Security Manager Preparedness

Improved Essays
Before a security manager can “sell” a strategy, the manager must first have a keen awareness of what the organization does and how security fits into it. The security manager must fully understand the organizational mission and what processes within the organization are needed to accomplish the mission. The security manager must be able to identify organizational assets, liabilities and threats. The vulnerability of system processes are identified and rated on a scale as to likelihood. Conducting a proper risk assessment which focuses efforts on the greatest hazards will help mitigate the confrontation of risks which threatens an organization’s survival. Security managers use the preparedness phase in the development of plans in accordance …show more content…
These could be personnel who control departments key to the organization’s function or perhaps the chief financial officer who controls budgeting. There are two reasons for this strategy; it gives the chance for the security manager to become better educated on particular processes while simultaneously communicating security objectives. The security officer may have been intent on implementing a new process only to find out it has been tried before and failed. It might be wise to be armed with critical information before approaching leadership with your plans. Another reason I think its important to involve other team managers is synergy. Personnel within organizations must work together in order to effectuate a common good. Fay (2010) describes the forging of healthy relationships across the board and up and down the organization as part of the “buy-in” process. This is not a one way flow of information but must be part of a mutual process in which security is actively promoted by leadership and made a “visible strategic priority” (Fay, 2010, p. 305). Bringing in people who support the security manager plan could only strengthen any proposals and facilitate the buy-in process. If, for example, the CFO is not in favor of a proposal, the CSO may need to develop a more convincing strategy backed with statistical data. The CSO may have to slightly alter a developing plan before presenting it to leadership based on the input of other members. I think early debate prepares the CSO in the anticipation of an institutionalized response or may expose problems within the plan. Although, this could all be dismissed as a “feel good” strategy, I would submit that we do not operate in a vacuum when making decisions. It is healthy to hear from managers who may suffer the greatest impact from implemented strategies.

Related Documents

  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    There are specific leadership issues that are facing today’s organizations. One, specific leadership issue is that homeland security issues are not discussed on the job by employees because Senior Leadership will not allow them to do so. Second, specific leadership issue is that employees involvement in emergency readiness is not encouraged by senior leaders, and they say employees that are on the job can not be involved in homeland security. Third, specific leadership issue is that only a few amount of Senior leaders is involved in deploying homeland security in their organization. Fourth, specific leadership issue is there is no community involvement in the organization involving homeland security.…

    • 842 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Internal communication elements, teambuilding ventures and activities that reveal an openness to the proposed changes must be conducted. The following journal article offered some valuable insight on creating a special team or coalition to handle the coming determents to change. It communicates thusly, “As a profession, the Army cannot lose sight of the purpose behind organizational design. In an effort to retain their corporate identity, leaders cannot stand as a special interest bastion defending jurisdictional dogma; their collective charge is ensuring that the Army serves the Nation. No organizational design can be sacrosanct.…

    • 1008 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    V-Care Security Solutions

    • 150 Words
    • 1 Pages

    Our present day security solutions involve threat assessment, surveillance and analytics, automated access and access control systems and a number of biometric and other devices that ensure that lives are protected keeping threats out of range. Security solutions apply to intellectual property that ranges from trade secrets to highly qualified people. It involves information systems on one hand…

    • 150 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Two hundred and fifty national leaders—CEOs from some of America’s largest companies, as well as executives from government, labor and academia gathered in Pittsburgh to share their experiences and insights on the right balance between competitiveness and security” (Opstal, 2007). There are several aspects as to how the Homeland Security Assessment process follows the Council on Competitiveness Business Model. Both, the Homeland Security Assessment process and the Council on Competitiveness begin their process with virtually…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Winter’s Tale Publishing; a Hack job The case centers around the liabilities in which poor management can expose a company as well as the side effects that a cyber-intruder can have on a business' operations. Secondary issues explored include, auditing the company’s framework to evaluate their internal control structure, designing a secure IT network for start-up businesses, and address their legal and marketing worries if the organization were to be hacked.…

    • 1952 Words
    • 8 Pages
    Improved Essays
  • Superior Essays

    Additionally, deliberate and comprehensive risk management makes the economy, resources, the nation, and way of life more flexible through anticipating, corresponding, and preparing for both external and internal hazards. The significance of a risk management strategy is in the capability to differentiate between diverse choices in larger context rather than in the endorsement of a particular action response. Risk management is vital for the leaders of homeland security in prioritizing contending requirements and permitting comprehensive approaches to determine performance and specify…

    • 1169 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The Secret Service

    • 1262 Words
    • 6 Pages

    The Secret Service special agents duties include both investigations and protection. Special agents investigate financial crimes such as counterfeiting of currency, false identification, credit and debit card fraud, computer fraud, forgery or theft of U.S. They also have to protect the president in certain situation as well like, when he's on the move to go somewhere they are with him at all times. Just to make sure nothing were to happen to him or so he doesn’t get assassinated at that time as well. Abraham Lincoln was the one who created the secret service as part of the Treasury Department 150 years ago, he signed the bill the day he was shot.…

    • 1262 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Requesting and allocating resources is always a big challenge for any organization. Who gets what, where, when, and how can make or break the group. This is epically crucial with funding. Money makes organizations like homeland security go around, put it the wrong department and it may lead to some catastrophic event. The risk matrix enables the bean counter to place money where they will get the best return or best bang for its buck.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Abc Company Case Study

    • 2257 Words
    • 10 Pages

    Security and safety services are a perfect example of a non-mission critical support function. Because of this shift, the contract security service in all its forms, continues to grow annually in all areas, including physical security and cybersecurity. Industry studies conducted by the American Society for Industrial Security (ASIS) point to continued outsourcing of security services by both large and small companies (The United States security industry, 2013). This corporate shift allows companies to focus on their core mission and thus improve bottom line performance. Security managers who can effectively outsource all or part of their security program will find they have more time to focus on the core mission of the company versus spending time dealing with the day to day burden of managing security officers and related…

    • 2257 Words
    • 10 Pages
    Great Essays
  • Superior Essays

    Security – Engineering for Everyone! Corporations in all sectors share a common goal: to make money. This is not an eye opening statement, but the following might be: “Corporations in all sectors share a common theme – they barely (if ever) care about security.” While some reading this may simply stop at that statement and whisper “he is insane,” many tasked with information security would wholeheartedly agree with me after reading this in its entirety.…

    • 1190 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    145). However, Sue Stark would have focused on calling for another meeting within which both the QI and executive teams would engage in a lively discussion on the recommendations presented. Engagement between all parties involved in quality improvement plays a central role towards ensuring that the recommendations provided suit the interests of all parties. Use a strategic communication could be critical in this case. According to Borkowski (2016), strategic communication is an attempt made by management to strategically communicate the goals of the organization.…

    • 1275 Words
    • 6 Pages
    Improved Essays