Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementPhysical Security

5 Keys to Building a Successful Active Threat Plan

By Jay Hart
shooter-enews
May 30, 2017

As the national conversation regarding violence in the workplace suggests a heightened awareness stemming from increased media coverage, recent studies suggest there may be statistical evidence supporting this perceived frequency. According to the U.S. Bureau of Labor Statistics, about five percent of all businesses experience an instance of workplace violence each year. For larger organizations with over 1,000 employees, this rate is increased tenfold to 50 percent. A 2014 report from the FBI found active shooter incidents in the U.S. now occur on an average of once a month. Of these incidents, almost (45.6 percent) occurred at a business while nearly a quarter (24.4 percent) occurred at Pre-K to 12 schools and institutions of higher learning.

Although active threats and the environments where they take place can vary from incident to incident, the common threads found throughout can be woven together to create the fabric of an effective and successful safety program. The following are lessons learned gleaned from past experience that businesses can use as tools for building a solid foundation for a safety-minded workplace:

 

Mindset to Clear the First Hurdle

More often than not, active threat training is the elephant in the room. Everyone has seen or heard of incidents, but are reluctant to take the steps toward mitigation. The reasons may vary from believing it’ll make employees more fearful than empowered to worrying the training might not be “right” for the team. However, looking the other way is not a solution to any problem, much less one with harmful consequences.

The aforementioned statistics illustrate an increasing probability of an active threat incident, making it less an if and more a when. Unfortunately, violence doesn’t discriminate on where it can take place, so the entire enterprise – be it headquarters, warehouse or storefront – should be involved in preventative measures. Breaking through the barrier of apprehension begins with a holistic approach: one team, one goal. Leadership should evaluate the type of training fitting for their organization’s culture, articulate the vital importance of such training to employees, and clearly explain how the training will be implemented.

 

Flexible Response Plans

Violence is seldom a cookie cutter affair, and as such a “one size fits all” response is likely an ineffective solution. Conversely, having too many threat-specific responses can be confusing, if not outright dangerous. While different threats do warrant varying responses, a series of “stovepipe” procedures can cripple a person with tunnel vision during a high stress scenario.

All active threat response plans should be built upon the same principles so even if the minute details are lost in the heat of the moment, team members can still make informed decisions to ensure the safety of themselves and others. Streamlining processes encourages a quick implementation and retention of information.  Knowledge increases confidence, confidence increases decisiveness, and it is decisive action in a critical incident that saves lives.

 

Proactive Response Plans

A fortunate trend stemming from unfortunate roots is a movement for companies to get ahead of the curve of active threat response. For better or worse, increased exposure of violence in the workplace means it is no longer an abstract concept but rather an issue thrust into the forefront. A strategy based on hoping nothing happens and performing damage control is a folly that can irreparably destroy a brand in addition to the obvious harm inflicted upon person and property.

An effective response plan doesn’t begin when the incident occurs, but as soon as training can be conducted. Empowering employees with tools on how to identify and communicate to leadership possible high-risk indicators such as signs of growing anger, depression or erratic behavior can be just as, if not more effective as decisive action during an active threat.

 

Clear Communication Plans

A cohesive “one-team” mindset supported by a response plan based on fundamentals and foresight cannot take place without clear communication before, during, and after a critical incident.  The language plays a critical role in an active threat response program and can dictate the program’s success or failure. Such language should be consistent with current policies and procedures so the program is both effective and legally defensible. 

Each company will need to tailor its active threat response plan to fit its culture and workplace environment. Thankfully, a simple concept utilized by premier agencies already exists so organizations may build a clear and coherent plan: “Run, Hide, Defend.”

 

Customer Service

Communication during a critical incident is by no means limited to employees, but extends to customer interaction as well. How a company communicates around and with customers during an active threat incident can play a vital role in minimizing harm and mitigating supplemental harm as a result of panic.

Every active threat mitigation plan should include an emergency communication strategy which may contain one or two common components: First is the use of a code like “Code Adam” alerting employees to a specific issue while customers and vendors remain unaware of any possible issues. The second option is to use “plain English” so that everyone quickly gains situational awareness.  For example, instead of using “Code Red” for an active shooter incident, the alert would announce there is an active shooter situation in progress so employees, customers and vendors can take decisive actions to seek safety.

Every active threat situation will unfold differently, especially since external factors such as the weather, type of environment, and other variables can present unpredictable outcomes. By being proactive over what that can be controlled, such as implementing sound training strategies, companies can be prepared for and respond to an active threat to the best of its ability. Through the empowerment of its most valuable assets – its people – companies can mitigate risks, protect the safety of its employees, customers, and community.

KEYWORDS: active shooter business continuity incident response plan security risk management workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jay Hart is the director of Force Training Institute (FTI), a Los Angeles-based consulting firm specializing in critical incident response and active shooter mitigation training. Founded and operated by former and current military and law enforcement officials, FTI has quickly earned its name as a trusted source for emergency preparedness through services rendered to industry leaders such as Rite Aid, Ford, REI, Gap and Boeing.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Red laptop

Cybersecurity leaders discuss Oracle’s second recent hack

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • shooter

    5 Keys to Building a Successful Active Threat Plan

    See More
  • Cyber Incident Recovery

    Security Awareness Training – Keys to Delivering a Successful Program

    See More
  • employee training

    Keys to a successful security awareness program

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing