PROTECTING YOUR ENTERPRISE FROM THE NEW GLOBAL TERRORISM, CYBER TERRORISM AND INFRASTRUCTURE ATTACK THREATS

- A Plan of Action for Survival and Business Continuity in the New Global Threat Environment -

- MAP-50 - NEW

The horrible events of September 11, the recent incidents of Anthrax bio terrorism and the flurry of cyber terrorism attacks aimed at disrupting the continuity of businesses and attacking vital public infrastructure have for ever changed the view of companies' and governments about risk.

These events plus the ensuing Afghanistan war have had their impact on the world economy, devastated whole industries and eroded consumer confidence thus lessening the chances of the US and other governments being able to respark the slow worldwide economy.

In response to these events the US government has created the new Office of Homeland Security to ensure that future provisions are in place to prevent, forestall, respond and recover from any disasters and mitigate the impact of unavoidable events.  Business and government agencies must adopt similar initiatives and develop a "broad view, comprehensive and highly coordinated" plan to similarly protect their organizations.

The events of September 11 have taught us that an organization does not have to necessarily be attacked directly, as the World Towers were, to be adversely impacted as a result of the the ripple effects from acts of terrorism and cyber terrorism.  Companies are vulnerable if in some way they are vitally dependent on other organizations and government-run infrastructure facilities or are sensitive to disruptions of the public infrastructure - which now includes the Internet and e-commerce.  This was quite evident in the New York City terror disaster where the continuity of companies that were not located in the "Ground Zero" area but in upper Manhattan,  the rest of the country and the globe were adversely impacted.  

The issue of business continuity and survival has never had such a strong meaning for thousands of companies that were impacted by the nasty acts of international terror.  Likewise enterprises that were highly concentrated in one single location were drastically impacted or obliterated as not only their place of business activity disappeared but their key employees were also gone.   Organizations which are heavily dependent on the "knowledge worker" should particularly take note of their vulnerability in the event of a major disaster as physical assets are easier to replace and recover than employees with critical and often unbackable and irreplaceable know-how.

MAP-50 provides you with a focused treatise on how to prepare for and develop a "plan of action" to address the new global threats as well as other conventional sources of threats which may also be impacted in any future terrorism attack.  This aggregate protection plan covers more that just contingency and business recovery issues but the whole set of considerations in developing top-down, highly coordinated, strategic and tactical and broad-based enterprise protection programs beyond mere computers and information technology systems which are only a part of the whole ensemble.

Management has a statutory duty to protect the vital continuity of its critical business processes, its employees and its assets as a matter of due diligence and the "Prudent Person's Rule".

The information provided in MAP-50 will save you countless person years of research and development effort and provide you with a detailed plan of action to help you develop your own internal protection programs to suit your own particular environment. It will provide you with valuable insight on the contemporary threats that can place your enterprise in jeopardy.

Whether you are a business executive, financial executive, auditor, security or risk management officer, or a CIO or information technology manager, a security advisor or a contingency planning and business continuity professional in the private and public sectors, you need a copy of this unique, contemporary and just-off-the press manual.

CONTENTS                                      ISBN  0-940706-57-1

1. DANGERS TO THE MODERN ORGANIZATION IN THE NEW GLOBAL ENVIRONMENT

1.1     The Current World Environment and Dangers to Business Organizations      

1.2      The Need for Risk Assessment and to Plan for Prevention, Emergency Preparedness, Damage Minimization, Recovery and Normalcy Restoration Through the Development of a Multifaceted Protection Plan of Action            

1.3        Present Deficiencies in Enterprise Protection Planning               

1.4       The Nature of the New Global Threats  

1.5       Management's Responsibility to Protect the Enterprise's employees, Assets, Critical Business Processes, and                Infrastructure in the Wake of the New Global Threats and Terrorism   

2.  NEW SOURCES OF THREATS AND MAJOR SPECIFIC THREATS

2.1          Identifying the Major New Sources of Threats and the Specific Threats that They Engender       

2.2     Main Classes of Threats             

2.3          Major Sources of Threats              

2.4          Differentiating Between Controllable and Non-Controllable Sources of Threats          

2.5          Procedure for Arriving and a Controllable and Non-controllable Threat Source Profile         

2.6          Defining the Protection Objectives for Controllable and Non-Controllable Threats and the Protection Strategies to Adopt

3.  MAJOR IMPACT AND EXPOSURES FROM THE NEW THREATS

3.1      What Is the Impact of the New Threats?              

3.2     Types of Impacts Derived from Adverse Threats              

3.3     Compendium of Adverse Impact from New Threats to Organizations

4.  MAJOR COMPONENTS OF A ROBUST PROTECTION PROGRAM

4.1          A Sound and Aggregate Enterprise Protection Program Should Include Several Key Components        

4.2          Distinguishing Between the Major Components of the Enterprise Protection Program and the Plan of Action       

4.3          Main Sections of and Enterprise Protection Program               

4.4          Relating the Major Protection or Security Components or Elements Required to Respond to Each of the Overall Protection             Program Sections in Figure 4-2        

4.5          A Summary of the Relationship Between the Protection Program’s Main Sections And the Specific Components or            Sub-programs Required to Accomplish the Main Sections

5.  A COMPREHENSIVE PLAN OF ACTION TO PROTECT THE ENTERPRISE

5.1      A Plan of Action to Develop and Deploy the Enterprise Protection Program              

5.2      Preparing the Detailed Plan of Action            

5.3          A Description of a Detailed Plan of Action to Develop an Aggregate Enterprise Protection Program to Address the Most Serious Global and Accidental Threats     

5.4     The Preventive, Preemptive, Security and Internal Controls Sub-Program in the Aggregate Enterprise Protection Program

5.5     Selected Best Practices

APPENDIX - A. Literature - B. Glossary - C. Selected Practices - D. Index

PRICE: US $250 plus $10 postage and handling in North   America - Ring Bound - 81/2 x 11 format - 182 pages

For overseas orders add: $35 for air postage.

All orders must be accompanied by payment.  Credit cards are not accepted.

Click the ORDER FORM below and send it with your payment to:

MANAGEMENT ADVISORY PUBLICATIONS                                                                                                 

57 Greylock Road - P.O. Box 81151 - Wellesley Hills, MA 02481-0001                                                                          Voice: (781) 235-2895        Fax: (781) 235-5446  - email: jaykmasp@aol.com   - Web: www.masp.com

Overseas orders, if you prefer to wire funds, inquire for bank routing address

PUBLICATIONS ORDER FORM

Note: A new seminar on how to audit contingency plans for new global threats is also available.  How to Audit Contingency and Business Continuity Plans for New Terrorism and Infrastructure Attacks.