Bioterrorism. Chemical threats. Cyber crime. Business as usual has taken on new meaning in the post September 11th world, particularly for the insurance industry. Introducing Business At Risk, the essential reference that shows you how to successfully manage the risks of terrorism both on and off American soil.
This is a must-have resource for the risk manager, facilities manager, safety and loss control specialist or business owner who wants to successfully manage the new risks and potential consequences for businesses in today s environment.
Business At Risk s systematic approach takes you step-by-step through the five key areas of managing terrorist threats: assessment, mitigation, response, recovery and financing the risk.
You ll discover how to: Conduct comprehensive pre-loss risk, threat and vulnerability assessments as well as a business impact analysis.
Devise successful mitigation strategies that cover everything from site selection and building design, to physical, operational, computer and cyber security.
Establish an effective response plan that encompasses both the potential for and an actual terrorist attack. Activate a recovery plan, including how to communicate with various company and public sectors. You ll also learn how to: Decrease an organization s vulnerability to terrorism losses and cushion financial blows.
Survive and thrive in a hard insurance market. Assess and use alternative risk techniques to address terrorist exposures. Handle claims issues that have or could arise in the aftermath of a terrorist incident. With supporting charts, checklists and helpful do s and don t s in every chapter, nationally-recognized authors Don Schmidt and Kevin Quinley chart a practical course that can be easily applied or customized to suit your client s unique needs.
You ll also find key insights into how the government and the industry are approaching reinsurance pressures Chapter 1: The Terrorism Threat Introduction What is Terrorism? Threats Biological & Chemical Agents Biological Agents Chemical Agents Nuclear/Radiological Agents Incendiary Devices Explosive Devices Cyberterrorism Consequences of a Terrorist Attack Direct Costs Indirect Costs Other Issues of Concern Chapter 2: Risk Assessment Risk Assessment Process Threat Assessment Vulnerability Assessment Business Impact Analysis Threat Assessment History of Past Incidents Potential Targets Vulnerability Assessment People Site Location, Layout & Protection Proximity to Potential Targets Buildings Operational Security Computer Security Other Considerations Business Impact Analysis Chapter 3: Mitigation Strategies Site Selection & Building Design Site Selection Building Design & Space Planning Site Security Building Security Operational Security Visitor & Package Screening Motor Vehicle Access to Garages, Inside Parking or Loading Docks Security Policies & Procedures Security Policy Threat Response Procedures Computer & Cyber Security Computer Security Management Detection Known Security Issues Other Mitigation Strategies Employee Training Emergency Response & Business Recovery Programs Plan Components, Objectives & Standards Chapter 4: Organizing & Planning to Respond Plan Components, Objectives, & Standards National Standards & Regulations The Planning Process Management Policy Planning Committees Assessment of Available Resources Organizations Emergency Response Team Organization Crisis Management Team Organization Communication with Target Audiences Business Recovery Team Critical Functions & Recovery Times Recovery Strategies Command, Control & Communications Incident Command System Emergency Operations Center Communications Pre-Incident Planning Community Hazards & Warning Systems Building Ventilation System Evacuation Plan Shelter-In-Place Mail Center/Package Screen
Paperback: 368 pages Publisher: National Underwriter Company; First Edition edition (April 1, 2002) Language: English ISBN-10: 0872187020 ISBN-13: 978-0872187023 Shipping Weight: 1.3 pounds ()