Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo SurveillanceEducation: K-12

11 steps to build the foundation of a school security and safety program

Let's change the mindset associated with the development and support of school security programs.

By Stephan Masson, Bill Edwards
school-safety-freepik1170x658v6.jpg

Image by rawpixel.com via Freepik

June 20, 2022

There is no time to waste; we simply cannot have another school shooting happen. 


More than ever, we need engaged leadership, a clear vision, community engagement, dedicated funding and resources and energy to reset our mindset around school security and safety. The events of countless schools like Columbine, Sandy Hook, Parkland and now Uvalde have brought school security and safety to the forefront of people’s minds in the U.S. and globally. These tragic and devastating attacks tear at the very fabric of our society.


As the events unfolded in Uvalde, it became clear that the most critical action we can take is to change the mindset associated with the development and support of school security programs. This shift must be backed by adequate budgets for creating and maintaining security programs that give administrators, staff, teachers, first responders and students confidence that all resources are being leveraged to provide the safest environment possible. People need to acknowledge that “it could happen here” and stop relying on the “it will never happen here” model. 


Most recently, Texas Governor Abbott directed The Texas School Safety Center (TxSSC) to conduct comprehensive safety reviews of all Texas schools, including unannounced random intruder detection audits. The entire directive includes the following five points:


  1. Ensure their School Safety and Security Committee meets to review their Emergency Operations Plan and address any campus safety needs. This includes reviewing their Active Threat plan.
  2. Ensure the School Behavioral Threat Assessment Team is trained and has reviewed procedures for each campus.
  3. Ensure that all staff and substitutes are trained on their specific district and campus safety procedures and that all drills are scheduled before the start of the next school year.
  4. Conduct an assessment of their access control procedures, such as single access points, locked instruction room doors, visitor check-in procedures, exterior door locks, etc.
  5. Complete these efforts by September 1, 2022, and certify this data to the TxSSC by September 9, 2022.


If people involved in schools and the mission to keep schools safe haven’t read the Marjory Stoneman Douglas High School Public Safety Commission Report, dated January 1, 2019,  or the K-12 School Safety Guide, they should all do so now. At the very least, it should be required reading before school starts next year. 


Additionally, carefully review internal and external communication plans and establish how communication should work in the event of an emergency. This topic is always at the top of lessons learned from any type of event. As a former military officer, with several combat deployments, communications always top the list of “leader business.” As the saying goes, “it’s a bad idea to think about communication when the crisis is happening.”


Let’s be clear; there is no single solution to fit all situations. Every school is different, and circumstances in different areas demand different answers. However, there are common elements that can be implemented to foster a safer environment. Changing the status quo will take effort and energy from leaders, but it is well worth the time as we get serious about the issue.  


In order to get the conversation started, consider the following recommendations that use the concept of comprehensive security program development as the foundation for school security and safety. It is by no means the only approach or a perfect solution, but rather a framework that combines assessment, technology, community and operations in a context that may provide the structure needed to start. 


  1. Budget for a thoughtful and comprehensive security program, and resource it appropriately. With funding comes responsibility. Government funding should come with accountability and guidance on allocating funds to support a comprehensive program. Schools need assistance on security programming matters and how to spend these funds effectively.
  2. Conduct a threat, vulnerability, and risk assessment (TVRA) with a third-party consultant that is vendor-agnostic to provide unbiased recommendations for program foundations.
    1. This product is the foundation of all security program development. It identifies and prioritizes the possible threats, the critical assets that require attention, the vulnerabilities of those assets and recommendations on mitigating risk.  
    2. Use the information to begin the process of building the school’s emergency plans and procedures. These documents are the foundation for developing and implementing a security program and training all parties on actions to take during an emergency. By doing this upfront, schools will save valuable time and money. 
  3. Engage the community and community leaders. Encourage parent involvement. Build a social network to support security and safety. 
  4. Design the technology package to include a high-performing video surveillance system (VSS), intrusion detection, access control and weapon detection tools. Technology should be used to enhance the security program, not as a be-all and end-all.
  5. Extend the school’s perimeter through advanced camera technology and weapon detection software. This can create a “virtual fence” through the VSS and provide early warning and additional reaction time.  
  6. Institute an emergency notification system that is based in the physical and digital domains. Have multiple and redundant ways to notify all people of an emergency. 
  7. Increase awareness of activities occurring within the school footprint through continuous monitoring. This can be achieved by building functioning and resourced security operations centers (SOC) in every school or district. If not financially feasible, alternatives include providing a VSS monitoring station in the administrative office with a dedicated staff member to support monitoring or remote video monitoring of the school and grounds. The latter two options should be supported by video analytics that provide alarms based on pre-determined triggers.
  8. Provide every school, depending on size, with the “right” amount of SRO support. Actively use SROs in perimeter patrolling that supports the “virtual fence” concept. 
  9. Think creatively and consider technology support like “drone in a box” technology for school perimeter patrolling that is equipped with weapon detection software to enable early warning.
  10. Train, rehearse and exercise the entire staff and students with first responders regularly and use state and local resources to support a holistic approach. Know your law enforcement, fire, and medical response elements before an event takes place. A simple and cost-effective technique is a tabletop exercise (TTX). These can be facilitated internally or externally by a third-party security expert. Either way, it’s a great way to train.  
  11. For existing schools, create and designate safe rooms that have ballistic protection and the means to communicate with a centralized base and first responders. Exercise the space and practice communications. Develop a primary, alternate, contingency, and emergency (PACE) communications plan. For new schools, plan safe spaces into the design, even if that means creating more square footage or adding to the initial cost of the school.  


There is no longer time to point fingers and find blame. Mature leaders will move into action mode and start to make positive changes as it pertains to school security and safety. It’s time for “leaders” to stand up and get this “mindset change” in motion. Leaders at all levels of government should consider mandatory minimum standards that allow schools to build on. Let’s keep the conversation going and get moving on a substantive mindset change.

KEYWORDS: physical security risk management school security Security Operations Center (SOC) threat assessment

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Stephan masson

Stephan Masson is a high-performing security and operations professional with nearly 30 years combined U.S Army Special Forces and private sector experience.

Bill edwards calibre bio

Bill Edwards is President of Federal and Public Safety at Building Intelligence, Inc. Edwards retired from the military in 2017 and led Thornton Tomasetti’s security consulting group as a Principal from 2017 – 2021 and Calibre Engineering from 2021 – 2022. 

He offers over 34 years of expertise in operational/technical security, counterterrorism, counter-intelligence, surveillance and counter-surveillance. He served as the Director of Intelligence for Theater Special Operations Command-North, a position that required extensive collaboration and partnering across the U.S. whole of government security enterprise. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • program-develop-freepik1170.jpg

    Training a security program

    See More
  • Photo courtesy of Shutterstock

    Legacy CCTV vs IP cameras: The differences for security program design and development

    See More
  • drones

    Drones and Security: The Future of Public Space Safety

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!