Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementPhysical Security

5 Keys to Building a Successful Active Threat Plan

By Jay Hart
shooter-enews
May 30, 2017

As the national conversation regarding violence in the workplace suggests a heightened awareness stemming from increased media coverage, recent studies suggest there may be statistical evidence supporting this perceived frequency. According to the U.S. Bureau of Labor Statistics, about five percent of all businesses experience an instance of workplace violence each year. For larger organizations with over 1,000 employees, this rate is increased tenfold to 50 percent. A 2014 report from the FBI found active shooter incidents in the U.S. now occur on an average of once a month. Of these incidents, almost (45.6 percent) occurred at a business while nearly a quarter (24.4 percent) occurred at Pre-K to 12 schools and institutions of higher learning.

Although active threats and the environments where they take place can vary from incident to incident, the common threads found throughout can be woven together to create the fabric of an effective and successful safety program. The following are lessons learned gleaned from past experience that businesses can use as tools for building a solid foundation for a safety-minded workplace:

 

Mindset to Clear the First Hurdle

More often than not, active threat training is the elephant in the room. Everyone has seen or heard of incidents, but are reluctant to take the steps toward mitigation. The reasons may vary from believing it’ll make employees more fearful than empowered to worrying the training might not be “right” for the team. However, looking the other way is not a solution to any problem, much less one with harmful consequences.

The aforementioned statistics illustrate an increasing probability of an active threat incident, making it less an if and more a when. Unfortunately, violence doesn’t discriminate on where it can take place, so the entire enterprise – be it headquarters, warehouse or storefront – should be involved in preventative measures. Breaking through the barrier of apprehension begins with a holistic approach: one team, one goal. Leadership should evaluate the type of training fitting for their organization’s culture, articulate the vital importance of such training to employees, and clearly explain how the training will be implemented.

 

Flexible Response Plans

Violence is seldom a cookie cutter affair, and as such a “one size fits all” response is likely an ineffective solution. Conversely, having too many threat-specific responses can be confusing, if not outright dangerous. While different threats do warrant varying responses, a series of “stovepipe” procedures can cripple a person with tunnel vision during a high stress scenario.

All active threat response plans should be built upon the same principles so even if the minute details are lost in the heat of the moment, team members can still make informed decisions to ensure the safety of themselves and others. Streamlining processes encourages a quick implementation and retention of information.  Knowledge increases confidence, confidence increases decisiveness, and it is decisive action in a critical incident that saves lives.

 

Proactive Response Plans

A fortunate trend stemming from unfortunate roots is a movement for companies to get ahead of the curve of active threat response. For better or worse, increased exposure of violence in the workplace means it is no longer an abstract concept but rather an issue thrust into the forefront. A strategy based on hoping nothing happens and performing damage control is a folly that can irreparably destroy a brand in addition to the obvious harm inflicted upon person and property.

An effective response plan doesn’t begin when the incident occurs, but as soon as training can be conducted. Empowering employees with tools on how to identify and communicate to leadership possible high-risk indicators such as signs of growing anger, depression or erratic behavior can be just as, if not more effective as decisive action during an active threat.

 

Clear Communication Plans

A cohesive “one-team” mindset supported by a response plan based on fundamentals and foresight cannot take place without clear communication before, during, and after a critical incident.  The language plays a critical role in an active threat response program and can dictate the program’s success or failure. Such language should be consistent with current policies and procedures so the program is both effective and legally defensible. 

Each company will need to tailor its active threat response plan to fit its culture and workplace environment. Thankfully, a simple concept utilized by premier agencies already exists so organizations may build a clear and coherent plan: “Run, Hide, Defend.”

 

Customer Service

Communication during a critical incident is by no means limited to employees, but extends to customer interaction as well. How a company communicates around and with customers during an active threat incident can play a vital role in minimizing harm and mitigating supplemental harm as a result of panic.

Every active threat mitigation plan should include an emergency communication strategy which may contain one or two common components: First is the use of a code like “Code Adam” alerting employees to a specific issue while customers and vendors remain unaware of any possible issues. The second option is to use “plain English” so that everyone quickly gains situational awareness.  For example, instead of using “Code Red” for an active shooter incident, the alert would announce there is an active shooter situation in progress so employees, customers and vendors can take decisive actions to seek safety.

Every active threat situation will unfold differently, especially since external factors such as the weather, type of environment, and other variables can present unpredictable outcomes. By being proactive over what that can be controlled, such as implementing sound training strategies, companies can be prepared for and respond to an active threat to the best of its ability. Through the empowerment of its most valuable assets – its people – companies can mitigate risks, protect the safety of its employees, customers, and community.

KEYWORDS: active shooter business continuity incident response plan security risk management workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jay Hart is the director of Force Training Institute (FTI), a Los Angeles-based consulting firm specializing in critical incident response and active shooter mitigation training. Founded and operated by former and current military and law enforcement officials, FTI has quickly earned its name as a trusted source for emergency preparedness through services rendered to industry leaders such as Rite Aid, Ford, REI, Gap and Boeing.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • shooter

    5 Keys to Building a Successful Active Threat Plan

    See More
  • Cyber Incident Recovery

    Security Awareness Training – Keys to Delivering a Successful Program

    See More
  • employee training

    Keys to a successful security awareness program

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!