Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesHospitals & Medical Centers

Your #1 De-Escalation Technique: Customer Service

The path to ‘zero incidents’ starts with zero excuses.

By Claire Meyer
Your #1 De-Escalation Technique: Customer Service

Image courtesy of Seattle Children's Hospital

Jim Sawyer

Jim Sawyer

Your #1 De-Escalation Technique: Customer Service
Jim Sawyer
October 1, 2016

Between illnesses, family tension and medical bills, hospitals are already harbors for stress, and nothing escalates a stressful situation into a dangerous one faster and more unnecessarily than poor customer service, says Jim Sawyer, Director of Security Services for Seattle Children’s Hospital.

Sawyer strives for a “zero incidents” rather than “zero tolerance” approach to security. For security personnel at the hospital, tolerance is absolutely imperative to mitigating the risk of incidents, Sawyer says, and getting that atmosphere hinges on selecting the right security officers and personnel.

“The finest violence prevention program on the planet in the workplace is optimum, caring, empathetic and aware customer service. It is more important than camera systems, biometrics, locks, batons, TV – it is the ultimate foundation for your zero incident or violence prevention program,” says Sawyer. “The most important thing for security people is making a good first impression, because how you stand, talk, act, interact with someone impacts directly with how they stand, talk, act, interact with you. For instance, if you come across as caring, empathetic, attentive, supportive, you have an optimum chance to de-escalate any concerns they have. If you showcase empathy with someone who is hostile or on the edge of rational control, you can bring them down.”

He adds: “Once behavior segues or changes or transitions from being frustration or anger into the kind of behavior where a reasonable person thinks there’s a reasonable threat of danger to a staff member or someone else, then it becomes threatening behavior, and you have to take the next step, i.e. law enforcement intervention and support or bringing in extra people. By employing this customer service, you mitigate, minimize, diminish the likelihood of someone acting out. But there are direct threats, veiled threats, or any kids of threatening commentary made, you’ve crossed the Rubicon, if you will,” and additional security measures will need to be enacted.

“Two things security officers should never say are ‘It’s not my job,’ and ‘There’s nothing I can do for you,’” Sawyer says. “Security officers should never turn anyone down for help, and they should always employ optimal customer service and situational awareness.”

One of the biggest pitfalls is hiring the right personnel, he says. Conducting careful and selective interviews takes time and resources, but compare it to the cost of training and retention, as well as the potential risk the enterprise takes on when hiring someone with an autocratic “my way or the highway” outlook, which can breed a toxic, hostile environment for both employees and visitors, Sawyer adds.

“In the old school, you wanted to hire people with strong law enforcement or military experience, black-and-white worldviews. Now, you want to have people who can think on their feet, who have the strength of empathy, the ability to interact and intervene with people under a great deal of stress and who have a genuine understanding and appreciation for diversity. If you hire those kinds of people, you can work magic.”

When interviewing potential security officers for the hospital’s proprietary guard force, Sawyer requests specific examples for several key open-ended questions:

  • What are your thoughts on diversity?

  • How do you resolve conflict?

  • What pushes your buttons at work?

  • How would you define conflict resolution?

Sawyer recommends watching out for comments such as “I tell it like it is,” or “I won’t back down from anybody.” While having strength and authority is necessary in some situations, in the healthcare environment, being able to meet stressed visitors and calm them down should be the first reaction from security personnel, Sawyer says, not confronting them.

            For enterprises working with contract security personnel, Sawyer recommends one of two paths:

  • Put security officers through in-house or enterprise-hosted de-escalation training.

  • Require the contract company to provide de-escalation training, and send an in-house team member (if not the enterprise security leader him- or herself) to participate and observe.

However, even with contract teams, it’s important to stay aware of which security officers are working in your facility and whether or not they’re the right fit.

“There’s a huge danger in not knowing your team,” says Sawyer. “If you hire a contract service, and there’s one guy with a disposition like a longshoreman with a chronic backache, that can be trouble for you.”

Sawyer recommends reaching out to some of the industry training groups – such as Pro-ACT (Professional Assault Crisis Training), CPI’s Nonviolent Crisis Intervention Training, or Management of Aggressive Behavior (MOAB), to name a few – and following up with refresher courses every year at least. He also works with other departments throughout the hospital to train employees on de-escalation, verbal mitigation and recognizing the signs of assault. The hospital has an annual online class for employees’ security education, and Sawyer personally reaches out to other department managers to help guide training.

“Ninety percent of the things that happen when people do stupid things at work or in hospitals – if you take a look and break it down – is preventable, and that’s what we try to focus on when we do these in-service (educational sessions),” Sawyer says.

No matter what training courses an enterprise pursues, however, documentation is vital, Sawyer says. His department has a training manager who tracks all educational sessions and training records, adding them to employees’ permanent files.

As Sawyer stated in a Security Solutions by Sector webinar in August, “Not documenting can come back to haunt you like a Dickens ghost.” If an enterprise’s security department is audited, or investigated following an incident, and there is no written proof of training, it’s as if the training never took place in terms of potential repercussions, he says.

“If you emphasize, promote, practice optimal service for people under stress, that is the finest violence prevention strategy you’ll ever have,” says Sawyer. “If you have this culture in place, you mitigate the possibility of so many things going wrong, and you build intuitional awareness with your staff. They can read people, and learn to read body language – the rewards here are endless. If you can build that philosophy into your program, you can minimize the risk of things going wrong, and that’s the heart and soul of a ‘zero incidents’ philosophy.”

 

Interested in getting more perspective from Jim Sawyer on his “zero incidents” philosophy, or how security teams can help domestic violence victims in the workplace? Visit SecurityMagazine.com/events/category/2141 for an archive of past Solutions by Sector webinars, including several with insights from Jim Sawyer.

KEYWORDS: Customer Service in Security de-escalation training hospital security Seattle Children's security security officer

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Claire Meyer is a former Managing Editor for Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Is Cybersecurity Part of Your Customer Service Policy?

    Is Cybersecurity Part of Your Customer Service Policy?

    See More
  • customer service

    How to Evaluate Your Access Control Provider’s Customer Service

    See More
  • SEC0821-Cover-Feat-slide1_900px

    Top de-escalation strategies and training for security leaders

    See More
×
Image courtesy of Seattle Children's Hospital
Jim Sawyer

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!