Author: Brian Gouin
Publisher: Elsevier
ISBN: 008049305X
Category : Technology & Engineering
Languages : en
Pages : 350
Book Description
A crucial reference for the practicing or aspiring design consultant, Security Design Consulting brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, Security Design Consulting gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant's important and growing role in an overall security program.* Focuses on consulting in security design, not security management* Provides sample service agreements, specifications, and reports to use as models* Emphasizes the highest technical and ethical standards for this increasingly crucial profession
Security Design Consulting
Author: Brian Gouin
Publisher: Elsevier
ISBN: 008049305X
Category : Technology & Engineering
Languages : en
Pages : 350
Book Description
A crucial reference for the practicing or aspiring design consultant, Security Design Consulting brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, Security Design Consulting gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant's important and growing role in an overall security program.* Focuses on consulting in security design, not security management* Provides sample service agreements, specifications, and reports to use as models* Emphasizes the highest technical and ethical standards for this increasingly crucial profession
Publisher: Elsevier
ISBN: 008049305X
Category : Technology & Engineering
Languages : en
Pages : 350
Book Description
A crucial reference for the practicing or aspiring design consultant, Security Design Consulting brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, Security Design Consulting gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant's important and growing role in an overall security program.* Focuses on consulting in security design, not security management* Provides sample service agreements, specifications, and reports to use as models* Emphasizes the highest technical and ethical standards for this increasingly crucial profession
Becoming an Independent Security Consultant
Author: Michael Silva
Publisher:
ISBN: 9780692717400
Category :
Languages : en
Pages : 220
Book Description
The demand for security consulting services is at an all-time high. Organizations of all types face unprecedented challenges in dealing with workplace violence, internal and external theft, robbery and crimes of all varieties. These organizations need help in dealing with these challenges, and are reaching out to independent security consultants to assist them. Operating an independent security consulting practice can be a profitable and rewarding business for those with the right skills. Many people retiring from law enforcement, military, or security careers would like to enter the security consulting profession, but don't know how. These people have extensive skills in security and loss prevention, but don't know how to translate these skills into a successful security consulting practice. While they have some idea about the type of services that they would like to provide, they have no idea of how to go about selling these services, what to charge for them, or how to run a profitable security consulting business. It is for these people that this book was written. Within this book, Michael A. Silva, an independent security consultant with over thirty years of experience, provides practical "how-to" advice on how to start and run a successful security consulting practice. Pulling no punches, Michael tells what it takes to be a successful security consultant, and explains why so many new security consultants fail within the first eighteen months. Chapters in this book include: Chapter 1 - What is an Independent Security Consultant? Chapter 2 - A Week in the Life of a Security Consultant Chapter 3 - The Skills needed to be Successful Chapter 4 - Planning Your Consulting Practice Chapter 5 - Determining What and How to Charge Chapter 6 - Selling Security Consulting Services Chapter 7 - Proposal Writing for the Security Consultant Chapter 8 - Selling to Government Agencies Chapter 9 - Selling to Architects and Engineers Chapter 10 - Security Consulting Services That Sell Chapter 11 - Creating a Business Plan Chapter 12 - Taking the Plunge Chapter 13 - Taking Your Practice to the Next Level Chapter 14 - Continuing Education Chapter 15 - Avoiding Pitfalls and Common Mistakes This book is crammed with practical tips based on the actual day-to-day experiences of a working security consultant. Within this book, Michael tells you what works - and more importantly, what doesn't work. This book is specifically written for the person starting a one-person security consulting practice, and answers questions such as: - What types of skills do I need to be successful? - What types of licenses and certifications do I need? - What should I name my business? - Do I need a website? - What types of insurance do I need? - Should I rent an office, or work out of my home? - How much should I charge? - How do I sell my services and get consulting jobs? - How do I write a proposal? - What consulting services should I offer? - How much money do I need to get started? - What steps should I take before I quit my present job? - Can I start my consulting practice part-time while I'm still working? - How do I grow my practice and take it to the next level? - What are some common mistakes made by new consultants and how can I avoid them? About The Author Michael A. Silva is an independent security consultant that has over forty years of security industry experience. Michael founded Silva Consultants, his independent security consulting and design firm, in 1985. In late 2001, Michael suspended the operations of Silva Consultants to accept a position with Kroll, the world's largest security and risk consulting company. From 2001 to 2006, he managed Kroll's security consulting and engineering practice in Seattle, and was responsible for projects throughout Washington, Oregon, California, and Nevada. In 2007, Michael resigned his position with Kroll and resumed the operations of Silva Consultants.
Publisher:
ISBN: 9780692717400
Category :
Languages : en
Pages : 220
Book Description
The demand for security consulting services is at an all-time high. Organizations of all types face unprecedented challenges in dealing with workplace violence, internal and external theft, robbery and crimes of all varieties. These organizations need help in dealing with these challenges, and are reaching out to independent security consultants to assist them. Operating an independent security consulting practice can be a profitable and rewarding business for those with the right skills. Many people retiring from law enforcement, military, or security careers would like to enter the security consulting profession, but don't know how. These people have extensive skills in security and loss prevention, but don't know how to translate these skills into a successful security consulting practice. While they have some idea about the type of services that they would like to provide, they have no idea of how to go about selling these services, what to charge for them, or how to run a profitable security consulting business. It is for these people that this book was written. Within this book, Michael A. Silva, an independent security consultant with over thirty years of experience, provides practical "how-to" advice on how to start and run a successful security consulting practice. Pulling no punches, Michael tells what it takes to be a successful security consultant, and explains why so many new security consultants fail within the first eighteen months. Chapters in this book include: Chapter 1 - What is an Independent Security Consultant? Chapter 2 - A Week in the Life of a Security Consultant Chapter 3 - The Skills needed to be Successful Chapter 4 - Planning Your Consulting Practice Chapter 5 - Determining What and How to Charge Chapter 6 - Selling Security Consulting Services Chapter 7 - Proposal Writing for the Security Consultant Chapter 8 - Selling to Government Agencies Chapter 9 - Selling to Architects and Engineers Chapter 10 - Security Consulting Services That Sell Chapter 11 - Creating a Business Plan Chapter 12 - Taking the Plunge Chapter 13 - Taking Your Practice to the Next Level Chapter 14 - Continuing Education Chapter 15 - Avoiding Pitfalls and Common Mistakes This book is crammed with practical tips based on the actual day-to-day experiences of a working security consultant. Within this book, Michael tells you what works - and more importantly, what doesn't work. This book is specifically written for the person starting a one-person security consulting practice, and answers questions such as: - What types of skills do I need to be successful? - What types of licenses and certifications do I need? - What should I name my business? - Do I need a website? - What types of insurance do I need? - Should I rent an office, or work out of my home? - How much should I charge? - How do I sell my services and get consulting jobs? - How do I write a proposal? - What consulting services should I offer? - How much money do I need to get started? - What steps should I take before I quit my present job? - Can I start my consulting practice part-time while I'm still working? - How do I grow my practice and take it to the next level? - What are some common mistakes made by new consultants and how can I avoid them? About The Author Michael A. Silva is an independent security consultant that has over forty years of security industry experience. Michael founded Silva Consultants, his independent security consulting and design firm, in 1985. In late 2001, Michael suspended the operations of Silva Consultants to accept a position with Kroll, the world's largest security and risk consulting company. From 2001 to 2006, he managed Kroll's security consulting and engineering practice in Seattle, and was responsible for projects throughout Washington, Oregon, California, and Nevada. In 2007, Michael resigned his position with Kroll and resumed the operations of Silva Consultants.
Encyclopedia of Security Management
Author: John Fay
Publisher: Elsevier
ISBN: 0080546064
Category : Business & Economics
Languages : en
Pages : 688
Book Description
The Encyclopedia of Security Management is a valuable guide for all security professionals, and an essential resource for those who need a reference work to support their continuing education. In keeping with the excellent standard set by the First Edition, the Second Edition is completely updated. The Second Edition also emphasizes topics not covered in the First Edition, particularly those relating to homeland security, terrorism, threats to national infrastructures (e.g., transportation, energy and agriculture) risk assessment, disaster mitigation and remediation, and weapons of mass destruction (chemical, biological, radiological, nuclear and explosives). Fay also maintains a strong focus on security measures required at special sites such as electric power, nuclear, gas and chemical plants; petroleum production and refining facilities; oil and gas pipelines; water treatment and distribution systems; bulk storage facilities; entertainment venues; apartment complexes and hotels; schools; hospitals; government buildings; and financial centers. The articles included in this edition also address protection of air, marine, rail, trucking and metropolitan transit systems. - Completely updated to include new information concerning homeland security and disaster management - Convenient new organization groups related articles for ease of use - Brings together the work of more than sixty of the world's top security experts
Publisher: Elsevier
ISBN: 0080546064
Category : Business & Economics
Languages : en
Pages : 688
Book Description
The Encyclopedia of Security Management is a valuable guide for all security professionals, and an essential resource for those who need a reference work to support their continuing education. In keeping with the excellent standard set by the First Edition, the Second Edition is completely updated. The Second Edition also emphasizes topics not covered in the First Edition, particularly those relating to homeland security, terrorism, threats to national infrastructures (e.g., transportation, energy and agriculture) risk assessment, disaster mitigation and remediation, and weapons of mass destruction (chemical, biological, radiological, nuclear and explosives). Fay also maintains a strong focus on security measures required at special sites such as electric power, nuclear, gas and chemical plants; petroleum production and refining facilities; oil and gas pipelines; water treatment and distribution systems; bulk storage facilities; entertainment venues; apartment complexes and hotels; schools; hospitals; government buildings; and financial centers. The articles included in this edition also address protection of air, marine, rail, trucking and metropolitan transit systems. - Completely updated to include new information concerning homeland security and disaster management - Convenient new organization groups related articles for ease of use - Brings together the work of more than sixty of the world's top security experts
Security Consulting
Author: Charles A. Sennewald
Publisher: Butterworth-Heinemann
ISBN: 012401674X
Category : Business & Economics
Languages : en
Pages : 281
Book Description
Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, at no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption -- which could bring any business to it's knees -- has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in-depth security surveys so businesses will know exactly where security holes are present and where they need improvement to limit their exposure to various threats. The fourth edition of Security Consulting introduces security and law enforcement professionals to the career and business of security consulting. It provides new and potential consultants with the practical guidelines needed to start up and maintain a successful independent practice. Updated and expanded information is included on marketing, fees and expenses, forensic consulting, the use of computers, and the need for professional growth. Useful sample forms have been updated in addition to new promotion opportunities and keys to conducting research on the Web. - The only book of its kind dedicated to beginning a security consulting practice from the ground-up - Proven, practical methods to establish and run a security consulting business - New chapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet - The most up-to-date best practices from the IAPSC
Publisher: Butterworth-Heinemann
ISBN: 012401674X
Category : Business & Economics
Languages : en
Pages : 281
Book Description
Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, at no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption -- which could bring any business to it's knees -- has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in-depth security surveys so businesses will know exactly where security holes are present and where they need improvement to limit their exposure to various threats. The fourth edition of Security Consulting introduces security and law enforcement professionals to the career and business of security consulting. It provides new and potential consultants with the practical guidelines needed to start up and maintain a successful independent practice. Updated and expanded information is included on marketing, fees and expenses, forensic consulting, the use of computers, and the need for professional growth. Useful sample forms have been updated in addition to new promotion opportunities and keys to conducting research on the Web. - The only book of its kind dedicated to beginning a security consulting practice from the ground-up - Proven, practical methods to establish and run a security consulting business - New chapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet - The most up-to-date best practices from the IAPSC
The Security Consultant's Handbook
Author: Richard Bingley
Publisher: IT Governance Ltd
ISBN: 184928749X
Category : Computers
Languages : en
Pages : 354
Book Description
A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organisational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. This book provides essential direction for those who want to succeed in security, either individually or as part of a team. It also aims to stimulate some fresh ideas and provide new market routes for security professionals who may feel that they are underappreciated and overexerted in traditional business domains. Product overview Distilling the author’s fifteen years’ experience as a security practitioner, and incorporating the results of some fifty interviews with leading security practitioners and a review of a wide range of supporting business literature, The Security Consultant’s Handbook provides a wealth of knowledge for the modern security practitioner, covering: Entrepreneurial practice (including business intelligence, intellectual property rights, emerging markets, business funding and business networking)Management practice (including the security function’s move from basement to boardroom, fitting security into the wider context of organisational resilience, security management leadership, adding value and professional proficiency)Legislation and regulation (including relevant UK and international laws such as the Human Rights Act 1998, the Data Protection Act 1998 and the Geneva Conventions)Private investigations (including surveillance techniques, tracing missing people, witness statements and evidence, and surveillance and the law)Information and cyber security (including why information needs protection, intelligence and espionage, cyber security threats, and mitigation approaches such as the ISO 27001 standard for information security management)Protective security (including risk assessment methods, person-focused threat assessments, protective security roles, piracy and firearms)Safer business travel (including government assistance, safety tips, responding to crime, kidnapping, protective approaches to travel security and corporate liability)Personal and organisational resilience (including workplace initiatives, crisis management, and international standards such as ISO 22320, ISO 22301 and PAS 200) Featuring case studies, checklists and helpful chapter summaries, The Security Consultant's Handbook aims to be a practical and enabling guide for security officers and contractors. Its purpose is to plug information gaps or provoke new ideas, and provide a real-world support tool for those who want to offer their clients safe, proportionate and value-driven security services. About the author Richard Bingley is a senior lecturer in security and organisational resilience at Buckinghamshire New University, and co-founder of CSARN, the popular business security advisory network. He has more than fifteen years’ experience in a range of high-profile security and communications roles, including as a close protection operative at London’s 2012 Olympics and in Russia for the 2014 Winter Olympic Games. He is a licensed close protection operative in the UK, and holds a postgraduate certificate in teaching and learning in higher education. Richard is the author of two previous books: Arms Trade: Just the Facts(2003) and Terrorism: Just the Facts (2004).
Publisher: IT Governance Ltd
ISBN: 184928749X
Category : Computers
Languages : en
Pages : 354
Book Description
A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organisational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. This book provides essential direction for those who want to succeed in security, either individually or as part of a team. It also aims to stimulate some fresh ideas and provide new market routes for security professionals who may feel that they are underappreciated and overexerted in traditional business domains. Product overview Distilling the author’s fifteen years’ experience as a security practitioner, and incorporating the results of some fifty interviews with leading security practitioners and a review of a wide range of supporting business literature, The Security Consultant’s Handbook provides a wealth of knowledge for the modern security practitioner, covering: Entrepreneurial practice (including business intelligence, intellectual property rights, emerging markets, business funding and business networking)Management practice (including the security function’s move from basement to boardroom, fitting security into the wider context of organisational resilience, security management leadership, adding value and professional proficiency)Legislation and regulation (including relevant UK and international laws such as the Human Rights Act 1998, the Data Protection Act 1998 and the Geneva Conventions)Private investigations (including surveillance techniques, tracing missing people, witness statements and evidence, and surveillance and the law)Information and cyber security (including why information needs protection, intelligence and espionage, cyber security threats, and mitigation approaches such as the ISO 27001 standard for information security management)Protective security (including risk assessment methods, person-focused threat assessments, protective security roles, piracy and firearms)Safer business travel (including government assistance, safety tips, responding to crime, kidnapping, protective approaches to travel security and corporate liability)Personal and organisational resilience (including workplace initiatives, crisis management, and international standards such as ISO 22320, ISO 22301 and PAS 200) Featuring case studies, checklists and helpful chapter summaries, The Security Consultant's Handbook aims to be a practical and enabling guide for security officers and contractors. Its purpose is to plug information gaps or provoke new ideas, and provide a real-world support tool for those who want to offer their clients safe, proportionate and value-driven security services. About the author Richard Bingley is a senior lecturer in security and organisational resilience at Buckinghamshire New University, and co-founder of CSARN, the popular business security advisory network. He has more than fifteen years’ experience in a range of high-profile security and communications roles, including as a close protection operative at London’s 2012 Olympics and in Russia for the 2014 Winter Olympic Games. He is a licensed close protection operative in the UK, and holds a postgraduate certificate in teaching and learning in higher education. Richard is the author of two previous books: Arms Trade: Just the Facts(2003) and Terrorism: Just the Facts (2004).
Rational Cybersecurity for Business
Author: Dan Blum
Publisher: Apress
ISBN: 9781484259511
Category : Computers
Languages : en
Pages : 330
Book Description
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your business
Publisher: Apress
ISBN: 9781484259511
Category : Computers
Languages : en
Pages : 330
Book Description
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your business
Security Technology Convergence Insights
Author: Ray Bernard
Publisher: Elsevier
ISBN: 0128030011
Category : Computers
Languages : en
Pages : 160
Book Description
Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information technology (IT) advances continued to accelerate, the physical security industry continued to lag behind IT advances by at least two to three years. Security Technology Convergence Insights explores this sometimes problematic convergence of physical security technology and information technology and its impact on security departments, IT departments, vendors, and management. - Includes material culled directly from author's column in Security Technology Executive - Easy-to-read question and answer format - Includes real-world examples to enhance key lessons learned
Publisher: Elsevier
ISBN: 0128030011
Category : Computers
Languages : en
Pages : 160
Book Description
Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information technology (IT) advances continued to accelerate, the physical security industry continued to lag behind IT advances by at least two to three years. Security Technology Convergence Insights explores this sometimes problematic convergence of physical security technology and information technology and its impact on security departments, IT departments, vendors, and management. - Includes material culled directly from author's column in Security Technology Executive - Easy-to-read question and answer format - Includes real-world examples to enhance key lessons learned
Becoming an Independent Security Consultant
Author: Michael A. Silva, CPP, CSC
Publisher: Silva Consultants
ISBN: 1737858738
Category : Business & Economics
Languages : en
Pages : 250
Book Description
The demand for security consulting services is at an all-time high. Organizations of all types face unprecedented challenges in dealing with workplace violence, internal and external theft, robbery and crimes of all varieties. These organizations need help in dealing with these challenges, and are reaching out to independent security consultants to assist them. Operating an independent security consulting practice can be a profitable and rewarding business for those with the right skills. Many people retiring from law enforcement, military, or security careers would like to enter the security consulting profession, but don’t know how. These people have extensive skills in security and loss prevention, but don’t know how to translate these skills into a successful security consulting practice. While they have some idea about the type of services that they would like to provide, they have no idea of how to go about selling these services, what to charge for them, or how to run a profitable security consulting business. It is for these people that this book was written. Within this book, Michael A. Silva, an independent security consultant with over thirty years of experience, provides practical “how-to” advice on how to start and run a successful security consulting practice. Pulling no punches, Michael tells what it takes to be a successful security consultant, and explains why so many new security consultants fail within the first eighteen months. Chapters in this book include: Chapter 1 - What is an Independent Security Consultant? Chapter 2 - A Week in the Life of a Security Consultant Chapter 3 - The Skills needed to be Successful Chapter 4 - Planning Your Consulting Practice Chapter 5 - Determining What and How to Charge Chapter 6 - Selling Security Consulting Services Chapter 7 - Proposal Writing for the Security Consultant Chapter 8 - Selling to Government Agencies Chapter 9 - Selling to Architects and Engineers Chapter 10 - Security Consulting Services That Sell Chapter 11 - Creating a Business Plan Chapter 12 - Taking the Plunge Chapter 13 - Taking Your Practice to the Next Level Chapter 14 - Continuing Education Chapter 15 - Avoiding Pitfalls and Common Mistakes This book is crammed with practical tips based on the actual day-to-day experiences of a working security consultant. Within this book, Michael tells you what works – and more importantly, what doesn’t work. This book is specifically written for the person starting a one-person security consulting practice, and answers questions such as: - What types of skills do I need to be successful? - What types of licenses and certifications do I need? - What should I name my business? - Do I need a website? - What types of insurance do I need? - Should I rent an office, or work out of my home? - How much should I charge? - How do I sell my services and get consulting jobs? - How do I write a proposal? - What consulting services should I offer? - How much money do I need to get started? - What steps should I take before I quit my present job? - Can I start my consulting practice part-time while I’m still working? - How do I grow my practice and take it to the next level? - What are some common mistakes made by new consultants and how can I avoid them? About The Author Michael A. Silva is an independent security consultant that has over forty years of security industry experience. Michael founded Silva Consultants, his independent security consulting and design firm, in 1985. In late 2001, Michael suspended the operations of Silva Consultants to accept a position with Kroll, the world’s largest security and risk consulting company. From 2001 to 2006, he managed Kroll’s security consulting and engineering practice in Seattle, and was responsible for projects throughout Washington, Oregon, California, and Nevada. In 2007, Michael resigned his position with Kroll and resumed the operations of Silva Consultants.
Publisher: Silva Consultants
ISBN: 1737858738
Category : Business & Economics
Languages : en
Pages : 250
Book Description
The demand for security consulting services is at an all-time high. Organizations of all types face unprecedented challenges in dealing with workplace violence, internal and external theft, robbery and crimes of all varieties. These organizations need help in dealing with these challenges, and are reaching out to independent security consultants to assist them. Operating an independent security consulting practice can be a profitable and rewarding business for those with the right skills. Many people retiring from law enforcement, military, or security careers would like to enter the security consulting profession, but don’t know how. These people have extensive skills in security and loss prevention, but don’t know how to translate these skills into a successful security consulting practice. While they have some idea about the type of services that they would like to provide, they have no idea of how to go about selling these services, what to charge for them, or how to run a profitable security consulting business. It is for these people that this book was written. Within this book, Michael A. Silva, an independent security consultant with over thirty years of experience, provides practical “how-to” advice on how to start and run a successful security consulting practice. Pulling no punches, Michael tells what it takes to be a successful security consultant, and explains why so many new security consultants fail within the first eighteen months. Chapters in this book include: Chapter 1 - What is an Independent Security Consultant? Chapter 2 - A Week in the Life of a Security Consultant Chapter 3 - The Skills needed to be Successful Chapter 4 - Planning Your Consulting Practice Chapter 5 - Determining What and How to Charge Chapter 6 - Selling Security Consulting Services Chapter 7 - Proposal Writing for the Security Consultant Chapter 8 - Selling to Government Agencies Chapter 9 - Selling to Architects and Engineers Chapter 10 - Security Consulting Services That Sell Chapter 11 - Creating a Business Plan Chapter 12 - Taking the Plunge Chapter 13 - Taking Your Practice to the Next Level Chapter 14 - Continuing Education Chapter 15 - Avoiding Pitfalls and Common Mistakes This book is crammed with practical tips based on the actual day-to-day experiences of a working security consultant. Within this book, Michael tells you what works – and more importantly, what doesn’t work. This book is specifically written for the person starting a one-person security consulting practice, and answers questions such as: - What types of skills do I need to be successful? - What types of licenses and certifications do I need? - What should I name my business? - Do I need a website? - What types of insurance do I need? - Should I rent an office, or work out of my home? - How much should I charge? - How do I sell my services and get consulting jobs? - How do I write a proposal? - What consulting services should I offer? - How much money do I need to get started? - What steps should I take before I quit my present job? - Can I start my consulting practice part-time while I’m still working? - How do I grow my practice and take it to the next level? - What are some common mistakes made by new consultants and how can I avoid them? About The Author Michael A. Silva is an independent security consultant that has over forty years of security industry experience. Michael founded Silva Consultants, his independent security consulting and design firm, in 1985. In late 2001, Michael suspended the operations of Silva Consultants to accept a position with Kroll, the world’s largest security and risk consulting company. From 2001 to 2006, he managed Kroll’s security consulting and engineering practice in Seattle, and was responsible for projects throughout Washington, Oregon, California, and Nevada. In 2007, Michael resigned his position with Kroll and resumed the operations of Silva Consultants.
Security Architecture
Author: Christopher M. King
Publisher: McGraw-Hill/Osborne Media
ISBN: 9780072133851
Category : Computer architecture
Languages : en
Pages : 0
Book Description
New from the official RSA Press, this expert resource explains how to design and deploy security successfully across your enterprise--and keep unauthorized users out of your network. You'll get full coverage of VPNs and intrusion detection systems, plus real-world case studies.
Publisher: McGraw-Hill/Osborne Media
ISBN: 9780072133851
Category : Computer architecture
Languages : en
Pages : 0
Book Description
New from the official RSA Press, this expert resource explains how to design and deploy security successfully across your enterprise--and keep unauthorized users out of your network. You'll get full coverage of VPNs and intrusion detection systems, plus real-world case studies.
Threat Modeling
Author: Adam Shostack
Publisher: John Wiley & Sons
ISBN: 1118810058
Category : Computers
Languages : en
Pages : 624
Book Description
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
Publisher: John Wiley & Sons
ISBN: 1118810058
Category : Computers
Languages : en
Pages : 624
Book Description
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.