18 Nov RISK MANAGEMENT PRINCIPLES AND PRACTICES
Order Instructions
“APPENDIX A: BUILDING VULNERABILITY ASSESSMENT CHECKLIST” is a reference document developed by the Department of Veterans Affairs and is part of FEMA 426, Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings. It is a resource document used by security professionals to facilitate the completion of risk assessment projects. Students can also benefit from using the document to enhance their knowledge in security operations. This resource document can be accessed at: https://www.fema.gov/pdf/plan/prevent/rms/452/fema452_step3.pdf
“USDA Physical Security Checklist” is another resource document checklist used by security professionals to facilitate the completion of risk assessment projects. The checklist can be accessed at: http://www.dm.usda.gov/physicalsecurity/physicalcheck.pdf
· “The Risk Management Process for Federal Facilities: An Interagency Security Committee Standard” is a 2016 document published by the Interagency Security Committee, Department of Homeland Security, and is used by security practitioners and students to assess security levels and determining appropriate physical security measures for non-military Federal facilities. The document can be accessed at: https://www.dhs.gov/publication/isc-risk-management-process#
“Evaluating Your Security Program” is one of the security tips offered by Michael A. Silva, founder of Silva Consultants, appearing on the company’s website. The article briefly identifies the questions security practitioners and students should be asking themselves to properly evaluate the effectiveness of a company’s current security program. The article can be accessed at: http://www.silvaconsultants.com/physical-security-assessments-by-silva-consultants.html.
DO:
Week Two Discussion
EXERCISE #1 – RISK MANAGEMENT PRINCIPLES AND PRACTICES
The ASIS “General Security Risk Assessment Guideline” is a 2003 ASIS International publication and a key resource for security operatives responsible of examining, evaluating, and managing risk to organizational assets and planning security operations.
After thoroughly reading and studying the publication’s contents, particularly the seven (7) Recommended Practice Advisories and the corresponding commentaries, explain why a corporate security officials must understand the various risk management principles and be able to apply those principles when assessing the vulnerability of an organization’s assets. Incorporate into your response the significance of determining not just the various crime-related AND non-criminal threats to assets, but also the impact or “criticality” (losses, harm, and costs) of those threat or “risk” events AND the probability or likelihood of those events occurring. Use examples to demonstrate the points you make in your response.
Finally, identify the various information sources available to corporate security officials to determine the probability of the various threats that may be directed at the organization. Again use examples of sources used by a real-world company (Exxon, Walmart, Apple, Proctor and Gamble, Amazon, Kroger, etc.) to demonstrate the points you make in your response.
NOTE: Students will be required to employ these strategies in their final project.
EXERCISE #2 – SECURITY THREATS AND MANAGEMENT CHALLENGES
“Top Security Threats and Management Issues Facing Corporate America” is a periodic Securitas Security Services USA, Inc., publication that assists security directors in completing their security planning.
After reading the results of the their most recent Survey of Fortune 1000 Companies and the “Emerging Trends” section of the publication, discuss possible reasons for corporate security director responses to the first five (5) security threats.
Also explain why security operatives in different industries place different emphasis on certain threats and provide specific examples. Finally, examine the different management issues and their anticipated impact on security operations and, based on your understanding of the ratings and any other independent research you have completed this week, discuss the possible reasons for the responses and what you might do as a security operative to address the first six (6) issues.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.