The main role of security is to protect people, property, information, and reputation in any given medium. These four elements of protection can be expanded further, to include protection of brand competitive advantage, profitability, and other elements. But essentially, these four again, people property information and reputation culminate in being the main objective that any organization would hire, train, equip, and develop a security function for the security managers or directors role is to interpret the requirements of the company pertaining to protecting people property, information reputation, and to deliver a program that meets with these requirements. So basically, a CEO tells the security manager Okay, I need to protect 700 people at six global offices a plant the size of 500,000 square feet, a web based content management system and front ends software with a server location overseas, and for the media to stay away from internal communications and excessive scrutiny of our executives go.
So now the job of the security manager is to figure out how to answer to these demands. Once a security manager figures out how to meet these requirements, he develops a program, the program may require the employment of people to help carry it out, as the manager himself cannot do it on their own. These people these security supervisors are then employed by security managers to assist and oversee various sections of the program. So going from the earlier example, one supervisor would be assigned, for example, to oversee the protection of employees, the other would be assigned to protect computer systems. And the third one to protect industrial goods and real estate, while the fourth supervisor if there is a position there to address executive protection and media security protocols. Security Officers, or protection staff are the people that are do all the work is day who perform daily duties of the security programs.
They conduct patrols, perform inventory and health and safety checks, escort executives to and from their vehicles, configure firewalls and networks, process security clearance applications and investigate corporate misconduct. They are arguably the most critical part of the security program because they make it real