Security Technology Executive

APR 2013

Issue link: https://securitytechnologyexecutive.epubxp.com/i/118926

Contents of this Issue

Navigation

Page 17 of 59

MARKET FOCUS Powered by Available Exclusively on Corporate: 7 Steps to Managing Traumatic Stress in Your Guard Force Employment in private security is projected to more than double that of public law enforcement for the foreseeable future, according to ASIS International, and Freedonia projects U.S. demand for privately contracted security professionals to increase 5.4 percent annually to $64.5 billion in 2016. As professional security service demand continues to rise, so does the chance your security force will be exposed to traumatic stress. As a security or business executive, these concepts should give you a baseline to ensure the continued mental health of your guard force. A Critical Incident Stress Management program (CISM) is a proven approach to creating operational policies and procedures to help security professionals deal with traumatic stress. When dealing with the complexities of stress management, it is imperative to have a systematic, comprehensive approach to treatment, which CISM provides. There are seven core components in the CISM process: 1. Pre-Crisis preparation: Psychological preparedness training is a primary technique, and if implemented prior to an actual crisis event, will set the appropriate expectations while enhancing the behavioral response. You can equate this technique to a type of mental preparedness training for high-risk personnel. Information should be communicated about stress and trauma, specifically, the common signs and symptoms of psychological distress. 2. Demobilization: Used at mass disaster sites for large groups to assist personal transition from the site to home or work. The process should be conducted away from the site and be an informational briefing on stress, trauma and coping techniques. 3. Defusing: A time-sensitive intervention and should be conducted within the first 12 hours, post-event. This is designed to reduce acute stress and tension levels. 4. Critical Incident Stress Debriefing (CISD): Small group discussions concerning the crisis event should be detailed and structured and are normally conducted 2-10 days post-event. 5. Individual Crisis Intervention: Can be an on-scene (during the event) technique or any time after the event. It is normally conducted as a one-on-one intervention. 6. Family CISM: The objectives of Family CISM teams are to define critical incident stress from the family perspective, look at the impact on the families, and provide resources and strategies, and CISM family interventions. 7. Follow-up Referral: Can be done at any time post-intervention and are usually symptom-driven. The key is to assess the mental status of the individual(s) and ensure they have access to a higher level of care. There���s more ��� read the full article at www.securityinfowatch.com/10859999 ISC West Live Coverage! SecurityInfoWatch is your best stop for up-to-date news, press releases, new products and live show coverage from the April 10-12 ISC West show in Las Vegas. Our editorial teams, including reporters from STE, Security Dealer & Integrator and Locksmith Ledger, will be combing the show floor for the news you want to read, including a morning digital show daily on the first two days of the show delivered right to your inbox! To get the email dailies, just register your name on the site, or check out the full, always-available coverage at www.securityinfowatch.com/iscwest. Campus Shooter Mitigation Strategies Sandy Hook forever changed the way we look at school security. Check out the archived SIW webinar from March 21 for mitigation strategies regarding active-shooter events on campuses. Speakers included: Patrick Fiel, school security consultant; Bob Lang, assistant vice president for strategic security and safety at Kennesaw State University in Georgia; Doug Titus, business development manager for education at Assa Abloy Door Security Solutions; and, John Mosebar, vice president of marketing at Aiphone. www.securityinfowatch.com/webinars Background Screening Employee background screening is evolving into a sacred partnership between human resources, security and risk. In our April 25 webinar sponsored by HireRight, we will examine new initiatives as they relate to process flow, metrics, risk mitigation tactics and cost benefit analysis. Security executives at Boeing will discuss best practices and how to build ROI into a background screening program. www.securityinfowatch.com/webinars 18 SECURITY TECHNOLOGY EXECUTIVE ��� April 2013 www.SecurityInfoWatch.com

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - APR 2013