Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementSecurity & Business Resilience

Emergency Preparedness Essentials: 5 Things CSOs Should Know

By Kathleen L. Kiernan
leader
June 13, 2017

In order to ensure the safety and security of an organization’s personnel, a Chief Security Officer (CSO) must be able to identify, assess and develop appropriate responses to a wide range of potential and actual threats as they evolve in real time. This presents a Herculean challenge since security, while recognized as critical, is also preferred to be invisible in day-to-day operations. Substantial guidance in these efforts is available from the communities of law enforcement, the private sector and emergency planners. In particular, it is worth summarizing five central insights that can assist CSOs as they work to protect their organizations.

 

  • Teach heightened situational awareness: A unique method of teaching situational awareness, known as Preparedness Without Paranoia™, emphasizes the importance of understanding today’s threat environment, recognizing telltale signs of an evolving threat and empowering people to take effective action. All personnel in the organization, from the C-suite to entry-level staff, should be educated in recognizing the signs of potential threats. These signs can include, but are not limited to, identifying an employee who manifests signs of social withdrawal or who engages in threatening communication with a potential targeted individual or individuals. It can also include the recognition that an employee has obtained a weapon and/or is becoming proficient in its use. Also key is the recognition of steps leading up to these behaviors, such as an employee’s negative coping mechanisms and personal social stressors. Awareness of triggering events (e.g. academic failure, financial stress, divorce, job termination) is vital, as is evidence of ideation/fantasy including strong negative behavioral changes, pervasive paranoia or use of pseudo-militaristic language, along with any indicators of indoctrination into extremism.

 

  • Ensure risk mitigation on the personal level: A four-pronged strategy consisting of education, preparation, planning and practice can and should be presented to employees to convey the risks posed by workplace threats. Each individual CSO should identify national-level models and modify them to suit their environments to include strategies related to employees with special or functional needs if mobility or access present additional challenges. Common-sense planning related to, for instance, the ability to access a concealment location quickly if escape options are limited requires that the areas beneath desks should not contain an excess of stored materials. Silencing cellphones so as to not alert an attacker to concealment locations while maintaining the ability to utilize a tracking feature or app to signal for help provides another example. This information should be shared with employees in a written format as well as in an open company-wide town hall style meeting specifically designed to share ideas. The latter reinforces written policies as well as reduces the reluctance to ask questions or indicate any misunderstanding. Making attendance mandatory also reinforces the buy-in of the organization and has the collateral benefit of gaining ideas and suggestions, which could improve the overall level of preparedness. In a sense, organizations are able to crowdsource their training and collect best practices simultaneously. The central message to be conveyed is that the CSO can conduct the responsibilities of the job most efficiently when every member of the organization is well-versed in the risks posed by threats to the workplace and has personally understood and accepted a plan of action in the stages before, during and after a threatening event.

 

  • Apply lessons from actual threat incidents: CSOs can leverage the lessons identified/learned from actual events. These include those derived from attacks against both hardened facilities such as the Washington Navy Yard and Ft. Hood, Texas, as well as attacks in what had been considered soft targets at college campuses and universities. The egregious active shooter event in April 2007 at Virginia Tech, which resulted in the deaths of 32 people, served as a catalyst for institutions of higher learning to heighten their security throughout the risk cycle.   When a university police officer was shot on campus in December 2011, officials notified stakeholders via multiple communication channels and social media. The school also implemented threat assessment teams to coordinate warning signs of potentially violent behavior, a model that has been incorporated in other types of organizations.

 

  • Prepare an emergency response plan: CSOs should create and regularly update an emergency response plan (ERP) with input from their stakeholders, such as their facility owner/operators, their facility managers, their human resources and legal departments, their training department (if one exists) and local law enforcement and emergency responders, including fire departments and hospitals. Developing an ERP will prepare personnel to respond effectively and help minimize any loss of life. An ERP is intended to address critically important policies and procedures, for example, reporting emergencies and evacuation of the premises. In addition, preparing for a variety of different active threat scenarios helps to minimize fear and potentially prevent additional casualties since alternative scenarios were anticipated, planned for and practiced in advance. The ERP should also include requirements for conducting all-hands training exercises on at least a semi-annual basis. The inclusion of video-based narratives of individuals who were witness of, or responders to incidents adds a great deal of credibility to the training. Individuals are able to identify with the human actions and reactions expressed, likely remembering them for far longer than a mandatory security lecture. Having the materials easily accessible for refresher training reinforces learning and adds to personal situational awareness and resilience outside of the work environment.

 

  • Assess a range of recovery tasks: To achieve post-incident resilience, CSOs can build or add a component to the business plan for rapid recovery from disruption caused by emergencies. Thinking through recovery and resilience efforts in advance better prepares an organization and its employees for both tangible requirements – actual rebuilding or replacement of damaged property, communications about the company or product brand, and the intangible but most important support services to employees. Such resilience can be achieved during the immediate aftermath of an event through effective response and recovery actions viewed as a series of “waves.” The Response Wave involves stabilizing an emergency situation in the immediate hours after an attack. The Mitigation Wave entails lessening the near-term impact of the critical incident. The Recovery Wave involves restoring pre-incident operational functioning and the well-being of those affected by the incident. Numerous tasks need to be accomplished during the three transitional waves, via a game plan for each wave that identifies each task and assigns responsibility to include alternative personnel designations to specific organization members.

 

The five insights above could serve as a starting point for action for CSOs responsible for the safeguarding of their organization’s employees and property. As always, preparation is the key to ensuring the best possible outcome when a threatening situation arises in the workplace.

KEYWORDS: emergency management Situational Awareness threat response team workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kathleen L. Kiernan, Ed.D., is the CEO and Founder of Kiernan Group Holdings, Inc. (KGH). She oversees KGH’s work as an intelligence, law-enforcement and national security consulting, training and problem-solving firm that provides tailored solutions to today’s most complex challenges. She has innovated the concept of Preparedness Without Paranoia™, which is predicated on the fact that understanding the modern threat environment does not have to be an intimidating or overwhelming task.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Man reading business paper

    Top 5 things CISOs should know to protect their business

    See More
  • professionals- enews

    The 5 New Year’s Resolutions CSOs Should Have Made

    See More
  • security leadership responsive default security

    5 Things Every Board Member Needs to Know about Security

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!