Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical Security

Security Risk Management

Practical tips for effective risk management in crisis situations

Consider these steps before, during and after a crisis to better protect your organization and manage risk more effectively.

By Tory Brownyard
matches

fongfong2 / iStock / Getty Images Plus via Getty Images

author tony

Tory Brownyard

matches
author tony
May 13, 2022

The high school shooting in Oxford, Michigan that claimed the life of four students in November 2021 brought with it a sobering truth: active shooters and other violent events are at the forefront of security leaders’ minds.

The more often mass casualty incidents hit the news, the more conversation they generate about safety. Such discussions often lead to action, as businesses of all sizes reexamine their security protocols or look to hire trusted private security professionals to help them prepare for crises, protect their people from harm and prevent these kinds of events from happening inside their factories, hospitals, stores or other workplace facilities.

While unfortunate and tragic, such events are an occasion for organizations to assess how they can improve the ways they protect lives and property. There are lessons to be learned by senior leadership as they compare their security and crisis planning to the events in the news and adjust accordingly. These situations also give outside security firms a chance to demonstrate their expertise and value.

In addition to loss of life, mass casualty incidents can also expose employers to costly and dangerous litigation. Security officers can’t always stop a shooter before they inflict damage. This means employers with in-house security teams or outside security firms may be held liable under certain circumstances. While a secondary concern, significant reputational damage is also at stake for the organization that operates the site where such events occur.

Let’s take a look at six steps security leaders and enterprise stakeholders can take before, during and after a crisis to better protect themselves, manage risk more effectively, and reduce liability.


1. Weigh the Consequences

Even under the best circumstances, the security industry is prone to significant staff turnover. Given current labor market shortages, this reality has been exacerbated. Organizations need to weigh the pros and cons of recruiting and retaining an in-house security workforce. In-house security increases insurance rates and risks, adds labor and training costs, and increases the company’s licensing, regulatory and background screening burdens — especially for businesses operating in more than one state or region.


2. Perform In-Depth Training and Risk Assessments

All security officers must receive proper training in active shooter and other crisis events. Security staff must know the post orders and any other written response, emergency management and crisis policies and procedures, as well as be ready to act. When security officers don’t follow a policy or procedure, it can open the company to liability and create risks to the people and property they are tasked with protecting.

In addition to training, organizations should perform regular reviews and audits when it comes to their risk assessment and emergency management plans to assess the effectiveness of all training and procedures. Tabletop drills are another effective tool.

It is important to perform a thorough, annual risk analysis of all company locations and properties. Any security flaws or significant risks found should be documented and flagged for discussion with security directors and appropriate stakeholders so they can be addressed proactively and in a timely fashion.

3. Follow Orders as Written

True moments of crisis are where training pays the biggest dividends. Security officers should know the crisis protocols of the organization and be well-trained to follow them step by step in the moment. While “run, hide and fight” is the standard protocol for individual survival during an active shooter situation, all security officers must consider and follow their post orders during a crisis.

Following written protocols won’t prevent all injuries or casualties. No emergency plan can. However, doing so can help mitigate both human and financial loss in a crisis. It will also help reduce liability in such situations.


4. Know Your Organization’s Risk Tolerance

Security leaders need to hone in on their organization’s unique risk tolerance with internal and external stakeholders, such as insurers. Historically, companies operating venues such as sports arenas, concert halls, shopping malls and fast-food restaurants carry a high-risk label, according to insurers.

But in the last 10 to 15 years, as crises like the Oxford school shooting and the January 2022 hostage situation at a Texas synagogue have increased, the high-risk label has expanded to include schools, places of worship and anywhere large groups of people gather.

Places with higher incidents of crime, such as those with a history of assaults or 24/7 drive-throughs and convenience stores, may also fall under the definition of high-risk.

Low-risk facilities typically include office buildings, high-end apartment complexes, industrial facilities, or any place unlikely to be a target for violence or hosted gatherings. Government buildings are considered low risk by most insurers because security officers within those buildings must undergo extensive screening and training.

Knowing your organization’s risk assessment and tolerance will aid safety and security leaders in crafting appropriate mitigation strategies and response plans.


5. Carry the Proper Insurance Coverage

Nearly every employer carries general liability coverage. However, there are nuances in coverages that stakeholders and security leaders must understand to protect the organization from unnecessary risk. A typical general liability policy limits bodily injury to “reasonable force,” which may be adequate for many organizations, but if security guards are employed, broader coverage may be needed.

Many insurers of the security industry expand this coverage to “physical force,” which is more encompassing and leaves less uncertainty in the event of an alleged assault involving security or other staff. This is especially true when using armed security, as courts rarely view the use of a firearm as “reasonable force.”

It’s an important consideration for security leaders to advise their organization’s insurer whether security staff is armed or unarmed, and, ultimately, the organization may decide to cancel or exclude such programs or teams from coverage.


6. File Claims as Soon as Possible

Insurers typically require insureds to file any claims promptly after a crisis or other incident — even in the event of a mass casualty or active shooter incident. The sooner the insurer receives all claims, the earlier and better they can react in the days and months that follow while preserving information about the incident while it is still timely.

In turbulent times, organizations and security leaders can rely on their security teams to keep employees safe and prevent tragedy. By following these principles and creating a solid risk management strategy, organizations can ensure security teams focus on what matters most: protecting lives.

KEYWORDS: corporate security crisis management risk management workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tory brownyard headshot

Tory Brownyard is president of Brownyard Group (www.brownyard.com), a program administrator that pioneered liability insurance for security officer firms more than 70 years ago. Image courtesy of Brownyard

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • coins in jar

    4 security risk management tips for small to medium-sized organizations

    See More
  • Woman in tech office

    Breaking down DE&I barriers: Practical tips for security leaders

    See More
  • meeting2-900px.jpg

    5 Tips for Health Risk Management Systems

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • May 22, 2025

    Proactive Crisis Communication

    ON DEMAND: Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?
  • January 16, 2025

    Preparing for the 2025 Threat Landscape

    ON DEMAND: In 2024, businesses faced a barrage of critical events with far-reaching impacts. From record-breaking storms and costly infrastructure failures to contentious election cycles and sophisticated cyberattacks, companies are navigating an increasingly complicated threat landscape.
View AllSubmit An Event
×
fongfong2 / iStock / Getty Images Plus via Getty Images
Tory Brownyard

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!