Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

New Technology, New Training: The Next Generation of Security Officers Has an Important Role to Play

By Drew Levine
Drew Levine
June 1, 2012

From monitoring new video feeds with analytics to the ability to access complex systems from anywhere within a computer network, improvements in technology are a driving force to help customers protect their people, facilities and assets.

And now, a superior caliber of security officers has emerged to meet the challenge; officers who are highly qualified, technology savvy and custom-trained for the specific environment in which they will be working. Today’s officers must have the best training to draw on as they complete critical tasks, and often times their skill sets are carefully matched to the specific needs of the industry sector, the market and even to the institution they serve. Quite frankly, this change in the kind of security officers available today adds new value for the end user.

More technology savvy.Technology is an essential part of the corporate security world, and today’s security officers must be able to interact efficiently and effectively with various high tech tools. Old-style “pen and pencil guard tours” have been replaced by the use of mobile devices and computer systems that provide real-time incident communication and response. Now security officers may be equipped with software-enabled PDAs, which can then be networked wirelessly with a command-center module and used to capture incidents, send pictures, record time-and-attendance of officers, plot GPS coordinates of their locations and guard tours. The accumulated data is a useful tool to analyze trends and measure safety and security performance.

Training for a specific range of skills.Continuous professional training is a definite requirement for the new generation of security officers. Today, security officers should be carefully screened and trained to meet their industry-specific environments. Special talents, experience and the overall disposition for the job are all important factors in determining where a security officer works. Online training can be a useful tool, and training courses may offer continuing education units (CEUs). Security personnel companies should leverage their affiliation with colleges or universities to enable security officers to pursue a college degree and/or professional accreditations. It’s important that we support security officers as they pursue Certified Protection Professional (CPP) and Physical Security Professional (PSP) certifications.

Empowerment to make more decisions.One benefit of highly-trained and more experienced security officers is their ability to make better decisions. An officer in the field who is equipped, informed and qualified to solve a problem or respond to a situation brings added value to the customer, helping to reduce risk when compared to an officer who is ill-equipped, not informed or waiting for someone else to tell him or her how to react to even minor situations. Candidates looking to become a security officer are no longer looking at this position as a dead-end job but more of a career. As a result, a new kind of security officer has emerged.

Often times, military veterans or former law enforcement personnel are finding a rewarding second career in the security industry and these officers are capable of making important on-the-spot decisions.

Mobile Information.The use of smartphones and other hand-held devices are empowering security professionals to capture and send real-time information while on guard tours or manning a post. Now, Web-based reporting tools enable officers to record incident information, including photos and then send real-time notifications to appropriate staff. Today, mobile devices can help drive performance and compliance. From post confirmation, GPS plotting, guard tour documentation, proof of presence to regulated compliance issues like assault and battery on college campuses or CFATS mandated facility inspections. Mobility allows information to be immediately entered at the scene making it more accurate and timely than information gathered the old fashioned way and then recalled hours later. Ultimately, less time at a desk filling out paperwork means more productive time spent guarding property and assets.

Career-oriented professionalism.Today’s practice of security requires a better class of security officers, including candidates who see security as a profession rather than a temporary or transitional job. Getting the best people requires security organizations to invest in recruiting, hiring and training the best candidates and then offering them a continuing education and training resulting in a rewarding career path.

Specialization to serve a customer’s needs.Security officers are not a one-size-fits-all business anymore. Expectations of performance by a security officer can vary widely from one client to the next, even from one position to another within the same company. The skills needed by security officers deployed at reception areas are very different than the skills needed by security personnel deployed in high-risk, high-consequence environments. Customers should have the flexibility to choose the right officer for a job, based on experience and qualifications. They should be able to select among candidates that have various levels of skills and training whether it’s from the military, law enforcement or on-the- job expertise in specific market sectors, such as commercial real estate, financial institutions or the chemical/petrochemical industry.

In the end, the security officer is the first responder and the linchpin of any organization’s security readiness. The true measure of a security program’s effectiveness ultimately begins with recruiting the best people, equipping them with the best training, matching them up to work in the best environment based on their skills and providing a fulfilling professional development path.

KEYWORDS: security officer security training video analytics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec0612 virtual inbody2 150px

Drew Levine is president of G4S Secure Solutions 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Fairfield University cybersecurity master's degree

    Fairfield University unveils new cybersecurity lab to prepare the next generation of information security professionals

    See More
  • The Role of Universities in Preparing the Next Generation of Security Professionals

    See More
  • Robots Play New Airport Security Role – More Come to Atlanta Facility

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing