top of page

REFERENCE MATERIAL

Bomb Threat Management

In the past there has often been a reluctance to accept that an emergency can happen. Some Management have made tentative plans. In recent years pressures have increased from interested bodies and now management is more inclined to draft contingency plans and provide the equipment and materials to carry them out. 

CCTV in Retail Security

Crisis Management Operations

For copy of this PowerPoint Presentation, write to us at sbtyagi1958@gmail.com

Naturally, security and safety, crime prevention and investigation remain critical issues underpinning the design, specification and operation of CCTV systems in shopping centers, and the appropriate selection, training and development of the individual CCTV operator is a prerequisite to maximizing the effective use of the whole installation.

A bomb threat is an effective means of disrupting business. The problems are intensified when the incident involves an actual explosive or incendiary device. Although there is no foolproof means of securing a premises against a bomb threat (or bomb attack), a good security plan, correctly executed, will enable a business to deal with an incident properly.

Bomb Threat SOP 

Abduction and Ransom

Anti-sabotage Checks 

Without being judgmental, professional assessment of the cases indicate that there have been striking similarities in both the abduction cases and knowing these similarities will help us in understanding the modus operandi of criminals and Do’s and Don’ts to be adopted. Following factors stand-out 

Sabotage is a covert act violent /non-violent with a view to cause physical damage to properties / material or person of a nation with a view to have determined effect on that national war potential resources.

Naturally, security and safety, crime prevention and investigation remain critical issues underpinning the design, specification and operation of CCTV systems in shopping centers, and the appropriate selection, training and development of the individual CCTV operator is a prerequisite to maximizing the effective use of the whole installation.

Is your soft luggage safe at airport?

So You Think Your Luggage is Safe?

Cash-in-transit (CIT) or Cash / valuables-in-transit (CVIT) are terms used to refer to the physical transfer of banknotes, coins and items of value from one location to another.
Traditionally, both terms refer to transfer of cash and valuables between cash centres and bank branches, ATM points, large retailers and other premises holding large amounts of cash.

Security of 'Cash in Transit'

Protecting trade secrets and critical & sensitive information from loss through business espionage is an increasingly important management function.  Business Espionage Controls & Countermeasures Association (BECCA) identified four primary areas of risk called "Four Faces of Business Espionage," a term now widely used by controls and countermeasures experts. 

Business Espionage & Intelligence

Access Contro challenges for Security professionals –
•Change in security concept world over after
WTC, USA incident on 11 Sept. 2001.
•Escalation in suicide attacks by terrorists. 
•Dimension of Security drastically changed. 
after attack on Indian Parliament on 13 Dec. 2001.

Access Controls in Industries

For copy of this PowerPoint Presentation, write to us at sbtyagi1958@gmail.com

Manas Publications

4402/ 5-A, Opp HDFC Bank,

Ansari Road, Darya Ganj

New Delhi - 110 002

Ph:  23265523,  23260783

Fax:  011-23272766

email:  manaspublications@vsnl.com

It is magnum-opus on the subject!

The most comprehensive book on the subject of industrial security management, it covers the whole gamut of effective and economic security management plans and stratagies.

It is written by the hard-core security practioners for the security professionals, who hither-to had no reference book to answer their querries!

Book on Industial Security Management

The environment, in which the Security operates, has changed beyond recognition. The ease of travel, more open borders and digital technologies have globalized criminality, making it far harder to contain and prosecute. Terrorism, of course, is notoriously borderless. But globalization has also massively expanded opportunities for organized crime. And technology, by spawning new kinds of crime while facilitating the traditional variety, is helping lawbreakers become ever bolder and more difficult to track down

Maximize Security with Existing Infrastructure

No question on the importance of the computer in the business world of today, and its increasing significance in the future! Yet, it creates a great potential for danger. No element of business, including catastrophic fire and ravages of non-computerized internal theft presents a greater potential to wipe out an entire business so quickly and so effectively. The dangers to a computer center or those which can be created by it encompasses virtually the entire operation of business it serves. 

Computer Security

Alarm monitoring & response is complex and tedious function of security management. It also means that systems need to be constantly upgraded and procedures checked. There is also need to constantly audit the efficacy of the system and the integrity of the data. Since all these activities occupy lot of attention and priorities of the organizations, some of the forward looking Managements started off-loading these activities to third-parties – specialist in the field. 

Central Monitoring Station 

No one has to tell a security professional about the growing importance of background screening. More and more organizations  now perform some kind of criminal background check on potential new hires, and more and more companies are checking employment history, education, driving records, credit history, sex offender registries, restricted parties lists and more. Clearly the drive to background screening is prompted by the desire for a safer workplaceC

Background Screening

How do forensic experts solve crimes using cutting-edge technology? This questions and more are related to the subject of Crime Investigation. Real crime, real people, real drama - Crime Investigation is the hard work by the true professionals who work meticulously and methodically to solve the mystery behind the crime – motive, the modusoperendai and men involved in crime! Crime Investigation opens the door to crime labs, police archives and courtrooms, providing a behind-the-scenes look at criminal investigations and probing unexplained mysteries. 

Crime Investigation

Country’s energy security is directly related to security of its Oil, Gas and Pipeline assets. Security provides oil and gas companies the freedom to find, develop and manage assets and to deliver supplies without interference.

 

While ensuring availability of energy sources becomes prime concern of the Nation, securing its Oil, Gas and Pipeline assets become prime responsibility of all stake-holders. 

Energy Security & Security of Oil and Gas Assets

For copy of this PowerPoint Presentation, write to us at sbtyagi1958@gmail.com

For copy of this PowerPoint Presentation, write to us at sbtyagi1958@gmail.com

For copy of this PowerPoint Presentation, write to us at sbtyagi1958@gmail.com

For copy of this PowerPoint Presentation, write to us at sbtyagi1958@gmail.com

For copy of this PowerPoint Presentation, write to us at sbtyagi1958@gmail.com

For copy of this PowerPoint Presentation, write to us at sbtyagi1958@gmail.com

bottom of page