Security Management The Statement That Essay

Security managers must also pay attention to regulatory compliance with voluntary, self-regulation, and statutory considerations (Options for the development of the security industry). Voluntary regulation is self-imposed and may include the establishment of a professional regulatory body. Self-regulation occurs where the regulated profession has a majority on the regulating body; for example, medical professionals regulating the medical industry. Legal regulation entails legal requirements that must be followed in order to practice or operate.

In Organizational resilience: Security, preparedness, and continuity management systems -- requirements with guidance for use (2009), a process approach is described for achieving effective security management. A process approach, according to this source, involves:

Understanding an organization's risk, security, preparedness, response, continuity, and recovery requirements

Establishing a policy and objectives to manage risks

Implementing and operating controls to manage an organizations' risks within the context of the organization's mission

Monitoring and reviewing the performance and effectiveness of the organizational resilience management system

Continual improvement based on objective measurement

Security managers must also be capable at invoking change when things simply aren't working the way they should. Professional practices for security managers seeking to improve security within their organizations (2005) advises the creation of a working group to quickly initiate needed change, "one month to settle the "big picture" in a realistic way and identify a strategy to follow." The working group should include security professionals as well as other stakeholders such as non-security employees and customers. Further, to increase uniformity and appropriateness of protection, it is useful to establish threat levels, high medium and low, based on the type of business activity, population...

...

To succeed in appropriate identification of these factors, security managers will have to master a process approach to security assessment and implementation and will need to work in the confines of regulatory requirements. Finally, security managers will have to acquire change management skills to understand what needs to change and how to change it.
Bibliography

Options for the development of the security industry. Security Management Bulletin No: 2. The Security Institute.

Organizational resilience: Security, preparedness, and continuity management systems -- requirements with guidance for use (2009, March 12). American National Standards Institute, Inc.

Professional practices for security managers seeking to improve security within their organizations (2004). Security Business Practices Reference, Volume 7. ASIS Council on Business Practices.

Professional practices for security managers seeking to improve security within their organizations (2005). Security Business Practices Reference, Volume 6. ASIS Council on Business Practices.

Rachel Briggs, R. And Edwards, C. The business of resilience. DEMOS.

Risk management and the role of security management (2009, January). Security Management Bulletin No: 4. The Security Institute.

Security management stage 1 (core skills). Security Operations Management. ARC Training.

The principles of security. Security Management Bulletin No: 3. The Security Institute.

The role of the security manager. Security Management Bulletin No: 3. The Security Institute.

Sources Used in Documents:

Bibliography

Options for the development of the security industry. Security Management Bulletin No: 2. The Security Institute.

Organizational resilience: Security, preparedness, and continuity management systems -- requirements with guidance for use (2009, March 12). American National Standards Institute, Inc.

Professional practices for security managers seeking to improve security within their organizations (2004). Security Business Practices Reference, Volume 7. ASIS Council on Business Practices.

Professional practices for security managers seeking to improve security within their organizations (2005). Security Business Practices Reference, Volume 6. ASIS Council on Business Practices.


Cite this Document:

"Security Management The Statement That" (2009, October 01) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/security-management-the-statement-that-18987

"Security Management The Statement That" 01 October 2009. Web.19 April. 2024. <
https://www.paperdue.com/essay/security-management-the-statement-that-18987>

"Security Management The Statement That", 01 October 2009, Accessed.19 April. 2024,
https://www.paperdue.com/essay/security-management-the-statement-that-18987

Related Documents

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is

References Best practices in encryption. (2008). nuBridges.com. [Online]. Available: http://www.nubridges.com/keymanagement1/. Bryan, H. (2001). Reply to David Scott and C. Scott Shafer, recreational specialization: AC critical look at the construct. Journal of Leisure Research, 33(3), 344. By the numbers. (2008). Bass Pro-Shops. [Online]. Available: http://vocuspr.vocus.com/vocuspr30/Newsroom/ViewAttachment.aspx?SiteName=basspro&Entity=PRAsset&Atta chmentType=F&EntityID=112488&AttachmentID=7f9f9eb0-2281-4066-b382- c00619b835c8. Company overview. (2008). Bass Pro-Shops. [Online]. Available: http://www.onlinepressroom.net/basspro/. Gerstein, D.M. (2005). Securing America's future: National strategy in the information age. Westport, CT: Praeger Security International. Hepner, R. (2001, July 6).

Security Failures and Preventive Measures Summary of the Case The Sequential Label and Supply company is a manufacturer and supplier of labels as well as distributor of other stationary items used along with labels. This company is shown to be growing fast and is becoming highly dependent on IT systems to maintain their high end inventory as well as the functioning of their department. The case started with the inception of a troubled

Security in Healthcare The recent advances in technology -- databases that store personal medical records and information -- are bringing tools to patients, doctors and other healthcare professionals that were simply not available just a few years ago. There is hope that eventually, a doctor in Hawaii that is treating a medical emergency for a tourist from Florida, will be able to access the digitally kept medical and healthcare records

Security Study Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of

Data Privacy and Security
PAGES 5 WORDS 2026

Security Management Plan John's Hospital Privacy of client information is an assurance that every patient wants and this assurance is what the hospital can build patient confidence on. The lack of it therefore may have consequences such as loss of confidence in the hospital, loss of clientele and the emergence of a poor reputation. This paper looks at the St. John's Hospital which has experienced the leakage of confidential information a problem