Details

Business Continuity Management


Business Continuity Management

Building an Effective Incident Management Plan
1. Aufl.

von: Michael Blyth

48,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 22.06.2009
ISBN/EAN: 9780470478097
Sprache: englisch
Anzahl Seiten: 384

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>PRAISE FOR Business Continuity Management</b> <p>Few businesses can afford to shut down for an extended period of time, regardless of the cause. If the past few years have taught us anything, it's that disaster can strike in any shape, at any time. Be prepared with the time-tested strategies in <i>Business Continuity Management: Building an Effective Incident Management Plan</i> and protect your employees while ensuring your company survives the unimaginable. <p>Written by Michael Blyth—one of the world's foremost consultants in the field of business contingency management—this book provides cost-conscious executives with a structured, sustainable, and time-tested blueprint toward developing an individualized strategic business continuity program. This timely book urges security managers, HR directors, program managers, and CEOs to manage nonfinancial crises to protect your company and its employees. Discussions include: <ul> <li>Incident management versus crisis response</li> <li>Crisis management structures</li> <li>Crisis flows and organizational responses</li> <li>Leveraging internal and external resources</li> <li>Effective crisis communications</li> <li>Clear decision-making authorities</li> <li>Trigger plans and alert states</li> <li>Training and resources</li> <li>Designing and structuring policies and plans</li> <li>Monitoring crisis management programs</li> <li>Stages of disasters</li> <li>Emergency preparedness</li> <li>Emergency situation management</li> <li>Crisis Leadership</li> <li>Over 40 different crisis scenarios</li> </ul> <p>Developing and utilizing a business continuity plan protects your company, its personnel, facilities, materials, and activities from the broad spectrum of risks that face businesses and government agencies on a daily basis, whether at home or internationally. <i>Business Continuity Management</i> presents concepts that can be applied in part, or full, to your business, regardless of its size or number of employees. The comprehensive spectrum of useful concepts, approaches and systems, as well as specific management guidelines and report templates for over forty risk types, will enable you to develop and sustain a continuity management plan essential to compete, win, and safely operate within the complex and fluid global marketplace.
<p>Preface xv</p> <p>About the Web Site xxi</p> <p><b>Chapter 1 </b><b>Business Continuity Management Plan 1</b></p> <p>Crisis Management 4</p> <p>The Value 5</p> <p>Common Failings 7</p> <p>Business Continuity Goals 9</p> <p>Defining a Crisis 10</p> <p>Mapping Risks 11</p> <p>Critical Dependencies 12</p> <p>Tactical Risk Evaluations 13</p> <p>Determining Risk Tolerances 15</p> <p>Incident Response versus Crisis Management 15</p> <p>Stages of Incident Management and Crisis Response 17</p> <p>Understanding Risk 17</p> <p>Immediate Response and Impact Levels 21</p> <p>Risk Management 22</p> <p>Response Trigger Points 24</p> <p>Decision and Authority Matrixes 27</p> <p>Structuring Business Continuity Management Plans 29</p> <p>Resourcing 33</p> <p>Design and Development 36</p> <p>Integrated and Compartmentalized Policies 39</p> <p>Reporting and Record Keeping 39</p> <p>Implementing the Business Continuity Management Plan 39</p> <p>The Communications Plan 47</p> <p>Organizational Interface Plans 53</p> <p>Medical Response and Repatriation Plan 58</p> <p>Public Relations Plan 59</p> <p>Resource and Procurement Management Plans 62</p> <p>Project Initiation Plans 67</p> <p>Business Recovery Plans 68</p> <p>Postincident Reviews 74</p> <p>Summary 75</p> <p><b>Chapter 2 </b><b>Incident Management Plan 77</b></p> <p>Incident Management versus Crisis Response 78</p> <p>Principles of Incident Management 79</p> <p>Incident Management Plan Risk or Threat Overview 80</p> <p>Objectives of the Incident Management Plan 80</p> <p>Incident Management Sequence 81</p> <p>Crisis Management Flow 82</p> <p>Incident Management Sequencing 82</p> <p>Incident Management Stages 84</p> <p>Macro and Micro Crises 85</p> <p>Understanding the Incident Management Plan Needs 86</p> <p>Incident Management Plan Design and Implementation 90</p> <p>Design and Development 91</p> <p>Reviewing and Testing 92</p> <p>Adjustment and Implementation 92</p> <p>Incident Management Plan Policies and Procedures 93</p> <p>Information Security 94</p> <p>Resourcing the Incident Management Plan 94</p> <p>Structuring Incident Management Plans 95</p> <p>Incident Management Plan Policies and Instructions 96</p> <p>Incident Management Plan Cover Letter 97</p> <p>Immediate Resource Mapping 98</p> <p>Incident Management Plan Communications and Tactical Resource Plan 99</p> <p>Initial Verbal Reporting 101</p> <p>Incident Management Plan Decision and Authority Matrix 102</p> <p>Incident Management Plan Alert States and Trigger Response Plans 102</p> <p>Alert Notification Systems 106</p> <p>Incident Management Plan Information Capture Reports 107</p> <p>Incident Management Plan Crisis Response Guidelines 107</p> <p>Destruction Plans 108</p> <p>Incident Management Plan Risk Assessments 109</p> <p>Summary 109</p> <p><b>Chapter 3 </b><b>Crisis Management Structures 111</b></p> <p>Interorganizational Management 112</p> <p>Crisis Leadership 114</p> <p>Organizational Crisis Leadership 116</p> <p>Approach Methodologies 117</p> <p>Education and Training 118</p> <p>Supporting Crisis Management Groups 119</p> <p>Response Buildups 121</p> <p>Crisis Management Structures 122</p> <p>Corporate Crisis Response Team 123</p> <p>Country Crisis Response Team 124</p> <p>Program Incident Response Team 125</p> <p>Project Incident Response Team 126</p> <p>Special Response Teams 126</p> <p>Composition of Crisis Response Teams 127</p> <p>Crisis Management Team Commander 128</p> <p>Crisis Team Coordinator 129</p> <p>Physical and Risk Security Manager 129</p> <p>Technical Security Manager 130</p> <p>Special Response Team Leader 130</p> <p>Administration Manager 130</p> <p>Intelligence or Information Officer 131</p> <p>Liaison Officer 131</p> <p>Communications Manager 132</p> <p>Public Relations Officer 132</p> <p>Legal Counsel 133</p> <p>Human Resources Department 133</p> <p>Health and Safety Department 134</p> <p>Stress Trauma Adviser 134</p> <p>Reception Team Manager 134</p> <p>Finance Officer 135</p> <p>Investor Relations Officer 135</p> <p>Incident Management Structures 136</p> <p>Crisis Control Center 137</p> <p>Monitoring Crisis Management Programs 138</p> <p>Summary 139</p> <p><b>Chapter 4 </b><b>Scope of Risk 141</b></p> <p>Security and Safety Awareness 144</p> <p>Crisis Management Training 145</p> <p>Stages of Disasters 145</p> <p>Man-Made Risks 146</p> <p>Espionage or Information Security Breach 147</p> <p>Kidnappings and Ransoms 149</p> <p>Hostage and Hijacking Situations 152</p> <p>Domestic Terrorism (Monkey Wrenching) 153</p> <p>Power Blackouts 157</p> <p>Road Traffic Accidents 158</p> <p>Complaints 159</p> <p>Muggings or Robberies 160</p> <p>Missing Persons 160</p> <p>Civil Unrest 161</p> <p>Arrest and Detention 162</p> <p>Pending Arrest or Detention and Exit Denial 163</p> <p>Loss of Sensitive or High-Value Equipment 164</p> <p>Unexploded Ordnance and Mines 165</p> <p>Indirect or Direct Fire Attacks 166</p> <p>Suspect Calls 167</p> <p>Workplace Violence 168</p> <p>Threats, Coercion, and Extortion 171</p> <p>Facility Intrusion 172</p> <p>Chemical, Biological, or Radiological Threats 173</p> <p>Small Arms Fire 175</p> <p>Complex or Armed Attacks 175</p> <p>Medical Emergencies 176</p> <p>Repatriations of Remains 177</p> <p>Explosive Attacks or Sabotage 179</p> <p>Suspect Packages and Letters 180</p> <p>Bomb Threats 181</p> <p>Vehicle-Borne Improvised Explosive Devices 182</p> <p>Sabotage 183</p> <p>Family Liaison 183</p> <p>Media Management 184</p> <p>Computer-Related Incidents 185</p> <p>Disciplinary Issues 186</p> <p>Office, Facility, or Hotel Fires 187</p> <p>Labor Disputes 189</p> <p>Natural Risks 190</p> <p>Floods 191</p> <p>Earthquakes 192</p> <p>Pandemics 193</p> <p>Tsunamis (Tidal Waves) 193</p> <p>Hurricanes and Tornadoes 194</p> <p>Volcanoes 195</p> <p>Sandstorms 196</p> <p>Landslides 196</p> <p>Forest Fires 197</p> <p>Summary 199</p> <p><b>Chapter 5 </b><b>Incident Response Guidelines 201</b></p> <p>Vehicle-Borne IED Incident Management 204</p> <p>Incident Management Guidelines 204</p> <p>Casualty Incident Management 206</p> <p>Incident Management Guidelines 206</p> <p>Missing Person Incident Management 208</p> <p>Incident Management Guidelines 208</p> <p>Road Traffic Accident Incident Management Data Call 210</p> <p>Incident Management Guidelines 210</p> <p>Facility Physical Security Breach Incident Management 212</p> <p>Incident Management Guidelines 212</p> <p>Kidnapping and Ransom Incident Management 214</p> <p>Incident Management Guidelines 214</p> <p>Media Management Incident Management 216</p> <p>Incident Management Guidelines 216</p> <p>Detention and Arrest Incident Management 218</p> <p>Incident Management Guidelines 218</p> <p>Hostage Situation Incident Management 220</p> <p>Incident Management Guidelines 220</p> <p>Suspect Call Incident Management 222</p> <p>Incident Management Guidelines 222</p> <p>Civil Unrest Incident Management 223</p> <p>Incident Management Guidelines 223</p> <p>Unexploded Ordnance or Suspect Package Incident Management 225</p> <p>Incident Management Guidelines 225</p> <p>Suspect Letter Incident Management 228</p> <p>Incident Management Guidelines 228</p> <p>Destruction of Sensitive Materials Incident Management 230</p> <p>Incident Management Guidelines 230</p> <p>Repatriation Incident Management 232</p> <p>Incident Management Guidelines 232</p> <p>Domestic Terrorism or Special-Interest Groups Incident Management 236</p> <p>Incident Management Guidelines 236</p> <p>Espionage Incident Management 238</p> <p>Incident Management Guidelines 238</p> <p>Site Occupation or Sit-Ins Incident Management 239</p> <p>Incident Management Guidelines 239</p> <p>Sabotage Incident Management 241</p> <p>Incident Management Guidelines 241</p> <p>Demonstrations Incident Management 243</p> <p>Incident Management Guidelines 243</p> <p>Pending Detention or Exit Denial Incident Management 245</p> <p>Incident Management Guidelines 245</p> <p>Complaints Incident Management 247</p> <p>Incident Management Guidelines 247</p> <p>Blackouts and Power Loss Incident Management 249</p> <p>Incident Management Guidelines 249</p> <p>Loss of Sensitive or High-Value Materials Incident Management 250</p> <p>Incident Management Guidelines 250</p> <p>Indirect Fire and Direct Fire Attacks Incident Management 251</p> <p>Incident Management Guidelines 251</p> <p>Workplace Violence Incident Management 253</p> <p>Incident Management Guidelines 253</p> <p>Chemical, Biological, or Radiological Attack Incident Management 254</p> <p>Incident Management Guidelines 254</p> <p>Complex Attack Incident Management 256</p> <p>Incident Management Guidelines 256</p> <p>Family Liaison Incident Management 257</p> <p>Incident Management Guidelines 257</p> <p>Office, Facility, or Hotel Fires Incident Management 259</p> <p>Incident Management Guidelines 259</p> <p>Threats, Coercion, and Intimidation Incident Management 261</p> <p>Incident Management Guidelines 261</p> <p>Mugging or Robbery Incident Management 263</p> <p>Incident Management Guidelines 263</p> <p>Small Arms Fire Incident Management 265</p> <p>Incident Management Guidelines 265</p> <p>Floods and Tidal Waves Incident Management 267</p> <p>Incident Management Guidelines 267</p> <p>Earthquakes Incident Management 269</p> <p>Incident Management Guidelines 269</p> <p>Pandemics Incident Management 271</p> <p>Incident Management Guidelines 271</p> <p>Hurricanes and Tornadoes Incident Management 273</p> <p>Incident Management Guidelines 273</p> <p>Volcanoes Incident Management 275</p> <p>Incident Management Guidelines 275</p> <p>Sandstorms Incident Management 277</p> <p>Incident Management Guidelines 277</p> <p>Landslides Incident Management 279</p> <p>Incident Management Guidelines 279</p> <p>Forest Fires and Brush Fires Incident Management 281</p> <p>Incident Management Guidelines 281</p> <p>Summary 283</p> <p><b>Chapter 6 </b><b>Crisis Information Capture Reports 285</b></p> <p>Immediate Verbal Reporting (SAD CHALETS) 288</p> <p>Serious Incident Reporting 288</p> <p>Serious Incident Report Incident Management Data Call 290</p> <p>Incident Management Plan Risk Assessment Reports 291</p> <p>IMP Risk Assessment Report Incident Management Data Call 292</p> <p>Sample Crisis Information Capture Reports 293</p> <p>Vehicle-Borne IED Incident Management Data Call 294</p> <p>Casualty or Injury Incident Management Data Call 295</p> <p>Missing Persons Incident Management Data Call 297</p> <p>Road Traffic Accident Incident Management Data Call 299</p> <p>Facility Physical Security Breach Incident Management Data Call 303</p> <p>Kidnapping and Ransom Incident Management Data Call 305</p> <p>Media Management Incident Management Data Call 307</p> <p>Detention or Arrest Incident Management Data Call 308</p> <p>Hostage Situation Incident Management Data Call 310</p> <p>Suspect Call Incident Management Data Call 312</p> <p>Civil Unrest Incident Management Data Call 313</p> <p>Unexploded Ordnance or Suspect Package Incident Management Data Call 314</p> <p>Suspect Letter Incident Management Data Call 315</p> <p>Destruction Plan Incident Management Data Call 316</p> <p>Repatriation Incident Management Data Call 317</p> <p>Information Security Breach Incident Management Data Call 318</p> <p>Domestic Terrorism or Special-Interest Groups Incident Management Data Call 319</p> <p>Complaints Incident Management Data Call 321</p> <p>Mugging or Robbery Incident Management Data Call 322</p> <p>Pending Detention and Exit Denial Incident Management Data Call 323</p> <p>Loss of Sensitive or High-Value Materials Incident Management Data Call 325</p> <p>Indirect or Direct Fire Attacks Incident Management Data Call 327</p> <p>Workplace Violence Incident Management Data Call 328</p> <p>Threats, Coercion, or Intimidation Incident Management Data Call 329</p> <p>Chemical, Biological, or Radiological Threats Incident Management Data Call 330</p> <p>Small Arms Fire Incident Management Data Call 332</p> <p>Complex Attack Incident Management Data Call 333</p> <p>Explosive Attack or Sabotage Incident Management Data Call 335</p> <p>Family Liaison Incident Management Data Call 336</p> <p>Computer-Related Incidents Incident Management Data Call 337</p> <p>Disciplinary Issues Incident Management Data Call 338</p> <p>Office, Facility, or Hotel Fires Incident Management Data Call 339</p> <p>Espionage Incident Management Data Call 341</p> <p>Site Occupation Incident Management Data Call 342</p> <p>Demonstrations Incident Management Data Call 343</p> <p>Blackouts and Power Loss Incident Management Data Call 345</p> <p>Floods or Tidal Waves Incident Management Data Call 346</p> <p>Earthquakes Incident Management Data Call 347</p> <p>Pandemics Incident Management Data Call 348</p> <p>Hurricanes and Tornadoes Incident Management Data Call 349</p> <p>Volcanic Eruptions Incident Management Data Call 350</p> <p>Sandstorms Incident Management Data Call 352</p> <p>Landslides Incident Management Data Call 353</p> <p>Forest Fires or Brush Fires Incident Management Data Call 354</p> <p>Summary 356</p> <p>Acknowledgments 357</p> <p>Index 359</p>
<p><b>MICHAEL BLYTH</b> is Director of Risk Strategies for RSM Consulting, a risk management and training company. He holds a master's degree in security management and has eighteen years of management and operational experience within over thirty-two countries, providing strategic advisory services and management training for large multinationals and government agencies. He is highly experienced in providing corporate risk mitigation and vulnerability assessments, multi-billion dollar market entry program risk solutions and national crisis management plans, as well as a wide spectrum of strategic policies and plans within high-risk environments for ambassadors, major oil and gas programs, development organizations and communications network corporations. He can be contacted at: Mike.Blyth@RSMConsulting.us
<p><b>PRAISE FOR Business Continuity Management</b> <p>Few businesses can afford to shut down for an extended period of time, regardless of the cause. If the past few years have taught us anything, it's that disaster can strike in any shape, at any time. Be prepared with the time-tested strategies in <i>Business Continuity Management: Building an Effective Incident Management Plan</i> and protect your employees while ensuring your company survives the unimaginable. <p>Written by Michael Blyth—one of the world's foremost consultants in the field of business contingency management—this book provides cost-conscious executives with a structured, sustainable, and time-tested blueprint toward developing an individualized strategic business continuity program. This timely book urges security managers, HR directors, program managers, and CEOs to manage nonfinancial crises to protect your company and its employees. Discussions include: <ul> <li>Incident management versus crisis response</li> <li>Crisis management structures</li> <li>Crisis flows and organizational responses</li> <li>Leveraging internal and external resources</li> <li>Effective crisis communications</li> <li>Clear decision-making authorities</li> <li>Trigger plans and alert states</li> <li>Training and resources</li> <li>Designing and structuring policies and plans</li> <li>Monitoring crisis management programs</li> <li>Stages of disasters</li> <li>Emergency preparedness</li> <li>Emergency situation management</li> <li>Crisis Leadership</li> <li>Over 40 different crisis scenarios</li> </ul> <p>Developing and utilizing a business continuity plan protects your company, its personnel, facilities, materials, and activities from the broad spectrum of risks that face businesses and government agencies on a daily basis, whether at home or internationally. <i>Business Continuity Management</i> presents concepts that can be applied in part, or full, to your business, regardless of its size or number of employees. The comprehensive spectrum of useful concepts, approaches and systems, as well as specific management guidelines and report templates for over forty risk types, will enable you to develop and sustain a continuity management plan essential to compete, win, and safely operate within the complex and fluid global marketplace.

Diese Produkte könnten Sie auch interessieren:

Visual Six Sigma
Visual Six Sigma
von: Ian Cox, Marie A. Gaudard, Mia L. Stephens
EPUB ebook
52,99 €
Marketing Performance
Marketing Performance
von: Thomas Bauer, Tjark Freundt, Jonathan Gordon, Jesko Perrey, Dennis Spillecke
EPUB ebook
21,99 €
Visual Six Sigma
Visual Six Sigma
von: Ian Cox, Marie A. Gaudard, Mia L. Stephens
PDF ebook
52,99 €