Earn up to 14 CPE CREDITS
Register by 21 September and save $100!
Shots fired! What to do before, during and after
Workplace violence is a top concern for all organizations. The most frightening and compelling element is an active shooter. Current events across the country dramatically illustrate that no individual or group is immune to this tragic possibility.
This program presents the necessary components of preparation strategies that include planning, prevention, mitigation, and response to active shooters and incidents. Your company must embrace the importance of preparing for, and rehearsing, what is known as a "survival mindset." Best practices are discussed throughout the program.
"Very informative. I learned there are some key factors to change in our daily operations."
--Director of Risk Management & Security, American House Senior Living Communities
- Enhance your overall awareness of the costly impact of workplace violence
- Practice a direct, state-of-the-art method for violence assessment
- Identify behaviors of concern
- Understand what case facts are the most critical for violence assessment and find out how to obtain them
- Learn the distinction between an active shooter and a hostage incident
- Meet your "duty of care" responsibilities to your employees by preparing them for this dreadful possibility and by integrating appropriate guidance into your overall violence prevention program.
Workplace and School/Campus Violence: A Historical Perspective
This overview of workplace, school, and campus violence highlights actual cases; threat assessment, management, and response; and best practices in prevention—focusing on the active shooter.
Recognizing and Preventing Workplace Violence
No profile exists to predict at-risk and potentially violent persons, but signs and flags most often are present prior to violent acts. These signs and flags may be observed in the person’s thinking, emotions, and/or behaviors and allow for reporting and intervention in informal and formal violence risk assessment procedures. These are covered, as well as the barriers to reporting or taking action.
The Five Phases of an Active Shooter
Examine what occurs before shots are fired. Understanding this enables the planning team to make effective and definitive decisions regarding their emergency response.
Shots Fired: Guidance for Surviving an Active Shooter Situation
Explore strategies to help YOU survive an active shooter situation whether in the workplace, school, or other venue.
The Active Shooter and Explosives and Other Weapons
Case examples are used to discuss and describe the motivations of offenders in utilizing these tactics.
The Role of Law Enforcement: Tactical Response, the Development of Active Shooter Teams
The tragedy at Columbine High School was a turning point for law enforcement training and resulted in the instigation of the largest change in police tactics. Response protocols are discussed at length.
Crisis Management: Corporate Response to the Active Shooter
Tabletop exercises are used to facilitate discussions about the development of effective active shooter crisis management protocols. One company's program is highlighted. Best practices are discussed.
Emergency Plans for Responding to an Active Shooter Situation
Examine the guidelines for proper response techniques, methods of employee notification, and evacuation and lock down strategies. Understand how to identify what will work best for your facility.
Earn up to 14 CPE CREDITS
There are many types of crises—some are anticipated and others are not. How an organization deals with a disruptive event that threatens to harm the organization or its stakeholders can determine its recovery and long-term success. Is your organization prepared?
In this hands-on workshop, you’ll be presented with a national crisis scenario and then work through each phase of the crisis—prevention, response, mitigation, and recovery. Practice new concepts from industry leaders and apply your own practical experience and expertise.
- Transition from theory to practice determining how to manage a crisis
- Analyze methods to manage and control communication
- Examine components of a comprehensive workplace violence program
- Strengthen strategies for protecting brand and reputation during a crisis
- Learn about crisis recovery and consequence management
- Discuss how cybersecurity issues affect crisis management
Earn up to 15 CPE CREDITS
- Workplace aggressors are easy to identify
- Prevention is expensive and time consuming
- Having good policies is enough
- People just “snap”
- Understand the behavioral and psychological basis for violent behavior
- Understand how information gathering, including interviewing, needs to be focused on behavioral information for value in the assessment, rather than just "facts".
- Examine victimization and the role of the workplace target in workplace violence incidents
- Training in a state-of-the-art structured professional judgement violence risk assessment tool
- Gain an in-depth understanding of modern intervention strategies- why they work and how they might fail
Who Should Attend
- Security directors
- Corporate security professionals
- Investigations professionals
- Loss prevention professionals
- HR professionals
Workplace violence touches everyone. It affects the way we think, feel and behave. The concern for safety and the threat of violence affects the emotional stability and productivity of our employees, and ultimately our profitability. Although the incidence of actual injuries while at work is relatively low, intentional acts and accidents affect the lives of thousands of innocent citizens each year. This training will address this problem and reveal what can be done about it. Regardless of one’s organizational responsibilities, every one of us plays a role in violence prevention and workplace safety.
Employers have a duty to provide a safe workplace for their employees. This includes statutory obligations under federal and state law to provide and promote a safe and violence-free work environment, related to the Occupational Safety and Health Act (OSHA) and state Workers’ Compensation laws. Employers also have responsibilities to the public. Either vicariously or directly, employers may be liable for the harm brought to others by workplace violence.
This intricate web of statutes, standards, rules, and regulations creates a legal minefield for supervisors and managers. Employers must protect employees and other parties without infringing on anyone’s rights. Rarely has the challenge for employers been greater. Fortunately, there are solutions.
All attendees receive a complimentary copy of Violence Assessment and Intervention: The Practitioner’s Handbook, Second Edition, by James S. Cawood, Ph.D., CPP and Michael H. Corcoran, Ph.D.
Earn up to 21 CPE CREDITS
Learn proven methods for completing cost-effective facility security designs.
Integrating multiple security systems in a layered effect—including CPTED and architectural security, critical infrastructure protection, building designs, interior/exterior layout, intrusion detection systems, structural barriers, access controls, communications, and CCTV assessment—contributes to the protection of assets as well as the control and reduction of losses.
This intensive, three-day program led by leading security design architects, engineers, and operations experts offers a detailed, systematic approach to the design of a fully-integrated physical security program. Acquire solid recommendations for improving protection against terrorism, workplace violence, street crime, and other threats. Participation in a three-day case study—and an off-site security site visit— allow you to immediately apply new information and understanding.
Please Note: This program includes an off-site visit. The host organization may require the use of non-disclosure agreements. Agreements offered to nationals and non-nationals of the host country may differ.
- Transition from theory to practice to determine your security needs
- Analyze methods to reduce and control security project costs
- Examine multiple approaches to assess risks, threats, and vulnerabilities
- Gain a deeper understanding of the structured approach used by engineers and architects to design fully integrated security systems
- Master your ability to define security design requirements and select countermeasures and technologies that reduce risks and protect client assets
- Learn how to prepare and defend a security business case before management
- Identify effective project management techniques used to bid, enhance construction management, and implement security systems
"This course bridges the gap between the inspectors in the field and the physical security specialists at the headquarters level."
--Keith Creighton, Federal Protective Service
"Go! It is worth it for invaluable training."
--Christoper Powell, SCL Health
Who Should Attend
- Architects, designers, integrators
- Security directors
- Practitioners responsible for their organization’s physical security controls
- Personnel directly involved in the design, specification, implementation, operation, or maintenance of security systems
Assess and analyze security systems and operations using knowledge gained in the classroom during an exclusive, customized behind-the-scenes tour. Location to be announced
Learn how to integrate design and security systems. Create your own architectural and engineering design solutions based on a multi-story facility design practicum.
LEED and GREEN: Sustainability's Impact on Security
Learn how LEED 2009 and sustainability strategies will impact your existing or proposed building.
Designing to Resist Terrorist Attacks
Develop a basic understanding of how to cost-effectively approach the protection of your people and critical infrastructure. Learn how to evaluate the level of risk from terrorist attacks and the consequences.
Overview of Security Countermeasures and Their Selection
Examine how security countermeasures are derived from functional security design requirements. Learn how to build a layered security solution. Better understand security technology systems and their role in facility design and operation.
The Security Design Process
Learn to interface successfully with the design process by applying sound engineering analysis, project management skills, CPTED, and proven architectural security techniques. Develop a responsive design project on time and within budget.
Design Team Interfaces
Explore the roles and responsibilities of key members. Discuss techniques that ensure effective communication and coordination between team members and the various design disciplines and how to introduce requirements at the appropriate times.
Functional Requirements and Conceptual Design
Learn how the designer establishes security requirements and the desired level of protection. Discover how these evolve into a complete functional security design and are traced through the life of the project.
Security Program Integration
Gain exposure to the approach and techniques of systems integration that are applied during the design stage, and that culminate in a complete security program and master plan.
Security System Documentation
Review the major aspects of design documentation and learn how to manage the preparation of design deliverables.
Estimating the Cost of the Project
Learn to produce an estimate based on information gained from various sources that are in line with the functional design requirements and the basis of design.
Engineering Design Considerations
Understand how a security system design is developed and converted into a facility design solution.
Explore how to control costs by avoiding rework, achieving optimum equipment utilization, manpower reduction, and proper use of consultants.
Preparing and Presenting a Security Business Case
Discuss security’s contribution to a company's bottom line and examine how to successfully present and defend your security business case to management. Learn how to get approval and how to get a sufficient capital budget for implementation.
Managing Project Changes
Learn how to deal with the impact of the inevitable changes in requirements, scope, budgets, and/or changes in direction.
Completing the Process
Address procurement—the bid and selection process, evaluation criteria, successful bid negotiation, and project award techniques—before moving on to construction administration.
It is assumed that participants have a basic familiarity with CPTED, security equipment, and physical security.
Renaissance Seattle Hotel
515 Madison Street
Seattle, WA 98104
For hotel reservations, book your reservations online or contact the hotel directly at +1.800.546.9184 and reference “ASIS Education Week” to receive our special group rate of $189 per night (plus taxes and fees).