Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalTop Guard and Security Officer Companies

Preparing to Protect and to Serve

How well-trained and well-paid security officers can benefit enterprise security

By Adam Stone
security officers
September 26, 2019

As president and CEO of Des Moines-based security consultancy The Conley Group, Tom Conley has seen firsthand the consequences of inadequate training among security officers.

“There’s a building in downtown Des Moines that used to have two security officers,” he says. “In one instance, a police officer went to arrest a subject in the lobby and the subject started to fight with him. The officer was fighting for his life, and the two security officers stood right by him and watched. He kept asking for help and they wouldn’t help. That was directly the result of a lack of training.”

Ensuring that security officers are well-trained is necessary to ensure enterprise security. Yet, there are many security officer companies who are wisely investing in providing their officers with the correct training and technology. Other possible solutions include formal certification and improved processes.

Increased Efforts

Beyond some security officer companies who are taking the lead in this area, overall, the security industry will improve their security officer training, says Sandi Davies, executive director of at IFPO, the International Foundation for Protection Officers, when end users proactively demand it.

“In the past, some companies have used old, redundant training materials, with training done in the back of a gun shop, possibly by someone from law enforcement or a military background,” Davies says. “But there is a big difference between law enforcement, which is a reactive mindset, and security, which is preventative. But we do see some larger companies making very proactive changes to the way that things have been done in the past, to respond to end user demand.”

Compounding the problem is a lack of standards. Different U.S. states set different requirements for security officer training, and some don’t require any at all. “In Iowa you can have zero training to be a licensed security officer but if you want to be a cosmetologist it takes 2,200 hours of training to do somebody’s nails,” Conley says.

Despite the hurdles, there are a number of high-value strategies available to get people the training they need, including some security officer companies, such as G4S, who combine the right personnel, training and technology with the responsiveness of local and site management.

Moving the Needle

Certification can be a method to get new hires up to speed. IFPO offers the Certified Protection Officer certification from between $120 and $380 per person. A starter course, the Initial Security Officer Program, costs just $30 and $35 per person for 16 hours of training. “They will be versed in recognizing threats, patrol techniques, crowd control, access control, workplace violence. It gives them a good bit of information,” Davies says.

Security companies also can leverage internal resources and implement formal processes to ensure officers can hit the ground running.

“There should be a minimum requirement for the number of hours a new officer needs to spend with an experienced person,” Conley says. “And there should also be measurable outcomes. At the end of the shadowing time, that person should be able to do certain things or display certain knowledge.”

It’s helpful, too, to document all those on-the-job training hours, along with any other formal training. With mass shooting and workplace violence ever in the news, some companies are getting more savvy about security, and security firms, such as G4S, that can document a solid training regimen, gain a competitive edge.

“The end users are starting to demand tangible proof of training and professional development,” Davies says. “Security companies need to track that information as proof of training, and also as a liability avoidance strategy. In the case of litigation, you want to have some verification that those educational requirements have been met.”

 

 

 

 

KEYWORDS: IFPO security officer

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Adam Stone is a contributing writer for Security magazine. He has covered IT issues in the public and private sectors for more than 20 years. In addition to following security trends, he writes on military technology, education-tech, government IT and diverse others issues.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • gsoc security

    How to bring a virtual GSOC to life

    See More
  • concerts-freepik1170x658v5.jpg

    To protect and serve: A case for drones and public gatherings

    See More
  • collage

    Leveraging non-traditional experience to drive your security career

    See More

Related Products

See More Products
  • into to sec.jpg

    Introduction to Security, 10th Edition

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • September 25, 2024

    How to Incorporate Security Into Your Company Culture

    ON DEMAND: From this webinar, you will learn how to promote collaboration between IT and physical security teams to streamline corporate security initiatives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing