asis Names Security Book of the Year WinnerGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-09-25T04:00:00Z<p>​</p><p>ASIS International awarded the 2017 Security Book of the Year to <em>Managing Critical Incidents and Large-Scale Event Security </em>by Eloy Nuñez, Ph.D., and Ernest G. Vendrell, Ph.D., CPP. Published in 2016 by CRC Press, the book's eight chapters cover the specifics of critical incident planning, including risk analysis, training exercises, and a 31-point planning checklist.</p><p>The award will be presented to Vendrell and Nuñez at 10:15 a.m. today at the Security Store in Lobby A/B. All attendees are invited to stop by to offer their congratulations to the two authors on their achievement. Both Vendrell and Nuñez will remain in the store during an Author Meet and Greet from 10:30 a.m. to 11:00 a.m. The winning title can be purchased at the store, and the authors will be on hand to sign copies.</p><p>The ASIS Book Award Committee, comprised of ASIS members who are established authors, editors, and reviewers, examined security books published in 2016 by ASIS members. Almost two dozen security titles were eligible for this year's award, which is in its fourth consecutive year.</p><p>The committee votes anonymously and confidentially by electronic ballot. Ultimately, two titles are nominated for the annual award. <em>Physical Security: 150 Things Your Should Know, 2nd ed.,</em> by Lawrence Fennelly and Marianna Perry, CPP, and published in 2016 by Butterworth Heinemann, was also nominated this year.</p><p>The two nominated titles are reviewed by each committee member using 13 criteria, including determining whether the title is relevant to today's security problems or issues, covers an important security subject, or provides unique coverage of a new security concept, idea, or technology.</p><p>Rating each factor from fair to excellent, each committee member considers the book's table of contents, introduction, graphics, index, writing, and editing. They also consider whether the book presents new information that the reviewer did not know before reading it. Finally, each reviewer can comment on why the book should receive the award.</p><p>The award was inaugurated in 2014 by the O.P. Norton Information Resources Center (IRC) and the ASIS Crime Prevention Council. From the start, its purpose has been to recognize published writers among the ASIS membership and their contributions to the profession, as well as to the publishing field.</p><p>The ASIS 2018 Security Book of the Year will be presented at the 64th Annual ASIS Seminar and Exhibits in Las Vegas on September 24 to 27, 2018. To be considered, security books must be authored by an ASIS member and published between January 1 and December 31, 2017. ASIS authors should notify the IRC when their works are published.</p><p>For further information or inquiries contact</p>

asis Names Security Book of the Year Winner Scholarship Recipients Named Cares Aids the Dallas Community Change Management Program Prepares Executives for Challenges CPP Turns 40 Strategic Plan to Guide Direction of the Society and Upward Award Winners Named’s-First-Rodeo.aspx2017-09-25T04:00:00ZNot the North Texas Chapter’s First Rodeo Memorial Honoree Named Tonight,-CPP.aspx2017-09-01T04:00:00ZCertification Profile: Felix Giannini, CPP Awards School Security Grant & More ASIS News,-PSP.aspx2017-08-01T04:00:00ZCertification Profile: Chuck McCormick, PSP News: ASIS 2017 Updates, Board Certifications, ASIS NYC Recap, and More News July 2017,-CPP.aspx2017-07-01T04:00:00ZCertification Profile: Malcolm Reid, CPP News June 2017,-CPP,-PSP.aspx2017-06-01T04:00:00ZCertification Profile: Anjali Sniadowski, CPP, PSP News May 2017

 You May Also Like... Most Resilient Countries in the World<p>​Property loss prevention consultant FM Global released its <a href="" target="_blank">fifth annual <em>Resilience Index</em></a><em>,</em> which ranks 130 countries on their enterprise resilience to disruptive events. The ranking is data-driven and assesses categories such as economic factors, risk quality, and supply chain. It allows executives to plan supply chain and expansion strategies based on insight regarding risks and opportunities, according to the FM Global website. </p><p>Giving a nod to new trends that affect supply chain resilience, FM Global introduced three new drivers of resilience to its assessment: supply chain visibility, urbanization rate, and inherent cyber risk. Supply chain visibility addresses the ease of tracking goods across a country’s supply chain. “The more visible and robust the supply chain and the faster it can begin functioning as normal following a major local event, the greater its resilience,” the report notes.</p><p>The urbanization rate is based on the percentage of the country’s population that lives in urban areas. While urbanization is typically associated with a country’s development, it can prove to be risky in an area with high natural hazards. And rapid and unplanned urbanization can create pressure on utilities and infrastructure, which can be a significant threat to the country’s resilience, according to the report.</p><p>2017 is also the first year that the threat of cyberattacks has been acknowledged in the report. The inherent cyber risk driver is defined as “a blend of a country’s vulnerability to cyberattack, combined equally with the country’s ability to recover.” This is calculated by determining the percentage of citizens with access to the Internet, as well as how the government responds to cyberattacks. “Countries that recover well from major events are those with a thriving industry in malware or cybersecurity, and where governments are willing to step in and help citizens in the event of a nationwide hacking,” the report says.</p><p>At the top of the list for the fifth year is Switzerland, an “acknowledged area of stability for generations” with infrastructure and political stability that makes its supply chain reliable and resilient. However, natural disasters and cyberattacks remain a threat to the country. </p><p>Also notable is Luxembourg, which was ranked eighth in 2013 but placed second this year. A growth in the country’s services sector, combined with its reduced economic reliance on oil and its business-friendly regulations, makes Luxembourg a safe place to expand operations to, the report finds. And due to its location, Luxembourg may serve as a new home for companies following the United Kingdom’s departure from the European Union.</p><p>At the other end of the spectrum, Haiti is ranked last due to its lack of supply chain and standards and its high rate of poverty. Similarly, Venezuela fared poorly due to corruption, natural disasters, poor infrastructure, and ill-perceived quality of local suppliers.  ​</p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.<div class="body"> <p> <em> <span style="font-size:small;"> <span style="font-family:arial;">CRC Press. Available from ASIS, item #2078; 954 pages; $120 (ASIS member), $132 (nonmember). Also available as e-book.</span> </span> </em> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">As good as the first edition of 21st Century Security and CPTED was, this second edition surpasses it. Atlas, known in security circles as a consummate professional, has done an outstanding job in creating this second edition, which has twice as much material as the original edition. It also includes voluminous references and hundreds of outstanding clarifying photos in both color and black-and-white. Using humor and candid insight he incorporates all the concepts of CPTED, including design, construction, security countermeasures, and risk management strategies, and merges them into a highly informative reference manual for security practitioners at every level.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">There is a logical flow to the book. It lays a solid foundation by discussing architecture and its intent, as well as environmental crime control theories and premises liability. There is something here for everyone as it also discusses terrorism and critical infrastructure from differing perspectives. Several chapters on problem solving provide guidance on conducting threat, risk, and vulnerability assessments.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Throughout, Atlas provides a roadmap for merging security and CPTED into management principles and practices in a wide variety of facility settings, including healthcare facilities, critical infrastructure, ATMs, office buildings, parking lots and structures, and parks and green spaces. The latter portion of the book is reserved for concepts including lighting, LEED and GREEN certification, workplace violence, signage, data capture and analysis, and conducting CPTED surveys.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Atlas has created the definitive book on CPTED and security. Despite the magnitude and complexity of the science and art of security management, he has done an outstanding job of merging these and other disciplines and concepts together into a cogent display of information that the reader should be able to apply in a wide variety of locations and situations. If you are only going to buy one book this year, it is strongly suggested you purchase this one. </span> </span> </p> <hr /> <p> <span style="color:#800000;"> <strong> <span style="font-size:small;"> <span style="font-family:arial;">Reviewer:</span> </span> </strong> </span> <span style="font-size:small;"> <span style="font-family:arial;"> Glen Kitteringham, CPP, has worked in the security industry since 1990. He holds a master’s degree in security and crime risk management. He is president of Kitteringham Security Group Inc., which consults with companies around the globe. </span> </span> </p> </div>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465