Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingFire & Life SafetyPhysical SecurityHospitals & Medical Centers

Top de-escalation strategies and training for security leaders

Security and de-escalation are often intertwined. Learn how security pros implement best-in-class de-escalation strategies.

By Adam Stone
SEC0821-Cover-Feat-slide1_900px

dinachi / iStock / Getty Images Plus via Getty Images

SEC0821-Cover-slide2_900px

Ted Bowen, Security Supervisor, North Olympic Healthcare Network

Image courtesy of Bowen

SEC0821-Cover-slide3_900px

Eric Sean Clay, Vice President of Security Services, Memorial Hermann Health System

Image courtesy of Clay

SEC0821-Cover-slide4_900px

Brian Uridge, Director of Security, Michigan Medicine

Image courtesy of Uridge

SEC0821-Cover-slide5_900px

Matthew Doherty, Senior Director, Jensen Hughes

Image courtesy of Doherty

SEC0821-Cover-slide6_900px

David Fowler, Founder and President, Personal Safety Training Inc.

Image courtesy of Fowler

SEC0821-Cover-Feat-slide1_900px
SEC0821-Cover-slide2_900px
SEC0821-Cover-slide3_900px
SEC0821-Cover-slide4_900px
SEC0821-Cover-slide5_900px
SEC0821-Cover-slide6_900px
August 2, 2021

Security often comes down to a matter of de-escalation – talking an individual down before agitation evolves into violence. At North Olympic Healthcare Network in Port Angeles, Wash., Security Supervisor Ted Bowen sees it every day.

“We had a patient come in very upset, pacing the lobby. They eventually started saying that they were going to break our windows, so naturally someone called security,” he says. So Bowen started walking with the patient and that walking-and-talking quickly eased the tension. “Obviously I was keeping my safe distance and always being aware, but just by going a couple of laps around our property, we were able to get that de-escalated.”

De-escalation is a key frontline security strategy in a range of situations, from hospitals to retail settings to office environments. Many sectors, such as travel and airlines, healthcare facilities, retail and more, have seen an increase in agitated behavior or violent incidents in recent years, some spawned from tensions rising regarding mask mandates and COVID-19 protocols.

“In a lot of cases, security directors place an emphasis on law enforcement,” says Matthew Doherty, a threat and violence risk management expert with Jensen Hughes. “But there are situations – either with patients, or with things like performance improvement plans, suspensions or terminations – where you need a different approach.”

What is that “different approach,” and how does it work?

 

Minimizing Risk

The point of de-escalation is to minimize risk – to turn down the heat before a situation can boil over.

“Security folks deal with people who are upset, people who are stressed, people who are angry, people who are intoxicated, and even people who are violent. If you don’t de-escalate, the potential for violence increases,” says David Fowler, Founder and President of Personal Safety Training, Inc. and the AVADE workplace violence program.

Particularly in the healthcare sector, security leaders must implement de-escalation as part of their daily practice and training.

“Sometimes the patients we see have some behavioral health issues, chronic pain or chemical dependency issues, which can create a difficult situation for us. Maybe they don’t want to cooperate, or they don’t feel that they are getting the attention that they need, which causes them to escalate,” says Eric Sean Clay, Vice President of Security Services for Memorial Hermann Health System, and one of Security’s 2020 Most Influential.

“We know that 75% of all violence that occurs in any workplace occurs in a healthcare environment,” says Brian Uridge, Director of security at Michigan Medicine, a healthcare complex at the University of Michigan. “For us, de-escalation happens multiple times a day.”

 

The Basics

When hospital security professionals look to calm the anxious or agitated, they start with strong communication. De-escalation is fundamentally an interpersonal skill: It’s all about finding common ground with the person in distress.

“You need to listen to the person, find out the reasons why they’re so upset, or at least give them some empathy and respect. You’re not condoning the disruptive behavior, but you do have to have some empathy, some listening skills,” Doherty says.

The fundamental idea is that people who upset typically have an underlying reason for their actions.

“A lot of the times when people are escalating, they have some unmet need. They had an adverse staff interaction, maybe the person up front wasn’t giving them the right answers or they weren’t getting what they need,” Bowen says. “I train my staff to never stop talking. We always keep our verbals going. Even in a situation where they have weapons, we keep talking to the person, letting them know we’re there. The whole time we’re moving closer and closer, because sometimes you just have to take control. But at the same, we never stop talking. And it’s hard: It’s really hard to keep that caring tone in those moments.”

This approach may not come naturally to those trained to take a more authority-driven approach.

“Security professionals often want to just go in and take charge of a situation, relying upon their authority,” Clay says. “When we de-escalate, on the other hand, we’re actively listening to what that person is saying. We’re watching for those verbal cues that may indicate what they’re thinking. Sometimes we just allow them to vent. It helps them feel validated, that somebody is actually listening to what they have to say.”

 

Building Relationships

Uridge likens de-escalation to the law enforcement practice of community policing.

“My background is in law enforcement, at Kalamazoo public safety. We started a program there where every single day we asked our officers to go out and just do 20 minutes of foot patrol, not as an investigation, just simply 20 minutes of foot patrol,” he says. “De-escalation starts with proactively building those relationships, before you ever need to be there for an incident.”

The same approach works, for example, in a hospital setting, he says. “We treat the health system as a community: Every floor is a neighborhood, and every neighborhood has different issues. To deal with the issues of the neighborhood, you have to build trust.”

To build trust, Uridge asks security staff to make the rounds, introducing themselves to patients and staff in advance of any incidents. “We want to build a relationship, to reduce anxiety and build trust. That means we have to proactively go out and engage people,” he says.

In any sector, whether retail, transportation or corporate settings, security staff can make personal connections and broker a level of familiarity as part of their routine duties. Then, when an incident does arise, there is already a basis of goodwill in place, which in turn makes it easier to de-escalate.


Best Practices

While the idea of de-escalation is important, implementation is even more important. A number of key best practices apply when training security staff and when emphasizing de-escalation within the organization:

  • Body language: Fowler, for example, trains his people on their physical presentation.
    “If you walk into a situation with an upset person and you’re face to face with them, it can be confrontational. We teach staff to approach to the side, with appropriate distance, and it has to be relaxed,” he says. “We also teach them to blade their body, to bring a shoulder forward so that you are less of a target and less confrontational. Then, you have your hands out in front of you, palms up: That’s universal for non-threatening, all over the world.”
  • Added resources: Bowen says that de-escalation works best when security personnel come to the situation armed with additional resources, such as phone numbers or information for additional services or agencies.
    “I carry around this pamphlet with social worker information and other resources in the area,” he says. “I’m always trying to [steer people] to more meaningful or better services.”
  • Redirect: For Uridge, a key de-escalation technique is the “redirect,” a strategy for helping an agitated person reframe his or her actions and attitude.
    “That might mean you take them out of the environment, you take a quick walk to change their environment. ‘Could I get you a cup of coffee, or a glass of water right now?’ When you refocus their attention, you’re often able to get to the root cause of the problem,” he says.

 

Building Skill Sets

For many people, de-escalation may not be their first instinct, and for that reason, Bowen makes it a point to hire frontline security staff with de-escalation skills in mind, and then to reinforce those skills with ongoing training.

“It starts with their interview: How are they acting when I give them certain scenarios? You can kind of tell just by their answer how they would immediately react,” he says.

Bowen says new security field officers will train with existing officers, achieve their international healthcare security certification and go through de-escalation and crisis intervention training. “I talk about scenarios and do some role-playing, making sure they understand our use-of-force policy. And I’ll spot check, just ask questions randomly,” he says.

Clay takes a similar approach. “It starts with just hiring the right people,” he says. “We have a self-assessment that gives us some insight into how they may handle things. When we do our interviews, we ask a lot of situational questions. ‘Tell me about a time when you had to successfully de-escalate a person.’ We look for clues on how a person is going to respond to these situations.”

Clay adds that security staff receive additional skills-building training as well, which ultimately helps with handling aggressive people and potentially violent situations. “We offer a lot of training in communication and customer service. We use role-playing, where we have simulated aggressive patients – because these are things that you’re going to be facing on a regular basis,” he says.

At Michigan Medicine, Uridge and his team place a heavy emphasis on training and rely on a number of outside providers to help with that effort. For example, the organization uses Welle Training to teach staff to recognize potentially problematic behaviors such as pacing, clenching first or raising their voices.

“They learn how to listen and to find out what people’s needs are,” Uridge says. “We also use MILO virtual training. You go into a giant room with five TV screens, and we run every one of our officers and guest services staff through multiple scenarios where they are having to de-escalate a person on the screen,” he says. “We want to immerse our people, to have them face these scenario-based virtual situations that are almost exactly what they would deal with [on the job].”

 

A Learning Curve

Though an increasing number of security leaders and security programs have implemented de-escalation techniques and a customer-service approach when it comes to security, this remains an evolving space.

“There is still a learning curve,” Doherty says. Some security leaders “still tend to want to remove the issue from the building, to meet aggressiveness with equal aggressiveness. But there is some progressive evolution, it is changing for the better.”

He continues, “In law enforcement, we have seen a dramatic change in the approach to these situations, because of the active shooter phenomenon in the workplace.” It has become common practice to have security personnel ready on standby, for example, when people are getting fired – not just to escort them out, but to talk them down if things get heated, Doherty says. “That’s a dramatic change.”

KEYWORDS: business continuity de-escalation training risk management security management violence workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Adam Stone is a contributing writer for Security magazine. He has covered IT issues in the public and private sectors for more than 20 years. In addition to following security trends, he writes on military technology, education-tech, government IT and diverse others issues.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hands pull rope

    Revisiting de-escalation strategies for better safety and security

    See More
  • de-escalation-freepik.jpg

    CISA releases de-escalation training series for critical infrastructure operators

    See More
  • workplace violence

    Michigan Medicine Security implements de-escalation training to improve safety

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×
dinachi / iStock / Getty Images Plus via Getty Images
Ted Bowen, Security Supervisor, North Olympic Healthcare Network Image courtesy of Bowen
Eric Sean Clay, Vice President of Security Services, Memorial Hermann Health System Image courtesy of Clay
Brian Uridge, Director of Security, Michigan Medicine Image courtesy of Uridge
Matthew Doherty, Senior Director, Jensen Hughes Image courtesy of Doherty
David Fowler, Founder and President, Personal Safety Training Inc. Image courtesy of Fowler

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!