|
![]() |
|||
|
||||
OverviewIn Intelligence-Based Security in Private Industry, Thomas A. Trier identifies the inherent need and desire for intelligence-based security that exists throughout the private security industry. He provides a general overview of intelligence-based security and specific implementation guidelines to reduce private businesses' risk and vulnerability to criminal activities. This book is practical and informational, demonstrating real applications of the concepts, theories, and methods of gathering and acting upon information that may suggest a threat to a company. It explains the difference between risk assessments, vulnerability assessments, and threat assessments, defines external and internal threats, and outlines how strategies to address either form of threat differ. It also establishes an outline of four key parts to an effective intelligence program: assessment, evaluation, analysis, and mitigation. Trier illustrates concepts and strategies with specific examples of his past experiences using and developing intelligence-based plans to improve security systems. He provides these case studies as guides to developing similar programs in your company because, as he points out, any capable adversary with the intent to attack also is running its own intelligence program. Using in-house intelligence-based security can make you better prepared against physical and virtual threats, ranging from theft of goods to identity theft. It allows you to have more critical information at hand prior to a possible incident and to make more informed decisions in anticipation of or response to threats. Intelligence-Based Security in Private Industry shows you how to acquire this information and how to use it for your protection. Full Product DetailsAuthor: Thomas A. TrierPublisher: Taylor & Francis Ebooks Imprint: CRC Press ISBN: 9781498722049ISBN 10: 1498722040 Pages: 187 Publication Date: 21 May 2015 Audience: General/trade , College/higher education , General , Tertiary & Higher Education Format: Electronic book text Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsPreface About the Author Introduction Intelligence Descriptions Intelligence Background Advantages of an Intelligence-Based Program Corporate Security Capabilities Assessment Assessing the Security Program Evaluate Capabilities Recommend Security Standards Building Consensus Initiate Collaboration of Cyber Security and Others Liaise with Industry Partners and Law Enforcement Show Success Engage Executive Management Planning an Enterprise-Wide Assessment External Threats Industry Threats Internal Threats Vulnerabilities Compiling the Assessment Planning and Resources Conduct an Intelligence Program Assessment Enterprise Mitigation and Risk Minimize Risk Develop a Strategic Plan Develop a Tactical Plan Communication Implementation: Case Studies Utility Company Execution Other Examples of Execution Follow-Up IndexReviewsAuthor InformationTom Trier served for 25 years as a special agent of the Federal Bureau of Investigation (FBI), including 13 years in the FBI management program. He attained the rank of assistant special agent in charge in the Intelligence Branch of the FBI Washington Field Office. His field of expertise was investigating criminal and terrorist enterprises, including extensive service overseas and development of intelligence programs. He served for 21/2 years as the leader of corporate security for an electrical transmission-only utility company, where he developed a security intelligence program that defined and analyzed internal, external, and electrical industry threats to the enterprise and formed collaborative working groups to reduce risk. Mr. Trier offers intelligence and security services through his business, Security Intelligence Consulting L.L.C. Tab Content 6Author Website:Countries AvailableAll regions |