Who Is Tomorrow's Security Professional?

By Azano, Harry J. | Security Management, June 1993 | Go to article overview
Save to active project

Who Is Tomorrow's Security Professional?


Azano, Harry J., Security Management


I have been involved in loss prevention programs in the corporate and defense environments for more than twenty-five years. During that time, both the scope of the problems and the means used to address them have changed dramatically. The skills considered essential for security professionals must be re-evaluated in light of these developments.

The most outstanding change over this past quarter century has been in technology. Twenty-five years ago words such as microchip, multiplex microprocessor, personal computer, and database storage were unknown to most people. Indeed, most of the technology we commonly use in our protective services today were considered science fiction when I began my career.

The second fundamental change in our industry has been sociological, extending security's responsibilities to everything from drugs to environmental issues. Over these years, we have seen a dramatic and steady rise in the use of drugs and the impact drugs have on our society.

Sociological change is present in our concern for the issues of employee safety. Twenty-five years ago the Occupational Safety and Health Administration (OSHA) was an idea being developed by some of our legislators. Twenty-five years ago there was no Environmental Protection Agency (EPA). Sociological change has brought us a new awareness of the rights of individual citizens. This is positive, but it also changes the way in which law enforcement functions.

Sociological change has been evident in the rate and kind of litigation we now have choking our courts. Some of this litigation has had a profound effect on both law enforcement and private security, particularly in the fields of abuse and negligence.

The question now is whether the typical path from high school to the military, a police force, or a government agency and then to a second career in private security is adequate under today's changing circumstances in the security field. Security systems are increasingly important as staffing levels are reduced. Security professionals must have a working knowledge of the technology available and how to implement it.

Understanding computers and their output is becoming a necessity. The ability to develop audit programs is becoming essential. The ability to identify potential problems is replacing the need for investigation after the fact.

New fields of expertise are also required by the changing nature of problems security managers face. For instance, the new weapon of choice for vandalism, terrorism, and revenge is fire. The security professional is increasingly faced with the need to be proficient in fire protection. Other concerns include occupational safety, environmental concerns, and the ability to protect an executive from personal responsibility when a loss occurs.

The new buzzwords in security are loss prevention, risk management, and safety management. The word security is downplayed because it is associated with a passing art form. Within a few years, the title security director may equate to dinosaur.

According to some professionals in our field, a minimum requirement for a supervisory position in security management by 1995 will be an associate degree in computer science. By the turn of the century, a computer specialist will be controlling a force of robotic security officers.

I have seen a major corporation hire a vice president for security who made it part of his agreement that the title be changed to vice president of risk management.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
Loading One moment ...
Project items
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited article

Who Is Tomorrow's Security Professional?
Settings

Settings

Typeface
Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

While we understand printed pages are helpful to our users, this limitation is necessary to help protect our publishers' copyrighted material and prevent its unlawful distribution. We are sorry for any inconvenience.
Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.

Are you sure you want to delete this highlight?