| Dedication | p. v |
| Acknowledgments | p. xv |
| Preface | p. xvii |
| Introduction | p. xix |
| Security Consulting as a Profession | p. 1 |
| Comparison of the Security Executive and the Consultant | p. 1 |
| The Consultant's Daily Work | p. 6 |
| Qualifications of a Professional Security Consultant | p. 9 |
| Experience | p. 9 |
| Education | p. 10 |
| Professional Credentials | p. 11 |
| Personal and Interpersonal Skills | p. 13 |
| The Ten Most Common Questions Asked about Entering the Profession | p. 17 |
| Of All the Things One Should Do to Be Successful, Which is the Most Important? | p. 17 |
| How Much Time and Money Are Required to Open a Consultancy? | p. 17 |
| How Does One Know If One Can Make a Living by Being a Security Consultant? | p. 18 |
| How Does One Go about Marketing One's Consulting Skills? | p. 18 |
| Is Prior Law Enforcement Experience Valuable? | p. 18 |
| Is It a Good Idea to Find Work in Another Management Consulting Organization before Trying to Break into Independent Security Consulting? | p. 19 |
| Where Can One Find Security Consulting Standards to Ensure One is Operating in the Mainstream? | p. 19 |
| How Can Fledgling Consultants Measure Their Worth? | p. 20 |
| Does One Have to Maintain a Parallel Career in Academia or Business to Keep Abreast of Industry Advances? | p. 21 |
| Is There an Average Period of Time over Which One Must Practice before Realizing Professional Recognition and Financial Success? | p. 22 |
| Starting the Business | p. 23 |
| Geographic Location of the Business | p. 24 |
| Specific Location of the Office | p. 24 |
| Personal Computer and Website | p. 25 |
| Telephone Service | p. 25 |
| Naming the Business | p. 27 |
| Press Release | p. 27 |
| Bank Account | p. 28 |
| Business Record Keeping | p. 28 |
| Office Equipment | p. 30 |
| Stationery | p. 30 |
| Insurance | p. 30 |
| The Need for Effective Consulting Websites | p. 31 |
| The Home Page | p. 32 |
| The Services Page | p. 32 |
| The Experience Page | p. 33 |
| Social Networking | p. 36 |
| Blogs | p. 39 |
| Mobile Versions | p. 40 |
| Final Thoughts Regarding Content | p. 41 |
| Bumps in the Road New Consultants Will Face | p. 43 |
| First Thing's First-Money | p. 43 |
| Forming Your Business | p. 44 |
| What Kind of Consultant Do You Want to Be? | p. 44 |
| A Question of Independence | p. 45 |
| Forensic Consulting | p. 45 |
| Seek Knowledge from Those Who Have Traveled the Road Before You | p. 46 |
| Marketing Your Business | p. 46 |
| Pro Bono Work | p. 47 |
| Spend Your Money Wisely | p. 47 |
| Brochures, Books, and Articles | p. 47 |
| Setting Your Fee Rate-Yet Another Bump | p. 48 |
| Professional Memberships and Certifications | p. 49 |
| Keep This Book Handy | p. 49 |
| Marketing | p. 51 |
| Prepare a Marketing Plan | p. 51 |
| Creating Your Marketing Strategy | p. 56 |
| Marketing Quick Tips | p. 69 |
| The Proposal and Contract | p. 73 |
| The Enterprise Recognizes the Need for Consultation | p. 73 |
| The Enterprise Requests A Proposal | p. 73 |
| The Consultant Submits a Proposal for Services | p. 74 |
| The Enterprise Accepts the Proposal and Contracts for Services | p. 88 |
| The Survey | p. 93 |
| The Preliminary Survey | p. 95 |
| The Survey Itself | p. 96 |
| The Consultant's Report | p. 103 |
| Components of the Report | p. 103 |
| An Alternative Report Strategy | p. 111 |
| The Oral Survey | p. 114 |
| Fees and Expenses | p. 115 |
| Field: Office Billing Formula | p. 116 |
| Travel Time | p. 118 |
| Advances | p. 118 |
| Retainers | p. 119 |
| Billing Periods | p. 119 |
| Expenses | p. 119 |
| The Invoice | p. 120 |
| Collection Problems | p. 125 |
| Technical Security Consulting | p. 127 |
| Schematic Design Overview | p. 129 |
| Detailed Design and Construction Documents Overview | p. 130 |
| Development of Device Schedules | p. 131 |
| Development of Floor Plans | p. 132 |
| Preparation of a Riser Diagram | p. 132 |
| Installation Typical Details | p. 134 |
| Updating the Cost Estimate | p. 134 |
| Initiating the Specifications | p. 135 |
| Bidding and Award Matters | p. 139 |
| Construction and Closeout | p. 140 |
| Final Thoughts and Considerations | p. 142 |
| Information Security Consulting | p. 145 |
| Ad-Hoc Security | p. 145 |
| Five Steps to Intruding | p. 146 |
| Teams at Risk | p. 148 |
| Teams That Use Outside Players | p. 149 |
| Managing the Team's Risks | p. 150 |
| Assessing the Team's Risks | p. 151 |
| Planning the Team's Risks | p. 151 |
| Risk Treatment Plan | p. 152 |
| Assessing the Team's Security | p. 153 |
| Balancing the Team's Access and Risks | p. 154 |
| Forensic Consulting | p. 157 |
| The Need for Security Consultants in Legal Cases | p. 157 |
| The Process of Forensic Consulting | p. 159 |
| Liability and Insurance Considerations | p. 175 |
| Professional Liability | p. 175 |
| Insurance Considerations | p. 176 |
| Use of Contract Clauses | p. 178 |
| The Need for Professional Growth | p. 183 |
| The Origin of the International Association of Professional Security Consultants | p. 183 |
| Institute of Management Consultants | p. 190 |
| Pro Bona Work as a Source of Professional Growth | p. 191 |
| Ethics in Consulting | p. 193 |
| General Standards for Consultants | p. 194 |
| Standards for Forensic Consulting | p. 196 |
| Consulting Contract | p. 201 |
| Professional Services Agreement | p. 205 |
| Confidential Information Agreement | p. 209 |
| Security Survey Work Sheets | p. 211 |
| General Questions before Starting the Survey | p. 211 |
| Number of Employees | p. 212 |
| Normal Shift Schedule and Break Times | p. 212 |
| Cafeteria | p. 212 |
| Credit Union | p. 212 |
| Custodial Service | p. 213 |
| Company Store | p. 213 |
| Petty Cash or Funds on Harid | p. 213 |
| Classified Operations | p. 213 |
| Theft Experience | p. 214 |
| Best Practice #1: Detaining Shoplifting Suspects | p. 225 |
| Best Practice #2: Forensic Methodology | p. 231 |
| Table of Contents | p. 231 |
| Position Statement | p. 231 |
| Evidence Review-The Process | p. 232 |
| Risk Assessment | p. 232 |
| Threat Assessment | p. 233 |
| Vulnerability Assessment/Security Survey | p. 233 |
| Analysis and Opinions | p. 235 |
| Bibliography | p. 235 |
| Forensic Security Committee Members | p. 236 |
| Cases Citing the Methodology | p. 236 |
| Document Revision History | p. 236 |
| Best Practice #3: Use of Force by Security Personnel | p. 237 |
| Table of Contents | p. 237 |
| Position Statement | p. 237 |
| Best Practice Committee Members | p. 239 |
| Document History | p. 239 |
| Addendums | p. 239 |
| Further Reading | p. 240 |
| A Timeless Message | p. 241 |
| Outline of the IAPSC's Successful Security Consulting Program | p. 243 |
| Course Description | p. 243 |
| SSC Introduction, Overview, and Objectives | p. 243 |
| The Business of Security Consulting | p. 243 |
| Defining and Marketing Your Services | p. 244 |
| Developing and Submitting Winning Proposals | p. 244 |
| Completing the Consulting Assignment | p. 245 |
| Conducting Security Audits and Assessments | p. 245 |
| The Business of Expert Witnessing | p. 245 |
| Preparing a Responsive, High-Impact Consultant's Report | p. 246 |
| Money: The Good, the Bad, and the Ugly | p. 246 |
| Project Teaming and Business Planning | p. 246 |
| Back-of-the-House Mechanics | p. 246 |
| Convergence Consulting | p. 247 |
| Bibliography | p. 249 |
| Index | p. 251 |
| Table of Contents provided by Ingram. All Rights Reserved. |