Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Security Managers Should Be Managers First And Security Specialist Second - Essay Example

Comments (0) Cite this document
In today's world of high technology, security became part of the business of many private and government organizations and companies. From local to international projects, security became important on global activities. As a result, others see the importance that made them aware of involving security in anything they are involved.
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Security Managers Should Be Managers First And Security Specialist Second
Read TextPreview

Extract of sample "Security Managers Should Be Managers First And Security Specialist Second"

Download file to see previous pages Most companies are still far from having an elevated, coordinated security unit.
However, the kind of leadership and management drives an organization or a company towards either success or failure. Though everything can be learned and mastered after further experiences and further studies, present activities and accomplishments are qualifications for higher and bigger opportunities that influence others to get involved in the stated missions and visions.
Managing and addressing security carries a significant and potential critical responsibility on whatever number of human resource. Security managers' extensive scope of responsibilities require a trivial task - from risk assessment to the implementation of security policies, from human resource issues to the definition of security duties, including global exposure, and strategic planning, must be embraced and managed.
The assertion that, security managers should be managers first, and security specialists second, it is but right to present the role of a security manager in the arena of securing potential assets. Where and how they're involved, and let the evidences for qualifications, be seen on why they should be managers first.
The importance of continuous attention ...
Such attention is important for all types of internal controls, because of the factors that affect security are constantly changing in today's dynamic environment.
Managing the increased risks associated with a highly interconnected computing environment demands increased central coordination to ensure that weaknesses in one organizational unit's systems do not place the entire organization's information assets at undue risk. Security managers on the other hand, should filter what senior managers see, and even before that, ensure they only collect information someone both cares about and takes responsibility, for Security managers need to easily position information in the context of risk policy, policy enforcement, and related business imperatives.
Risk assessments improve business managers' ability to make decisions on controls needed in the absence of quantified risk assessment results, and engender support for policies and controls adopted, thus helping to ensure that policies and controls would operate as intended.
Through the reporting procedure, business managers take responsibility for either tolerating or mitigating security risks associated with their operations. And such procedures provide a relatively quick and consistent means of exploring risk with business managers, selecting cost-effective controls, and documenting conclusions and business managers' acceptance of final determinations regarding what controls were needed and what risks could be tolerated. exposure and strategic planning...
What an organization can and can't do strategy wise is always constrained by what is legal, by what complies with ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Security Managers Should Be Managers First And Security Specialist Essay”, n.d.)
Security Managers Should Be Managers First And Security Specialist Essay. Retrieved from
(Security Managers Should Be Managers First And Security Specialist Essay)
Security Managers Should Be Managers First And Security Specialist Essay.
“Security Managers Should Be Managers First And Security Specialist Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security Managers Should Be Managers First And Security Specialist Second


...that can be distributed to the concerned individuals so as to keep them updated (Woloschuk, 2010). The leading function requires a manager to influence and motivate the employees to work better. Employees visualize their leader as a practical and spiritual role model whom they can consult when in trouble. Therefore, a good leader keeps the lines of communication open with his/her subordinates. Nevertheless, a manager should be just enough of a leader so as to be able to influence others. Too much of leadership or influence is not consistent with a manager’s function (Mintzberg, 2004, p. 22). The function of controlling requires a manager to supervise and...
2 Pages(500 words)Essay

Project Managers and Functional Managers

...participate more as team leaders than as bureaucratic entities. They normally work with cross-functional teams with members picked from various backgrounds to bring diversity to the project team. A functional manager on the other hand exists to coordinate the functions of an institution on ongoing basis. Normally, a functional manager will be responsible for the day-to-day operations of the department they head (Meredeth & Mantel, 2011). They tend to be in charge of departments like finance, accounts, human resource, and security, among others. It is important to note that functional managers may also serve as project managers for small-scale projects in...
4 Pages(1000 words)Essay

Growing Managers

...problems and especially those related with empowerment, assertion, authority and power usage. The other is to hire an assistant manager whose role will be to take care of the paperwork while she is left with the fieldwork only. This will free her time to interact with the team and tutor them even through experience on how to increase sales. She will also have enough time to seek new customers (supplementing the work already being done painfully slow by her team) also to ensure that the monthly sales of the company continue to increase. Lastly, her regional supervisor should assist her in her report and other duties to provide guidance and orientation (which was never done in the first...
5 Pages(1250 words)Essay


...Security The paper delves into the concept of online security which is indeed a very fundamental concern in the present world. In this regard, Google is heavily investing in a series of authentication through the use of two-step verification. There is a greater need to realize a stronger user security and device identification and limit much of the insecurity. The paper identifies some of the common security threats that face people online. However, it is realized that while people are reactive about aspects of online security, they only invest slightly to reduce this risk. This is majorly done through passwords without strong authentication. Some of the...
4 Pages(1000 words)Essay

Nurse Managers

...factors that support or inhibit it. Alimo-Metcalfe (1996) find that fear of punishment or being disliked and isolated by nursing colleagues ranked highest as barriers to using skills and qualities required for an effective nurse manager in the workplace; these barriers were ranked second and third respectively in the studied literature. (Sellgren 2006: 348-355) Alimo-Metcalfe (1996) also find that nurses and midwives frequently practise management skills like effective communication, delegation, authority and decision making skills among peers but less often when communicating with nursing management or medical staff. These findings support Bondas (2006 332-339) view and...
10 Pages(2500 words)Assignment

Strategic Issues For Information Security Managers

...breaches and/or use the security breaches to cause havoc. Obviously this is a major problem, basically because the number of hackers out there is potentially unlimited. So, the risk that an information system will be hacked is very high. This is why companies should spend the extra money to invest in good information security systems and information security managers. These are complex issues facing IS professionals, and, as such, one should be aware of them. That brings us to the next point. III. Secure Communication Quickly, “…information security is now being perceived as a business enabler...
9 Pages(2250 words)Essay

Information Security

...Information Security: Balance and Management Introduction Determining an appropriate level of information security is often complicated by the factthat different professionals, be they general managers or IT specialists, often perceive security needs through a different set of priorities. Security specialists often see complexity and increasingly secure systems as a desirable business practice (Angus, 2007; Miller, 2005) whereas general managers are more likely to view information security practices within a larger business context. The objective data demonstrates a couple of points quite clearly. First, as noted by Angus, the organizations that decide to implement the strictest types of security are often much less secure than... ...
4 Pages(1000 words)Essay

Global Managers

...PROJECTS IN (Global Managers) TABLE OF CONTENTS Globalization..3 The future of globalization..4 First phase of globalization.4 Second phases of globalization...5 Global Company.. Cross Cultural Management....6 Skills require for the new global MGT....................................................6 MULTINATIONAL CORPORATION (MNC)..7 FACTORS IN EXPATRIATE MANAGERS' SUCCESS & FAILURE8 International Strategy..10 Manager in Saudi Arabia..11 What can you do to be a global manager..12 Values of Global Managers. Global Information Technology13 CONCLUSION..14 REFERENCES..16 Globalization It is the name for the process of increasing the connectivity and interdependence of the world's markets and businesses. This process has speeded... ...
21 Pages(5250 words)Essay

Security Management

...Assertion that security managers should be managers first and security specialists second Security programs differ in scope, complexity, and purpose. The security is needed for material, equipment, machinery tools, people, money, documents, technical and nuclear information, weapons, fuels, medical supplies, Research and development property, intellectual property, concepts, ideas etc., All these elements need to be protected under the security management program. The protection program can be executed against intrusion, trespass, acts of...
14 Pages(3500 words)Essay


...event. This consists of events including harm, injury or abuse to individuals or groups of people. Risk management is a procedure aimed at protecting individuals or a group of people. Amanda D’Costa (2011) introduced six steps in a risk management program. They are: i. Identifying risk and registering them; ii. Analyzing the risks using various methods of risk analysis; iii. Identifying the cause of these risks; iv. Identifying ways in which risks can be resolved; v. Developing an action plan to resolve risks; and vi. Making someone responsible and accountable for resolution of risk. As a first step risks need to be identified before they can be dealt with. Once they are...
7 Pages(1750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Security Managers Should Be Managers First And Security Specialist Second for FREE!

Contact Us