{"id":17253,"date":"2021-04-20T14:00:06","date_gmt":"2021-04-20T17:00:06","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=17253"},"modified":"2021-04-20T13:35:43","modified_gmt":"2021-04-20T16:35:43","slug":"security-audits","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/security-audits\/","title":{"rendered":"Security Audits"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-17254\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/04\/security-audits.jpg\" alt=\"Security Audits\" width=\"145\" height=\"202\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/04\/security-audits.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/04\/security-audits-108x150.jpg 108w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Christopher Finucane<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>European Interagency Security Forum<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> NGO security management is most effective when carried out in a systematic way. To do this, processes are applied in a logical order, to achieve desired conditions and outputs. For many NGOs, the security management system\u2019s primary purpose is to produce the conditions for an aid mission to be implemented within an acceptable risk tolerance in a given operating context.<br \/>\nA security management system (SMS) audit is an evidence-based review of the system\u2019s structure and functions and a test of the system\u2019s purpose.<br \/>\nAuditing provides managers and their staff with essential information from which to identify system strengths and weaknesses, allowing resources to be focused where most needed. The audit process also serves as a tool for NGOs to conduct due diligence of their internal management processes and determine if the security management system is fit for purpose.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2021\/04\/security-audits.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Christopher Finucane European Interagency Security Forum R\u00e9sum\u00e9: NGO security management is most effective when carried out in a systematic way. To do this, processes are applied in a logical order, to achieve desired conditions and outputs. For many NGOs, the security management system\u2019s primary purpose is to produce the conditions for an aid mission to be implemented within an acceptable risk tolerance in a given operating context. A security management&hellip; <\/p>\n","protected":false},"author":3,"featured_media":17254,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,23,6,19,112],"tags":[],"class_list":["post-17253","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-gestao-da-seguranca-empresarial","category-livros","category-risco-e-perdas","category-download"],"views":127,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=17253"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17253\/revisions"}],"predecessor-version":[{"id":17255,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17253\/revisions\/17255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/17254"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=17253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=17253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=17253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}