Tools of the Master Planning Trade

Collins, Kurt W.
December 2007
Security: Solutions for Enterprise Security Leaders;Dec2007, Vol. 44 Issue 12, p36
Trade Publication
The article discusses why organizations need a master security plan and how to go about assembling and implementing the plan. Creating a security master plan calls for a lot of homework including the need to know the existing and future needs of the business enterprise. The baselining of current security operations and the assessment of security needs are also addressed.


Related Articles

  • STEP 4 - SECURITY STRATEGIC PLAN.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p169 

    The article discusses the fourth step needed to identify critical assets, treat and targets and the appropriate measures to implement an effective integrated physical security plan. The section focuses on how to set out strategic plan appropriate to get management approval and develop a blue...

  • LAGE- UND ANALYSEZENTRUM BEI EINEM INTERNATIONALEN UNTERNEHMEN. János, Pataki; Péter, Sulányi // Hadmérnök;sze2011, Vol. 6 Issue 3, p161 

    The publication aims to show the possibility of technical protection of companies. The certain aspects of protection (operations center, the central control unit, the various sub-tasks and functions in the periphery) ensure that the company's security situation is still appropriate and in line...

  • How Secure Is Your Brand, Company?  // Food Logistics;Oct2004, Issue 72, p8 

    Focuses on the inclusion of security initiatives in a food company's corporate strategy. Highlights of a study on the importance of security investments by Deloitte & Touche USA LLP; Security and business benefits of complying with security regulations in the U.S.; Sources of security threats...

  • Managing in Tough Times. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p20 

    The article discusses the contribution and significance of security systems to businesses in the U.S. It highlights the importance of security systems to the performance of businesses, considering that system security should be attuned the business. In addition, it cites the perspectives and...

  • Businesses should pay more attention to software security. Greene, Tim // Network World;2/20/2006, Vol. 23 Issue 7, p12 

    The article focuses on the importance of business enterprises to pay more interest and significance to computer software security in the U.S. The problem of companies lies on their failure to ask about the security of the commercial software they are using. Washington Mutual Inc. chief...

  • Shooting Rampage Survivors Sue Security Company. Gold, Lessing E. // SDM: Security Distributing & Marketing;Nov2004, Vol. 34 Issue 11, p29 

    Reports on the appeal of the lawsuit filed by the survivors of a shooting rampage against the firms where the shooting occurred and against the company providing security to the firms in Georgia. Judgment of the trial court; Contention of the plaintiff on the liability of the security company on...

  • Face Recognition Is Robust With Incongruent Image Resolution: Relationship to Security Video Images. Chang Hong Liu; Burton, A. Mike; Seetzen, Helge; Chaudhuri, Avi // Journal of Experimental Psychology. Applied;Mar2003, Vol. 9 Issue 1, p33 

    Identifying a criminal captured on conventional security video typically requires matching poor-quality video footage against a high-quality photograph. The authors examined the consequence of such a large discrepancy in image quality. Recognition and matching performance of this...

  • At the Start of Private Security, Evolution is Evident. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Jul2008, Vol. 45 Issue 7, p70 

    The article explores how security at industrial and manufacturing facilities has evolved in the U.S. According to Terry Vannarsdale of Coca-Cola Enterprises Inc., the security mission in organizations is one of protection, deterrence and investigation of policy violations. In today's...

  • Monitoring the Latest Developments in Access Control. Shaver, John Michael // EC&M Electrical Construction & Maintenance;May2007, Vol. 106 Issue 5, p28 

    The article discusses the security management as an integral part of a commercial building designed. It mentioned that the improvements in security systems and its technology as part of the access control system in a building design in order to have a critical factor in choosing an appropriate...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics