This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Preparing to Protect and to Serve
PhysicalTop Guard and Security Officer Companies

Preparing to Protect and to Serve

How well-trained and well-paid security officers can benefit enterprise security

security officers
September 26, 2019
Adam Stone
KEYWORDS education & training / IFPO / security officer
Reprints
No Comments

As president and CEO of Des Moines-based security consultancy The Conley Group, Tom Conley has seen firsthand the consequences of inadequate training among security officers.

“There’s a building in downtown Des Moines that used to have two security officers,” he says. “In one instance, a police officer went to arrest a subject in the lobby and the subject started to fight with him. The officer was fighting for his life, and the two security officers stood right by him and watched. He kept asking for help and they wouldn’t help. That was directly the result of a lack of training.”

Ensuring that security officers are well-trained is necessary to ensure enterprise security. Yet, there are many security officer companies who are wisely investing in providing their officers with the correct training and technology. Other possible solutions include formal certification and improved processes.

Increased Efforts

Beyond some security officer companies who are taking the lead in this area, overall, the security industry will improve their security officer training, says Sandi Davies, executive director of at IFPO, the International Foundation for Protection Officers, when end users proactively demand it.

“In the past, some companies have used old, redundant training materials, with training done in the back of a gun shop, possibly by someone from law enforcement or a military background,” Davies says. “But there is a big difference between law enforcement, which is a reactive mindset, and security, which is preventative. But we do see some larger companies making very proactive changes to the way that things have been done in the past, to respond to end user demand.”

Compounding the problem is a lack of standards. Different U.S. states set different requirements for security officer training, and some don’t require any at all. “In Iowa you can have zero training to be a licensed security officer but if you want to be a cosmetologist it takes 2,200 hours of training to do somebody’s nails,” Conley says.

Despite the hurdles, there are a number of high-value strategies available to get people the training they need, including some security officer companies, such as G4S, who combine the right personnel, training and technology with the responsiveness of local and site management.

Moving the Needle

Certification can be a method to get new hires up to speed. IFPO offers the Certified Protection Officer certification from between $120 and $380 per person. A starter course, the Initial Security Officer Program, costs just $30 and $35 per person for 16 hours of training. “They will be versed in recognizing threats, patrol techniques, crowd control, access control, workplace violence. It gives them a good bit of information,” Davies says.

Security companies also can leverage internal resources and implement formal processes to ensure officers can hit the ground running.

“There should be a minimum requirement for the number of hours a new officer needs to spend with an experienced person,” Conley says. “And there should also be measurable outcomes. At the end of the shadowing time, that person should be able to do certain things or display certain knowledge.”

It’s helpful, too, to document all those on-the-job training hours, along with any other formal training. With mass shooting and workplace violence ever in the news, some companies are getting more savvy about security, and security firms, such as G4S, that can document a solid training regimen, gain a competitive edge.

“The end users are starting to demand tangible proof of training and professional development,” Davies says. “Security companies need to track that information as proof of training, and also as a liability avoidance strategy. In the case of litigation, you want to have some verification that those educational requirements have been met.”

 

 

 

 

Subscribe to Security Magazine

Recent Articles by Adam Stone

Video Management Systems for Your Security Enterprise

Closer Ties: Private Security and Public Safety Need Interoperable Communications

IoT, Robots and ROI: Asset Tracking Industry

Safeguarding Security and Loss Prevention at Gap Inc.

Adam Stone has covered IT issues in the public and private sectors for more than 20 years. In addition to following security trends, he writes on military technology, education-tech, government IT and diverse others issues.

Related Articles

How to Find Talent in a Tough Job Market

IoT, Robots and ROI: Asset Tracking Industry

Closer Ties: Private Security and Public Safety Need Interoperable Communications

Related Products

Effective Physical Security, 5th Edition

Related Events

What’s User Experience Got to Do With It?: Creating A Great User Experience To Improve Security

Drones and Surveillance at MetLife Stadium

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

cybersecurity-blog

European Hotel Group Suffers Data Breach Impacting 600,000 Hotels Worldwide

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing