Advertisement

Changes in the Profile of Security Managers

  • Teemupekka Virtanen
Chapter
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 125)

Abstract

Twelve years ago a development program for security managers was started in Finland. The first program was designed to fulfil the needs of a security manager in an organization. However, the content was an educated guess. During the second program, in 1993, we made a study on how security managers themselves feel the requirements of their work and which part of their work they felt difficult or easy. We were interested in what kind of education security managers would need. These results were used when the following programs were planned and some extra courses were introduced. However, these results were never really published. Now, we try to improve the development program for security managers again. We took the results of the old study and found out the current situation. We noticed that the requirements for a security manager have changed. The security managers have become a manager of a department instead of a single specialist. They do not need as deep specialized knowledge as nine years ago. Instead they need understanding of business processes and managerial skills. Another finding is that security manager is a long term career. Few security managers have proceeded to higher vacancies. Instead many of those security managers who participated the old study as a security manager are now retiring from that very same position.

Key words

security education areas of security requirements for security manager 

References

  1. Edith Cowan University (2001). Security Science, Postgraduate studies. PD–3236–04–011000, Australia, Edith Cowan University.Google Scholar
  2. Hesse, L and Smith, C. L. (2001). Core curriculum in security science. In Armstrong, H., editor, Proceedings of the 5 thAustralian Security Research Symposium, pages 87 – 104, Australia, Edith Cowan University.Google Scholar
  3. Katsikas, S. K. (1999). Academic curricula and curricula developments in Europe - The ERASMUS/SOCRATES Approach. In Yngströn, L. and Fischer-Hubner, S., editors, WISE1, Proceedings of the IFIP TCII WG11.8, pages 3 – 17, Sweden, DSV.Google Scholar
  4. Siponen, M. T. (2001). A paradigmatic analysis of conventional approaches for developing and managing secure IS. In Dupuy, M. and Paradinas, P., editors, Trusted Information, The New Decade Challenge, pages 421 – 452, USA. Kluwer Academic Publisher.Google Scholar
  5. University of Leicester (2002). The Scarman Centre: excellence in the study and teaching of community safety, policing, criminology, security, risk and health & safety. GB.Google Scholar
  6. Virtanen, T. (1994). Tutkimus turvallisuusjohtajan ominaisuuksista (Study on the capabilities of security managers). In Berg, K.-E., editor, 2. Turvallisuusjohdon kurssi, Kurssijulkaisu, Finland, HUT.Google Scholar
  7. Virtanen, T. (2001). An information security education program in Finland, In Armstrong, H. and Yngström, L., editors, Proceedings of WISE2, Australia, Edith Cowan University.Google Scholar
  8. Warren, M. and Hutchinson, W. (2001). Teaching small and medium sized enterprises about security. In Armstrong, H., editor, Proceedings of the 5 thAustralian Security Research Symposium, pages 207 – 218, Australia, Edith Cowan University.Google Scholar
  9. White, G. B., Marti, W. and Huson, M. L. (1999). Incorporating Security Issues Throughout the Computer Science Curriculum, In Yngströn, L. and Fischer-Hubner, S., editors, WISE1, Proceedings of the IFIP TC11 WG11.8, pages 19 — 26, Sweden, DSV.Google Scholar
  10. Yngström, L. (1996). A systemic-holistic approach to academic programmes in IT security. Sweden, Stockholm University/Royal Institute of Technology.Google Scholar

Copyright information

© Springer Science+Business Media New York 2003

Authors and Affiliations

  • Teemupekka Virtanen
    • 1
  1. 1.Helsinki University of TechnologyFinland

Personalised recommendations