Legislative Corner – How Does SB513 Affect the Private Security Industry?

Effective January 1, 2026, SB 513 requires that training documentation contain specific information:

  • Employee’s name,
  • Trainer’s name,
  • Training dates,
  • Duration of the training,
  • Core competencies or skills addressed,
  • Certifications or qualifications earned.

It is the opinion of the association that training certificates that are in compliance with the California Code of Regulations are also in compliance with SB513. CALSAGA leadership has confirmed with Bureau of Security and Investigative Services Chief Lynne Jensen that she is of the same opinion.

While SB513, does not bring change for our industry, it would be wise to utilize its implementation as an opportunity to audit training certificates and records to ensure compliance. As a reminder, fines for certificate violations can be thousands of dollars per certificate.

As a reminder, CALSAGA members have access to a proprietary database that allows members to create training certificates that are in compliance with California Code of Regulations. These certificates have been reviewed and approved by BSIS leadership.

Training Requirements FAQ

Instructions for the CALSAGA Member Portal & Training Database

Access the CALSAGA Database

Why Post Orders Matter More Than You Think

Courtney Sparkman, OfficerApps, CALSAGA Associate Member

Most security problems do not begin with bad intentions. They begin with unclear direction from managers and supervisors.

In the security industry, post orders are often treated as a formality. Something written once, handed to an officer, and rarely revisited unless something goes wrong. Yet, post orders quietly define how a security officer’s authority is exercised, how judgment is applied, and how a security company presents itself to the clients it is supposed to protect.

A story from hospital security shows exactly what happens when post orders exist without a process behind them.

When Following Post Orders Becomes the Problem

A security officer working armed security at a large hospital was assigned to the main entrance. This was a busy trauma center in a rou\gh part of town where real security issues were constant and ongoing. There were mental health patients fighting in the ER. Strange people wandering into restricted areas. Vulnerable patients getting lost. All situations that required a security officer with presence, discretion, and sound judgment.

Then a new instruction came down. The officer was told to post up at the main entrance to keep hospital staff out. Not because of a threat or an operational risk, but because someone in middle management decided employees should use a different door to keep the entrance clear for patients and guests.

Doctors, nurses, facilities staff, and janitorial teams were redirected. Anyone who refused would have their name recorded for reprimand. The instruction made little sense to the officer because it pulled attention away from real risks and replaced it with administrative enforcement that added no security value. But the post orders were clear enough. This was now his post.

When Post Orders Collide With Reality

One day, a man in a suit approached the entrance leading a group of well-dressed executives. All wore employee badges. The man at the front, from his stature, was clearly important.

Following his post orders, the officer stopped the group and redirected them to the West entrance. When the man insisted on using the main entrance, the officer calmly explained the policy and informed him that names would be taken and supervisors notified. So he did exactly that. Every name. Slowly. Carefully.

When the security supervisor reviewed the list, one name stood out immediately. It was the name of the Chief Executive Officer.

The well-dressed man that the security officer stopped was the CEO of the entire health system who was escorting potential investors around the hospital. The CEO had never been informed of the policy change.

As you can guess, the policy was quietly reversed, and staff were once again allowed to use the main entrance.

Common sense eventually won. But only after wasted time, unnecessary friction, and reputational risk.

What This Story Is Really About

This is not a story about a bad officer. He did exactly what he was told. It is not even a story about a bad policy; poor policies exist in every organization. What it is, is a story about post orders created without a process.

Post orders do more than tell officers what to do. They determine whether officers are empowered to apply judgment or forced to enforce instructions that were never tested against reality. When post orders are written without a full understanding of the environment, officers are left choosing between common sense and compliance.

In this case, compliance exposed the weakness in the system.

Why Post Orders Require Discipline, Not Just Documentation

Effective post orders do not begin with the purpose of accomplishing some goal.

Every instruction in the post order should tie back to a clear security or operational objective. If an order cannot be explained in terms of risk reduction, safety, or operational control, it does not belong in the post orders. Administrative convenience and internal politics should never be enforced by front line security…although it happens more than enough.

Post orders also require validation before deployment. Any instruction that affects access, movement, or behavior within a facility must be reviewed with the stakeholders that ultimately owns the space. In the hospital example, the CEO was unaware of a policy that directly affected how his organization operated. That gap alone guaranteed failure.

Officers must also be part of the process. Experienced officers know immediately when an instruction will create distraction, conflict, or confusion. When there is no mechanism for that feedback to move upward, flawed post orders survive longer than they should.

Finally, post orders must be treated as living documents. Even well-intentioned instructions can deteriorate over time. This usually happens when client expectations change, threat profiles evolve, or most commonly when leadership turns over. Rules that once made sense quietly become liabilities when not revisited.

By scheduling regular reviews of your post orders, security organizations can address any necessary questions before embarrassment or incidents happen. Without regular reviews officers may bend a rule to do their job when the rule is the problem.

The Real Value of Getting Post Orders Right

When a disciplined process exists, post orders support and officer’s judgment instead of replacing it. As a result officers are not forced into robotic enforcement which leads to supervisors spending less time managing fallout and ensuring client satisfaction.

Post orders are not just miscellaneous paperwork, they are operational intent made visible. When they are wrong, everyone feels it. Sometimes at the front door, in front of investors, with a CEO holding his badge in the air.

Either way, the lesson is the same, post orders matter.

Courtney W. Sparkman is the founder and CEO of OfficerApps, the umbrella technology platform behind OfficerReports, OfficerHR, and OfficerBilling, a suite of purpose built tools designed exclusively for security guard companies. With more than two decades of hands on experience in security operations, sales, and executive leadership, Courtney brings deep industry knowledge paired with a practical, operator first approach to technology and growth.

Prior to founding OfficerApps, Courtney held senior leadership roles across the security industry. He had most recently served as Director of Business Development for Diamond Detective Services, where he led national growth initiatives, pursued public and private sector opportunities, and consistently won competitive bids through strategic prospecting, client presentations, and proposal driven sales.

Earlier in his career, Courtney served as Vice President of Operations and Sales at Cequr Security, a security guard company he co-founded with his father. During his seven-year tenure, he was directly responsible for client acquisition and retention, developing training standards, and implementing quality assurance initiatives. The operational challenges and lessons from that experience directly inspired the creation of the OfficerApps platform.

In addition to leading OfficerApps, Courtney is the publisher of Security Guard Services Magazine. The only magazine dedicated to the security guard services industry where he covers industry leadership, technology, and the future of manned guarding. He is also a speaker and author, frequently sharing insights on how security companies can modernize operations, scale profitably, and remain competitive in a rapidly evolving marketplace.

Courtney previously held a private security contractor license in the state of Illinois, earned through a rigorous background check and licensing examination. He holds a Bachelor of Science in Agricultural Economics from the University of Illinois at Urbana Champaign and is currently a candidate for a Master of Science in Emergency Management from the University of Chicago.

Improve Shift Management Operations with a Unified Approach

Gurmit Dhaliwal, Celayix, CALSAGA Associate Member

Security operations are becoming more complex, but the systems used to manage them haven’t kept pace.

Hiring, shift scheduling, time tracking, payroll, and billing are often handled in disconnected tools. Even so-called “all-in-one” platforms struggle to meet the needs of sophisticated security organizations, where requirements evolve constantly, and operational precision is non-negotiable.

Legacy software and broken workflows lead to miscommunication, staffing gaps, compliance risk, and lost revenue. As complexity increases, these failures become harder and more expensive to manage.

When Communication Breaks Down, Operations Suffer

For security operations to run smoothly, accurate data and timely communication must flow across every system.

New guards must be onboarded correctly and made available for shifts without delay. Scheduling must account for qualifications, availability, and location requirements to ensure the right guard is deployed at the right time. Shifts must be communicated clearly and accepted quickly, with transparency that reinforces fairness and trust.

When communication fails, the impact is immediate: no-shows, frustrated employees, higher turnover, and missed revenue. Inaccurate or delayed time and attendance data creates downstream payroll and billing issues, leading to reconciliation headaches, payment disputes, and compliance risks.

Small data failures quickly become operational chaos.

Why All-in-One Software Falls Short

Every function within a security operation has unique requirements.

HR teams need flexible hiring workflows. Schedulers need real-time visibility and intelligent tools to deploy the best available guard across multiple job sites. Finance teams require precise, compliant data flow between time tracking, payroll, and billing.

All-in-one systems promise simplicity but sacrifice depth. They are built for the average use case, not the operational realities of complex, growing security organizations. As a result, businesses outgrow them quickly—or never fully realize their potential.

Sophisticated operations require flexibility, specialization, and control.

The Power—and Challenge—of Best-of-Breed Solutions

Best-of-breed platforms excel by focusing deeply on a single domain. They deliver advanced functionality, industry expertise, and continuous innovation that generic systems can’t match.

The challenge has always been integration. Connecting specialized systems traditionally required custom development, ongoing maintenance, and internal technical resources that many organizations don’t have.

As a result, many security firms settle for suboptimal systems—not because they want to, but because integration felt too complex.

The Evolution to a Unified, Integrated Approach

That trade-off no longer exists.

Modern APIs and native, pre-built integrations now enable specialized platforms to work together as a cohesive system. Instead of stitching tools together manually, forward-thinking vendors are partnering to deliver seamless, production-ready integrations out of the box.

This unified approach allows each system to operate at its full strength while data flows automatically across the organization, from hiring to scheduling to payroll and billing.

The result:

  • Fewer errors and less manual work
  • Faster, more reliable staffing decisions
  • Better employee communication and engagement
  • Improved billable utilization and lower administrative costs
  • Built-in compliance that adapts as requirements change

Better data flow enables smarter automation and clearer analytics, providing visibility into true shift costs and operational efficiency. Organizations gain the agility to adapt quickly, whether responding to client demands, workforce changes, or growth opportunities.

A Unified Workforce Without Compromise

Native, intelligent integrations create a unified workforce management ecosystem without sacrificing flexibility or control. Security organizations can mix and match best-of-breed tools while operating as a single, cohesive system.

The outcome is clear: fewer bottlenecks, less chaos, and a foundation built for scale.

As one Project Manager at Cerberus Security Group put it:

“The proof is in the pudding. Celayix and isolved have solved a lot of things overnight. The training was really amazing. It’s sophisticated software, but not complicated at all from a user standpoint.”

For security organizations ready to move beyond fragmented systems and outdated workflows, a unified approach delivers what all-in-one solutions never could: clarity, control, and confidence at scale.

For a real-world example, see the recent announcement on Celayix and isolved partnering to deliver unified workforce management for the security industry.

Gurmit Dhaliwal is the CEO of Celayix, which delivers shift management for workforce operations and helps ensure every shift is covered. His 25 years of experience in employee scheduling and time-and-attendance software help improve shift management for the security guard industry. He understands the complex requirements of the industry, such as compliance with California State Laws and integrating best-of-breed tools to simplify workflows and accelerate operations.

Member Spotlight – Black Knight Patrol

Shela Borr, CALSAGA Ambassador Committee Co-Chair

The CALSAGA Ambassador Committee is honored to feature Black Knight Patrol (BKP) in this quarter’s spotlight, especially as the company celebrates its 10-year anniversary in the private security industry! Known for its innovative approach, transparency, and strong community presence, Black Knight Patrol continues to set a high standard for professionalism and leadership in security services across California.

Black Knight Patrol’s mission is rooted in providing safety and security through innovative technology and advanced training, with the goal of redefining excellence in private security. Their philosophy goes beyond traditional protection services, focusing instead on proactive solutions, accountability, and continuous improvement. This commitment has allowed BKP to adapt to increasingly complex security environments while maintaining trust with both clients and the communities they serve.

The organization is led by a highly experienced executive management team bringing together more than 80 combined years of industry experience (including a Regional Operations Manager with over 40 years in the field alone!). This depth of knowledge provides BKP with strong operational leadership, strategic foresight, and a practical understanding of the evolving demands placed on today’s security professionals.

Black Knight Patrol has been a proud CALSAGA member since 2019 and remains deeply engaged in advancing the association’s mission. CEO Manuel Jimenez is an active participant on the CALSAGA Ambassador Committee and currently also serves on the CALSAGA Board of Directors. His dedication to improving the private security industry through advocacy, education, and collaboration is widely recognized. From a personal perspective within the Ambassador Committee, Manny’s passion, leadership, and willingness to engage meaningfully with peers stands out. His commitment to bettering the industry is both genuine and impactful.

To the Black Knight Patrol team, CALSAGA represents accountability, integrity, and unity across the private security profession. The company values CALSAGA’s role in advocating for ethical operations, promoting professional standards, and fostering collaboration among security providers. This shared mission has helped BKP remain informed, connected, and prepared as the industry continues to evolve.

Looking ahead, Black Knight Patrol recognizes several ongoing challenges facing the industry, including workforce development, evolving regulations, rising operational demands, and increasingly complex security environments. Addressing these challenges requires more than individual effort, it requires a unified professional voice. Through CALSAGA membership, BKP is able to exchange best practices, stay informed on regulatory changes, and contribute to collective solutions that strengthen the industry while elevating professionalism statewide.

What truly sets Black Knight Patrol apart is its innovative mindset, dedication to community service, and transparent approach to operations, including its candid use of social media to educate, engage, and inform. Whether viewed as bold or unconventional, this transparency reflects BKP’s confidence in its values and its willingness to lead openly in a changing industry.

As Black Knight Patrol celebrates its 10th anniversary, the company stands as a strong example of what modern private security leadership can look like – innovative, engaged, ethical, and community-focused. CALSAGA is proud to highlight BKP and its continued commitment to advancing the private security profession.

Guard Tour Best Practices for Crowded Venues (Stadiums, Malls, Events)

Jordan Wallach, Belfry, CALSAGA Network Partner

Managing security in a crowded venue, whether it’s a stadium on game day, a mall during holiday promotions, or a large public event, requires precision, structure, and constant situational awareness. As a supervisor or operations manager, you already know how quickly a routine patrol can turn into a high-pressure incident when tens of thousands of people are moving through your facility.

Crowded venues present unique challenges: blind spots created by dense foot traffic, delayed reporting caused by noise or congestion, missed patrols during peak hours, and slower incident response time when guards can’t move freely. These pressures make it difficult for any team to maintain consistent coverage without a well-designed system.

This is where security patrol best practices become essential. By combining structured patrol planning with modern tools like GPS guard tracking, NFC checkpoints, and intelligent reporting, you can dramatically improve coverage, accountability, and response times, especially during high-traffic seasons like November and December.

Why Guard Tour Structure Matters

A well-structured guard tour isn’t just about walking predictable routes; it’s about ensuring every zone receives the right level of attention at the right time.

What is a Guard Tour System?

A guard tour system is a framework that uses pre-defined routes, checkpoints, and tracking tools (such as QR/NFC tags or GPS) to ensure officers complete their assigned patrols. It enhances situational awareness, supports incident documentation, and helps supervisors verify that coverage requirements are being met.

For large venues, the right guard tour best practices reduce:

  • Security blind spots
  • Missed incidents
  • Delayed responses
  • Unauthorized access
  • Incomplete patrols

When your guards follow structured and trackable patrol cycles, your entire operation becomes more proactive rather than reactive.

Designing Patrol Routes for Maximum Coverage

Crowded venues require intelligent planning to keep patrols efficient and unpredictable. You, your team, and your contracted guards must collaborate to design patrol routes that security teams can follow consistently.

1. Use A/B/C Route Rotations

Rotating through three defined routes prevents predictable patrol patterns that bad actors can exploit.

  • Route A: Main concourses, entrances, service corridors
  • Route B: Upper levels, escalators, stairwells, back-of-house areas
  • Route C: Parking structures, exterior walkways, drop-off points

Each shift should rotate routes so guards don’t follow the same pattern daily.

2. Alternate Entry & Exit Points

This reduces the risk of blind spots and helps officers detect repeat suspicious behaviors.

3. Sample Patrol Route Diagram (Conceptual)

Use a full diagram in your operations manual so guards can visualize each route clearly.

4. Consider Timing & Foot Traffic

During the holidays or peak events, routes should be adjusted to reflect:

  • Expected crowd surges
  • Event schedules
  • Vendor/contractor movements
  • VIP pathways

This ensures your security patrol best practices remain aligned with real-world conditions.

Using GPS and QR/NFC Checkpoints to Improve Accountability

Modern patrol management relies heavily on technology. Tools like GPS guard tracking and NFC or QR checkpoints ensure guards complete tours on time and at the correct locations.

How Checkpoint Systems Work

  • You place QR/NFC tags at critical zones
  • Guards scan checkpoints using the mobile app.
  • GPS adds an extra layer of verification.
  • Supervisors get real-time activity logs.

Timing Matrix for Patrol Efficiency

Route Expected Duration Tolerance Flag Condition
A 22–26 minutes ± 4 mins > 30 mins or < 18 mins
B 28–33 minutes ± 5 mins > 38 mins or < 23 mins
C 18–22 minutes ± 3 mins > 25 mins or < 15 mins

This matrix helps supervisors assess patrol quality and detect:

  • Rushed or incomplete routes
  • Extended stops
  • Deviations that may require follow-up

How GPS Improves Response Times

Real-time alerts notify supervisors when:

  • A guard goes off-route
  • A checkpoint is missed
  • A panic alert is activated
  • Foot traffic blocks a standard route

Faster visibility = faster incident response time.

KPIs Every Security Supervisor Should Track

To improve guard performance and venue safety, track KPIs that reflect actual patrol effectiveness:

1. Patrol Completion Rate (%)

Measures how many scheduled patrols were completed vs. assigned.

2. Missed Checkpoint Ratio

Scheduling and callout procedures must adhere to regional labor laws governing rest periods, on-call pay, maximum work hours, and mandatory overtime policies. For U.S. companies, refer to the U.S. Department of Labor (DOL) guidelines and your state’s labor board for compliance requirements. This content is for informational purposes only and not legal advice.

3. Average Incident Response Time

Evaluates how quickly guards react to alarms or alerts (a critical metric during crowded events).

4. Guard Punctuality

Late shift starts cause delayed patrol cycles and increased risk.

These KPIs become even more valuable when integrated into security operations management software or security workforce management software that automatically logs and visualizes performance.

Technology Tools That Streamline Patrol Management

This is where advanced solutions like security guard software make a dramatic difference.

Guard Patrol Management Software helps you:

  • Track guard locations in real time with GPS guard tracking
  • Automate checkpoint scans using NFC or QR tags
  • Receive alerts for missed checkpoints or deviations
  • Analyze patrol activity with automated dashboards
  • Maintain shift visibility across crowded venues
  • Integrate patrol data with incident reporting and scheduling

When combined with the right scheduling tools, supervisors can create:

  • Holiday-ready patrol plans
  • Backup shift assignments
  • Callout playbooks for no-shows
  • Rapid-response staffing workflows

Quick Checklist: Guard Tour Optimization

Use this checklist before your next large event or holiday rush:

  • Alternate A/B/C routes each shift
  • Verify checkpoints daily via GPS/NFC
  • Track completion rates weekly
  • Update escalation SOPs before peak events
  • Use automated reporting tools for visibility
  • Provide guards with active communication channels
  • Maintain backup officer lists for callouts
  • Review incident trends before designing new routes

Legal Disclaimer:

Guard tour planning and scheduling must comply with local labor laws covering overtime, rest periods, and maximum allowable shift lengths. Refer to the U.S. Department of Labor and your regional labor board for formal guidelines. This article is informational only and does not constitute legal advice.

Optimize Your Patrol Strategy

Crowded venues demand structured patrols, real-time visibility, and technology that keeps guards accountable. With the right guard patrol management software and the right playbook, you can increase coverage, strengthen response times, and protect every corner of your venue.

Jordan Wallach is the Co-Founder and CEO of Belfry, a software platform built for security guard services companies to manage scheduling, payroll, compliance, and field operations with greater visibility and less operational friction.

Jordan founded Belfry after spending hundreds of hours speaking directly with security company owners, operations managers, and officers across the country. Those conversations shaped Belfry’s focus on reducing back-office burden and supporting the realities of running a distributed, people-intensive operation.

Prior to Belfry, Jordan worked in product and software roles at Microsoft and as an Engagement Manager at McKinsey & Company, advising technology companies on product strategy and growth. He holds a B.S. in Mathematical and Computational Science from Stanford University and is based in New York City.

WOTC Legislative Update: What Pending Changes Could Mean for Employers in 2026

Marcel Abandonato, MJA & Associates, CALSAGA Associate Member

As Congress continues discussions around federal workforce and tax policy, the Work Opportunity Tax Credit (WOTC) is once again in focus. Proposed legislation aimed at enhancing and modernizing the program could reshape how employers calculate credits, qualify new hires, and capture savings.

For businesses that rely on hiring incentives to control labor costs, the outcome of this legislation could have a meaningful financial impact.

Now is the time to understand what’s changing — and how to prepare.

Why WOTC Still Matters

For over 25 years, the Work Opportunity Tax Credit has helped employers reduce federal tax liability while expanding opportunities for individuals facing barriers to employment.

Employers may earn credits of up to $2,400–$9,600 per eligible hire, depending on the target group and hours worked.

Common qualifying groups include:

  • Veterans
  • SNAP recipients
  • Long-term unemployed individuals
  • Ex-felons
  • SSI recipients
  • Youth employees in designated areas

For many organizations — especially those in security, staffing, retail, hospitality, manufacturing, and healthcare — WOTC represents six- and seven-figure annual tax savings.

What’s Being Proposed in Congress

While final language is still being negotiated, current proposals suggest several enhancements to strengthen and extend the program:

Expanded eligibility
Additional target groups may be added, allowing more new hires to qualify.

Updated credit structure
Discussions include adjusting wage caps and credit percentages to better reward long-term employment.

Program modernization
Streamlined documentation and certification processes could reduce administrative burdens and improve processing timelines.

Long-term stability
Lawmakers are signaling support for making WOTC a more predictable, long-term workforce incentive rather than a short-term extension.

If enacted, these updates could increase available credits while simplifying compliance — a win for both employers and job seekers.

What Employers Should Do Now

Even before legislation is finalized, proactive businesses can position themselves to maximize savings:

– Review your current WOTC capture rate

Are you screening 100% of new hires? Many companies miss 20–40% of eligible credits due to process gaps.

Strengthen onboarding workflows

Ensure applications, prescreens, and documentation are completed accurately and on time.

– Align recruiting with incentives

Expanded eligibility may open opportunities to target new workforce segments strategically.

Prepare for quick implementation

When changes pass, early adopters typically benefit most.

The Opportunity Ahead

Whether the legislation expands credits, simplifies processes, or both, one thing is clear:
WOTC remains one of the most valuable and underutilized tax incentives available to employers.

Organizations that stay informed and optimize their programs stand to gain a significant competitive advantage.

Ready to Maximize Your WOTC Savings?

If you’re unsure whether your current process is capturing every available dollar — or want guidance on how upcoming legislation could affect your business — now is the perfect time for a review.

MJA & Associates has helped employers for over 20 years reduce tax liability through WOTC and other employment-based incentives.

We can help you:

  • Evaluate your current WOTC performance
  • Identify missed credits
  • Improve compliance and documentation
  • Prepare for upcoming legislative changes
  • Automate and streamline your process

Contact us today for a complimentary WOTC program review or consultation.

For more information or to learn more about WOTC please contact

Marcel Abandonato at marcel@mja-associates.com or call 951.272.8294.

Marcel Abandonato is the President and CEO of MJA & Associates, Inc., a leading provider of Work Opportunity Tax Credit (WOTC) consulting and compliance services. For more than two decades, Marcel has worked with businesses across the country to unlock millions of dollars in federal tax credits by implementing compliant, efficient, and scalable WOTC programs.

Marcel is widely regarded as a subject-matter expert on WOTC legislation, program renewals, and best practices—particularly for security firms,staffing firms, multi-state employers, and organizations with high-volume hiring. Under his leadership, MJA & Associates partners with leading HR and staffing technology platforms to modernize WOTC screening and processing, helping employers improve participation rates and maximize return on investment.

Inside the Frontline: An Industry Snapshot

Johann Hauswald, PlixAI, CALSAGA Network Partner

The Gap Between Perceived Risk and Operational Reality

Most industry strategies for frontline safety are built on a worst-case foundation: training for rare assaults, staffing for static shifts, and documenting only major incidents. While well?intentioned, this approach leaves organizations prepared for the exception rather than the rule.

An analysis of more than 10,000 incidents across three major U.S. metropolitan areas, captured through AI?powered body?worn cameras, reveals a different operational reality. Risk is not occasional or isolated – it is continuous, routine, and largely invisible to leadership relying on traditional reporting methods.

This snapshot moves beyond anecdote to provide a data?driven view of frontline operations, uncovering a critical visibility gap between what leadership believes is happening and what frontline teams actually experience each day.

Key Findings

  • The 90% Blind Spot: Organizations that rely on manual incident reporting are effectively blind to over 90% of frontline risk signals. While traditional reports capture roughly 8% of activity, automated AI detection shows that operational friction is ongoing, not episodic.
  • The 80/20 Workload Reality: Frontline teams are not primarily responding to high?severity crime. 83% of daily activity involves routine compliance issues such as trespassing, access disputes, and refusal to comply, while only 17% of incidents escalate into high?severity events.
  • Escalation is Conversational: Violence is rarely spontaneous. Nearly 70% of escalations begin with verbal resistance or authority challenges, creating a measurable pre?escalation window that often goes unaddressed.

THE VISIBILITY GAP: THE 90% BLIND SPOT

Incident detection follows two primary paths: manual reporting and automated, always?on detection. The data shows that manual reporting captures only a small fraction of real?world interactions.

Key Insight

Organizations relying solely on manual reports operate with a 92% visibility gap. Frontline risk is continuous, but legacy reporting tools capture only isolated moments, leaving leadership unaware of the true volume of operational friction.

Operational Takeaway

You cannot manage risk you do not see. Closing the visibility gap requires moving from after?the?fact reporting to continuous workforce intelligence.

THE 80/20 REALITY: FREQUENCY VS SEVERITY

Incident Breakdown

The data reveals that routine compliance issues such as trespassing, loitering, and access disputes account for the majority of frontline activity, while high?severity incidents remain statistically rare.

Operational Takeaway

Operational efficiency is gained by optimizing for the 80% of interactions that occur daily, not just the extremes. Systems and training must support flexibility, communication, and de?escalation as core competencies.

THE ANATOMY OF ESCALATION: LANGUAGE AS AN EARLY WARNING SYSTEM

Behavioral Triggers Across 10,000 incidents

Analysis across thousands of incidents shows that physical aggression is rarely the starting point:

Linguistic Signals

Instead, non?violent verbal cues – resistance, challenges to authority, and refusal to comply – trigger more than 60% of automated alerts.

Key Insight

Escalation is primarily a conversational breakdown, not a spontaneous physical event. Since nearly 70% of escalations stem from non-compliance and verbal disputes, there is almost always a “pre-escalation window” – a clear period of verbal resistance that occurs well before any physical risk materializes.

Operational Takeaway

Treat language as the earliest indicator of risk. Since verbal resistance reliably precedes physical violence, safety strategies should focus on early intervention. Training staff to recognize and de?escalate specific verbal patterns can prevent many of the incidents that later become severe.

OPTIMIZING COVERAGE: ALLOCATING RESOURCES TO PEAK RISK

Daily & Weekly Patterns

Incident volume does not follow a simple day?versus?night pattern. Instead, activity forms a double?peak curve, clustering around late morning (~11:00 AM) and late evening (~11:00 PM). Volume steadily builds throughout the week, peaking on Fridays, when incidents start earlier and persist later than on other weekdays.

Key Insight

Operational risk aligns with social and business cycles, not just darkness. The late-morning spike suggests friction related to business operations and access, while the Friday surge reflects social movement. Crucially, Friday risk is longer, not just higher meaning standard 8-hour shift blocks often leave the “shoulders” of this high-risk window exposed.

Operational Takeaway

Staff for the curve, not the clock. Static shifts often overserve low?risk early?morning hours while underserving critical peak periods. Effective workforce management requires dynamic scheduling that specifically targets the 11:00 AM / 11:00 PM intensity clusters and extends coverage windows for the weekend ramp-up.

CONCLUSION: FROM ACTIVITY TO INSIGHT

The Reality

A full-distribution view of frontline activity reveals a reality that traditional “top incident” summaries miss. The data proves that risk is continuous, not episodic. Escalation is predictable and conversational, not spontaneous. And crucially, the operational load is driven by volume, not rarity.

The Strategic Shift

Organizations can no longer afford to operate based on the small percentage of incidents that get manually reported. Effective risk management requires visibility across the entire interaction lifecycle – from the first verbal refusal to the final report.

Final Takeaway

Moving from reactive reporting to proactive workforce intelligence enables three immediate advantages:

  1. Smarter Staffing: Align coverage with real 11:00 AM / 11:00 PM risk curves.
  2. Effective Training: Focus on the language and behaviors that precede 70% of escalations.
  3. Defensible ROI: Base staffing, technology, and budget decisions on real operational behavior, not worst-case hypotheticals.

For private security organizations, visibility is no longer a nice to have. It is the foundation of safer teams, stronger operations, and sustainable growth.

Johann Hauswald is the Founder and CEO of Plix AI, a startup developing AI-enabled body cameras and safety analytics software for private security and field-operations industries. Plix is backed by Sequoia Capital, Andreessen Horowitz (a16z), and the founders of Samsara and Verkada.

Johann earned his Ph.D. in Computer Engineering from the University of Michigan, where he specialized in AI at the edge and computer vision. Before founding Plix, he was a postdoc at Stanford working on large-scale video analytics and edge inference systems and previously co-founded a venture back AI company building conversational AI systems. His work sits at the intersection of AI, safety, and real-time video intelligence, advancing how organizations detect and respond to incidents in the physical world.

The More Things Change, the More They Stay the Same

Shaun Kelly, The Liberty Company , CALSAGA Preferred Broker

We are excited to announce that our team has changed to a new insurance brokerage firm, the Liberty Company Insurance Brokerage, LLC. As this is a name change for us, we want you to know that our team remains the same. We will continue to provide the same support to CALSAGA and all the Members.

The Liberty Company Insurance Brokerage, LLC operates in all 50 states with over 80 offices nationwide and growing. We are an independently owned full-service insurance broker that handles commercial, personal and employee benefits insurance needs of businesses, non-profits, and individuals for over 30 years. We are establishing a Liberty Security Program Group, in efforts to further support the Security Industry in California and other states.

Our goal is to continue providing Members with Risk Management and Safety resources to reduce claim frequency and severity.  Any broker can go out and get insurance quotes; it is the service after the quotes that really matters. Liberty Company brings additional resources that will assist in creating positive results that reduce costs, improve efficiency and decision making.

There will be more information to come in future articles.

Thank you and look forward to seeing everyone.

Shaun Kelly began his insurance career is 1992 after graduating from California State University, Fresno with a BS in Business Administration with a major in Finance. In searching for a specific industry to specialize in, he recognized that the Security Industry was growing and expected to maintain significant growth for years to come. Since 1992, he has specialized in the security industry and has experienced the changes over the years. He is the Preferred Broker for CALSAGA, California Association of Licensed Security Agencies, Guards & Associates. He is a Partner at Liberty Company Insurance Brokers, LLC. He is proud to serve his clients and the security industry.

The True Cost of Inaccurate Timekeeping (and How to Fix It)

Stephanie Petersen, TEAM Software by WorkWave, CALSAGA Network Partner

If you manage a security guarding company, you know the reality of a distributed workforce: your business happens everywhere but your office. Your teams are out in the field, often working independently at multiple high-stakes job sites. While that flexibility is inherent in the industry, it creates a massive data blind spot if you aren’t careful.

When you can’t see your employees, how do you know — really know — that your timekeeping is accurate?

For many in the security industry, “close enough” has been the standard for too long. But in a world of razor-thin margins and strict compliance regulations, “close enough” is a leak your business can’t afford. Accurate timekeeping is the foundation of your profitability, your compliance strategy and your employee retention.

1. Protecting Your Profit Margins

Labor is almost certainly your largest expense. When timekeeping records are loose, you are likely overpaying for labor without realizing it. Even minor discrepancies — a few minutes here, a rounded-up hour there — compound quickly across hundreds of guards and job sites.

Beyond simple overpayment, accuracy is critical for job costing. You need to know precisely how many hours are spent on specific sites to understand if a contract is actually profitable. Accurate timekeeping ensures you are billing clients for every minute of service delivered, preventing the “missed minutes” that silently eat away at revenue.

2. The Shield of Compliance

Labor laws are unforgiving. You need auditable, precise documentation of hours worked, breaks taken and overtime accrued. If you are relying on manual timesheets, you are leaving yourself open to audits, fines, and legal disputes.

For security contractors, timekeeping serves as a digital audit trail. It provides proof of presence, verifying a guard was at a specific post at a specific time, which significantly reduces your liability if a security incident occurs.

3. Proof of Service Is Your Promise

Your customers want to know they are getting the protection they paid for. Was the lobby guard at their post at 8:00 AM?

Accurate timekeeping acts as proof of service. When you can provide verified data that correlates time punches with GPS or location markers, you give your customers confidence. This visibility protects your reputation and helps you retain contracts in a competitive market.

4. Building Trust with Your Team

Reliable timekeeping ensures fair compensation for every hour worked, which is critical for retention in an industry with high turnover. Furthermore, accurate data helps you avoid burnout. By analyzing true hours worked, you can adjust schedules to prevent employees from overextending themselves.

The Solution: WinTeam Mobile

Capturing data in the field is difficult. Connectivity issues and the risk of “buddy punching” have historically made accuracy a challenge. That is why we are rolling out significant updates to WinTeam Mobile to close the gaps between your field operations and your back office.

  • Offline Punch Capabilities: Capture punch data and GPS locations even without cellular connectivity. The app automatically synchronizes and validates the data once service returns.
  • Kiosk Mode: For sites with large teams, the new multi-user kiosk mode allows rapid clock-ins for multiple workers using a single device. This eliminates the need for expensive, specialized hardware.
  • Biometric Validation: Coming soon, WinTeam Mobile will include optional facial verification. This feature virtually eliminates time theft and buddy punching by confirming the right employee is at the right place at the right time.

Accurate timekeeping is the difference between guessing at your success and engineering it. With TEAM Software by WorkWave, you have the tools to turn time tracking into a competitive advantage.

Ready to see how WinTeam can tighten your operations? Visit TEAM Software online at teamsoftware.com to request a demo today.

Stephanie is a passionate product manager with over a decade of experience shipping complex software. She specializes in owning ERP products for security and janitorial operations, turning chaotic workflows into functional systems designed to perform in the field and deliver measurable impact.

Why Your AI Is Only as Good as Your Data Factory: The Hidden Requirement for Security Operations

David Libesman, TEAM Software by WorkWave, CALSAGA Network Partner

AI is the current buzzword in the security industry. From automated scheduling and predictive guard patrolling to agentic workflows that can flag incidents on their own, the promises are significant. Vendors suggest smarter dispatching, reduced overhead and better client experiences with minimal effort.

However, there is a reality the industry often ignores: AI without a Data Factory is just an expensive experiment.

If your data is fragmented or inconsistent across systems, no AI model will ever deliver the results you expect. In the security industry — where operations change minute-to-minute at different posts — that gap is dangerous. The faster your business moves, the more damage bad or delayed data can do.

The Reality: Why Security AI Fails

Many security companies rush to adopt AI but overlook the foundational layer required to fuel it: a Data Factory that continuously cleans, unifies, and prepares datasets for real-time decision-making.

Common issues security pros encounter include:

  • Data Silos: Guard notes are in one system, billing in another and scheduling in a third. AI cannot reconcile these conflicting sources.
  • Manual Latency: Relying on manual uploads or human-initiated exports leads to multi-day delays that break real-time automation.
  • Dirty Data: Inconsistent job types or incorrect site IDs from the field cause predictive models to degrade quickly.

Trying to run AI on poor data is like trying to navigate an autonomous vehicle down a road of potholes and missing road signs. The technology is advanced, but the environment makes it worthless.

What a Data Factory Actually Does

A true Data Factory is not just a database or a dashboard. It is a live operational layer that:

  1. Automates Ingestion: It pulls every data point across your operations, including payroll, scheduling, and field notes.
  2. Normalizes Records: It ensures that an “incident” or “checkpoint” means the same thing across different regions and supervisors.
  3. Eliminates Human Dependency: It removes the need for manual spreadsheet merging or data extracts.
  4. Streams in Real Time: It ensures data is current so AI agents can act immediately.

Why Security Needs Real-Time Data

Security is a data-volatile industry. Your guards are constantly updating statuses and capturing photos through mobile tools. AI agents built on stale data make the wrong calls: dispatching the wrong guard, missing SLA thresholds or re-routing personnel based on yesterday’s information.

The silent killer of automation is decision latency. If a guard marks a post as “in progress” but the update doesn’t hit the system for 12 hours, the opportunity for AI to optimize your operation has already passed. A Data Factory collapses that gap, ensuring that when reality changes in the field, your systems respond immediately.

Agentic Workflows Demand Clean Data

Modern agentic AI workflows — like automated scheduling or client outreach — rely on immediate signal changes. For example:

  • A guard is running late to a high-priority post.
  • A client cancels a temporary coverage request.
  • Weather or traffic impacts route efficiency for mobile patrols.

If your systems only sync overnight, your AI is operating blind. Without a Data Factory to process input 24/7, you have no real-time intelligence and, consequently, no meaningful automation.

From Missed Opportunity to Competitive Advantage

Once your data is standardized and refreshed automatically, AI becomes a profit center. Predictive patrolling becomes accurate, guard utilization increases, and client churn drops because you are providing proactive communication based on real-time truth.

The transformation isn’t the AI itself but the data readiness behind it. Before you invest in the next “smart” tool, ensure you have the foundation to support it.

Ready to see how a unified data foundation can transform your security business? Visit TEAM Software online to learn more about our business intelligence solution, WavelyticsTM.

David Libesman is a visionary SaaS executive with an entrepreneurial spirit and track record of developing, monetizing and growing data analytics & AI product strategy and business. David is well-versed in driving strong sales through enterprise channels, as well as building, developing and retaining high-performing teams. He aims to bring best of breed AI and analytic capabilities to boost growth and profits for TEAM Software customers through data-driven strategies.