classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


The changing role of the security manager
March 2011, Enterprise Solutions

Hi-Tech Security Solutions spoke to three industry players about what they believe the impact of security is on different designations, such as HR, IT, safety/security, operations, risk, facility managers, financial director etc. Points such as how risk management and security will change the job descriptions of these traditionally non-security roles were raised. This article also looks at how the job of the traditional security operations manager is changing.

In pursuit of greater professionalism and increased technical competence it has been necessary for security managers to cease being solely concerned with loss prevention. For example, the role of the security manager has broadened to include knowledge of pertinent and topical matters such as the law, health and safety, fire prevention, security survey and risk assessment, business continuity planning, and crisis and disaster management.

Kevin Monk, technical director at Bidvest Magnum Group, said that he has seen a growing interaction between the security manager and the HR department at his clients. “This can be attributed to the fact that biometrics and identity management control have become so prevalent in access control. In integrated security solutions, companies now offer a time and attendance approach, which is a perfect example of the synergistic cooperation between security and HR.

“Time and attendance is applicable to every staff member entering the company’s premises but due to protection of personal rights, obviously the fingerprints can only be used for internal use.

“By involving shop stewards and the unions in the whole integration process, security managers are also increasingly involved in the legal side of the business since they need to be aware of the laws surrounding protection of information and identity. This will become more prevalent, not only for internal (staff) security, but also for access control for customers and suppliers as the Consumer Protection Act comes into effect,” he added.

Chief operations officer at Ideco Biometric Security Solutions, Marius Coetzee, said his company had undertaken an analysis of a number of major players in the security industry a few years ago to determine the benefits a secure visitor management system can bring to the various departments within an organisation.

“What we discovered was that assurance and accountability is the product of an increased focus on risk and compliance. The effort of risk management within any organisation therefore has a broad impact on the organisation.”

Coetzee pointed out that some of the results derived from this analysis included the impact on the financial department whereby the bottom line is increased through an investment in an access control infrastructure that prevents risk of losses and liabilities arising from unauthorised access. “We also found that companies benefited from the security department working closely with the HR department to ensure that all visitor information was gathered in compliance with the Occupational Health & Safety (OHS) Act.”

With regard to the IT interface, Coetzee said that there were great benefits to be derived from integrating company IT systems with existing electronic access management and appointment systems. “In short, by developing an open line of communication between the various departments and ensuring a basic understanding of what each department’s expectations are from a security and risk perspective, a complete enterprise-wide solution for managing visitor information is developed.”

What has security got to do with it?

Monk said that the role of the IT personnel in security issues has changed somewhat with the shift to IP-based peripherals. “We find that when we sell an integrated solution into a company they generally allow the IT personnel to have the final say because of the IP capabilities.

“This can be problematic if the IT personnel are not stringent in securing their entire IT solution, so there is a great need for communication between the security department, the IT department, the HR department and management to ensure across-the-board compliance and risk management. Ultimately, risk should be determined by the risk manager in collaboration with management.”

Risk assessment, simply put, is a means of having a degree of certainty about the future. Therefore, as decision makers, security managers have risk assessment available as a tool which allows them to make informed decisions. “The security or risk manager can add benefit to the overall equation by becoming more familiarised with IP solutions,” Monk said.

Teryl Schroenn, CEO of Accsys, said that another issue that needs to be considered with regard to the role of IT in security is the ready access to people’s personal details. “Whenever you apply for credit or sign up for a service you are required to provide your ID number or date of birth.

“With the advent of the electronic era this has presented its own set of unique problems, not least of which is the issue of passwords and pin codes. Research indicates that the majority of people use some form of their birth date as a means of accessing private and sensitive issues, so it does not take much effort for an opportunistic hacker to compromise your privacy.”

Two other problem areas, according to Schroenn, are the downloading of information from a PC or laptop onto a portable USB stick and the accessibility of information via social media such as Facebook. “How difficult is it for you to leave a facility with your flash stick? How do companies control this potential theft of information from a company’s database? Companies really need to implement layered security access in terms of who in the company is allowed access to certain sensitive information. However, unless this is carefully monitored it will have little value.”

Schroenn pointed out that IT security is evolving into more of a business-level discussion. “To date, IT personnel have been given a high level of access to information that should ideally be for management eyes only. In many cases this could be due to the ignorance of the operability of IT systems by anyone other than an IT specialist. This is why management and security personnel involvement in the security of IT systems needs to become more of a pressing issue.

“What we typically see is that a number of companies have a closed circuit with regard to access to personnel data, but the loop seems to break when financial systems are concerned. This is obviously an issue that needs to be addressed as a matter of urgency and the security manager could play a big role in helping to plug the holes,” Schroenn said.

With regard to Facebook, Schroenn said that the younger generation are not always cognisant of the risks posed when entering personal information onto their Wall. “However, unless they acknowledge that this information is in the public domain, they will never regard it as a high risk pursuit. Companies need to be aware of the high risk level introduced with careless Facebook behaviour by employees.

“A major challenge is that there are widely variant perceptions of what is acceptable in terms of information sharing. The primary driver for me is that there needs to be more effective communication between the security department and other company role players,” Schroenn added.

Enterprise-wide consultation

Monk believes that because companies are moving towards totally integrated solutions in terms of all their IT requirements, enterprise-wide consultation will definitely be key to success. “The individual departments need to motivate their IT security needs in terms of human rights and legislation compliance and the financial department needs to buy into the programme by seeing the budgetary benefits outlined by a more secure system.”

In today’s complex, interconnected world, protection of information assets has become a core corporate function that must be addressed at the highest levels of the organisation and not be regarded as a technical speciality with accountability relegated to the IT department.

Right at the bottom of the list, where the emphasis with respect to security should be placed, is allocating security to a specific role, which drives home the point about needing to see the security manager’s role as one piece of the puzzle.

It seems that security managers have little choice but to go beyond the simplistic loss prevention role and develop additional skills. These skills add to the competence of security managers to fulfil their role in the modern world and would include knowledge of the basic workings of the various interrelated departments in a company.

The question we need to ask is that, with other company departments becoming increasingly involved in security, does this mean that we will see the demise of the security manager? The answer would seem to be that the importance of the specialist roles, either in security management or in a security or risk management advisory capacity, is not going to diminish in the conceivable future. What is probable though is that the role of the security/risk manager may evolve into more of a facilitating capacity with regard to enterprise-wide security.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Customising solutions is critical
    July 2015, Entertainment and Hospitality (Industry), CCTV, Surveillance, Asset Management, EAS, RFID, Enterprise Solutions
    Balancing the need to keep patrons happy and secure with the need to protect assets is a paradox that security and risk managers regularly face in the entertainment industry.
  • Efficient guarding with software
    July 2015, neaMetrics, EasyRoster, Access Control, Identity Management, Enterprise Solutions, Security Services & Risk Management
    The degree of success of a guarding company is largely determined by the degree of efficiency with which the company’s guard force is applied to the requirements of the company’s clients.
  • Safe sporting
    July 2015, Graphic Image Technologies, Entertainment and Hospitality (Industry), CCTV, Surveillance, Enterprise Solutions
    Surveillance solutions ensure safety and security for athletes and audiences at major sporting events. The key security requirements at sports stadia include the ability to identify incidents, preferably prior to them escalating, as well as potential threats.
  • The 12 critical commandments of crisis communications
    July 2015, Security Services & Risk Management, Enterprise Solutions, This Week's Editor's Pick
    While there are numerous ways to plan for a crisis and implement relevant strategies, there are 12 commandments that form the basis of a solid crisis communications and management framework.
  • The Revised BBEEE Codes: so what’s new?
    July 2015, News, Enterprise Solutions
    With the new codes, BBEEE is not a four- to five-week process anymore. To achieve the scores to meet compliancy and, more important, give your company a competitive advantage, you need to approach BBEEE strategically.
  • Huawei holds Safe City Africa Summit in Cape Town
    June 2015, IT infrastructure in security, Enterprise Solutions, Security Services & Risk Management, Remote Monitoring
    Huawei held its Safe City Africa Summit in Cape Town in April as a platform for more than 400 industry members to share insights, development trends and global success stories on public safety in cities.
  • Securing security equipment
    June 2015, Elvey Security Technologies, Security Services & Risk Management, Enterprise Solutions
    The greatest threat businesses face in South Africa today is not competition, but the ability to continue operations without electricity. But what about securing your security equipment?
  • Load-shedding chaos
    June 2015, BFR Digital, Security Services & Risk Management, Enterprise Solutions, Products
    What can be done to protect equipment from Eskom’s blackouts? BFF Digital has an answer.
  • Protecting Google-backed SA solar farm
    June 2015, TeleEye (South Africa), Enterprise Solutions, CCTV, Surveillance, Case Studies
    For the Jasper solar plant, TeleEye provided a complete perimeter surveillance solution consisting of TeleEye optical cameras, FLIR thermal imaging cameras, video analytics, alarm verification and alarm management.
  • The Eskom effect
    June 2015, Tyco Security Products, Security Services & Risk Management, Enterprise Solutions
    Proper maintenance and awareness is critical to remaining secure when the lights go out. ADT elaborates.
  • Load shedding presents an opportunity for crime
    June 2015, Cash Connect, Security Services & Risk Management, Enterprise Solutions
    For South Africa, load shedding will remain a reality for the foreseeable future and as the winter season approaches, the pressure on our power grid will increase even more, creating more opportunities for criminals.
  • Mobile content security and enterprise collaboration boosted
    June 2015, Enterprise Solutions, Information Security
    BlackBerry announced that it has entered into a definitive agreement to acquire WatchDox to further enhance its mobile security and give enterprises control over their files even after data leaves the corporate network.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.