Printer Friendly

Winning tales.

If you love a good story, you'll be in heaven reading the winning articles from Security Management's First Annual Technology-at-Work Solicitation. The authors are not merely writers, they are also the stars--along with their companies--of their narratives.

Ted Barron, vice president and security project manager for Wells Fargo Bank in San Francisco, took first place with his article, "Anatomy of a Redesign," which appeared in the March issue. He tells the story of an alarm system overhaul that spanned several years and saved millions of dollars.

Richard Cantor, president of Amerigard Alarm & Security in New York City, and Robert Ansley, corporate security manager of Dell Computer in Austin, Texas, tied for second place. Cantor recounts the challenge of installing security in a skyscraper under tight budget constraints, while Ansley shares his story of the growing pains that security felt during a rapid corporate expansion. Both of these articles appear in this issue.

Kevin Surette, CPP, senior security consultant for Facility Management Solutions, Inc., in Bedford, Massachusetts, took third place with an instructive review of how he and his company secured a family planning clinic. His article, "A Clinical Approach to Security," published in the August issue, is a detailed look at this timely topic. Surette says that he enjoyed the security project and wanted to share his enthusiasm with others. The contest offered the perfect venue, and it presented a challenge as well. "I'm kind of new at writing," he explains, "so it tested my skills."

Cantor's "Rising High with Security," reveals how tight budgets and a lack of building-owner interest in security breeds creativity on the part of the practitioner. Cantor is a man with a message, and he wrote this piece to convey it. He says that much attention is paid to the security manager, who buys products and makes decisions, and the vendor, who makes the product, but less credit is given to the system installers. He believes his article addresses the oversight.

Cantor also hopes to emphasize the need for a plan when technology is applied. Without a coherent strategy, "advances in technology make us more vulnerable, not less vulnerable," because they provide an illusion of security, he says.

In "Managing Growth Successfully", Ansley explains the management decisions behind his company's expansion. He says that the concepts in his article were a mixture of the unique and the tried and true. As a newcomer to the field he was pleased to have his company's strategy given recognition.

Barron also had an objective for writing his piece. "My goal |in writing this article~ was to just help other security directors make the decision of whether or not to reinvest in their systems," he says. Judging by the feedback he has received since the article's publication, Barron thinks he has achieved his goal.

Security Management sponsored the contest to encourage security professionals to share their techniques and expertise in applying technology. Each entry was judged by the magazine's editors and a panel of security experts based on the effectiveness of the systems and policies described and the ability of the author to give readers a thorough understanding of the project.

Look for a collection of technology-at-work articles as part of the reprint series. Details of the second annual contest will be provided to readers in the January 1994 issue of Security Management for their manuscript contributions.

The One Book

Management sources abound, but those that apply directly to security management are scarce. The Encyclopedia of Security Management: Techniques and Technology attempts to fill that void. This 800-page volume is designed to familiarize security managers with current trends. It is a collection of information that was contributed by seventy-seven security experts. The text is indexed for easy reference and covers most current electronic technology. The book costs $99.95 and can be ordered by writing to Butterworth-Heinemann, 80 Montvale Avenue, Stoneham, MA 02180; phone: 800/366-BOOK.
COPYRIGHT 1993 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 1993 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:Security Spotlight; Security Management's First Annual Technology-at-Work Solicitation
Author:Arbetter, Lisa
Publication:Security Management
Date:Oct 1, 1993
Words:647
Previous Article:A Practical Guide for Business Speaking.
Next Article:Guard bill update.
Topics:


Related Articles
Metawave Communications Files for Initial Public Offering.
Microsoft First Customer to Select Alpha Microsystems' AC Spotlight Knowledge Management Technology.
1999 Exceptional Parent Index.
Metawave Communications Files for Initial Public Offering.
Metawave Communications Corp. Announces Initial Public Offering.
Undewriters Exercise Over-Allotment on Metawave Initial Public Offering.
Spotlight 29 Shines on Infinium ASP; After the Ink is Dry, Customer is Live in Five Days.
GLUV Corporation Retains Acclaimed Financial Marketing Team.
The Oscar-Winning, Animated Cat and Mouse Duo, Tom and Jerry, Returns to DVD With the Release of Tom and Jerry Spotlight Collection Vol. 3 September...

Terms of use | Copyright © 2016 Farlex, Inc. | Feedback | For webmasters