - What types of licenses and certifications do I need? - What should I name my business? - Do I need a website? - What types of insurance do I need? - Should I rent an office, or work out of my home? - How much should I charge? - How do I sell my services and get consulting jobs? - How do I write a proposal? - What consulting services should I offer? - How much money do I need to get started? - What steps should I take before I quit my present job? - Can I start my consulting practice part-time while I'm still working? - How do I grow my practice and take it to the next level? - What are some common mistakes made by new consultants and how can I avoid them? About The Author Michael A. Silva is an independent security consultant that has over forty years of security industry experience. Michael founded Silva Consultants, his independent security consulting and design firm, in 1985. In late 2001, Michael suspended the operations of Silva Consultants to accept a position with Kroll, the world's largest security and risk consulting company. From 2001 to 2006, he managed Kroll's security consulting and engineering practice in Seattle, and was responsible for projects throughout Washington, Oregon, California, and Nevada. In 2007, Michael resigned his position with Kroll and resumed the operations of Silva Consultants.
- Filename: principles-of-security-consulting.
- ISBN: 1930586795
- Release Date: 2002-08-01
- Number of pages: 272
- Author: Charles Read
- Publisher: American University & College Press
Are you in the security industry? Whether your answer is yes or no, keep reading! This informative and easy-to-read book is of value to all who want to know what it takes to be secure in today's society. It provides the knowledge you need to make your family and your home as safe as possible. Learn what the pros already know--from outside perimeters and types of alarms to fire prevention and detection. Learn about the tools criminals use and how to best protect yourself against them. Learn to think like a top security consultant and give yourself peace of mind. For those who are interested in taking these steps further and establishing themselves as security consultants, nothing could be better than Charlie Read's principles of providing top-quality service, outlined in this one-of-a-kind book. A must-read for anyone interested in safety and security!
- Filename: the-security-consultant-s-handbook.
- ISBN: 1849287481
- Release Date: 2015-09-29
- Number of pages: 366
- Author: Richard Bingley
- Publisher: Itgp
A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organizational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities, and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. This book provides essential direction for those who want to succeed in security, either individually or as part of a team. It also aims to stimulate some fresh ideas and provide new market routes for security professionals who may feel that they are underappreciated and overexerted in traditional business domains. Product overview Distilling the author's fifteen years' experience as a security practitioner, and incorporating the results of some fifty interviews with leading security practitioners and a review of a wide range of supporting business literature, The Security Consultant's Handbook provides a wealth of knowledge for the modern security practitioner, covering: Entrepreneurial practice (including business intelligence, intellectual property rights, emerging markets, business funding, and business networking) Management practice (including the security function's move from basement to boardroom, fitting security into the wider context of organizational resilience, security management leadership, adding value, and professional proficiency) Legislation and regulation (including relevant UK and international laws such as the Human Rights Act 1998, the Data Protection Act 1998 and the Geneva Conventions) Private investigations (including surveillance techniques, tracing missing people, witness statements and evidence, and surveillance and the law) Information and cybersecurity (including why information needs protection, intelligence and espionage, cybersecurity threats, and mitigation approaches such as the ISO 27001 standard for information security management) Protective security (including risk assessment methods, person-focused threat assessments, protective security roles, piracy, and firearms) Safer business travel (including government assistance, safety tips, responding to crime, kidnapping, protective approaches to travel security and corporate liability) Personal and organizational resilience (including workplace initiatives, crisis management, and international standards such as ISO 22320, ISO 22301 and PAS 200) Featuring case studies, checklists, and helpful chapter summaries, The Security Consultant's Handbook aims to be a practical and enabling guide for security officers and contractors. Its purpose is to plug information gaps or provoke new ideas, and provide a real-world support tool for those who want to offer their clients safe, proportionate, and value-driven security services. About the author Richard Bingley is a senior lecturer in security and organizational resilience at Buckinghamshire New University, and co-founder of CSARN, the popular business security advisory network. He has more than fifteen years' experience in a range of high-profile security and communications roles, including as a close protection operative at London's 2012 Olympics and in Russia for the 2014 Winter Olympic Games. He is a licensed close protection operative in the UK, and holds a postgraduate certificate in teaching and learning in higher education. Richard is the author of two previous books: Arms Trade: Just the Facts (2003) and Terrorism: Just the Facts (2004).
- Filename: global-security-consulting.
- ISBN: 9781495600630
- Release Date: 2014-10-01
- Number of pages: 280
- Author: Luke Bencie
- Publisher: Mountain Lake Press
With new security threats nearly every week all over the globe, governments and businesses are forced to take extraordinary measures to protect themselves. Likewise, espionage continues at levels comparable to the days of the Cold War—but many more players are now participating. In this environment, a new industry has grown to deal with these challenges: international security consulting. Drawing from military, law-enforcement, and intelligence communities, new private companies are springing up across the world. Global Security Consulting, written by a former intelligence specialist who has built a successful consultancy, provides solid guidance for anyone wishing to enter this glamorous but often dangerous field.
- Filename: effective-security-management.
- ISBN: 0123820138
- Release Date: 2011-03-28
- Number of pages: 360
- Author: Charles A. Sennewald
- Publisher: Elsevier
Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. Working with a team of sterling contributors endowed with cutting-edge technological expertise, the book presents the most accurately balanced picture of a security manager’s duties. Its Jackass Management cartoons also wittily illustrate the array of pitfalls a new manager must learn to avoid in order to lead effectively. In short, this timely revision of a classic text retains all the strengths that have helped the book endure over the decades and adds the latest resources to support professional development. * Includes a new chapter on the use of statistics as a security management tool * Contains complete updates to every chapter while retaining the outstanding organization of the previous editions * Recommended reading for The American Society for Industrial Security's (ASIS) Certified Protection Professional (CPP) exam
- Filename: articles-on-security-consulting-firms-including-blackwater-worldwide-blackwater-security-consulting-aegis-defence-services-control-risks-group-s.
- ISBN: 1243286113
- Release Date: 2011-08-31
- Number of pages: 58
- Author: Hephaestus Books
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Hephaestus Books represents a new publishing paradigm, allowing disparate content sources to be curated into cohesive, relevant, and informative books. To date, this content has been curated from Wikipedia articles and images under Creative Commons licensing, although as Hephaestus Books continues to increase in scope and dimension, more licensed and public domain content is being added. We believe books such as this represent a new and exciting lexicon in the sharing of human knowledge. This particular book is a collaboration focused on Security consulting firms.
- Filename: strategic-security-management.
- ISBN: 9780080465968
- Release Date: 2006-11-27
- Number of pages: 416
- Author: Karim Vellani
- Publisher: Butterworth-Heinemann
Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organization’s assets, giving decision makers the foundation needed to climb the next step up the corporate ladder. Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures. Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald. * Provides clear direction on how to meet new business demands on the security professional * Guides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the program * Covers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each
- Filename: risk-and-security-management.
- ISBN: 9780470387276
- Release Date: 2008-11-21
- Number of pages: 384
- Author: Michael Blyth
- Publisher: John Wiley & Sons
Learn to measure risk and develop a plan to protect employees and company interests by applying the advice and tools in Risk and Security Management: Protecting People and Sites Worldwide. In a world concerned with global terrorism, instability of emerging markets, and hazardous commercial operations, this book shines as a relevant and timely text with a plan you can easily apply to your organization. Find a series of strategic to granular level policies, systems, and concepts which identify and address risk, enabling business to occur in a manner which best protects you and your company.
- Filename: directory-of-security-consultants.
- ISBN: IND:30000076254030
- Release Date: 1976
- Number of pages: 59
- Author: Elizabeth Robertson
- Filename: the-international-handbook-of-computer-security.
- ISBN: 9781135961732
- Release Date: 2013-11-26
- Number of pages: 400
- Author: Jae Shim
- Publisher: Routledge
First Published in 2000. Routledge is an imprint of Taylor & Francis, an informa company.
- Filename: security-consulting-firms.
- ISBN: 1155598601
- Release Date: 2010-05
- Number of pages: 80
- Author: Books Llc
- Publisher: Books LLC, Wiki Series
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 26. Chapters: Blackwater Worldwide, Blackwater Security Consulting, DynCorp, HBGary, Giuliani Partners, Secure Banking Solutions, Sinclair Knight Merz, Aegis Defence Services, Defion Internacional, Endgame systems, Anti Piracy Maritime Security Solutions, Hillard Heintze, Unity Resources Group, Control Risks Group, Aaron Barr, BCIA Inc., MVM, Inc., OSSI-Safenet Security Services, Corporate Training Unlimited, Civilian Police International. Excerpt: Xe Services LLC is a private military company founded in 1997 by Erik Prince and Al Clark.; it is better known by its former names, Blackwater USA and Blackwater Worldwide. Xe is currently the largest of the U.S. State Department's three private security contractors. Of the 987 contractors Xe provides, 744 are U.S. citizens. At least 90% of the company's revenue comes from government contracts. Xe provided security services in Iraq to the United States federal government, particularly the Central Intelligence Agency on a contractual basis. The company was purchased on December 17, 2010 by USTC Holding, an investment group. Erik Prince will no longer have an equity stake in or involvement in the management or operation of Xe. In 2011 former NSA head & CIA exec Bobby Ray Inman became the lead of the board of directors.In May 2011, Xe named Ted Wright as CEO. In June, 2011 the company named Suzanne Folsom its chief regulatory and compliance officer and deputy general counsel. Both logos, side by side. Note the original below, with the curved Blackwater wordmark.Blackwater USA was formed in 1997, by Erik Prince in North Carolina, to provide training support to military and law enforcement organizations. In explaining the Blackwater's purpose, Prince stated that ''We are trying to do for the national security apparatus what FedEx did for the Postal Service.'' After serving SEAL and SWAT tea...
- Filename: the-consulting-bible.
- ISBN: 1118023617
- Release Date: 2011-02-23
- Number of pages: 288
- Author: Alan Weiss
- Publisher: John Wiley & Sons
Everything you need to know about building a successful, world-class consulting practice Whether you are a veteran consultant or new to the industry, an entrepreneur or the principal of a small firm, The Consulting Bible tells you absolutely everything you need to know to create and expand a seven-figure independent or boutique consulting practice. Expert author Alan Weiss, who coaches consultants globally and has written more books on solo consulting than anyone in history, shares his expertise comprehensively. Learn and appreciate the origins and evolution of the consulting profession Launch your practice or firm and propel it to top performance Implement your consulting strategies in public and private organizations, large or small, global or domestic Select from the widest variety of consulting methodologies Achieve lasting success in your professional career and personal goals The author is recognized as "one of the most highly regarded independent consultants in America" by the New York Post and "a worldwide expert in executive education" by Success Magazine Whether you're just starting out or looking for the latest trends in modern practice, The Consulting Bible gives you an unparalleled toolset to build a thriving consultancy.
- Filename: building-and-implementing-a-security-certification-and-accreditation-program.
- ISBN: 020349248X
- Release Date: 2005-12-15
- Number of pages: 344
- Author: Patrick D. Howard
- Publisher: CRC Press
Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes. This book consists of four main sections. It begins with a description of what it takes to build a certification and accreditation program at the organization level, followed by an analysis of various C&A processes and how they interrelate. The text then provides a case study of the successful implementation of certification and accreditation in a major U.S. government department. It concludes by offering a collection of helpful samples in the appendices.