Stepping up to the business plate

September 2012 News & Events

Hi-Tech Security Solutions spoke to Nash Lutchman, vice president and group head of protection services at Gold Fields, about the dynamics of the security manager’s role.

Nash Lutchman
Nash Lutchman

“Traditionally security managers managed physical security and facilities, and mostly protected this with fences, gates, guards, alarms and dogs. Physical security and guarding is still a key component in delivering a security strategy, however, there has been a shift in focus which has required a significant change in approach,” said Lutchman.

“Speaking from the position of a company that handles high-value assets and products, it has become necessary to look at our security risks from the viewpoint of the crime syndicates that target our operations. By understanding criminal business practices and how they impact the business you are securing, you are a step closer to mitigating the risk. Typically, we begin by identifying and understanding threat vectors, which leads to implementing dynamic risk management models to inform the deployment of resources, processes, procedures and technology in fit-for-purpose security solutions.”

Lutchman believes that it is critical for the security manager to understand issues such as integrated solutions, building management systems and new technologies (such as IP communications) so that he can incorporate them into his job description.

Step out of tradition

This is based on the premise that security spend and an efficient security strategy are aimed primarily at enabling businesses to ensure business sustainability, and therefore the security manager needs to step out of the traditional role of gatekeeper. In doing so, the security function ceases to be a grudge purchase and becomes a business function.

With the adoption of increased job functionality, the security manager is being increasingly exposed to the IT function within the business. “My view is that the IT manager should provide infrastructure to enable business efficiency, business availability and business continuity. The security manager, on the other hand, should focus on network integrity, network business risk mitigation and secure network architecture.”

Lutchman pointed out that this will require an expanded skills set. “While it would be rare for a security manager to be an IT specialist, they will need to understand and be able to implement the skills needed to check the integrity of company networks using, for example, a network penetration test. This of course, presupposes that the security manager has a thorough understanding of the existing risks and partners with the IT specialists to mitigate against these risks.

“The IT department normally has its own set of security systems in place – often standard in the network design – including firewalls, anti-virus software and intrusion prevention or detection systems. Typically, the IT professionals are focused on increasing the speed of the network and reducing any system downtime, thus focusing on business continuity and business availability. It is the security manager’s role to ensure that the business risk is being managed.”

A business enabler

The security manager needs to convince management that his function can evolve into one of a business enabler, rather than merely being a cost centre. Where security is seen as providing both business and security risk management, the job of the security manager is critical. In addition security managers, IT managers and risk managers should have an interactive relationship, exploiting synergies in their business portfolios and managing enterprise risk, thus enabling the achievement of business targets.

Furthermore, security managers need to sharpen their skills in the security value chain of security in terms of prevention, detection, risk management, investigation and intelligence. Business savvy is another job essential and an understanding of financials, return on investment, environmental risk analysis and sustainable development is critical for a successful security manager.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the editor's desk: We’ve only just begun
Technews Publishing News & Events
The surveillance market has expanded far beyond the analogue days of just recording and/or monitoring screens. The capabilities of surveillance technology today extend to black screen monitoring with ...

Read more...
The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
AI means proactive surveillance
DeepAlert Technews Publishing SMART Security Solutions AI & Data Analytics Surveillance
SMART Security Solutionsasked DeepAlert for some insight into how AI is transforming video surveillance, even to the extent of it being taught to protect the privacy of those in the cameras’ view.

Read more...
The state of the VMS market
Arteco Global Africa Milestone Systems Cathexis Technologies Technews Publishing Surveillance
SMART Security Solutions asked three platform vendors in South Africa, one that is developed and maintained in the country with an international market, for their views on the state of the VMS market and where it is headed.

Read more...
SAFPS issues SAPS impersonation scam warning
News & Events Security Services & Risk Management
The Southern African Fraud Prevention Service (SAFPS) is warning the public against a scam in which scammers pose as members of the South African Police Service (SAPS) and trick and intimidate individuals into handing over personal and financial information.

Read more...
Strong industry ties set Securex South Africa apart
News & Events Training & Education
Securex South Africa, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, is a meeting place of minds, where leading security, safety, fire, and facilities professionals come together, backed by strong ties with the industry’s most influential bodies.

Read more...
Connected commercial drone market to reach US$37.3 billion
News & Events Commercial (Industry) IoT & Automation
The global market for connected commercial drones is forecast to grow from US$18.6 billion in 2024 at a compound annual growth rate (CAGR) of 15% to reach US$37.3 billion in 2029

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Fully-integrated browser AI
News & Events
Opera Mini now provides all its smartphone users with its own free built-in browser AI, Aria, including AI chat, Ask Aria and image generation. According to an Opera survey, 80% of South Africans want AI tools integrated into their browser.

Read more...