Stepping up to the business plate

September 2012 News & Events

Hi-Tech Security Solutions spoke to Nash Lutchman, vice president and group head of protection services at Gold Fields, about the dynamics of the security manager’s role.

Nash Lutchman
Nash Lutchman

“Traditionally security managers managed physical security and facilities, and mostly protected this with fences, gates, guards, alarms and dogs. Physical security and guarding is still a key component in delivering a security strategy, however, there has been a shift in focus which has required a significant change in approach,” said Lutchman.

“Speaking from the position of a company that handles high-value assets and products, it has become necessary to look at our security risks from the viewpoint of the crime syndicates that target our operations. By understanding criminal business practices and how they impact the business you are securing, you are a step closer to mitigating the risk. Typically, we begin by identifying and understanding threat vectors, which leads to implementing dynamic risk management models to inform the deployment of resources, processes, procedures and technology in fit-for-purpose security solutions.”

Lutchman believes that it is critical for the security manager to understand issues such as integrated solutions, building management systems and new technologies (such as IP communications) so that he can incorporate them into his job description.

Step out of tradition

This is based on the premise that security spend and an efficient security strategy are aimed primarily at enabling businesses to ensure business sustainability, and therefore the security manager needs to step out of the traditional role of gatekeeper. In doing so, the security function ceases to be a grudge purchase and becomes a business function.

With the adoption of increased job functionality, the security manager is being increasingly exposed to the IT function within the business. “My view is that the IT manager should provide infrastructure to enable business efficiency, business availability and business continuity. The security manager, on the other hand, should focus on network integrity, network business risk mitigation and secure network architecture.”

Lutchman pointed out that this will require an expanded skills set. “While it would be rare for a security manager to be an IT specialist, they will need to understand and be able to implement the skills needed to check the integrity of company networks using, for example, a network penetration test. This of course, presupposes that the security manager has a thorough understanding of the existing risks and partners with the IT specialists to mitigate against these risks.

“The IT department normally has its own set of security systems in place – often standard in the network design – including firewalls, anti-virus software and intrusion prevention or detection systems. Typically, the IT professionals are focused on increasing the speed of the network and reducing any system downtime, thus focusing on business continuity and business availability. It is the security manager’s role to ensure that the business risk is being managed.”

A business enabler

The security manager needs to convince management that his function can evolve into one of a business enabler, rather than merely being a cost centre. Where security is seen as providing both business and security risk management, the job of the security manager is critical. In addition security managers, IT managers and risk managers should have an interactive relationship, exploiting synergies in their business portfolios and managing enterprise risk, thus enabling the achievement of business targets.

Furthermore, security managers need to sharpen their skills in the security value chain of security in terms of prevention, detection, risk management, investigation and intelligence. Business savvy is another job essential and an understanding of financials, return on investment, environmental risk analysis and sustainable development is critical for a successful security manager.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Value and industry insight
Securex South Africa Training & Education News & Events
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing.

Read more...
Gallagher Security achieves ISO 27001 recertification
News & Events Training & Education
Gallagher Security has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for Information Security Management Systems (ISMS). This accomplishment builds on previous certifications and reflects a continued commitment to the highest standards of information security.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
From the editor's desk: Showtime for Securex
Technews Publishing News & Events
We have once again reached the time of year when the security industry focuses on Securex. This issue includes a short preview, with more coming online and via our special Securex Preview news briefs. ...

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...