Key Dimensions of Organisational Security Issue 2 Organisational Security 1 Research overview Organisations are becoming increasingly sophisticated in the way in which they organise security. An international study by researchers Briggs and Edwards (2006), conducted with corporate heads of security in the UK, India, South Africa and the US, identified how the profile of security within organisations is growing, and the portfolio of security departments is widening. Prior to the new millennium, it typically centred on the physical security of sites and buildings, people, equipment and products but 9/11, they found, proved to be an important turning point in the way organisational security was conceived at the board level. Today, as the authors highlight, the responsibilities of senior security managers may extend to responses to the risks associated with employee dishonesty, fraud, corruption and money laundering, as well as responsibilities for information security, business continuity planning and the management of crises including natural and man-made disasters. The widening scope of security risk is requiring security departments to become more aligned with the primary organisational objectives, a shift that is also about how to move successfully from “security as a cost” to “creating value from security”’ (ASIS International, 2010:5). This, along with the broader imperative for organisations to manage their risks more holistically, as set out in Issue 1: Enterprise Risk Management requires the security function to be better integrated with other core business functions. In this issue, the term ‘organisational security’ is employed, rather than the commonly used synonym ‘corporate security’, to emphasise that the considerations discussed apply to public and third sector organisations as well as private sector corporations. Policy and practice overview Such alignment has important implications for the way in which security is organised, its strategic approach, and the areas of responsibility falling within the security department. These topics are discussed in turn. Security within the organisational structure Effectively organised security, according to Briggs and Edwards (2006), allows for a clear 2 philosophy of security linked to the organisation’s wider goals to be established and promoted upwards to the board, across the business functions, and downwards to staff members throughout the organisation. It is likely to include heads of security sitting on cross-departmental risk management committees and working groups in order to link to other areas of the organisation. The authors provide no single model as to where security should be placed within the organisational structure. Based on their research, however, they argue that the most successful security departments have found a good ‘fit’ within the organisation so that security is seen as something that adds to its success rather than holding it back. In these instances, ‘business imperatives drive security, rather than the other way round’ (p.21). In such cases, Briggs and Edwards assert, security departments have the ear of the board and senior management team. This means that their leadership needs to be placed fairly high up within the organisational structure. Developing a security strategy A security strategy, approved by the board, is essential in order to demonstrate how the security function contributes to the broader aims of the organisation. As observed by Perpetuity Consultancy (2010), an effective security strategy helps to ensure good security management throughout the organisation and indeed is an important part of its corporate governance. A security strategy that is directly related to the wider organisational strategy is necessary in order to give a sense of direction to the security functions (including, for example, physical and personnel security), establish priorities, guide security activities, and document how security adds value to the organisation. Notably, in the research that informed their Security Strategy Toolkit, Perpetuity Consultancy found that only a third of the organisations in their study had a security strategy that had been approved by the board. This highlights the considerable room for improvement in the delivery of security that is, in practice, present in most organisations. The development of an organisational security strategy involves an approach that is no different to other forms of decision-making at Phase 1: strategic analysis Phase 2: strategic design • Strategic analysis • Threat assessment • Vulnerability assessment • • • • Phase 3: strategic implementation Phase 4: strategic review • Implementation plan • Communication strategy • Regular performance monitoring • Strategic review Defining the rationale Defining the strategic objectives Establishing performance requirements Outlining the security strategy Table 1: Phases in an organisational security strategy initial threat assessment and vulnerability analysis to identify the risks, a security audit encompassing an extensive review of the security function, and the analysis of the political, economic, social, technological, environmental and legal factors that will affect the security strategy’s success (known as PESTEL analysis). This is covered in more detail in Issue 4: Security Risk Management. the strategic level of an organisation. It begins with an initial analysis/assessment phase, followed by subsequent stages of design, implementation and review. The primary elements of such an approach, exemplified in the methodologies published by Perpetuity Consultancy (2010) and the European Commission (2010), are summarised in Table 1 above and described in more detail below. The strategic analysis phase involves a substantial intelligence gathering exercise, based on the analysis of the following elements of the organisation: • Its reason for existing, expressed in terms of its values, vision and/or mission, and main objectives, based on, for example, a review of documentation and stakeholder interviews to illuminate both the business strategy and the risk appetite of the organisation; • Its internal strengths and weaknesses, as well as the external opportunities and threats in the environment in which it operates (based on, for example, a SWOT analysis); • Its resources (financial, physical, human and intangible, e.g. brand or reputation), competencies (strategic, functional and technical) and capabilities (organisational, human, social and customer capital) to perform effectively; and • The security risks and threats it faces. Such a process needs to be based on a systematic risk assessment exercise, beginning with an 3 The next phase is strategic design, comprising the following steps: • Defining the rationale underpinning the strategy, including mission and vision statements that summarise its overall approach and the aspirations underpinning it, to ensure that all stakeholders will have a clear understanding of the underlying aims; • Defining the strategic objectives or specific goals underpinning the strategy, including generic goals to protect the company’s people, property, assets and processes, and delivery objectives such as improving the integration of security in the business processes; • Establishing the performance requirements of the security strategy and its components (such as physical or personnel security) and ways of monitoring performance, discussed more fully in Issue 5: Security Metrics. Examples might include achieving a demonstrable reduction in the number of security incidents, based on rigorous reporting and recording of all incidents, and demonstrating employee satisfaction with security education and training processes measured through administration of a survey; and • Outlining the security strategy in a comprehensive document tailored to a lay audience, including the key assumptions on which it is based, the main dimensions of the strategy (again, such as physical or personnel security) and related objectives, and the key human, financial and technical resources required to achieve its delivery. The strategic implementation phase involves setting out a clear implementation plan for the security strategy. This should include the start and end dates for the plan, the key objectives, priorities and the actions required to meet each one, the resources provided, and a robust performance specification, incorporating the key performance criteria established in the previous phase. Implementing the strategy will include communicating it across the company which, as Perpetuity Consultancy (2010) observes, may require the development of a communication strategy and plan if the organisation is large in size. This might begin with engaging representatives of key audiences (for example the board, managers, union representatives and staff members) at an early stage, and considering the range of different options for disseminating the strategy, ranging from the company intranet, to newsletters, workshops, staff handbooks and nominating individuals in key roles within the organisation to act as champions of the strategy. The final strategic review phase is important to ensure that the strategy is working as expected. This requires the comprehensive performance monitoring based on the approaches set out in the design phase to take place. It also involves subjecting the security strategy to on-going review to ensure that the assumptions on which it is based, the objectives and the mission remain relevant and appropriate. Security areas of responsibility A comprehensive organisational security strategy will reflect a number of principal functions, with separate objectives, plans, 4 policies and procedures including specific performance measurement approaches. The research by Briggs and Edwards (2006) illustrated how, in practice, the portfolios of corporate heads of security vary considerably and can be broad in scope or more narrowly concentrated around physical security (protective security of property, processes, equipment and people). Other dimensions may include personnel security (associated with insider threats from employees or contractors), information security, business continuity, investigations, counterfraud and security education and awareness training. Two public sector models usefully elaborate on some of these functions, the Security Policy Framework of the Cabinet Office of the UK Government (2012) and the Protective Security Policy Framework of the Australian Government Attorney General’s Office (2012). Physical security Physical security involves the use of physical controls to protect business premises from unauthorised access and loss, harm or destruction of property. It can be considered in terms of physical ‘layers’, the external layer protecting the approach routes, perimeter, estate and buildings of an organisational premises by such means as fences, walls, gates and lighting, as well as engineering and technological measures. These can include intruder alarms, closed circuit television systems, security barriers to control traffic or protect against serious threats such as ram-raiding or terrorist attack, and blast resistant glazing. The internal layer comprises access control systems such as secured entrance lobbies and swipe card entry systems, postal screening, and secure storage areas, such as strong rooms and safes. Other controls such as guards and identification badges support the general delivery of physical security in an organisation. Personnel security The overall purpose of personnel security, according to the UK’s Security Policy Framework (Cabinet Office, 2012:13), is ‘to provide a level of assurance as to the trustworthiness, integrity and reliability of employees, contractors and temporary staff’. Its delivery needs to incorporate effective risk assessment, screening of personnel (beginning, for example, with verification of identity, employment history and right to work in the country), secure contracting (ensuring that contractors also have measures in place that are satisfactory to the organisation) and on-going control measures. Such on-going measures may include monitoring employee access, and managers being alert to signs of vulnerability among their staff to third party influence or opportunistic criminality, such as depression, excessive alcohol consumption, emotional instability and financial difficulty. Information security Organisational information security strategies are needed to ensure that access to information assets within an organisation is correctly managed and safeguarded to an agreed and proportionate level, as well as being compliant with data protection requirements. They apply to all stages in the information lifecycle: creation, storage, transmission and, as appropriate, destruction (Cabinet Office, 2012). The necessary policies and procedures cover two dimensions, the first being technical security measures such as firewalls, data encryption and antivirus software, which fall primarily within the remit of organisations’ information technology departments. The second dimension, in which security departments play a greater part, is administrative security, including user account management, change management and physical and logical access control. The benefits of converging organisational security and IT responsibilities in some aspects of the delivery of information security are discussed in Issue 3: Converged Security Management. Security education and awareness training Once other security functions have been implemented, employees need to understand their responsibilities in contributing to the protection of organisational assets. This should involve establishing the audience requiring training, the topics in which they need to be trained, the learning objectives for the training and the methods of delivery, and then designing 5 the training materials. Implementation of the training may include devising an overall plan for delivering the training, some initial piloting of the programmes developed, the modification of training materials as required and the delivery of the programmes. Finally, there is a need to assess that learning objectives are being effectively met, and that staff members are satisfied with the training programmes. Investigations Objectives underpinning a workplace investigation, as summarised by Gill and Darroch-Warren (2010), include identifying dishonest employees, applying internal disciplinary measures or justifying dismissals, facilitating civil litigation or criminal prosecution, and initiating revision of policies and procedures. They describe investigations, when properly conducted, as a critical part of an organisation’s risk management strategy, although they note how conflicting imperatives can create uncertainty as to what is the best outcome. On the one hand, a willingness to investigate and sanction employees concerning such incidents as cases of theft or fraud may reassure honest staff members, as well as communicating a strong message to those who may themselves be tempted to commit dishonest acts. Yet on the other, investigations can be costly, or can lead to other adverse outcomes such as negative publicity or employee claims against the company. Such conflicting needs must be balanced against each other before it is decided whether or not to proceed with an investigation. Investigations share a common, phased approach which, as Gill and Darroch-Warren argue, needs to be ‘systematic, thorough and legally compliant’, as well as ‘proportionate to the matter at hand’ (p.14). Business continuity Business continuity management (BCM) is a critical aspect of the risk management of an organisation in which security departments are becoming increasingly involved. It encompasses identifying potential threats to an organisation and how these could impact on business operations, as well as providing a framework for establishing organisational resilience against these threats and their impact. Business continuity solutions include crisis management measures and a disaster recovery strategy, relating to the recovery or continuation of an organisation’s technology infrastructure. Counter fraud Counter fraud is an inter-departmental responsibility, since it involves control systems being built into the operations of the organisation, needs to be underpinned by effective personnel and information security, and relies on a comprehensive internal audit process. Threats derive from both insiders and outsiders to an organisation, and can take a wide variety of forms depending on the nature of the organisation. Examples include benefit fraud, credit card fraud, expenses fraud, health care fraud, insurance fraud and welfare fraud. Security departments often have responsibility for preventing, investigating and applying sanctions against fraud in their organisations. of other departments, in order to achieve such alignment, as well as reviewing the security operations in the context of the overall strategy. Further reading • ASIS International (2010) Enterprise Security Risk Management: How Great Risks Lead to Great Deeds: A Benchmarking Survey and White Paper. Alexandria, VA: ASIS International. • Australian Government Attorney General’s Office (2012) Protective Security Policy Framework, Canberra: Australian Government Attorney General’s Office, available at http://www.protectivesecurity. gov.au/Pages/default.aspx (accessed 13/06/14). • Briggs, R. and Edwards, C. (2006) The Business of Resilience: Corporate Security for the 21st Century. London: Demos, available at: http://www.demos.co.uk/ publications/thebusinessofresilience (accessed 13/06/14). • Cabinet Office (2012:13) HMG Security Policy Framework. London: Cabinet Office, available at: http://www. cabinetoffice.gov.uk/resource-library/ security-policy-framework (accessed 13/06/14). • Cavanagh, T.E. (2005) Corporate Security Measures and Practices: An Overview of Security Management Since 9/11. New York: The Conference Board, available at: http://www.conferenceboard.ca/documents. aspx?did=1205 (accessed 13/06/14). • European Commission (2010) A Reference Security Management Plan for Energy Infrastructure. Brussels: European Commission, available at http://ec.europa. eu/energy/infrastructure/critical_en.htm. (accessed 13/06/14). • Gill, M., Burns-Howell, T., Keats, G. and Taylor, E. (2007) Demonstrating the Value of Security, Leicester: Perpetuity Research. Free copies can be requested from http:// www.perpetuityresearch.com/publications. html. Evaluation Since security departments are so varied in their scope, there is no definitive model of organisational security. However, security risks need to be taken as seriously as other risks to an organisation, and therefore should be a concern of the board and senior management team, with the organisational head of security reporting into those upper tiers of an organisation. As recognised by Briggs and Edwards (2006), physical security has been the traditional emphasis of organisational security but this narrow focus is coming to be seen as old fashioned, especially in large, multi-functional organisations, due to growing recognition of the inter-connectivity of different types of organisational risk. An effective security strategy will be closely aligned with an organisation’s primary business objectives, adopting a holistic and organisationcentred approach to the management of security risks in line with an enterprise risk management strategy for the organisation as a whole. Much of the day-to-day work of the head of security is therefore likely to involve communicating with senior members of the organisation and heads 6 • Gill, M., Taylor, E., Bourne, T. and Keats, G. (2008) Organisational Perspectives on the Value of Security, Leicester: Perpetuity Research. Free copies can be requested from http://www.perpetuityresearch.com/ publications.html. • Perpetuity Consultancy (2010) Security Strategy Toolkit. Leicester: Perpetuity Research. Free copies can be requested from http://www.perpetuityresearch.com/ publications.html. 7
© Copyright 2026 Paperzz