Mini MBA: Security - free course from the Russian School of Management, training 250 hours, Date: December 5, 2023.
Miscellaneous / / December 08, 2023
Expert practitioner in the field of corporate security. Has experience in developing and implementing comprehensive business protection systems from external and internal threats.
Specialist in organizing the security system of enterprises of any form of ownership. Consultant on economic, physical, personnel security. Has practical experience in building corporate business protection systems from scratch.
Expert in protecting businesses from criminal prosecution for tax and economic crimes, lawyer at the Moscow Collegium “Knyazev and Partners”
Building an enterprise security system
• Risks, dangers and threats to the enterprise's activities. Comprehensive assessment of the security status of the enterprise. The concepts of “threat” and “risk” from the point of view of the security of a non-state enterprise. General classification of security threats to non-state enterprises. The main threats to the security of a non-state enterprise. Basic ways to identify threats. Algorithm for conducting a comprehensive assessment of the security status of an enterprise. Criteria for evaluation. Drawing conclusions about the current level of security of the enterprise and its needs for KSOS.
• Development of the concept of an integrated security system (ICSS) for the enterprise. Modern regulatory framework for the functioning of the enterprise's KSOB. Main principles of business security. A systematic approach to effectively ensuring business security. Algorithm for developing a concept for ensuring enterprise security. Algorithm for developing a comprehensive enterprise security system. Basic regulatory and legal acts for the creation and operation of the enterprise's KSOB.
• The main elements of the enterprise's KSOB. The structure of relationships, principles of creation and operation, main tasks and ensuring the viability of the enterprise’s KSOB. Functional model of a typical enterprise security system. The main tasks facing the structural elements of a standard enterprise security system. Basic principles for creating structural elements of a standard enterprise security system. Basic principles of the viability and effectiveness of a typical enterprise security system.
• Operating modes of the enterprise's KSOS. Reasons and principles of regime changes. Basic operating modes of the KSOB. Operating mode maps. The main reasons for changing the current operating mode of the KSOB.
• Operation of the enterprise in extreme conditions. “Crisis plans”: development, implementation and testing at the enterprise. The main tasks facing the security system in extreme operating conditions of the enterprise. Contents of the package, its development, admission conditions, basic measures for introducing a security system into the current work. Ways to prepare employees for effective actions within the framework of the implementation of the crisis plan.
• Procedure for conducting a security audit. Types of audits of the enterprise security system and their tasks Algorithm for conducting a comprehensive audit of the enterprise security system.
• Criteria for assessing the effectiveness of the KSOB activities. Main evaluation criteria. Determining the level of professional efficiency of the enterprise's CSOB. Economic efficiency of KSOB activities.
Corporate fraud. Internal audits and investigations
• Protecting the company from corporate fraud.
• Types of corporate fraud. Fraud triangle concept. The most typical scenarios of corporate fraud by employees. Signs of corporate fraud on the part of employees. Scenarios of corporate fraud by executives.
• Qualifying signs of fraud. Direct and indirect signs of corporate fraud. Signs of corporate fraud identified based on the analysis of relations with business partners within the framework of civil law relations.
• Signs of corporate fraud identified based on analysis of employee behavior. The concept of fraud symptoms in relation to human factors. Psychological techniques used to calculate fraudulent schemes. Building relationships between employees. Security services and personnel to detect and suppress corporate fraud.
• Indirect signs of corporate fraud associated with weaknesses in internal control (lack of separation of duties, lack of physical security, lack of independent checks, lack of appropriate authority, lack of relevant documents and records, etc.).
• Protection of the company's economic interests from fraudulent transactions. General action plan to combat fraud (prevention, detection, investigation). Identification of positions in the company with fraudulent risks. Key ways to eliminate corporate fraud opportunities.
• Organizational, personnel and control measures to prevent corporate fraud. The relationship between the company's security service and government investigative and law enforcement agencies in connection with initiation of criminal cases for acts classified under Article 159 of the Criminal Code of the Russian Federation (fraud).
• Procedures for conducting internal audits and financial investigations.
• What is an internal audit and in what cases is it carried out. Reasons for carrying it out. Drawing up an inspection matrix.
• Features of conducting internal audits on the most typical illegal actions of company employees. The procedure for interaction between divisions of the enterprise in the process of conducting an internal audit. Procedural norms that must be followed during its implementation.
• Use of a polygraph (lie detector) when conducting internal corporate investigations (inspections). Contact or non-contact polygraph, which is better? Legal and organizational side of the issue. Is it possible to fool a polygraph?
• Documentation of internal audit results. The ability to use the results as evidence of the employee’s guilt. Formation and procedures for storing nomenclature files with inspection results.
• Financial investigations in the company's contractual work. What is Forensic accounting? Audit of regulations for the implementation of civil legal relations. Analysis of instructions for contract work.
• Analysis of decision-making procedures in contract work. Methods for calculating signs of affiliation of an organization’s employees with companies that are parties to contracts.
• Collection and analysis of information on the company's counterparties for the presence of economic risks. Identification of dubious counterparties, non-standard and economically unjustified business and financial transactions. Tax risks. Identification of abuses during bidding and competitions.
• Documentary analysis of a company's civil law relations from the perspective of calculating signs of corporate fraud. Analysis of financial documents from the perspective of empirical laws (Benford's law). Signs of document forgery.
• Analysis of the procurement system and price reality. Unscheduled inspections (audits) of inventory and company property.
• Anti-corruption examination of contracts. Analysis of contracts concluded by the company from the perspective of economic risks, as well as economic feasibility.
• Checks of company employees holding positions with corruption (fraud) risks. Analysis of the powers and performance of an employee in the company. Conversations and interviews.
• International experience and corporate standards for protecting companies from financial crimes. International anti-fraud acts (UK Bribery Act, Foreign Corrupt Practices Act, Sarbanes-Oxley Act).
Collection and analysis of information when assessing the reliability of counterparties
• External threats to enterprise security. Modern methods of unfair competition and ways to counter them. A general definition of the concepts “threat” and “external threat” from the point of view of enterprise security. The main external threats to enterprise security. Modern methods of unfair competition. The main ways to counteract unfair competition methods.
• Determining the possibility of negative consequences and their neutralization. Main types of negative consequences. Basic methods of neutralizing negative consequences.
• Business intelligence as a tool for achieving competitive advantage. Regulatory and legal framework for functioning. Sources of information when conducting business intelligence. "Business Intelligence" and "Competitive Advantage". The main goals and objectives of business intelligence. Business intelligence as a tool for competitive advantage. Regulatory and legal framework for functioning. Sources and methods of obtaining information when conducting business intelligence.
• The place of business intelligence in a comprehensive enterprise security system. Technical means of conducting business intelligence. Functional model of a typical security system. Technical means of conducting business intelligence.
• “Competitive wars”: strategy and tactics for survival in the market. Commercial espionage in modern conditions: subjects of conduct, methods and techniques of access to closed sources of information. Methods for identifying and localizing consequences. "Competitive wars", "strategy" and "tactics". Strategy and tactics for survival in the market, from the point of view of the security system. “Espionage” and “commercial espionage” Subjects of commercial espionage. The main ways to access closed sources of information. Basic methods for detecting acts of commercial espionage. Basic methods of localizing commercial espionage attacks.
Practical Security Tools: Physical Security System
• Physical protection system (PPS). Terms and concepts. Principles, goals and objectives of creation. Basic elements of the PPS. Lines of protection. Technical safety equipment. SPS Management.
• Facility security. Types and methods. Principles of protection. Alarm button. The procedure for surrendering to protection. Security using dogs.
• Workshop: Calculation of the required number of security guards to protect the facility.
• Throughput and intra-object modes. Goals. Organization of access for employees, visitors, cars, carriages. Carrying and transportation of the ITC. Passes. PP equipment.
• Workshop: Searching a person using a metal detector.
• Security division. Tasks. Compound. Own division or outsourcing. Instructions. Selection of employees. Education.
• Workshop: Interview with a candidate.
• Algorithm for creating (modernizing) PPS. Analysis of the current state of potential threats. Drawing up models of violators. Planning of defense lines. Drawing up a threat matrix. Optimization of protection methods in accordance with financial and time constraints. Configuring the structure of the technical security system. Development of a system implementation plan. Development of regulations, action algorithms, instructions. Personnel selection. Education.
• Business game: Development of a solution using the PPS.
• Quality of security services. Standards and regulations. TK for security. Quality control.
• Workshop: Development of a Checklist.
• Features of the PPS of objects for various purposes. Area objects. Industrial facilities. Retail objects. Restaurants. Museums and galleries. Public events.
Criminal legal risks: concept, identification, reduction
• Modern trends in the criminal legal policy of the state in the field of business: improving criminal legal regulation in the field economic relations, strengthening the fight against kickback schemes, creating equal conditions for tax administration for everyone taxpayers.
• Types of risks. The likelihood of their occurrence, causes and consequences.
• Risks of initiating criminal prosecution.
• Probability of risks occurring.
• Rollback schemes. Facts indicating conspiracy.
• Fraud.
• Tax offenses and crimes.
• Reasons for the realization of risks.
• Initiating criminal prosecution and conducting a police investigation.
• Stages of police verification. Collection of information by the police.
• Algorithm for working with police requests.
• Analysis of typical operational-search activities.
• Consequences of criminal prosecution.
• Practical recommendations for minimizing risks.
• Action plan before and after the arrival of police officers.
• Methods of protection against illegal actions.
• Risk prevention. The value of prevention.
Leader and team
• What is the meaning of Leadership.
• The Leader's Path.
• How to develop leadership qualities.
• Power and influence of the Leader.
• Leader's personal effectiveness.
• How to stay on track.
• Leader and team.
• Systematic view of the team.
• Team management styles.
• Improving the efficiency of teams.
• Motivating employees and teams.
Leader and employees
• What does a Leader need for effective management.
• Purposefulness and result orientation.
• Forecasting and planning.
• Control and self-control.
• Making decisions.
• Problem solving.
• Delegation.
• Communication with employees.
• Development of employee potential.
Business system
• Attention management.
• Intellectual capital management.
• Resource balance.
• Strategy.
• Modern company design.
• VUCA world and requirements for companies.
• Systems and structures.
• Resource-target modeling.
• Management.
• Smart management in the digital world.
• Uncertainty and its impact on management.
Systems design
• Complexity management tools.
• 3 useful analysis tools.
• Method of scientific search for solutions to problems.
• Matrix of tools for designing control systems.
• Development of a value proposition.
• Digital transformation of business.
• Digital transformation team.
• Digital maturity scale.
• Competencies of top managers.
• Digital transformation technologies.
Marketing system and opportunity search
• Marketing functions. The evolution of marketing thought. Formation of value.
• Modern marketing: strategy, tactics, trends.
• Marketing management.
• Working with marketing information. Calculation of market capacity.
• Concentration index. Expert methods. Low-budget ways to analyze the market.
• Marketing research. Objectives of the task. Implementation specifics.
• WEB analytics. End-to-end analytics.
• Marketing research scenario. Construction of CJM.
• Algorithm for developing a new product. Generation of ideas. Design thinking.
• Blue ocean strategy. Value innovation. Innovative business models.
Creating and promoting value
• Positioning. Points of differentiation. Positioning niches.
• Positioning: algorithm for generating and constructing a map.
• Branding: development algorithm and identity.
• Naming. Name development. Registration of trademarks in the Russian Federation.
• Brand design. Packaging is a brand differentiation strategy. Brand KPIs.
• Brand strategy. Growth in the value of private label (private label). Brand portfolio optimization.
• Methods of setting prices. Psychology of price. Dynamic pricing.
• Strategy and tactics in communications. Algorithm for developing creative and media strategy.
• Integrated Internet marketing. Internet marketing tools.
Human Resource Management Strategy
• Human capital of the company. HR function audit.
• HR strategy.
• HR analytics.
• Personnel cost management: budget formation.
• Personnel cost management: cost optimization methods.
• Corporate culture of the company.
• Organizational change management: development / preparation for implementation.
• Organizational change management: dealing with resistance/maintaining change.
• Personnel marketing. Employer value proposition.
• Promotion of the HR brand when working with different generations of employees.
Key technologies in the field of human resource management
• Competency model.
• Personel assessment.
• Recruitment.
• Personnel adaptation. Mentoring.
• Personnel training and development.
• Theories of motivation.
• System of material motivation.
• Fixed part of remuneration. Grading.
• Variable part of remuneration. Management by objectives.
• Internal research into the state of human resources.
Financial instruments for increasing efficiency
• Budgeting as an effective technology for company management.
• Unit economics as a basis for financial modeling.
• Determining the profit zone when scaling a business.
• Identification of infrastructural limitations of the business development model.
• Forecasting business performance based on the budget of income and expenses.
• Formation of a balanced business development plan based on the cash flow budget.
• Formation of investment policy based on CFS indicators.
• Forecasting the need for resources and possible sources of business financing based on the forecast balance.
• Internal business assessment based on three key methods. Application of terminal value to increase business value.
• Business valuation based on economic added value.
Construction of a financial management system. Analysis of investment projects and risk management
• Practical application of existing reporting systems for company management tasks.
• Fundamental analysis of the company. Dashboard of operational analysis of the company.
• Key methods for diagnosing the financial condition of a business: historical, vertical, plan-fact.
• Increased efficiency through identification of immobilized assets. Asset turnover.
• Methodology for making management decisions based on the analysis of indicators of the cash cycle model.
• Performance analysis based on the financial results statement.
• Methodology for a comprehensive analysis of factors affecting the efficiency of operating activities.
• Key success factors when analyzing internal and external investment projects.
• Risk management as the basis of a business management system. Creating a risk matrix. Risk management methods.
• Analysis of the sensitivity of investment projects based on risk management and development of project implementation scenarios.
Flexible project management in business
• The place of flexible design approaches in business. Product Development, Customer Development and Lean Startup.
• Business model of the project and business.
• MVP. A minimally working product to find a solution.
• Pivot: when and how a decision or strategy should be changed.
• Agile in project management. Popularity of different Agile approaches.
• Scrum. The concept of Sprint. Roles in Scrum.
• Team members. Functions and required skills.
• Documents in the project: Product backlog. Sprint backlog. Burndown chart.
• Processes: Sprint planning, review and retrospective. Scrum meeting.
• Implementation of Scrum. Problems and solutions.
Classic or “planned” approach to projects
• 5-phase project life cycle. Participants and their roles according to PMBoK.
• Effective project launch. Stakeholder requirements and Charter.
• Project content. Hierarchical work structure (WBS).
• Calculation of task durations and project schedules.
• Calculation of the cost of work and the project budget.
• Risk identification and mitigation.
• Project execution management.
• Control of project deadlines, budget and content.
• Change management system.
• Project reporting. Project closure and lessons learned.