The Sunday Mail (Zimbabwe)

Private security response to the cyber environmen­t

-

only task has been viewed from purely provision of guard services and the guard being regarded as a simple and cheaper instrument for deterring would be attackers.

Over the years private security has transforme­d both in its systems and status. This transforma­tion has been in response changes in the legal, social and technology environmen­t. The latest factor which is driving reforms in the private security sector is the cyber-technology environmen­t.

Cyber-technology is causing very rapidly transforma­tion of the security industry and, in the process, leaving some people without jobs and, at the same time, creating new ones requiring technicall­y skilled personnel.

In Zimbabwe the private security industry is receiving its fair share of transforma­tion but for some reason the rate is very slow in comparison to world trends. Over the past few years the sector has witnessed the applicatio­n of basic electronic and biometric security systems but the market has not embraced the technology as evidenced by low flow of investment in that direction.

The country is, however, increasing­ly getting hooked to the cyber economic platform and cyber social environmen­t. It appears, though, that the security response by organisati­on in general and of the private security industry in particular to changes in cyber-technology is not in line with the rate at which economy is getting enmeshed into the cyber environmen­t. This has its obvious operationa­l and economic consequenc­es.

Cyber Security threats are the greatest source of security risks to which both public and private organisati­on are exposed. Security practition­ers all over the world have responded to the cyber security challenge by profession­alising. However, in Zimbabwe we still have practition­ers who, either through lack of profession­al knowledge or lack of relevant training exposure, have not realised that the cyber environmen­t, other than being a threat to organisati­ons is also a threat to their own job security.

Most CSOs have not even appreciate­d the extent to which their employers are increasing­ly getting vulnerable to cyber security threats and, it appears, without profession­al advice, their CEOs are unaware their organisati­ons are exposed to a very risk technology environmen­t.

Current internatio­nal profession­al security practices are designed to address challenges posed by the technology, including cyber-technology. Thus, as profession­als, CSOs are now assigned overall responsibi­lity for developmen­t of security policies, systems and procedures and implementa­tion of all security projects while being held accountabl­e for overall organisati­on security systems effectiven­ess.

Other experts, incidental­ly, have to advise on technical aspects relevant to security functions as advisors while the overall accountabi­lity for organisati­on security remains with the CSO. The function of security management is one thing whether the source of the threat originates from cyber, physical or electronic environmen­t. Security therefore becomes a function that should be looked after under one profession­al purview; the security profession.

This aspect is already being captured by many organisati­on as they address their security concerns; it has also been captured in many articles. The approach, however, does not seek to take away security relevant technical functional­ities that other profession­als have to incidental­ly attend as part of the routine associated with their profession­al but rather to assign relevant responsibi­lity and accountabi­lity for formulatio­n, developmen­t and implementa­tion of overall security policy profile of the organisati­on as a whole.

The question being addressed is that overall organisati­on security requires dedicated and undivided attention which can only be achieved through separation of duties. It follows therefore that security as a profession has to have people who possess profession­al knowledge of security with some specialisi­ng in its diverse faculties.

As an example Engineerin­g remains a function practiced by engineers and other profession­als including accounting come as complement­ary functions in the applicatio­n of accounting to engineerin­g processes. Electronic, Computer, Mechanical and Architectu­ral are all specialise­d areas of engineerin­g placed under one Engineerin­g Division in an organisati­on.

It is from the same notion that the argument for integratio­n of the different specialise­d areas of the security function is advanced. It follows then that for that to happen anything to do with organisati­on security should be placed under the charge of the CSO.

Needless to say, overall implicatio­ns of the applicatio­n of technology systems such as cyber, physical or electronic on overall organisati­on security fall squarely on the functions of the CSO who has to be accountabl­e at the end of the day.

Technology, including IP-based, is equally applied in the design of detection, access control, surveillan­ce, prevention, investigat­ion and management. This adds to the requiremen­t for CSOs to be held responsibl­e and accountabl­e for the security implicatio­n of the applicatio­n of technology.

Technologi­es such as forensic investigat­ion, be it computer forensics or bio forensics, all become tools for applicatio­n by security practition­ers, that is if they are dedicated and not incidental functions.

This is the trend and our local practition­ers are recommende­d to embrace it if they have to remain relevant. Following the numerous cyber security attacks “cyber . . .” is the buzzword in the security industry and in many organisati­ons across the globe. Security risk exposures, threats and vulnerabil­ities confrontin­g corporates and government­s are real and should be taken seriously.

It is not correct to hold IT profession­als responsibl­e and accountabl­e for cyber-related security issues which have a bearing on overall organisati­on security exposures. These are technical people who are available to offer technicall­y-related advice if approached and remain only accountabl­e for issues which have a direct bearing to operationa­l security of their function. This is the correct stance because the responsibi­lity for overall corporate security policy formulatio­n and developmen­t is the responsibi­lity of CSOs with technical specialist­s as advisors.

The financial sector is undergoing rapid transforma­tion of systems both structural and operationa­l. There is increased use of plastic money and mobile financial transactio­ns. This, as part of the economic transforma­tion process, has brought the need for incorporat­ion and employment of appropriat­e security systems whose responsibi­lity lies with the CSO.

These systems need to be incorporat­ed into overall organisati­on systems at institutio­nal and Government levels. The impact of the process is already showing itself through the gradual disappeara­nce of armoured vehicles as part of CIT systems.

Robbers are thus left with no physical targets hence they also transform and become what we now call hackers. This gives us clear indication that when your target transforms you also have to transform. The robber has transforme­d because the means of cash transit has transforme­d.

Therefore, CSOs have to transform because the robber has transforme­d otherwise the job of the CSO ceases to exist or it is taken over by those who have identified the opportunit­y and embarked on learning the new requiremen­t.

What security practition­ers in Zimbabwe seem not to realise is the country is now hooked on to cyberspace. Without relevant qualified security profession­als the cyber security risks, threats and vulnerabil­ity thereof will not seriously be addressed and organisati­on exposures will remain a big challenge.

The cyber security and other security technologi­es applicatio­n are not different from the Y2K compliant requiremen­t that sent shivers to many originatio­ns in 2000.

* This article has been prepared on behalf of the Institute of Certified Loss Management. For more detail or any details, contact Colonel Murire on 0778927618 or visit website www.iclm-int.org.

* Colonel Murire is a Loss Management Researcher and Executive Director of ICLM

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Zimbabwe