Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


The changing role of the security manager
March 2011, Enterprise Solutions

Hi-Tech Security Solutions spoke to three industry players about what they believe the impact of security is on different designations, such as HR, IT, safety/security, operations, risk, facility managers, financial director etc. Points such as how risk management and security will change the job descriptions of these traditionally non-security roles were raised. This article also looks at how the job of the traditional security operations manager is changing.

In pursuit of greater professionalism and increased technical competence it has been necessary for security managers to cease being solely concerned with loss prevention. For example, the role of the security manager has broadened to include knowledge of pertinent and topical matters such as the law, health and safety, fire prevention, security survey and risk assessment, business continuity planning, and crisis and disaster management.

Kevin Monk, technical director at Bidvest Magnum Group, said that he has seen a growing interaction between the security manager and the HR department at his clients. “This can be attributed to the fact that biometrics and identity management control have become so prevalent in access control. In integrated security solutions, companies now offer a time and attendance approach, which is a perfect example of the synergistic cooperation between security and HR.

“Time and attendance is applicable to every staff member entering the company’s premises but due to protection of personal rights, obviously the fingerprints can only be used for internal use.

“By involving shop stewards and the unions in the whole integration process, security managers are also increasingly involved in the legal side of the business since they need to be aware of the laws surrounding protection of information and identity. This will become more prevalent, not only for internal (staff) security, but also for access control for customers and suppliers as the Consumer Protection Act comes into effect,” he added.

Chief operations officer at Ideco Biometric Security Solutions, Marius Coetzee, said his company had undertaken an analysis of a number of major players in the security industry a few years ago to determine the benefits a secure visitor management system can bring to the various departments within an organisation.

“What we discovered was that assurance and accountability is the product of an increased focus on risk and compliance. The effort of risk management within any organisation therefore has a broad impact on the organisation.”

Coetzee pointed out that some of the results derived from this analysis included the impact on the financial department whereby the bottom line is increased through an investment in an access control infrastructure that prevents risk of losses and liabilities arising from unauthorised access. “We also found that companies benefited from the security department working closely with the HR department to ensure that all visitor information was gathered in compliance with the Occupational Health & Safety (OHS) Act.”

With regard to the IT interface, Coetzee said that there were great benefits to be derived from integrating company IT systems with existing electronic access management and appointment systems. “In short, by developing an open line of communication between the various departments and ensuring a basic understanding of what each department’s expectations are from a security and risk perspective, a complete enterprise-wide solution for managing visitor information is developed.”

What has security got to do with it?

Monk said that the role of the IT personnel in security issues has changed somewhat with the shift to IP-based peripherals. “We find that when we sell an integrated solution into a company they generally allow the IT personnel to have the final say because of the IP capabilities.

“This can be problematic if the IT personnel are not stringent in securing their entire IT solution, so there is a great need for communication between the security department, the IT department, the HR department and management to ensure across-the-board compliance and risk management. Ultimately, risk should be determined by the risk manager in collaboration with management.”

Risk assessment, simply put, is a means of having a degree of certainty about the future. Therefore, as decision makers, security managers have risk assessment available as a tool which allows them to make informed decisions. “The security or risk manager can add benefit to the overall equation by becoming more familiarised with IP solutions,” Monk said.

Teryl Schroenn, CEO of Accsys, said that another issue that needs to be considered with regard to the role of IT in security is the ready access to people’s personal details. “Whenever you apply for credit or sign up for a service you are required to provide your ID number or date of birth.

“With the advent of the electronic era this has presented its own set of unique problems, not least of which is the issue of passwords and pin codes. Research indicates that the majority of people use some form of their birth date as a means of accessing private and sensitive issues, so it does not take much effort for an opportunistic hacker to compromise your privacy.”

Two other problem areas, according to Schroenn, are the downloading of information from a PC or laptop onto a portable USB stick and the accessibility of information via social media such as Facebook. “How difficult is it for you to leave a facility with your flash stick? How do companies control this potential theft of information from a company’s database? Companies really need to implement layered security access in terms of who in the company is allowed access to certain sensitive information. However, unless this is carefully monitored it will have little value.”

Schroenn pointed out that IT security is evolving into more of a business-level discussion. “To date, IT personnel have been given a high level of access to information that should ideally be for management eyes only. In many cases this could be due to the ignorance of the operability of IT systems by anyone other than an IT specialist. This is why management and security personnel involvement in the security of IT systems needs to become more of a pressing issue.

“What we typically see is that a number of companies have a closed circuit with regard to access to personnel data, but the loop seems to break when financial systems are concerned. This is obviously an issue that needs to be addressed as a matter of urgency and the security manager could play a big role in helping to plug the holes,” Schroenn said.

With regard to Facebook, Schroenn said that the younger generation are not always cognisant of the risks posed when entering personal information onto their Wall. “However, unless they acknowledge that this information is in the public domain, they will never regard it as a high risk pursuit. Companies need to be aware of the high risk level introduced with careless Facebook behaviour by employees.

“A major challenge is that there are widely variant perceptions of what is acceptable in terms of information sharing. The primary driver for me is that there needs to be more effective communication between the security department and other company role players,” Schroenn added.

Enterprise-wide consultation

Monk believes that because companies are moving towards totally integrated solutions in terms of all their IT requirements, enterprise-wide consultation will definitely be key to success. “The individual departments need to motivate their IT security needs in terms of human rights and legislation compliance and the financial department needs to buy into the programme by seeing the budgetary benefits outlined by a more secure system.”

In today’s complex, interconnected world, protection of information assets has become a core corporate function that must be addressed at the highest levels of the organisation and not be regarded as a technical speciality with accountability relegated to the IT department.

Right at the bottom of the list, where the emphasis with respect to security should be placed, is allocating security to a specific role, which drives home the point about needing to see the security manager’s role as one piece of the puzzle.

It seems that security managers have little choice but to go beyond the simplistic loss prevention role and develop additional skills. These skills add to the competence of security managers to fulfil their role in the modern world and would include knowledge of the basic workings of the various interrelated departments in a company.

The question we need to ask is that, with other company departments becoming increasingly involved in security, does this mean that we will see the demise of the security manager? The answer would seem to be that the importance of the specialist roles, either in security management or in a security or risk management advisory capacity, is not going to diminish in the conceivable future. What is probable though is that the role of the security/risk manager may evolve into more of a facilitating capacity with regard to enterprise-wide security.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • The convergence of industrial security and life safety
    September 2014, Honeywell Security Group, Industrial (Industry), Enterprise Solutions
    Sensor integration, IP networks and GIS-based situational awareness enable ­convergence of industrial security and life safety.
  • Wireless security growing
    September 2014, Centurion Systems, Enterprise Solutions
    The future of security lies in the ether of this world, in the intricate invisible highways and byways of wireless communication that, second for second, trade information between sender and receiver.
  • Chasing operational efficiency
    September 2014, Sukema Integrated Solutions, Enterprise Solutions
    The Chase OEM management platform from Sukema offers a suite of operations enterprise management tools, focused on the areas of security, maintenance, assets, HR, rostering and health and safety, underpinned by people, process and technology.
  • Integrated management platforms
    August 2014, Enterprise Solutions
    Hi-Tech Security Solutions asked a few management platform vendors for their views on the market and the evolution of VMS and PSIM. Integration is all the rage, even for security management platforms
  • Nothing in common makes a good match
    August 2014, Enterprise Solutions, CCTV, Surveillance
    Canon has bought Milestone; Hi-Tech Security Solutions spoke to both companies to ask what the reasons were and what the impact on customers and the channel will be.
  • The ultimate guide to PSIM
    August 2014, Enterprise Solutions
    CNL Software has released a document describing exactly what PSIM (Physical Security Information Management) is and is not. This is a short extract highlighting the main points of the paper.
  • ROI is not a four-letter word
    August 2014, Honeywell Building Solutions, Enterprise Solutions
    As security budgets tighten across most industries, security managers face increasing demand from CEOs and CFOs, to be able to deliver a return on investment (ROI).
  • High-end surveillance storage
    August 2014, Enterprise Solutions
    Hi-Tech Security Solutions spoke to EMC and Oracle about what is important for the high-end surveillance storage market.
  • The right drive for surveillance
    August 2014, Enterprise Solutions
    Buying a DVR or NVR with a hard drive is very easy today, but all too often the drive has impressive specifications in terms of the storage capacity, but little other information about the capabilities of the device.
  • Workforce management essentials
    August 2014, Powell Tronics, Enterprise Solutions
    Powell Tronics will soon be complementing its hardware solutions from Impro, Morpho and Golmar with Synerion’s workforce management (WFM) solutions.
  • Making integration easier
    August 2014, Miro distribution, Enterprise Solutions
    PSIM can help security organisations to integrate multiple security systems providing all the necessary information in one view to allow operators to focus on important and critical events.
  • Mirasys management software
    August 2014, Security & Communication Warehouse, Enterprise Solutions
    Mirasys is an open video management platform to ensure easy integration of cameras, with over 1500 camera models already supported, as well as full ONVIF support.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.