Security Leadership and Management

Protecting People at Risk

Asecurity manager visiting a company manufacturing floor noticed a curtain hung around a work area. He asked if proprietary work was being done behind the curtain. “No,” he was told, “that’s just how we deal with Bill.” Bill had long, loud, demonstrative conversations with God while he worked on the floor, so they’d put up the curtain to shield the other employees from his disturbing behavior. This is how they had dealt with Bill for years. They had a delusional and potentially dangerous employee on their hands, but site management and HR dealt with him as a local issue and never told security or anyone else about it.

This is a true story. Situations like this are seen in companies all over the country all too frequently, and they sometimes end in workplace violence and other security-related incidents. It’s interesting how often investigations into these events after the fact uncover indicators of potentially violent behavior in the files of multiple corporate departments, clues that could have triggered actions to reduce risk of an incident if they’d only been shared.

Workplace violence prevention is not just about a training program or awareness or creating a policy. It depends upon the creation of a culture of understanding and cooperation between departments and a strong process of overall risk identification and mitigation. This also applies to other efforts to protect company employees, leaders and customers, including the executive protection program and protection from activists, thieves, troubled persons and malicious criminals.

Workplace violence is only one piece of the larger puzzle of protecting people at risk. If an organization views its various people protection efforts under a single umbrella, it will have a better chance of leveraging the information and resources of all departments to provide better protection in a holistic manner. The intent is to create all-hazards planning and response when protecting people.

Here are some basic guiding principles for protecting people at risk:

1) First and foremost, identify all the people that can be at risk, all the reasons they can be at risk, and all the people, groups and situations that can put them at risk. Supervisors, executives, labor relations employees, benefits staff, HR staff, attorneys and “gatekeepers” – receptionists, security guards and administrative assistants – are all classes of at-risk people. Carefully consider why each group may be at risk. For instance, benefits staff may be at risk if an employee dies early and the family blames the company, HR staff may be at risk because they regularly deal with people in crisis, and gatekeepers because they are simply the first people a troubled person may encounter. Who is putting these people at risk? Other employees, outside environmental, political or religious extremists, criminals, domestic partners, troubled individuals suffering from mental or medical health problems, etc.

2) Identify all the sources of information on the risk or people.Each department could be a source of information and may have a record of risk-enhancing behaviors or issues. Establish a cross-functional team that may include HR, Legal, business units, Employee Assistance, Corporate Security/IT Security, Site Management and Benefits to make sure you’re getting and sharing all the information available. Have a program in process in place to gather relevant information on risks and at-risk groups.

3) Have a program that addresses the issues at all stages of risk.There are many ways you can intervene to protect people at risk, throughout the course of the threat. Make sure you have a plan for proactive action; prevention and planning; reactive action in the case of imminent danger; and emergency response and business continuity in the case of an event. The full continuum of risk has to be addressed.

4) Have resources in your toolkit to deal with the threat and the risk.Identify potential solutions for people protection issues and develop a process by which your cross-functional team will escalate and apply these solutions. If you are national or global, make sure you have resources that can cover your entire operation. Wherever you have people, you have to be able to respond and address the threats.

5) Keep data and metrics that help you define, measure, and communicate the value of what you’re doing, especially on the preventive side.

Protecting people at risk is one of the security professional’s most important functions. Leverage the resources and information of a cross-functional team to improve protection and guard against future events.   

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Bob Hayes

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security June 2015 issue cover

2015 June

In this June 2015 issue of SecurityIs the security director business’s new “corporate rock star?” Find out how CSOs can become the new leaders of their enterprises through mentorships, partnerships and creatively adding business value. Also, learn how security professionals are training employees in cyber security through games. And why are deterrence and detection so important when it comes to thwarting metal thieves? Find out in this issue.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.