Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization.
A good security assessment is a fact-finding process that determines an organization’s state of security protection. It exposes vulnerabilities, determines the potential for losses, and devises a plan to address these security concerns. While most security professionals have heard of a security assessment, many do not know how to conduct one, how it’s used, or how to evaluate what they have found.
Security Risk Assessment offers security professionals step-by-step guidance for conducting a complete risk assessment. It provides a template draw from, giving security professionals the tools needed to conduct an assessment using the most current approaches, theories, and best practices.
Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization.
A good security assessment is a fact-finding process that determines an organization’s state of security protection. It exposes vulnerabilities, determines the potential for losses, and devises a plan to address these security concerns. While most security professionals have heard of a security assessment, many do not know how to conduct one, how it’s used, or how to evaluate what they have found.
Security Risk Assessment offers security professionals step-by-step guidance for conducting a complete risk assessment. It provides a template draw from, giving security professionals the tools needed to conduct an assessment using the most current approaches, theories, and best practices.
Evaluate the safety and security of any organization with this comprehensive how-to guide
Chapter 1: Introduction to Security Risk Assessments
Chapter 2: Pre-Assessment Planning
Chapter 3: Defining the Project Scope
Chapter 4: Project Management
Chapter 5: Information Gathering
Chapter 6: Physical Security Assessment
Chapter 7: Financial Assessment
Chapter 8: Security Department Operations
Chapter 9: Security Training
Chapter 10: Security Vulnerability Identification
Chapter 11: Workplace Violence Risks and Vulnerabilities
Chapter 12: Law Enforcement’s Role
Chapter 13: Security Technology Assessment
Chapter 14: Crime or Loss Foreseeability
Chapter 15: Crime Prevention Strategies
Chapter 16: The Security Assessment Report
John M. White, a recognized expert in asset protection management, has over 38 years of experience including military, law enforcement, corporate security administration, and professional security consultation. White is Board Certified in Security Management as a Certified Protection Professional (CPP), and he is a Certified Healthcare Protection Administrator (CHPA), the two highest certifications in the security profession. He is also a member of the International Association of Chiefs of Police, National Association of Chiefs of Police, The International Association for Professional Security Consultants, ASIS International, International Association for Healthcare Security & Safety, and several other professional groups. He has also presented as a security expert at an international security conference.White has been published in the Journal of Healthcare Protection Management, International Association for Healthcare Safety & Security, Rusting Publications, on numerous occasions, and in the association’s monthly Directions magazine. He has also been published in the ASIS International’s Security Management magazine.
"White has created an excellent book with material drawn from the
well of his experience...clearly a must-read for the inexperienced
or nonsecurity professional who is faced with the task of
conducting a security assessment." --ASIS Dynamics
"...it was refreshing to see this book covered very little on IT
and took a broader view of security risk assessment...Each section
is presented in layman’s terms, with clear examples and some
templates to help with the assessment. Score: 7 out of 10"
--BCS.org, January 2015
"...takes you through a security risk assessment, from who will do
it, how often it needs doing, and how long it takes...through the
planning, the schedule and budget, and that wonderful word
‘deliverables’, how to gather information on risk, whether from
staff surveys or interviews." --Professional Security Magazine
Online, 2014
![]() |
Ask a Question About this Product More... |
![]() |