Stepping up to the business plate

September 2012 News & Events

Hi-Tech Security Solutions spoke to Nash Lutchman, vice president and group head of protection services at Gold Fields, about the dynamics of the security manager’s role.

Nash Lutchman
Nash Lutchman

“Traditionally security managers managed physical security and facilities, and mostly protected this with fences, gates, guards, alarms and dogs. Physical security and guarding is still a key component in delivering a security strategy, however, there has been a shift in focus which has required a significant change in approach,” said Lutchman.

“Speaking from the position of a company that handles high-value assets and products, it has become necessary to look at our security risks from the viewpoint of the crime syndicates that target our operations. By understanding criminal business practices and how they impact the business you are securing, you are a step closer to mitigating the risk. Typically, we begin by identifying and understanding threat vectors, which leads to implementing dynamic risk management models to inform the deployment of resources, processes, procedures and technology in fit-for-purpose security solutions.”

Lutchman believes that it is critical for the security manager to understand issues such as integrated solutions, building management systems and new technologies (such as IP communications) so that he can incorporate them into his job description.

Step out of tradition

This is based on the premise that security spend and an efficient security strategy are aimed primarily at enabling businesses to ensure business sustainability, and therefore the security manager needs to step out of the traditional role of gatekeeper. In doing so, the security function ceases to be a grudge purchase and becomes a business function.

With the adoption of increased job functionality, the security manager is being increasingly exposed to the IT function within the business. “My view is that the IT manager should provide infrastructure to enable business efficiency, business availability and business continuity. The security manager, on the other hand, should focus on network integrity, network business risk mitigation and secure network architecture.”

Lutchman pointed out that this will require an expanded skills set. “While it would be rare for a security manager to be an IT specialist, they will need to understand and be able to implement the skills needed to check the integrity of company networks using, for example, a network penetration test. This of course, presupposes that the security manager has a thorough understanding of the existing risks and partners with the IT specialists to mitigate against these risks.

“The IT department normally has its own set of security systems in place – often standard in the network design – including firewalls, anti-virus software and intrusion prevention or detection systems. Typically, the IT professionals are focused on increasing the speed of the network and reducing any system downtime, thus focusing on business continuity and business availability. It is the security manager’s role to ensure that the business risk is being managed.”

A business enabler

The security manager needs to convince management that his function can evolve into one of a business enabler, rather than merely being a cost centre. Where security is seen as providing both business and security risk management, the job of the security manager is critical. In addition security managers, IT managers and risk managers should have an interactive relationship, exploiting synergies in their business portfolios and managing enterprise risk, thus enabling the achievement of business targets.

Furthermore, security managers need to sharpen their skills in the security value chain of security in terms of prevention, detection, risk management, investigation and intelligence. Business savvy is another job essential and an understanding of financials, return on investment, environmental risk analysis and sustainable development is critical for a successful security manager.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
2025 Global OSPAs winners
News & Events
Bringing together the very best of the global security industry, the second Global Outstanding Security Performance Awards (OSPAs) was streamed live to a worldwide audience on 05 February 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.