Book description
Threats to multinational corporations come in two forms: natural and man-made. This book illustrates the types of risks that confront corporations when working outside of North America. It provides key tools and understanding that are required to do business in a safe and secure manner, no matter the level of risk. It walks through a logical framew
Table of contents
- Front cover
- CONTENTS (1/2)
- CONTENTS (2/2)
- PREFACE
- INTRODUCTION (1/2)
- INTRODUCTION (2/2)
- AUTHOR BIOGRAPHY
- Chapter 1. Challenges to Security Management in Companies with Global and High-Risk Operations (1/2)
- Chapter 1. Challenges to Security Management in Companies with Global and High-Risk Operations (2/2)
- Chapter 2. Travel Tracking and Intelligence Issues: It's 3:00 a.m.-Do You Know Where Your Expats Are? (1/2)
- Chapter 2. Travel Tracking and Intelligence Issues: It's 3:00 a.m.-Do You Know Where Your Expats Are? (2/2)
- Chapter 3. Risk Assessment Methodologies: The 5:00 p.m. Friday Telephone Call-"We've Got a Project Kicking Off Monday in Colombia" (1/6)
- Chapter 3. Risk Assessment Methodologies: The 5:00 p.m. Friday Telephone Call-"We've Got a Project Kicking Off Monday in Colombia" (2/6)
- Chapter 3. Risk Assessment Methodologies: The 5:00 p.m. Friday Telephone Call-"We've Got a Project Kicking Off Monday in Colombia" (3/6)
- Chapter 3. Risk Assessment Methodologies: The 5:00 p.m. Friday Telephone Call-"We've Got a Project Kicking Off Monday in Colombia" (4/6)
- Chapter 3. Risk Assessment Methodologies: The 5:00 p.m. Friday Telephone Call-"We've Got a Project Kicking Off Monday in Colombia" (5/6)
- Chapter 3. Risk Assessment Methodologies: The 5:00 p.m. Friday Telephone Call-"We've Got a Project Kicking Off Monday in Colombia" (6/6)
- Chapter 4. Protecting People Who Don't Believe They Need to Be Protected: "I Would Prefer to Go Low Profile" (1/4)
- Chapter 4. Protecting People Who Don't Believe They Need to Be Protected: "I Would Prefer to Go Low Profile" (2/4)
- Chapter 4. Protecting People Who Don't Believe They Need to Be Protected: "I Would Prefer to Go Low Profile" (3/4)
- Chapter 4. Protecting People Who Don't Believe They Need to Be Protected: "I Would Prefer to Go Low Profile" (4/4)
- Chapter 5. Security, Crisis Management, and Evacuation Planning: The 2:00 a.m. Friday Telephone Call-"The Missiles Are Flying All around Us!" (1/6)
- Chapter 5. Security, Crisis Management, and Evacuation Planning: The 2:00 a.m. Friday Telephone Call-"The Missiles Are Flying All around Us!" (2/6)
- Chapter 5. Security, Crisis Management, and Evacuation Planning: The 2:00 a.m. Friday Telephone Call-"The Missiles Are Flying All around Us!" (3/6)
- Chapter 5. Security, Crisis Management, and Evacuation Planning: The 2:00 a.m. Friday Telephone Call-"The Missiles Are Flying All around Us!" (4/6)
- Chapter 5. Security, Crisis Management, and Evacuation Planning: The 2:00 a.m. Friday Telephone Call-"The Missiles Are Flying All around Us!" (5/6)
- Chapter 5. Security, Crisis Management, and Evacuation Planning: The 2:00 a.m. Friday Telephone Call-"The Missiles Are Flying All around Us!" (6/6)
- Chapter 6. Crisis Management Do's and Don'ts: Pushing the Crisis Button (1/4)
- Chapter 6. Crisis Management Do's and Don'ts: Pushing the Crisis Button (2/4)
- Chapter 6. Crisis Management Do's and Don'ts: Pushing the Crisis Button (3/4)
- Chapter 6. Crisis Management Do's and Don'ts: Pushing the Crisis Button (4/4)
- Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (1/10)
- Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (2/10)
- Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (3/10)
- Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (4/10)
- Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (5/10)
- Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (6/10)
- Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (7/10)
- Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (8/10)
- Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (9/10)
- Chapter 7. Protecting People and Assets around the World: From Green Acres to the Green Zone (10/10)
- Chapter 8. Predeployment and Security Awareness Training: "Tell Me Everything I Need to Know about This Country in about 15 Minutes' (1/6)
- Chapter 8. Predeployment and Security Awareness Training: "Tell Me Everything I Need to Know about This Country in about 15 Minutes' (2/6)
- Chapter 8. Predeployment and Security Awareness Training: "Tell Me Everything I Need to Know about This Country in about 15 Minutes' (3/6)
- Chapter 8. Predeployment and Security Awareness Training: "Tell Me Everything I Need to Know about This Country in about 15 Minutes' (4/6)
- Chapter 8. Predeployment and Security Awareness Training: "Tell Me Everything I Need to Know about This Country in about 15 Minutes' (5/6)
- Chapter 8. Predeployment and Security Awareness Training: "Tell Me Everything I Need to Know about This Country in about 15 Minutes' (6/6)
- Chapter 9. Establishing and Maintaining Contact and Coordination with Local, Regional, and International Authorities: "We Need a Favor, We Have People in Your Country That We Need Evacuated Now!" (1/2)
- Chapter 9. Establishing and Maintaining Contact and Coordination with Local, Regional, and International Authorities: "We Need a Favor, We Have People in Your Country That We Need Evacuated Now!" (2/2)
- Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (1/7)
- Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (2/7)
- Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (3/7)
- Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (4/7)
- Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (5/7)
- Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (6/7)
- Chapter 10. Benchmarking International Crisis and Security Management: "Give Me One Good Reason Why Our Company Needs to Do This" (7/7)
- Chapter 11. Maximizing Your Security and Crisis Management Efficiency: "How to Be All Things to All People, and Keeping It Real" (1/4)
- Chapter 11. Maximizing Your Security and Crisis Management Efficiency: "How to Be All Things to All People, and Keeping It Real" (2/4)
- Chapter 11. Maximizing Your Security and Crisis Management Efficiency: "How to Be All Things to All People, and Keeping It Real" (3/4)
- Chapter 11. Maximizing Your Security and Crisis Management Efficiency: "How to Be All Things to All People, and Keeping It Real" (4/4)
- APPENDIX A: EMERGENCY MANAGEMENT PLAN (1/3)
- APPENDIX A: EMERGENCY MANAGEMENT PLAN (2/3)
- APPENDIX A: EMERGENCY MANAGEMENT PLAN (3/3)
- APPENDIX B: GENERAL STRIKE/PROTEST OVERVIEW (1/5)
- APPENDIX B: GENERAL STRIKE/PROTEST OVERVIEW (2/5)
- APPENDIX B: GENERAL STRIKE/PROTEST OVERVIEW (3/5)
- APPENDIX B: GENERAL STRIKE/PROTEST OVERVIEW (4/5)
- APPENDIX B: GENERAL STRIKE/PROTEST OVERVIEW (5/5)
- APPENDIX C: BOMB THREAT PROCEDURES (1/2)
- APPENDIX C: BOMB THREAT PROCEDURES (2/2)
- APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (1/8)
- APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (2/8)
- APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (3/8)
- APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (4/8)
- APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (5/8)
- APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (6/8)
- APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (7/8)
- APPENDIX D: SECURITY, SAFETY, AND EVACUATION PLAN (8/8)
- APPENDIX E: WORKPLACE VIOLENCE PROCEDURES
- INDEX (1/3)
- INDEX (2/3)
- INDEX (3/3)
- Back cover
Product information
- Title: Managing Security Overseas
- Author(s):
- Release date: August 2009
- Publisher(s): Auerbach Publications
- ISBN: 9781439804681
You might also like
book
Online Security for the Business Traveler
Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Preventing Good People from Doing Bad Things: Implementing Least Privilege
In today's turbulent technological environment, it's becoming increasingly crucial for companies to know about the principle …