Hot-button political issues are a leading reason for violence at places of worship. Not every one of these incidents is committed by a member of an organized extremist group—whether right-, left-, or alt-leaning—but all are concerning and deserve in-depth review to determine how they might affect future house of worship security. Are the attacks planned and organized or a random mob reacting to a recent event, choosing to act in anger instead of creating a dialogue toward reconciliation and peace? Have criminal gangs evolved into political extremists? Are these events perpetrated by lone actors or groups?
What to Expect from a U.S. Government-Coordinated Evacuation
5 Underlying Reasons for Extremist Attacks on Houses of Worship
Infographic: How to Build Priority Lists for Threat Monitoring
Security Management: Focus on House of Worship Security
Extremism Against Places of Worship Extends Across Faiths
Houses of worship across many religions faced a spike in security incidents in recent years, whether driven by the response to a controversial event or a longstanding tension or discrimination. In this collection of articles from Security Management, explore how security and religious leaders are tracking threats, changing mindsets, and preparing for extremist-linked incidents.
▪ 5 Underlying Reasons for Extremist Attacks on Houses of Worship
▪ How Faith-Based Organizations Can Improve Threat Intelligence Collection
▪ Infographic: How to Build Priority Lists for Threat Monitoring
▪ PRAY: A Model to Change Mindsets about Security in Houses of Worship
▪ 4 Steps to Mitigate Crime Risks at Houses of Worship
▪ Fast Facts: 11 Security Scenarios Religious Personnel Should Prepare For
Best of Security Management
Security Technology: Supply Chain Challenges and Opportunities
Semiconductor shortages. Trucking delays. Counterfeits and compromises. Cargo ships stuck in canals. Sanctions stopping supplies. Society depends on supply chains, and when they’re broken, stalled, or compromised, the ripple effects are enormous. This issue of Security Technology explores supply chain security, from the technology that’s helping monitor and secure the physical movement of goods to threats to software supply chains to vetting of third-party suppliers and more.
Security Management Podcast
March 2023: Are You Ready for What’s Next? Evacuations, Resilience, and Pitching New Ideas
Do you have the infrastructure, programs, and soft skills in place to adapt to any situation? In this episode of Security Management Highlights, host Brendan Howard speaks with Dale Buckner about mass evacuations and duty of care; ASIS Europe co-chairs Inge Huijbrechts and Gavin Henderson discuss the business case for sustainability and resilience; and Suzanna Alsayed gives some practical advice about how to ready your reputation—and your pitch—to increase chances of buy-in success.
Want to learn more about these topics? Check out additional resources from Security Management and ASIS International:
- Dale Buckner on how “Speed Is Your Security”
- “How to Be More Convincing,” by Suzanna Alsayed
- Inge Huijbrechts on “The Intersection of Sustainability and Security”
- Learn more about ASIS Europe: https://asiseurope.org/
Focus on Bomb Threats
13 Steps Organizations Can Take to Prepare for a Bomb Threat
Historically Black, Historically Targeted
An Explosive Situation: Strategies to Prevent Youth Radicalization
Director of corporate security, Daimler Truck North America
“Good crisis leadership happens when you plan for it. It is imperative to have a team in place that understands their role in crisis could be different than their daily line role.”
President and CEO of The Resiliency Initiative
“Use the crisis as the springboard to establish the process and protocol you want to build and document for future responses.”
Director of guest safety and operations at the Denver Zoo
“I’ve lived in Colorado my whole life. I witnessed Columbine as it happened, and the Aurora movie theater shooting. We’ve had a lot of big shootings. I felt we needed to test our infrastructure and make some of those connections with our first responders.”
Chief information and technology officer, Securitas North America
“As a systematic collaborative approach for transforming a company's services and goals, organizational change management (OCM) tends to emphasize process; however, it is people who most affect change and are affected by that change, meaning any successful effort must center on engagement and authenticity.”
“It comes down to: If we identify an adult who is being exploited, what are we going to do? Who is going to be notified?”
Michael Bailey, Sr., CPP
Security control official, Collins Aerospace
“When it comes to sharing numerical data during an event, leaders should keep in mind that most people involved in a crisis have trouble processing information when it comes to numbers or basic math while the event is ongoing.”
ASIS Calendar of Webinars & Events
As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.
Book Review: The Psychology of Extremism
The Psychology of Extremism: A Motivational Perspective is a compilation of research on humans’ engagement in extremism.
Catch Up With SM on Social Media
Hear what Security Management editors and guest speakers have to say about this month’s magazine.
View all of our past and upcoming educational webinars.
Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes.
Access old issues of Security Management and other content.
ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.
Read the latest articles from our newest publication, Security Technology.