The main hurdle for professionalization is one mainly hampered by established notions about what background a security manager should have
Law enforcement and pure problem-solving
skills will play less of a role for the future
security director

Much effort has been put down in the professionalisation of security work. Not only is it a recurring topic of conversation at events for security professionals, but also a formal topic of concern for ASIS – having active task forces devoted to the promotion of professionalisation and academisation of security practice as well as a recently updated standard (ANSI/ASIS CSO.1-2013) describing the competence profile of a Chief Security Officer (CSO).

The outer driving forces for this effort are well-known; for example the increase of uncertainties relating to cyber-security threats, industrial espionage, activism and business-related risks when operating in hostile environments. In parallel with this trend, the demands for a formal, ongoing and cost-effective coordination of security work has further increased. Also on the list of organisational demands are clearer and improved business processes that cut across functional and operational value-creating activities, and increased use and sharing of security-supporting technologies. Furthermore, our research shows that physical security since long is a well-established business process within larger firms and a further development of security management would seem a natural development.

Distinctive for well-established professions are commonly agreed methodologies, techniques and terminology among professionals. Furthermore, a uniform and considerable quality assurance process is often in place in the form of higher education and/or formal licencing. Prime examples of professions often referred to are medical doctors and lawyers. In short, a professional from one country should more or less be able to communicate with colleague in another part of the world.

Establishing a higher education in security management is tightly coupled with the question on what would be general research direction for security management
There is an uncertainty regarding the academic orientation that security management should have

For security management there exists no such well-established equivalent. Institutions of higher education that offer security management are Edith Cowan University in Australia and the specialisation in Security Management that is offered at Wharton at University of Pennsylvania with ASIS as supporting body.

Engineering, criminology or business/management?

For any higher education with a clear identity and recognition the fundamental (research) question of whom or what we are is agreed upon. In effect, establishing a higher education in security management is tightly coupled with the question on what would be general research direction for security management. This is an important question – both short-term and long-term. In the short-term it is important to know what universities and schools to target, and long-term to guarantee the profession a development in the right direction and with the intended legitimacy.

A crude division can be made by dividing research and higher education into three general orientations; the first (1) being an orientation towards engineering and problem-solving; the second (2) being social scientific and criminology orientation that concerns itself with addressing overarching crime development and underlying structure and motives for criminal behaviour; and third (3), a business/management orientation that is concerned with balancing and setting business priorities in a corporate landscape of limited resources. None of these orientations are mutually excluding of one another – all higher education is a mix of a major subject and support subjects. However, some form of declaration of will and consensus about the general orientation is necessary. Worst-case effect might be that security management ends up being academically and institutionally weak as is sometimes the case with over-specialized degrees. When educating security managers, should the general orientation be on of engineering/problem-solving, criminology or business and management? In Sweden, the Higher Education Authority have for example assessed the Security Management degree in Australia as being one in engineering (assessment made 08/05/2008).

More business, management and new technology

From the research conducted within the LUSAX research program at the Institute of Economic Research at Lund University a clear majority of survey respondents working corporate security management expresses a need for increased skills of business and management, but also a need to understand novel technology to some extent. Law enforcement and pure problem-solving skills will play less of a role for the future security director. If asking security directors, the answer would be to follow the business/management orientation.

Some form of declaration of will and consensus about the general orientation is necessary. Worst-case effect might be that security management ends up being academically and institutionally weak as is sometimes the case with
over-specialised degrees

A third possibility is to position security management as focusing mainly on criminology and behavioural sciences. No explicit and direct demand from security directors was made regarding the need for criminology. However, we believe criminology and behavioural science is an important support subject to security management. A final alternative would be to position security management as a corporate legal activity, but we argue that the legal alternative is one that can be considered of being constraint or factor within the business and management orientation. Also, some security directors have expressed concerns in sorting security management under the legal corporate branch due possible risks of conflicts of interests.

Our research further suggests that the security manager needs further resource enforcement for areas like budgeting, procurement, cost-benefit analysis, new technology and business to mention a few examples. From that point of view, the choice of orientation clearly points to a direction of hosting security management within a business and management orientation. All in all, this could be described as the will for professionalisation from the ones within the profession.

Security Management and its corporate environment

For a more complete analysis it is not sufficient to include only the within-professional will for professionalisation. External forces outside the control of security professionals also govern the answer for the development of the profession. Since the start of LUSAX in 2006 we have repeatedly experienced corporate recruitment of security managers being mainly driven by a corporate interest searching for senior security candidate with a clear and solid law-enforcement background. This is more noticeable in North America and in the United Kingdom where Executive Protection often lies within the scope of security management. This is evident also in industry sectors where physical security is not typically part of the core business – like media, banking and consultancies.

In summary, in this article we have pointed out that there is an uncertainty regarding the academic orientation that security management should have. We are saying that it is necessary to choose a purposeful academic platform that over times generates the positive effects of professionalisation, for example wide corporate influence, clearer career paths and increased rewards in term of salary and perks. Our answer is to aim for security management to be positioned within a business and management orientation.

Finally, we have also pointed out the importance of changing the environmental attitudes concerning security management. We believe the main hurdle for professionalisation is one mainly hampered by established notions about what background a security manager should have. These notions lies outside the control span of the typical security manager, but are pivotal for the professionalisation of the profession.

Download PDF version

Author profile

Markus Lahtinen Researcher and Lecturer at Lund University, LUSAX Security Informatics

Markus Lahtinen holds a Master’s degree in Informatics (2001) and a Bachelor's degree in Business Administration and Economics (2006). The past ten years he has been active as lecturer at the Department of Informatics at the School of Economics and Management, teaching mainly Interaction Design but also given classes on Decision Support Systems, UML, IT and organisation, and supervising theses work for students at Bachelor and Master level.

In case you missed it

High-speed airport-screening systems will improve soft target security
High-speed airport-screening systems will improve soft target security

Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced visitor experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognised a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimetre wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding perimeter protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centres, sports centres, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat mitigation with soft target approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labour reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving security posture at event venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labour reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.

How to make school security effective and unobtrusive for students
How to make school security effective and unobtrusive for students

Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognise potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security best practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organisations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology in school security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-hour monitoring solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorised to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting and landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing physical environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.

Has consolidation shifted to the security integrator/installer market?
Has consolidation shifted to the security integrator/installer market?

Consolidation – a decrease in the number of companies in a market achieved through mergers and acquisitions (M&A) – has been an important trend among manufacturers in the physical security market for many years. More recently, the trend has also appeared to extend to the integrator market. Larger integrators have been buying up other large integrators; in some cases, they have also been buying up smaller, regional integrators to expand their geographic coverage area. We wondered if this week’s Expert Panel Roundtable has noticed the trend. We asked: Has consolidation among security companies shifted to the integrator/installer market? What is the impact?