Leadership Solutions

How to Develop and Implement a Security Master Plan

How to Develop and Implement a Security Master Plan


This practical guide details how to construct a customized, comprehensive five-year corporate security plan that synchronizes with the strategies of any business or institution. The author explains how to develop a plan and implementation strategy that aligns with an organization’s particular philosophies, strategies, goals, programs, and processes. Readers learn how to outline risks and then formulate appropriate mitigation strategies. This guide provides tested, real-world solutions on how to:
  • Conduct an effective, efficient assessment of the site and security personnel, meticulously addressing the particular needs of many different environments
  • Make decisions about security philosophies, strategies, contract relationships, technology, and equipment replacement
  • Interview executive and security management to determine their concerns, educate them, and ensure that they buy in to your plan
  • Use all gathered data to construct and finalize the Security Master Plan and then implement it into the management of the business
Author Tim Giles worked at IBM for 31 years serving as Director of Security for the company’s operations in the United States and Canada, as well as Latin America and Asia-Pacific. His immeasurable experience and insight provide readers with an extraordinarily comprehensive understanding that they can use to design and execute a highly effective, tailored security program.
  • Shows how to assess risks of violence, theft, fraud, and other security threats and subsequently gauge their potential business impact
  • Instructs on how to determine what existing crisis prevention, management, and recovery programs are in place
  • Teaches how to evaluate all security-related contracts and the information protection program
  • Offers instruction that is equally useful for in-house security professionals and outside consultants
  • Presents ideas and approaches to compensate for instances when the use of in-house personnel is necessary but might prove less effective

Table of Contents:
Chapter 1: The Business of Security
Chapter 2: Evaluate the Business’s Risks
Chapter 3: Conducting a Site Security Assessment Part 1
Chapter 4: Conducting a Site Security Assessment Part 2
Chapter 5: Conducting a Site Security Assessment Part 3
Chapter 6: Conducting a Site Security Assessment Part 4
Chapter 7: Conducting an Assessment of the Security Organization
Chapter 8: Determining What Prevention, Crisis Management, and Recovery Programs Exist
Chapter 9: Interviewing Executive and Security Management
Chapter 10: Review and Evaluate All Security-Related Contracts and the Information Protection Program
Chapter 11: Constructing the Security Master Plan Document
Chapter 12: Typical Contents of a Security Master Plan
Chapter 13: Finalizing the Security Master Plan Process
Chapter 14: Utilizing Your Plan in Managing Your Business
Appendix A: Workplace Violence Guidelines
Appendix B: Executive/Employee Protection
Appendix C: Security Assessment Checklist
Appendix D: Sample Request For Proposal
Appendix E: Basic Physical Security Standards
Appendix F: Sample Termination Checklist
Appendix G: Crisis Management / Emergency Planning Checklist

Click here to view a sample!

** Note: This resource is available at no cost or at a discount to the Council community and strategic alliance partners based upon their level of involvement. Please contact Rob West if you need assistance.

Add to Cart:

  • Model: TF001-SMP09
  • Manufactured by: Taylor & Francis, LLC

Please Choose:

Media Type

Copyright © 2020 The Security Executive Council.
The Security Executive Council