Вы находитесь на странице: 1из 8

Task 1

The role of a security manager is varying according to the needs of an organization.

Security managers in different organizations are in charge of implementing security policies,

regulations, rules, norms and are in charge of taking care of the overall environment of the

organization. For Security managers in the different organization, the roles deviate and vary.

Security managers are even required to hire new employees and distribute tasks and duties.

Security managers are in control of the identification passes, the issues with these passes and

their access; managing the security control room; monitoring CCTVs; managing on-site parking;

Coordinating emergency evacuations, and responding to any on-site incidents that may occur.

Security managers are also in charge of writing and publishing corporate security protocols;

developing procedures for different scenarios; overseeing security; developing and maintaining

different prevention procedures and strategies for different scenarios, and collaborating with

different departments as security counterparts.

Different styles of security management can be found in the workplace. There are

different approaches to leadership that can be taken by a security manager. These management

styles are based on the Blake and Moulton Leadership Grid that categorize security managers

into the following:

 Impoverished

 Country Club

 Middle of the Road

 Authoritarian

 Team Leader
Figure 1. Blake and Moulton Leadership Grid

The impoverished style of management presents low results and low people. This style of

management is mostly ineffective. The results of such a style are mostly disorganized,

dissatisfying and disharmonizing for the organization. The authoritarian style of management or

Produce-or-Perish Management yields high results while making use of low people. The needs of

the team are regarded to be secondary to the productivity of the team. This managerial style is

autocratic and has well defined and strict policies, rules and regulations. The Middle of the Road

management yields high results with a medium number of people. A middle of the Road

manager tries to balance the results and the number of people. However, this management

strategy does not present a promising or productive output. The country club management style

yields low results while employing a large number of people. This kind of work environment is

very relaxed, and therefore, productivity suffers. The Team Leader management style yields high

results while making use of a large number of people. This style of management is the most

effective, as it connects the team leader with their team and creates a more productive and

efficient work environment.


Communication is a two way street between individuals. Communication involves a sender,

the message, and a receiver. The back and forth flow of information between the sender and the

receiver creates the pattern of communication. Communication can be of different types. Verbal,

non-verbal or written communications are the most common types of communication. For good

communication in an office environment, there are a number of effective strategies and

methodologies that can be applied. The effective ABCs of communication should be employed

in the workplace. These ABCs are composed of the following:

 Accuracy

 Brevity

 Clarity

The accuracy of information and communication between the sender and the receiver, in

the case of a work environment the employer and the employees or others, includes stating the

facts while providing the necessary evidence required. Brevity reflects the nature of being as

brief as possible while communicating. The second principle helps avoid the leakage of

unnecessary information to the employees or other people involved in communication. The third

principle Clarity helps the communicating parties be as transparent as possible and present their

ideas or opinions in a concise and eloquent manner.

Other strategies that can be employed for effective communication includes using the 7

C’s of communication. The 7 C’s of communication include Clarity; Conciseness; Concreteness;

Correctness; Coherence; Completeness and Courteousness. Clarity describes the clearness of the

message which is clear of any ambiguity. Conciseness describes the relevance of a message

while being free of any redundancy. Concreteness describes the specific facts and figures while

describing the message in a clear picture. Correctness influences the accuracy of information
while completeness describes the entire complete message that is conveyed. Courteousness

describes the friendliness and respect involved in a message.

Organizations and companies should view security as a fundamental part of their

existence. The security of any company should be the priority of the company. Security can

range from physical security to the security of the IT sector of the company. It is essential for

organizations and companies to prioritize the security of their entire infrastructure as it helps

safeguard the property, information, and data of the organization or company, the employers, the

stakeholders, the employees and the many other people involved in the workings of the

organization or firm.

Task 2

The commercial case for budget spending involves different steps and procedures. The

first step is to understand the importance of security for the company. Security should be the

priority of a company, as it is the first mitigation tool that can protect not only data and

information but also the different assets involved. In order to prepare budgets, the first is to

evaluate the different security requirements of the organization and the requirements of the

stakeholders and the data owners. The stakeholders and data owners are in charge of the data and

information and therefore have full authority of how their data and information is used. The

assessment of the risks involved in the project with also be carried out that can help solve the

issue of security for the company. The identification of the problem is the critical aspect while

defining it comes in next. The next step would be to examine the different options and create an

action plan or course of action that is feasible, effective and cost-efficient for the firm. Different

solutions for security should then be presented to the stakeholders for approval.
As a security manager, the critical area that I would be called in to manage includes the

financial management of the security department, while being expected to present regular reports

regarding the budget, the policies, the procedures, and different other factors. As a security

manager, the critical areas required will include budget development; profit and loss;

management of various accounts and other financial implications, sources, and projections. The

determination of the salary, the costs of different resources, the wages of the employees, their

bonuses and many other expenditure areas will be required management as a security manager.

The legislation in security management defines the different rules, regulations, policies,

and procedures that are involved in the security sector. The legislation is a set of rules and

policies that apply to the people working in an organization. The legislation includes different

information regarding the employee such as their past employment records, citizenship status,

visa status, etc. The Human Resources department is in charge of taking care of the different

screenings and legislation of a potential employee, while the security management team has to

ensure that the people employed are eligible and have the right to work for the company. The

legislation related to financial transactions that the security manager should be aware of include

ensuring that the transactions are done is safe and reliable. Moreover, the PCI Compliance

policies should be taken care of, while ensuring data encryption. PCI compliance policies and the

policies of the organization should be met and kept in mind to avoid any possible risk to the data

or information. A thorough security assessment should also be made of the different security

risks involved in the process, to ensure that any possible risks are met with and dealt with if the

time arises. Moreover, the backup of data and information should also be kept, in case of the loss

of data or information due to unforeseen circumstances.


Task 3

Leadership is literally defined as the act of leading one's employees or workers of an

organization, firm or business. leadership defines how a person treats other people and how

much they obey his wishes or commands. A leader is unlike a boss, who commands that tasks be

performed and completed on time. A leader’s duty is to motivate the employees and encourage

them towards achieving and completing their goals while working together for the benefit of the

employees. Different theories of motivation have been involved in the motivation of employees

and organizations. Theories of motivation are divided into two categories the Content Theories

of Motivation and the Process Theories of Motivation. The Content theories of motivation

include Maslow’s Hierarchy of Needs; McGregor’s Theory X / Theory Y; and Hertzberg’s Two-

Factor Theory. Whereas, the Process Theories of Motivation include the Equity Theory;

Expectancy Theory and the Goal-Setting Theory. For a security manager, the theories of

motivation that can be best used include the Maslow’s Hierarchy of Needs; the expectancy

theory, and the goal-setting theory. Maslow’s Hierarchy of Needs describes the hierarchy of five

general needs. These needs include the psychological needs; safety needs; the need for

belonging; needs of the personal esteem and self-actualization. The psychological needs of an

individual govern the basic needs for the survival of an individual. These basic needs include

food, water, and shelter. A salary or a wage usually meets these psychological needs of an

employee. The safety needs and requirements of an individual relate to the feelings of security

and freedom of an individual. The needs of belonging for an individual include the need for

human connection, affection, and love from other people. The esteem needs of an individual

refer to the need for self-esteem and self-image of an individual that are attained via achieving

some recognition or status in society. Self-actualization is the final stage, which reflects the
personal growth of an individual. Maslow’s theory can be defined best by explaining if an

individual was enrolled in a degree program, it would fulfil his personal development needs, but

might not fulfil his psychological needs such as food and rent.

Figure 2. Maslow’s Hierarchy of Needs

The expectancy theory represents the strength of an individual; their instrumentality and

their values. The theory suggests that employees and individuals are rational when they are

promised a reward. The Goal setting theory, on the other hand, focuses on the attainment of a

particular goal. The Goal Setting theory defines the relationship between the difficulty of a goal

and the performance of a task. The theory makes use of an effective action plan that can help

guide a person or organization towards attaining a goal. The theory makes use of the SMART

technique and encourages an organization to perform its best, given the resources and conditions.

Management and recruitment represent the tactics, strategies, and policies required that

are required for the recruitment process. The recruitment process is managed through a formal

process, in order to produce a healthy set of individuals who are excellent for the growth and

development of an organization or company. Recruitment can have long-lasting implications on

security management. For managing the recruitment process, it is essential to initially screen the

recruits and categorize them according to their skill sets. After the initial screening, a thorough
reduction of the number of applicants should be made, that helps in shortlisting the candidates.

The shortlisting is done on the basis of the capabilities, abilities, and qualities of an individual.

The final selection procedure is then carried out which helps in the recruitment of the employees.

For effective management and recruitment, recruiters require effective communication skills;

leadership skills; and good conflict resolution skills.

A Service Level Agreement or SLA is a contractual agreement. A Service Level

Agreement defines the relationship between the buyer and the supplier. The Service Level

Agreement defines the kind of relationship the buyer, and the seller has the products and services

that will be supplied and distributed by the buyer and the terms and conditions of the contract. In

the case of security management, for example, the buyer is the security department, while the

seller could be the guarding agencies, leasing companies, or hiring companies. The Service Level

Agreement helps define the boundaries of an agreement or contract. In case of conflicts, Service

Level Agreements help the involved parties clear out any issues or concerns that may arise in the

future. The Service Level Agreements help turn a good company into a great one. The Service

Level Agreement help maintain a formal agreement and formal communication process between

the business or organization and the clients. The role of Service Level Agreement for an

organization is to maintain the relationship between the buyer and the seller, so that both parties

can make use of the products and the services to the best of their abilities, in the most effective

and efficient way possible.

Вам также может понравиться