StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security Managers Should Be Managers First And Security Specialist Second - Essay Example

Cite this document
Summary
In today's world of high technology, security became part of the business of many private and government organizations and companies. From local to international projects, security became important on global activities. As a result, others see the importance that made them aware of involving security in anything they are involved.
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Security Managers Should Be Managers First And Security Specialist Second
Read Text Preview

Extract of sample "Security Managers Should Be Managers First And Security Specialist Second"

Download file to see previous pages

Most companies are still far from having an elevated, coordinated security unit. However, the kind of leadership and management drives an organization or a company towards either success or failure. Though everything can be learned and mastered after further experiences and further studies, present activities and accomplishments are qualifications for higher and bigger opportunities that influence others to get involved in the stated missions and visions. Managing and addressing security carries a significant and potential critical responsibility on whatever number of human resource.

Security managers' extensive scope of responsibilities require a trivial task - from risk assessment to the implementation of security policies, from human resource issues to the definition of security duties, including global exposure, and strategic planning, must be embraced and managed. The assertion that, security managers should be managers first, and security specialists second, it is but right to present the role of a security manager in the arena of securing potential assets. Where and how they're involved, and let the evidences for qualifications, be seen on why they should be managers first.

The importance of continuous attention . Such attention is important for all types of internal controls, because of the factors that affect security are constantly changing in today's dynamic environment. Managing the increased risks associated with a highly interconnected computing environment demands increased central coordination to ensure that weaknesses in one organizational unit's systems do not place the entire organization's information assets at undue risk. Security managers on the other hand, should filter what senior managers see, and even before that, ensure they only collect information someone both cares about and takes responsibility, for Security managers need to easily position information in the context of risk policy, policy enforcement, and related business imperatives.

Risk assessments improve business managers' ability to make decisions on controls needed in the absence of quantified risk assessment results, and engender support for policies and controls adopted, thus helping to ensure that policies and controls would operate as intended.Through the reporting procedure, business managers take responsibility for either tolerating or mitigating security risks associated with their operations. And such procedures provide a relatively quick and consistent means of exploring risk with business managers, selecting cost-effective controls, and documenting conclusions and business managers' acceptance of final determinations regarding what controls were needed and what risks could be tolerated. .global exposure and strategic planning.

What an organization can and can't do strategy wise is always constrained by what is legal, by what complies with

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Managers Should Be Managers First And Security Specialist Essay”, n.d.)
Security Managers Should Be Managers First And Security Specialist Essay. Retrieved from https://studentshare.org/miscellaneous/1525635-security-managers-should-be-managers-first-and-security-specialist-second
(Security Managers Should Be Managers First And Security Specialist Essay)
Security Managers Should Be Managers First And Security Specialist Essay. https://studentshare.org/miscellaneous/1525635-security-managers-should-be-managers-first-and-security-specialist-second.
“Security Managers Should Be Managers First And Security Specialist Essay”, n.d. https://studentshare.org/miscellaneous/1525635-security-managers-should-be-managers-first-and-security-specialist-second.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Managers Should Be Managers First And Security Specialist Second

Security Management Implementation

So when a security specialist starts applying the management theory, he can change the entire behavior of the organization towards security.... The security mangers who are authoritative to execute this security managers are the ones who are experts in the special fields.... In order to avoid, line and staff conflict, many organizations directly hand the responsibility of security management to the person who is expert and specialist in handling the particular security tasks....
13 Pages (3250 words) Essay

Air Transport Management and Operations

Further, actuating means that the manager should engage in those activities that are aimed at motivating and directing the employees; while controlling means that; managers should try to ensure that there is no deviation from norm or plan.... Whenever there is something wrong in the airport, such as economic problems, security threats, and weather disruptions, the managers must take action to remedy the situation.... managers in the airport industry must think of their actions in advance before implementing them as they can either lead to losses or benefits....
12 Pages (3000 words) Essay

Improving Palm Chemist Systems To Cope With The Expansion Needs

The second phased focused on the broadening of the first phase through the expansion of the project implementation scope, project team, and reduced difficulties during the implementation.... The areas of implementation of the system were mainly identified in the second phase.... The first phase of the Palmcy chemist was a detailed demonstration of electronic messaging through the use of the GSI system within its supply chain management.... They were mainly driven by some of the learning in the first phase, which includes - Identification and the bar coding of various pharmaceutical; and related products as manufactured by Palmcy chemist....
45 Pages (11250 words) Essay

The Key Competencies of a Project Manager

At times, certain things should be kept in mind like the fact that information is the single most significant thing in this whole process.... The paper "The Key Competencies of a Project Manager" highlights that in the business world of present times, project management has become an art and it is best advisable to let the project managers accomplish the very same since they are the artists and they can solve it in the best possible form.... ithin the literature review for this topic, the emphasis would be laid on the fact that project managers commit their own selves whole-heartedly towards the cause of the project at hand and that they exhibit some of the very intrinsic traits within their professional duties and their personal capacities which make them stand head and shoulders with the rest of the employees within the organization....
10 Pages (2500 words) Coursework

The Rookie Chief Information Security Officer

he report from each office and department should be presented to the Chief Information Security officer for evaluation.... The paper "The Rookie Chief Information security Officer" states that risk can be controlled through avoidance, sharing, reduction and retention.... IT Compliance Officer, security Officer, Privacy security Personnel and IT security Engineer should also present the problem faced in their daily duties....
9 Pages (2250 words) Term Paper

The Concept of the Managerial Escalator

hellip; The authors view the specialist background as the pedigree of the vast majority of managers.... Conflicts may arise between managerial activity and specialist activity because management position calls for exceptional expertise and knowledge for managing people.... Sometimes, managers may have the requisite specialist skills in a certain field but may fail to bring the best.... specialist skills alone may prejudice one's ability to identify the managerial aspect of a job, thus, making managers engage in an improper balance of activities....
8 Pages (2000 words) Coursework

Project Management for Security, Facility Managers

The second father of project management is considered to be Henri Fayol who created the 5 management functions.... … Project Management for security/Facility ManagersIntroductionThis essay paper starts by reviewing the available literature on the discipline of project management today.... In doing this, an assessment of project management as a feasible tool for Project Management for security/Facility ManagersIntroductionThis essay paper starts by reviewing the available literature on the discipline of project management today....
10 Pages (2500 words) Essay

Impact of Data Security on Enterprise Information Security Planning

Today, organizational managers have a critical responsibility to play in ensuring safety and security of their organization's information.... According to the Administration and Finance (2014), Organizations need to establish, implement, assess, monitor, review and enhance informational processes where necessary as a strategy towards meeting unique organizational and security goals.... ompliance with the Current Regulatory Standards IPSO (2016) asserts that data security impacts enterprise information security planning by demanding that the organization adheres and complies with the existing regulatory standards to achieve safety and security....
13 Pages (3250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us