Security management is that part of a business where a converged set of security, resilience and fraud functions are managed and focussed on the protection of the business, its brand, employees, assets and data by the use of multiple layers of interdependent systems. The main aim of security management is to help make the business more successful. This can involve strategies that enhance confidence with shareholders, customers and stakeholders, through to preventing damage to the business brand, actual losses and business disruptions. This course is designed as an introduction to the specialist function of security management within a business.
Those people who are newly appointed for security jobs, those working in security firms or those looking for a path towards security business.
To enhance the participants’ competency necessary to understand the role of security management within the business world, also to demonstrate the possibilities of a rewarding and challenging career for those who decide to become a security management specialist.
By the end of this course, participant will be able to:
• Identify Important Assets
• Identify Threats
• Assess Security, Fraud and Resilience Risks
• Understand Production and Implementation of Policies and Procedures
• Prevent Information and Data Theft
• Prevent Terrorist or Extremist Attack
• Prevent Fraud
• Minimize Service Disruption
• Provide Training and Awareness
• Monitor and Audit Effectiveness
• Comply with Regulations and Standards
• Apply Investigation procedures.
1. Role of Security Management
o Central Functions of Security within a Business
o The Role of a Security Management Specialist
o How to Get the Most Efficient Protection
o Security polices &procedures
2. Introduction to Security Management Organisation Structure
3. Introduction to Physical Security Protection
o Function of Physical Security Protection
o Key Physical Barriers and Technical Systems Used within a Modern Business
4. Introduction to Information Security
o Importance of Protecting Business Sensitive Information
o Employee Information and Customer Data as Required by Laws
5. Introduction to Cyber Security –
o Importance to Prevent the Unauthorised Use of IT Based Systems
6. Introduction to Business Resilience and Crisis Management
7. Introduction to Fraud Prevention –
o Threat from Fraud
o Corruption and Counterfeiting
8. Introduction to Investigations –
o Types of Investigations Conducted within a Business to Establish Evidence of Criminal Activity, or Wrongdoing
9. Executive and Employee Protection: The Role of Close Protection Operatives Employed to Protect:
o Employees
o Critical Assets
10. Security Threat Awareness
o the Range of Common Threats Faced by a Business Today
o the Importance of Threat Assessments to Keep the Threat Mitigation to a Sensible Level
11. Security Risk Management:
o Risk Awareness
o Risk Reduction
12. Convergent Security –
o Importance of Modern Security Convergence Needed to Successfully Support the Modern Business