SecurityManagement
Nameof the Student
InstitutionAffiliation
SecurityManagement
ABCCorporation had expanded its operations since its inception 100 yearsago. Under the management of the CEO, Dr. Susan L Pickman, thecompany has managed to have a retail outlet where business is donedirectly to the final consumer of the products. However, increasedoperations have a significant impact on the security status of theorganization. The manufacturing enterprise does not have anestablished security department to oversee the current problems ofinsecurity as reported from various functional units of the business.Employees have developed a culture of unethical behavior at theworkplace they can make mistakes without any fears of a disciplinaryaction against them. The human resource department has not developedany training plan or awareness campaign where employees learn tofollow organizational rules and regulations. Furthermore, lack ofcoordination among various organizational units of the company hasled to poor management of resources. Respective supervisors andmanagers do not make a follow-up to establish whether the companyassets are present, and if they are being put to their proper use.The organization, therefore, has decided to come up with a separatedepartment whose primary duty is to provide security management tothe assets.
ProjectPurpose and Scope
Theproposal is intended to be a guide to providing an introduction andin-depth understanding of the efficient processes and procedures forallocation of resources necessary for the establishment of thesecurity department in the ABC Corporation. Furthermore, it is meantto give the management an overview of the best practices that theorganizational budget can support in securing all the resourceswithin the company premises (The Interagency Security Committee,2015).
Theproposal is also a guide to the security unit, departmental heads,and the designated officials to use in understanding an establishedcollaborative framework for physical security resource allocation.The process, therefore, includes the roles of key personnel involvedin the assessment. These officials include Chief Security Officer,Chief Information Security Officer, Chief Financial Officer,Operational Officer, Public Works, Procurement and contractingspecialist, Emergency and Disaster management personnel, and the Human Resource Manager. The team ought to come up with securitypolicies using the risk management best practices that entail anorganization-wide program of safeguarding the whole business (TheInteragency Security Committee, 2015).
Theprimary goal, therefore, is to come up with an effective plan ofadministration and performance measurement by use of concepts such asrisk management strategies, and carrying out assessment tests (TheInteragency Security Committee, 2015). Applying a centralizedstructure of the directorate is necessary for monitoring theutilization of the limited resources available in the business. Thesecurity department aims at laying down this plan basing on theinternational standards of safety management.
ProjectApproach
Theorganization needs to clarify the important business activities andthe necessary assets for the operations. The management can use thisinformation in growth analysis and cost estimates. The crucialadministrative needs, in this case, include all the assets andstrategies of giving maximum security to the organizationalresources. The size of the facility and population of employees isalso a determinant (The Interagency Security Committee, 2015).
Arisk management program is necessary for identifying threats,vulnerabilities, and assessing the consequences. The best riskmitigation plan shall be developed to address how particular assetswould be affected. The solution shall follow three steps that is,policy formulation, the physical implementation of security systems,and the hiring of technical staff for the task (Sennewald, &Baillie, 2015). Analyzing data will help the management to understandthe market prices of required products and its economic value to thefuture of the company. It will also provide insight on the costs ofasset acquisition and installation. The company will also be able tolearn more about the compliance of rules and international standardsfor the use of such resources (The Interagency Security Committee,2015).
Beforedeveloping a maintenance process, the organization shall identifyvarious types of aggressors and their associated tactics. With suchinformation, the security department will be able to develop the bestprotective and preventive measures against property loss. Theeffective resource management plan will be a guide to support ofsafety procedures. Such entails identifying the types of maintenanceand the technical skills for the task (Sennewald, & Baillie,2015).
Theorganization will require adequate labor force to achieve the desiredgoals and objectives. Therefore, assessing, planning, and managementof security operations in the organization should be under the rightteam of employees. Key steps, in this case, include a detailed plansuch as having the manpower to deter an attack through visualmeasures like creating physical barriers to prevent unauthorizedaccess, or delaying overall entry time by an assailant. The workforceincludes all the security professionals whose full responsibility isto safeguard the organizational property. In some cases, theorganization might need additional security personnel. It might,therefore, hire (through contracting) the qualified individuals whosebackground and experience meet ABC’s employment standards (TheInteragency Security Committee, 2015).
PhysicalSecurity Assets
Theaim of this equipment is to deter, detect, delay, and respondaccordingly in the case of a security breach. Managing of theseassets includes strategic planning, goal, and performance objectiveidentification. A realistic budget for a security program is also anessential aspect for the success of the company. In addition to thehiring of more staff, the company shall purchase equipment such asbiometric scanners, CCTV cameras, alarm systems and more computers(Sennewald, & Baillie, 2015).
Theinitial step in the acquisition is to come up with the documentationto request for physical security resources. The budget estimatesshown should cover all costs incurred to implement the security unitentirely. Other issues such as benchmarking activities should alsofollow so as the organization can learn the best practices and thecurrent trends in security management. The security department shallbe responsible for policy development to ensure the assets are put toproper use. It shall also come up with an appropriate assetmaintenance plan (The Interagency Security Committee, 2015).
Training
Investingin training will enable a business to realize the value of a program.Therefore, ABC should focus more on equipping employees with theright skills and the new security management strategy. The trainingshould also emphasize on work ethics. The departments such asfinance, human resources and operations should come together anddevelop a plan that shows how the training is going to be done. Theyshould define the relationship between the training and organizationgoals. It is also important to describe how the process will solveparticular challenges in the business (The Interagency SecurityCommittee, 2015).
Timeframe
Task |
Start and End Dates |
|
Phase One |
Planning |
January to March |
Phase Two |
Implementation stage |
May to August |
Phase Three |
Monitoring and Evaluation |
From October (A continuous process) |
ProjectBudget
Task |
Estimated expenditure ($) |
|
1 |
Planning (official’s meetings) |
1,500 |
2 |
Market research and Procurement of resources |
50,000 |
3 |
Training of employees |
1,000 |
4 |
Monitoring and Evaluation (annual) |
500 |
5 |
Hiring of new Employees |
3000 |
6 |
Overheads and Miscellaneous expenses |
150 |
7 |
Benchmarking |
1,000 |
Total |
57,150 |
KeyStakeholders
External Contractors |
[name] |
[sign] |
ABC Corporation Top Management representative |
[name] |
[sign] |
Security Manager |
[name] |
[sign] |
Chief Information Security Officer |
[name] |
[sign] |
Resourceintegration
Theincorporation of physical and information security aspects is thebest approach to managing and planning property safety measures inthe organization. The process enables the company to have an insighton its values since it combines two mechanisms, which were previouslyknown to be separate. The best way to achieve integration is throughrisk identification and assessment so as to manage and plan for theavailable security resources. CCTV cameras, alarm system, and otherbiometric devices should be installed in all premises and connectedto a network where it is easy to monitor them from a central point(TheInteragency Security Committee, 2015).
Monitoringand Evaluation
Theorganization shall establish a management program such as the TotalQuality Management (TQM) to ensure that there is a continuousimprovement in all aspects of operations, especially the newlyestablished Unit that still needs new ideas toachieve its goals. It will entail frequent auditing and assessmentactivities where findings will be used in identifying the weak areasand developing key strategies for improvement (Aquilani, Aquilani,Silvestri, Silvestri, Ruggieri, Ruggieri & Gatti, 2017).
Conclusion
Theestablishment of a security department in ABC Corporation is asignificant step towards securing the business assets against theftand misuse. The initial planning stage involves all the departmentalheads who are expected to carry out their respective roles inensuring that the program is working. The budget estimates,therefore, shows that the company can comfortably allocate sufficientresources for the establishment of the security unit. Various stagessuch as planning, market research, and asset acquisition arenecessary especially in allocating costs in terms of time and money.Rules and regulations governing the integrated security systemprevent illegal access of assets. In the end, monitoring andevaluation exercise enables the department and the entireorganization to improve in the weaker areas.
References
Aquilani,B., Aquilani, B., Silvestri, C., Silvestri, C., Ruggieri, A.,Ruggieri, A., … & Gatti, C. (2017). A systematic literaturereview on total quality management critical success factors and theidentification of new avenues of research. TheTQM Journal, 29(1),184-213.
Sennewald,C. A., & Baillie, C. (2015). Effectivesecurity management.Butterworth-Heinemann.
TheInteragency Security Committee, (2015). BestPractices for the Planning and the Managing Physical SecurityResources(1st ed., pp. 1-26). Washington, DC: Released by The InteragencySecurity Committee. Retrieved fromhttps://www.dhs.gov/sites/default/files/publications/isc-planning-managing-physical-security-resources-dec-2015-508.pdf