The changing role of the security manager
March 2011, Integrated Solutions
Hi-Tech Security Solutions spoke to three industry players about what they believe the impact of security is on different designations, such as HR, IT, safety/security, operations, risk, facility managers, financial director etc. Points such as how risk management and security will change the job descriptions of these traditionally non-security roles were raised. This article also looks at how the job of the traditional security operations manager is changing.
In pursuit of greater professionalism and increased technical competence it has been necessary for security managers to cease being solely concerned with loss prevention. For example, the role of the security manager has broadened to include knowledge of pertinent and topical matters such as the law, health and safety, fire prevention, security survey and risk assessment, business continuity planning, and crisis and disaster management.
Kevin Monk, technical director at Bidvest Magnum Group, said that he has seen a growing interaction between the security manager and the HR department at his clients. “This can be attributed to the fact that biometrics and identity management control have become so prevalent in access control. In integrated security solutions, companies now offer a time and attendance approach, which is a perfect example of the synergistic cooperation between security and HR.
“Time and attendance is applicable to every staff member entering the company’s premises but due to protection of personal rights, obviously the fingerprints can only be used for internal use.
“By involving shop stewards and the unions in the whole integration process, security managers are also increasingly involved in the legal side of the business since they need to be aware of the laws surrounding protection of information and identity. This will become more prevalent, not only for internal (staff) security, but also for access control for customers and suppliers as the Consumer Protection Act comes into effect,” he added.
Chief operations officer at Ideco Biometric Security Solutions, Marius Coetzee, said his company had undertaken an analysis of a number of major players in the security industry a few years ago to determine the benefits a secure visitor management system can bring to the various departments within an organisation.
“What we discovered was that assurance and accountability is the product of an increased focus on risk and compliance. The effort of risk management within any organisation therefore has a broad impact on the organisation.”
Coetzee pointed out that some of the results derived from this analysis included the impact on the financial department whereby the bottom line is increased through an investment in an access control infrastructure that prevents risk of losses and liabilities arising from unauthorised access. “We also found that companies benefited from the security department working closely with the HR department to ensure that all visitor information was gathered in compliance with the Occupational Health & Safety (OHS) Act.”
With regard to the IT interface, Coetzee said that there were great benefits to be derived from integrating company IT systems with existing electronic access management and appointment systems. “In short, by developing an open line of communication between the various departments and ensuring a basic understanding of what each department’s expectations are from a security and risk perspective, a complete enterprise-wide solution for managing visitor information is developed.”
What has security got to do with it?
Monk said that the role of the IT personnel in security issues has changed somewhat with the shift to IP-based peripherals. “We find that when we sell an integrated solution into a company they generally allow the IT personnel to have the final say because of the IP capabilities.
“This can be problematic if the IT personnel are not stringent in securing their entire IT solution, so there is a great need for communication between the security department, the IT department, the HR department and management to ensure across-the-board compliance and risk management. Ultimately, risk should be determined by the risk manager in collaboration with management.”
Risk assessment, simply put, is a means of having a degree of certainty about the future. Therefore, as decision makers, security managers have risk assessment available as a tool which allows them to make informed decisions. “The security or risk manager can add benefit to the overall equation by becoming more familiarised with IP solutions,” Monk said.
Teryl Schroenn, CEO of Accsys, said that another issue that needs to be considered with regard to the role of IT in security is the ready access to people’s personal details. “Whenever you apply for credit or sign up for a service you are required to provide your ID number or date of birth.
“With the advent of the electronic era this has presented its own set of unique problems, not least of which is the issue of passwords and pin codes. Research indicates that the majority of people use some form of their birth date as a means of accessing private and sensitive issues, so it does not take much effort for an opportunistic hacker to compromise your privacy.”
Two other problem areas, according to Schroenn, are the downloading of information from a PC or laptop onto a portable USB stick and the accessibility of information via social media such as Facebook. “How difficult is it for you to leave a facility with your flash stick? How do companies control this potential theft of information from a company’s database? Companies really need to implement layered security access in terms of who in the company is allowed access to certain sensitive information. However, unless this is carefully monitored it will have little value.”
Schroenn pointed out that IT security is evolving into more of a business-level discussion. “To date, IT personnel have been given a high level of access to information that should ideally be for management eyes only. In many cases this could be due to the ignorance of the operability of IT systems by anyone other than an IT specialist. This is why management and security personnel involvement in the security of IT systems needs to become more of a pressing issue.
“What we typically see is that a number of companies have a closed circuit with regard to access to personnel data, but the loop seems to break when financial systems are concerned. This is obviously an issue that needs to be addressed as a matter of urgency and the security manager could play a big role in helping to plug the holes,” Schroenn said.
With regard to Facebook, Schroenn said that the younger generation are not always cognisant of the risks posed when entering personal information onto their Wall. “However, unless they acknowledge that this information is in the public domain, they will never regard it as a high risk pursuit. Companies need to be aware of the high risk level introduced with careless Facebook behaviour by employees.
“A major challenge is that there are widely variant perceptions of what is acceptable in terms of information sharing. The primary driver for me is that there needs to be more effective communication between the security department and other company role players,” Schroenn added.
Monk believes that because companies are moving towards totally integrated solutions in terms of all their IT requirements, enterprise-wide consultation will definitely be key to success. “The individual departments need to motivate their IT security needs in terms of human rights and legislation compliance and the financial department needs to buy into the programme by seeing the budgetary benefits outlined by a more secure system.”
In today’s complex, interconnected world, protection of information assets has become a core corporate function that must be addressed at the highest levels of the organisation and not be regarded as a technical speciality with accountability relegated to the IT department.
Right at the bottom of the list, where the emphasis with respect to security should be placed, is allocating security to a specific role, which drives home the point about needing to see the security manager’s role as one piece of the puzzle.
It seems that security managers have little choice but to go beyond the simplistic loss prevention role and develop additional skills. These skills add to the competence of security managers to fulfil their role in the modern world and would include knowledge of the basic workings of the various interrelated departments in a company.
The question we need to ask is that, with other company departments becoming increasingly involved in security, does this mean that we will see the demise of the security manager? The answer would seem to be that the importance of the specialist roles, either in security management or in a security or risk management advisory capacity, is not going to diminish in the conceivable future. What is probable though is that the role of the security/risk manager may evolve into more of a facilitating capacity with regard to enterprise-wide security.