Course Description 
			
	This very popular and comprehensive programme- 
			
	successfully completed by hundreds of security managers from many of the world’s most famous and most successful companies – is designed for security managers, coordinators and their equivalents, who wish to gain a thorough understanding of how to manage security within a corporate environment. Suited equally for existing security managers and those newly appointed from police or military or business backgrounds, the course will enable delegates to use a range of risk management and security design tools to enhance their 
			organisation’s ability to protect its assets. 
			
	The course takes the form of lectures, workshops, exercises and makes extensive use of case studies. Delegate participation is 
			active encouraged. 
			
	
			 
			
			 			 
			 
			
			 			  
			
	Course Objective 
			
	 
	
			 
			
			 			 
			 
			
			 			  
			
	Who Should 
			attend? 
			
	 
	This program is designed for security managers, 
			coordinators and their equivalents. 
			
	
			 
			
			 			 
			 
			
			 			  
			
	Course Outline 
			
	 
	Security Risk Management 
			
	Risk management as a cross-functional business tool; security risk analysis; identifying assets; asset systems and asset contexts; determining probability based on quantitative and qualitative scales; measuring direct and consequential impact; risk mitigation 
			
	
			Security Operations Management 
			
	The main roles of the security manager; operating a cost-effective security department; creating a return on investment; effective management skills for the security manager; creating proactive security programmes; security reporting chains; service level agreements to manage contracted services 
			
	
			Security Policies and Procedures 
			
	Alignment of security to business processes; creating board-driven security management; devising, drafting and implementing security policies and procedures 
			
	
			Security Design 
			
	The components of a security system; the 18 principles of security design; the security environment; creating  risk-commensurate security; balancing risk and protection; integrating security into the business environment; selling security to management; creating crime prevention through good security design 
			
	
			Physical and Electronic Security 
			
	Creating a perimeter to deny, detect, deter, deflect and demark; balancing delay, detection and response to perimeter intrusions; creating layered security, perimeter fencing options, costs, drawbacks and benefits; perimeter intrusion detection systems (PIDS); off-site and on-site monitoring of PIDS; CCTV as a perimeter protection means; perimeter lighting; perimeter patrolling; the key requirements of a high-risk site perimeter; security buildings against internal and external crimes; methods of illicit entry into buildings; the key requirements of working hours protection; the key requirements of quiet hours protection; protecting the building shell using physical and electronic means; protecting the building interior using physical and electronic means; internal patrolling; building intrusion detection systems (BIDS); point alarm systems and electronic article surveillance; internal CCTV 
			
	
			Access Management 
			
	The key aims of access control; access management systems design and application; preventing 
			unauthorised access; preventing 
			unauthorised removal of property; badging and identification systems; biometric access management systems; key control systems and best practice; entry and exit searching policies and practice; applying the need-to-go principle; access management compartmentalization 
			
	
			Workplace Crime Prevention 
			
	The factors which might motivate an employee to commit and internal crime; the common traits of an employee thief; application of Felson’s Routine Activity Theory; the application of situational crime prevention; social crime prevention overview; crime prevention through environmental design; reducing exposure to burglary; developing a corporate crime prevention programme 
			
	
			Introduction to Security Surveying 
			
	Security surveys, 
			reviews and audits; sequencing a security survey; security surveying options; peer surveys; pre- and post- survey tasks; survey report writing; presenting survey results to the Board 
			
	
			Manpower Selection and Deployment 
			
	Manpower selection, 
			deployment and span of control; lines of responsibility and reporting; personnel specifications and job descriptions; background screening; dealing with disciplinary infractions 
			
	
			Leadership and Motivation 
			
	The principles of effective leadership; common 
			behavioural and skill characteristics inherent in successful business leaders; application of 
			recognised successful business leadership and motivational techniques; motivating the security team; leading meetings; delivering management presentations 
			
	
			Introduction to Investigations 
			
	Evidence, information and intelligence; collecting, classifying, preserving and using evidence; basic scene of crime processing; investigation strategies, routes and outcomes; investigations management and sequencing of tasks; case management; using outside agencies and services; investigation resourcing and budgeting; investigation reporting; interviewing; questioning strategies; use of agents and informants 
			
	
			Protection against Explosive Devices 
			
	Terrorism overview and modus operandi of groups; trends, targets and weapons; the improvised explosive device (IED) overview; IED components and construction; the characteristics of, and countermeasures for, postal IEDs hand- 			deliverd IEDs, under-vehicle IEDs, 			remotely-controlled IEDs, large vehicle IEDs, suicide pedestrian and vehicular IEDs, blast and blast mitigation; telephone bomb threats; search; evacuation and assembly; CBRN threat overview and mitigation 
			
	
			Information Security 
			
	The value of information; identifying information at risk; identifying information security vulnerabilities; threats posed to information by staff; the activities of information brokers; the extent of business espionage; national-level threats to business information; methods of classification and secure storage; securing information while mobile; dealing with suspected information thieves; social engineering; secure disposal of office waste; office information security best practice 
			
	
			Technical Surveillance Countermeasures 
			
	Telephone and fax intercept countermeasures; methods of covert bugging and recording; hard-wired devices; wireless devices; recording devices; hybrid systems; creating a secure environment for a confidential meeting; using "sweeping” equipment and services; using frequency scanning equipment and services 
			
	
			IT Security 
			
	The contribution of the security 			manage to IT security; the main threats to confidentiality of information, its availability and integrity; business interruption potential of a major IT security incident; the main threats to corporate IT systems; viruses and other pathogens; hacking; denial of service attacks; phishing; inadvertent disclosure through social engineering; laptop security; managing the threat from peripheral devices; IT systems protection overview; the key points of an IT security policy; special considerations for the security of laptops; data encryption and other methods to restrict unauthorised access to information stored on IT systems 
			
	  
			
	Protection of At-Risk Personnel 
			
	The key human assets at risk; the risk and threat spectrum; circumstances which increase risk; countermeasures which decrease risk; identifying risk environments and high-risk countries; delivering country risk briefings; travel security protocols; the risk of kidnap and ransom; the fundamentals of 
			personnel protection; use of 			close-protection specialists; counter-surveillance 
			
	
			Crisis Management 
			
	The security risk management/crisis management relationship; crisis management in relation to business continuity planning; crisis management and emergency management – the difference; the contribution of a security manager to crisis management planning and coordination; creating a crisis management response; 
			
	 
		
			  
				| typical 
							 | crisis 
							 | management 
							 | team 
							 | roles 
							 |  and 
							 | 
 
			  
				| responsibilities; 
							 | equipping 
							 |  and 
							 | managing 
							 | a 
							 | crisis 
							 | 
 
			  
				| management 
							 |  centre; 
							 | crisis 
							 | audiences 
							 | and 
							 | 
 
			  
				| communications 
							 |   
							 |   
							 |   
							 |   
							 | 
 
			  
				| Change Management 
							 |   
							 |   
							 |   
							 | 
 
			  
				|  |  |  |  |  |  |  |  | 
		
	
	  
			
	The external and internal drivers for change; planning for change; use of change management models; effective strategies for communicating change; identifying and responding to resistance to change