Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

SECURITY Services: The Importance of Being Trained

February 1, 2004
It is important to concentrate on security credential programs respected industry-wide
With security anticipated as one of the fastest growing professions over the next decade, many more people now pursue a career in security.

As the number of personnel increases, it’s as important that these individuals have proper training so that they can both stand out in this more competitive job market as well as provide a higher level of quality service on the job.

Proper training, without a doubt, improves a security officer’s credentials and credibility as a professional.

Of course, training aims at employees performing at a level in alignment with the goals and objectives of the organization and its security operation. All employees, including security officers, must work towards a common mission.

Specifically, properly trained personnel are crucial for several reasons.

One driver: liability issues center on the insuring that security personnel deflect and minimize the constant flow of lawsuits specific to negligent security. According, to a study conducted by Liability Consultant Inc. the liability for security failures often rises into the million-dollar bracket. The study states that apartment buildings, for example, paid on average $1.5 million in damages from awards after guilty verdicts, and $1.7 million in reported settlements. Premises security liability cases cost hotels an average of $1 million in awards and $632,000 in settlements. Wrongful death cases, as would be expected, garnered the highest awards: an average of $2.8 million in both verdicts and settlements.

Reduce Liability

It’s obvious that better trained security personnel would have prevented some incidents or minimized the liability profile in some of the lawsuits or settlements. In essence, being proactive and having specialized training may potentially save a company significant dollars. In addition, better-trained personnel may potentially reduce the costs associated with high turnover, low morale and poor performance. Having specialized training or industry-wide respected credentials may also prove beneficial for the employer as well as the security officer.

There are many benefits inherent in industry-wide, respected security credentials. A primary reason is to increase or refresh a security officer’s knowledge of industry trends, technology and concepts. It is true that the U.S. Department of Labor states that “opportunities for most jobs as security officers and surveillance officers should be very favorable through the year 2010.” The agency also states that “stiff competition is likely for higher paying positions at facilities requiring a high level of security.”

One can logically conclude that if a security officer desires a higher paying position or a higher level security position or when a security director wants to raise the bar for proprietary or contract services, then having additional training or credentials is an asset. There are various professional security credentials. So there is a need to explore various programs before determining which credential or training is worth investing time, money and energy.

The Naples, Fla.-based International Foundation for Protection Officers (IFPO) has developed several security credential programs respected industry-wide and also convenient.

The most recognized and coveted IFPO designations are the Certified Protection Officer (CPO), Certified Security Supervisor (CSS) and the Certified Protection Officer Instructor (CPOI) credentials.

Numerous Topics Covered

Security professionals with broad knowledge of the security industry can acquire the CPO. A person must demonstrate, through examination, mastery of a variety of topics that include: physical security, crime scenes, emergency procedures, safety procedures, physical fitness, use of force, workplace violence, environmental crime control, investigations, traffic & crowd control, legal aspects and report writing. Other topics include: hazardous materials, public relations, effective communications, weapons of mass destruction, apprehension & detention procedures, fire prevention, strikes/labor relations, crisis intervention, bomb threats, professionalism and ethics, police/security liaison, operational risk management, foundations for surveillance and more.

CPO candidates have a study guide that helps prepare them for the examination. The guide, Protection Officer Training Manual and published by Butterworth-Heinemann, consists of 43 chapters authored by some of the industry’s leading professionals. A candidate must complete a midterm and a proctored examination that covers the topics studied within the text. Upon successful completion of the course and examinations, the security officer candidate becomes eligible for the CPO designation.

IFPO’s Security Supervisor Program can lead to the CSS designation. It can also be completed through distance learning and is equally extensive.

The foundation now requires that professionally certified individuals gain certain credits to meet re-certification requirements. While completion of any certification program can demonstrate that certain learning has occurred, it is invaluable for the security officer and the operation that employs the person that continuous learning occurs.

Most prestigious professional designations require demonstration that knowledge is continuously acquired. Most often, re-certification encourages individuals to remain abreast of the new concepts and trends within the industry.

Training will always be important in the security industry. Having properly trained security officers likely increases both the profits and productivity of any organization or department. Encouraing security officers to keep up with threats and technologies also is beneficial.

SIDEBAR 1: What’s the Purpose?

It’s good for a security officer or operation to determine the purpose of training and certification. Common purposes of receiving professional security credentials include acquiring tangible evidence of having knowledge of the profession. This gives credibility to the credential holder. Also, having professional security credentials can differentiate between two applicants with otherwise equal experience. While any credential may have its advantages, it may prove more useful to acquire a credential or recognize one that has a respected history within the industry.

In addition, some credentials may not be convenient to acquire. Some require that a person travel to a different location to take the course and final examination. Others require that an officer complete an examination at a location that may be in another state.

SIDEBAR 2

Here are four Web sites that boast information on security officers, training and certification programs.

http://www.asisonline.org/newsroom/pressReleases/101002sm.xml

http://www.bls.gov/oco/ocos159.htm

http://www.ifpo.org/programs/cpo.htm

http://www.securitymagazine.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Data Stream

    The Five Rings: Understanding the importance of physical security of colocation data centers as a fundamental service during COVID-19

    See More
  • human-security-freepik1170x658.jpg

    The importance of the human element of security

    See More
  • Cybersecurity handshake

    Where organizations are falling short on security: The importance of keeping a balanced approach

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • 150 things.jpg

    The Handbook for School Safety and Security

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!