RISK MANAGEMENT PRINCIPLES AND PRACTICES
Order Instructions
“APPENDIX A: BUILDING VULNERABILITY ASSESSMENT CHECKLIST” is a reference document developed by the Department of Veterans Affairs and is part of FEMA 426, Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings. It is a resource document used by security professionals to facilitate the completion of risk assessment projects. Students can also benefit from using the document to enhance their knowledge in security operations. This resource document can be accessed at: https://www.fema.gov/pdf/plan/prevent/rms/452/fema452_step3.pdf
“USDA Physical Security Checklist” is another resource document checklist used by security professionals to facilitate the completion of risk assessment projects. The checklist can be accessed at: http://www.dm.usda.gov/physicalsecurity/physicalcheck.pdf
· “The Risk Management Process for Federal Facilities: An Interagency Security Committee Standard” is a 2016 document published by the Interagency Security Committee, Department of Homeland Security, and is used by security practitioners and students to assess security levels and determining appropriate physical security measures for non-military Federal facilities. The document can be accessed at: https://www.dhs.gov/publication/isc-risk-management-process#
“Evaluating Your Security Program” is one of the security tips offered by Michael A. Silva, founder of Silva Consultants, appearing on the company’s website. The article briefly identifies the questions security practitioners and students should be asking themselves to properly evaluate the effectiveness of a company’s current security program. The article can be accessed at: http://www.silvaconsultants.com/physical-security-assessments-by-silva-consultants.html.
DO:
Week Two Discussion
EXERCISE #1 – RISK MANAGEMENT PRINCIPLES AND PRACTICES
The ASIS “General Security Risk Assessment Guideline” is a 2003 ASIS International publication and a key resource for security operatives responsible of examining, evaluating, and managing risk to organizational assets and planning security operations.
After thoroughly reading and studying the publication’s contents, particularly the seven (7) Recommended Practice Advisories and the corresponding commentaries, explain why a corporate security officials must understand the various risk management principles and be able to apply those principles when assessing the vulnerability of an organization’s assets. Incorporate into your response the significance of determining not just the various crime-related AND non-criminal threats to assets, but also the impact or “criticality” (losses, harm, and costs) of those threat or “risk” events AND the probability or likelihood of those events occurring. Use examples to demonstrate the points you make in your response.
Finally, identify the various information sources available to corporate security officials to determine the probability of the various threats that may be directed at the organization. Again use examples of sources used by a real-world company (Exxon, Walmart, Apple, Proctor and Gamble, Amazon, Kroger, etc.) to demonstrate the points you make in your response.
NOTE: Students will be required to employ these strategies in their final project.
EXERCISE #2 – SECURITY THREATS AND MANAGEMENT CHALLENGES
“Top Security Threats and Management Issues Facing Corporate America” is a periodic Securitas Security Services USA, Inc., publication that assists security directors in completing their security planning.
After reading the results of the their most recent Survey of Fortune 1000 Companies and the “Emerging Trends” section of the publication, discuss possible reasons for corporate security director responses to the first five (5) security threats.
Also explain why security operatives in different industries place different emphasis on certain threats and provide specific examples. Finally, examine the different management issues and their anticipated impact on security operations and, based on your understanding of the ratings and any other independent research you have completed this week, discuss the possible reasons for the responses and what you might do as a security operative to address the first six (6) issues.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.