SlideShare a Scribd company logo
1 of 25
Download to read offline
Radicalization	
in	the	
Workplace
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		2
ORIGINS:	WHY	THE	EXECUTIVE	CONCERN?
"We	are	witnessing,	in	my	view,	a	change	in	the	
nature	of	mass	shootings	in	the	U.S.	No	longer	
are	they	solely	defined	by	a	single,	isolated	
aggrieved	shooter	but	a	shooter	or	shooters	
embedded	in,	justified	by	and	potentially	
supported	by	an	ongoing	ideological	
framework.”
ALAN	J.	LIPMAN,	FOUNDER	AND	EXECUTIVE	DIRECTOR	
THE	CENTER	FOR	THE	STUDY	OF	VIOLENCE	IN	WASHINGTON	D.C.
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		3
ORIGINS:	WHY	THE	SPOTLIGHT	NOW?
A	marked	rise	in	executive	concerns	
Increasing	
focus	on	
workplace	
violence	
and	active	
shooter	
prevention
Recent	terror	
events	in	
Europe	and	
Turkey	– and	
in the	U.S.,	
from	San	
Bernardino	
to	the	Navy	
Yard
Media
spin,	
opinion	
and	frenzy
Politics
and	the	
U.S.	
election	
process
Complexity
of	the	
issues	–
from	
privacy	to	
religious	
expression
Overlapping	
executive	
responsibilities
– Security,	HR,	
Legal,	IT,	Law	
Enforcement
4
Radicalization	cuts	across	many	areas
So	where	exactly	does	threatening	
behavior	related	to	radicalization	fit	in?
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		
• Workplace	violence
• Substance	abuse
• Hostile	work	environment
• Criminal	activity
• Inappropriate	behavior
• Sexual	harassment
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		5
DEFINITION
Radicalization
“Radicalization	is	a	personal	process	in	which	individuals	
adopt	extreme	political,	social	and/or	religious	ideals	
and	aspirations,	and	where	the	attainment	of	particular	
goals	justifies	the	use	of	indiscriminate	violence.	It	is	
both	a	mental	and	emotional	process	that	prepares	and	
motivates	an	individual	to	pursue	violent	behavior.”
Source:	A.	S.	Wilner and	C.	J.	Dubouloz,	"Homegrown	terrorism	and	transformative	learning:
an	interdisciplinary	approach	to	understanding	radicalization,"	GlobalChange,	Peace	&	Security	
(formerly	Pacifica	Review:	Peace,	Security	&	Global	Change)	22:1	(2010):	38.
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		6
What	Security	and	HR	leaders	are	saying
• “Duty	of	care”	obligates	
companies	to	keep	the	employee	
population	fully	informed	
regarding	ALL	potentially	
threatening	behaviors	and,	
conversely,	behaviors	that	may	
require	tolerance	in	the	
workplace	as	well	as	reporting.
• Radicalization	falls	into	a	subset	of	
workplace	violence	behaviors.
• Awareness	training	should	be	provided	
to	employees	regarding	radicalization	
and	orientations.
• Accommodations	for	particular	non-
threatening	belief	practices	should	be	
considered	and	established.
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		7
The	spectrum	of	potential	behavior
that	could	be	“radicalized”	should	be	
broadened	to	include:
• Gun	rights
• Abortion
• Racism
• Animal	rights
• Religious	extremism
• Ultra	right-wing	activism
• Ultra	left-wing activism
• Environmental	activism
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		8
ACCOUNTABILITY:	
OVERLAPPING	AREAS	OF	RESPONSIBILITY	
CATEGORIES
• Workplace	Violence
• Hostile	Work	Environment
• Criminal	Behavior
• Cyber
• Sexual	Harassment
• Substance	Abuse
• Inappropriate	Behavior
STAKEHOLDERS
• Security
• HR
• Legal
• IT
• Law	Enforcement
ACTIONS
• Document
• Employee	Assistance	
Program
• Confront
• Report	to	Law	Enforcement
• Counsel
• Personal	Action
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		9
MANIFESTATION	IN	THE	WORKPLACE
Radicalization	can	manifest	itself	as:
• A	violent,	aggressive,	selfless	act	conducted	on		a	
random	target,	with	encouragement,	enabling	and	
logistical	support	from	an	identifiable	segment	of	an	
organization	that	has	hijacked	or	bastardized	a	goal.
• The	result	of	an	openly	stated	goal	or	purpose	of	an	
organization	or	body.
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		10
PATHS	TO	RADICALIZATION
Disciples	may	be	radicalized	
through	exposure	to:
• A	narrow	indoctrination	path.
• No	outside	contrary	opinions.
• The	inevitability	of	a	catastrophic	
event	as	the	likely	outcome.
11
Violent	Extremist
Person	who	advocates,	is	engaged	
in	or	is	preparing	to	engage	in	
ideologically	motivated	terrorist	
activities	(including	providing	
support	to	terrorism)	to	further	
political	or	social	objectives	
promoted	by	a	foreign	terrorist	
organization	(FTO).
THREATS:	THREE	TYPES	OF	ATTACKERS
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters
12
Homegrown	Violent	Extremist	(HVE)	
THREATS:	THREE	TYPES	OF	ATTACKERS
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		
A	U.S.	person	who	was	once	assimilated	into,	
but	who	has	rejected	the	cultural	values,	beliefs	
and	environment	of	the	U.S.	in	favor	of	a	
violent	extremist	ideology.	
He	or	she	is	“U.S.	radicalized”	and	intends	to	
commit	terrorism	inside	the	U.S.	without	direct	
support	or	direction	from	a	foreign	terrorist	
organization.
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		13
THREATS:	THREE	TYPES	OF	ATTACKERS
Domestic	Terrorist	
Person	who	engages	in	unlawful	acts	of	violence	to	
intimidate	civilian	populations	or	attempt	to	
influence	domestic	policy	(as	opposed	to	furthering	
the	aims	of	a	foreign	terrorist	organization)	without	
direction	from	or	influence	by	a	foreign	actor.
Examples	include	acts	by	racist,	supremacist,	
antigovernment,	environmental,	animal	rights or	
other	single-issue	extremist	groups	or	movements.
14
A	sampling	of	lessons	the	U.S.	intelligence	
community	is	gleaning	from	recent	events
• Radicalization	increases	the	likelihood	of	violence.
• Individuals	and	groups	follow	different	paths	to	violence.
• Multiple	factors	indicate	why	some	choose	terrorist	violence.
• A	one-factor	approach	to	intervention	will	fail.
• Factor	importance	varies	across	cases	and	circumstances.
• Some	factors	serve	as	catalysts	for	others	and	can	
trigger	a	chain	of	events.
INSIGHTS:	FUNDAMENTAL	PRINCIPLES	OF	RADICALIZATION
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		15
DRIVERS:	FACTORS	THAT	INCREASE	AN	INDIVIDUAL’S	VULNERABILITY
Personal	
Factors
Group	
Factors
Community	
Factors
Sociopolitical
Factors
Ideological	
Factors
• Psychological
• Demographic	
backgrounds
• Personal	
history
• Social	
networks
• Family	and	
peer	groups
• Group	
dynamics
• Alienation
• Marginalization
• Diaspora	
relationships	
with	home	
country
• Collective	
grievances
• Foreign	policy
• External	
events
• Appeal	of	
justifying	
narrative
• Charismatic	
ideologues
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		16
MOBILIZATION	
A	Portfolio	of	Indicators
Other	Indicators	(Sampling)
• Preparing	and	disseminating	a	last	
will,	martyrdom	video	or	statement.
• Seeking	help	from	family	and	
friends	to	enable	travel	to	join	
terrorist	groups	overseas.
• Planning	or	attempting	to	travel	
to	a	conflict	zone	to	fight	with	or	
support	an	FTO.
• Seeking	religious	or	political	
justification	for	violent	acts.
• Employing	counter-
surveillance	techniques.
• Establishing	suspicious	
travel	patterns.
• Deleting	social	media	and	
other	online	accounts	to	
avoid	tracking	by	law	
enforcement.
• Suspicious	acquisition	of	
maps	or	blueprints.
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		17
DEFINITION
Workplace	Insider	Threats
“A	current	or	former	employee,	contractor	or	other	business	
partner	who	has	or	had	access	to	an	organization’s	network,	
system	or	data	and	intentionally	exceeded	or	misused	that	
access	in	a	manner	negatively	affected	the	confidentiality,	
integrity,	or	availability	of	the	organization’s	information	or	
information	systems.”
DHS	NATIONAL	CYBERSECURITY	AND	COMMUNICATIONS	INTEGRATION	CENTER
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		18
DEFINITION
Insider	Threat
“The	insider	threat	to	critical	infrastructure	is	one	
or	more	individuals	with	the	access	and/or	insider	
knowledge	of	a	company,	organization	or	enterprise	
that	would	allow	them	to	exploit	the	vulnerabilities	
of	that	entity’s	security,	systems,	services,	products,	
or	facilities	with	intent	to	cause	harm.”
National	Infrastructure	Advisory	Council	in	their	publication,	
“The	Insider	Treat	to	U.S.	Critical	Infrastructures”
19
INSIDER	THREAT	MITIGATION
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		
Detect	anomalies	as	early	as	possible	
and	investigate	before	assets,	data	or	
personnel	are	compromised
Look	beyond	cyber	security	to	include	
potential	insider	threats	related	to:
• Fraud
• Workplace	violence
• Information	technology	(IT)	sabotage
• Intellectual	property	and	research	and	
development	theft
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		20
INSIDER	THREATS	ARE	SELDOM	IMPULSIVE	ACTS
Look	for	the	warning	signs	as	insiders	move	
along	a	threat	continuum	from	idea	to	action	
• Demonstrating	a	change	in	
behavior	or	attitude
• Violating	company	policy
• Arriving	early	or	staying	late
• Showing	undue	interest	in	
information	not	relevant	to	job
• Attempting	access	into	physical		
areas	not	related	to	job
21
LEARN	THE	WARNING	SIGNS	OF	INSIDER	THREAT
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		
Companies	must	establish	guidelines	
on	recognizing	threat	indicators	based	
on	behavioral-based	techniques	
1. Train	employees	to	recognize	and	report	
behavioral	indicators	exhibited	by	fellow	
employees	or	business	partners.	
2. Ensure	training	includes	how	to	identify	the	
characteristics	of	insiders	at	risk	of	becoming
a	threat.
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		22
CHARACTERISTICS	OF	INSIDERS	AT	RISK	OF	BECOMING	A	THREAT
• Introversion
• Greed/financial	need
• Vulnerability	to	blackmail
• Compulsive	and	destructive	
behavior
• Rebellious,	passive-
aggressive
• Ethical	“flexibility”
• Reduced	loyalty
• Entitlement	– narcissism	
(ego/self-image)
• Minimize	their	mistakes	
and	faults
• Inability	to	assume	
responsibility
• Intolerance	to	criticism
• Self-perceived	value	exceeds	
performance
• Lack	of	empathy
• Predisposition	towards	law	
enforcement
• Pattern	of	frustration	and	
disappointment
• History	of	managing	crisis	
ineffectively
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		23
FREE	ONLINE	COURSES
DHS/FEMA	independent	study	course,	
“Protecting	Critical	Infrastructure	
Against	Insider	Threats”	(IS-915)
http://training.fema.gov/	
Department	of	Defense	(DoD),	
“Insider	Threat	Awareness	Course”	
http://cdsetrain.dtic.mil/itawareness/
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		24
KEY	ISSUES
Starting	the	Conversation
4. Determine	the	scope	of	monitoring,	recording	
and	reporting	on	employee	online	behavior.
5. Establish	the	parameters	of	access.
6. Communicate	the	consequences	of	
abuse	to	employees.
1. Engage	external	partners	
– law	enforcement,	
media,	community	
services	and	religious	
experts.
2. Understand	the	role	of	
technology,	social	media	
and	internet	usage.
3. Identify	technology	
vendors	that	provide	
monitoring	services.
HILLARD	HEINTZE		©	2018			|				Protecting	What	Matters		25
FOR	FURTHER	INFORMATION
Howard	Fisher,	Esq.	
Vice	President,	Strategic	Relationships
howard.fisher@hillardheintze.com
312.229.9882
30	South	Wacker	Drive,	Suite	1400
Chicago,	Illinois		60606						312.869.8500

More Related Content

What's hot

Identity and terrorism
Identity and terrorismIdentity and terrorism
Identity and terrorismJaseme_Otoyo
 
Tactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic InsurgencyTactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic InsurgencyPatrick Thomas Cannon
 
Changes on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorismChanges on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorismChandana Wickramasinghe
 
Effective Counters to Terrorism & Violent Extremism
Effective Counters to Terrorism & Violent ExtremismEffective Counters to Terrorism & Violent Extremism
Effective Counters to Terrorism & Violent ExtremismENODO Global, Inc.
 
Addressing extremism
Addressing extremismAddressing extremism
Addressing extremismMark Levy
 
Chapter 9 Political crime & terrorism criminology presentation
Chapter 9 Political crime & terrorism criminology presentationChapter 9 Political crime & terrorism criminology presentation
Chapter 9 Political crime & terrorism criminology presentationAsadAli775
 
Sociological Perspectives-2015-Stewart-0731121414557700
Sociological Perspectives-2015-Stewart-0731121414557700Sociological Perspectives-2015-Stewart-0731121414557700
Sociological Perspectives-2015-Stewart-0731121414557700Michele Bendall
 
To Elect Clinton
To Elect ClintonTo Elect Clinton
To Elect ClintonBrian Coyle
 
Asymmetric warfare group report psychological and sociological concepts of r...
Asymmetric warfare group report  psychological and sociological concepts of r...Asymmetric warfare group report  psychological and sociological concepts of r...
Asymmetric warfare group report psychological and sociological concepts of r...PublicLeaker
 
Cost of terrorism revised
Cost of terrorism revisedCost of terrorism revised
Cost of terrorism revisedbrianhayward
 
White7e ppt ch14
White7e ppt ch14White7e ppt ch14
White7e ppt ch14difordham
 
Educational Strategies for the Prevention of Violent Extremism
Educational Strategies for the Prevention of Violent ExtremismEducational Strategies for the Prevention of Violent Extremism
Educational Strategies for the Prevention of Violent ExtremismRenee Hobbs
 
The face of terrorism 2013
The face of terrorism   2013The face of terrorism   2013
The face of terrorism 2013Martin Brown
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...paperpublications3
 

What's hot (18)

Terrorism
TerrorismTerrorism
Terrorism
 
Identity and terrorism
Identity and terrorismIdentity and terrorism
Identity and terrorism
 
Tactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic InsurgencyTactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic Insurgency
 
Changes on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorismChanges on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorism
 
Effective Counters to Terrorism & Violent Extremism
Effective Counters to Terrorism & Violent ExtremismEffective Counters to Terrorism & Violent Extremism
Effective Counters to Terrorism & Violent Extremism
 
Addressing extremism
Addressing extremismAddressing extremism
Addressing extremism
 
Chapter 9 Political crime & terrorism criminology presentation
Chapter 9 Political crime & terrorism criminology presentationChapter 9 Political crime & terrorism criminology presentation
Chapter 9 Political crime & terrorism criminology presentation
 
Sociological Perspectives-2015-Stewart-0731121414557700
Sociological Perspectives-2015-Stewart-0731121414557700Sociological Perspectives-2015-Stewart-0731121414557700
Sociological Perspectives-2015-Stewart-0731121414557700
 
Power in ir
Power in irPower in ir
Power in ir
 
To Elect Clinton
To Elect ClintonTo Elect Clinton
To Elect Clinton
 
Asymmetric warfare group report psychological and sociological concepts of r...
Asymmetric warfare group report  psychological and sociological concepts of r...Asymmetric warfare group report  psychological and sociological concepts of r...
Asymmetric warfare group report psychological and sociological concepts of r...
 
Psychology of Peace
 Psychology of  Peace Psychology of  Peace
Psychology of Peace
 
Cost of terrorism revised
Cost of terrorism revisedCost of terrorism revised
Cost of terrorism revised
 
White7e ppt ch14
White7e ppt ch14White7e ppt ch14
White7e ppt ch14
 
Educational Strategies for the Prevention of Violent Extremism
Educational Strategies for the Prevention of Violent ExtremismEducational Strategies for the Prevention of Violent Extremism
Educational Strategies for the Prevention of Violent Extremism
 
The face of terrorism 2013
The face of terrorism   2013The face of terrorism   2013
The face of terrorism 2013
 
Violence ppt
Violence pptViolence ppt
Violence ppt
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
 

Similar to Hillard Heintze Radicalization in the Workplace

Radicalization in the Workplace
Radicalization in the WorkplaceRadicalization in the Workplace
Radicalization in the WorkplaceHillard Heintze
 
Revolutions and Contention
Revolutions and ContentionRevolutions and Contention
Revolutions and Contentionatrantham
 
Revolutions and Contention
Revolutions and ContentionRevolutions and Contention
Revolutions and Contentionatrantham
 
Revolutions and Contention
Revolutions and ContentionRevolutions and Contention
Revolutions and Contentionatrantham
 
Revolutions and Contention
Revolutions and ContentionRevolutions and Contention
Revolutions and Contentionatrantham
 
Question 1 What led to the drastic decline of the Klu Klux Kla.docx
Question 1 What led to the drastic decline of the Klu Klux Kla.docxQuestion 1 What led to the drastic decline of the Klu Klux Kla.docx
Question 1 What led to the drastic decline of the Klu Klux Kla.docxmakdul
 
17 471 03_realist_model
17 471 03_realist_model17 471 03_realist_model
17 471 03_realist_modelAndrei Bujaki
 
Is America Under Siege?
Is America Under Siege?Is America Under Siege?
Is America Under Siege?Denise Scelsi
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandEnrique J Cordero
 
Revolutions and contention
Revolutions and contentionRevolutions and contention
Revolutions and contentionatrantham
 
Attempts To Define Terrorism Terrorist Or Freedom Fighter
Attempts To Define Terrorism  Terrorist Or Freedom FighterAttempts To Define Terrorism  Terrorist Or Freedom Fighter
Attempts To Define Terrorism Terrorist Or Freedom FighterDustin Pytko
 
Suicide Report 1
Suicide Report 1Suicide Report 1
Suicide Report 1adnanshaikh
 
Media's Discursive Influence on the Philippines' War on Drugs
Media's Discursive Influence on the Philippines' War on DrugsMedia's Discursive Influence on the Philippines' War on Drugs
Media's Discursive Influence on the Philippines' War on DrugsMark Raygan Garcia
 
Online Assignment
Online AssignmentOnline Assignment
Online AssignmentArun Murali
 
Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...Elsevier
 
Comprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident ManagementComprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident ManagementWilliam Penfield
 

Similar to Hillard Heintze Radicalization in the Workplace (20)

Radicalization in the Workplace
Radicalization in the WorkplaceRadicalization in the Workplace
Radicalization in the Workplace
 
Revolutions and Contention
Revolutions and ContentionRevolutions and Contention
Revolutions and Contention
 
Revolutions and Contention
Revolutions and ContentionRevolutions and Contention
Revolutions and Contention
 
Terrorism and-new-ideologies
Terrorism and-new-ideologiesTerrorism and-new-ideologies
Terrorism and-new-ideologies
 
final
 final final
final
 
Revolutions and Contention
Revolutions and ContentionRevolutions and Contention
Revolutions and Contention
 
Revolutions and Contention
Revolutions and ContentionRevolutions and Contention
Revolutions and Contention
 
40 years of terror trend
40 years of terror trend40 years of terror trend
40 years of terror trend
 
Question 1 What led to the drastic decline of the Klu Klux Kla.docx
Question 1 What led to the drastic decline of the Klu Klux Kla.docxQuestion 1 What led to the drastic decline of the Klu Klux Kla.docx
Question 1 What led to the drastic decline of the Klu Klux Kla.docx
 
17 471 03_realist_model
17 471 03_realist_model17 471 03_realist_model
17 471 03_realist_model
 
Is America Under Siege?
Is America Under Siege?Is America Under Siege?
Is America Under Siege?
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
Revolutions and contention
Revolutions and contentionRevolutions and contention
Revolutions and contention
 
Attempts To Define Terrorism Terrorist Or Freedom Fighter
Attempts To Define Terrorism  Terrorist Or Freedom FighterAttempts To Define Terrorism  Terrorist Or Freedom Fighter
Attempts To Define Terrorism Terrorist Or Freedom Fighter
 
Suicide Report 1
Suicide Report 1Suicide Report 1
Suicide Report 1
 
Media's Discursive Influence on the Philippines' War on Drugs
Media's Discursive Influence on the Philippines' War on DrugsMedia's Discursive Influence on the Philippines' War on Drugs
Media's Discursive Influence on the Philippines' War on Drugs
 
Online Assignment
Online AssignmentOnline Assignment
Online Assignment
 
Terrorism
TerrorismTerrorism
Terrorism
 
Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...
 
Comprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident ManagementComprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident Management
 

More from Hillard Heintze

Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4Hillard Heintze
 
Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3Hillard Heintze
 
Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2Hillard Heintze
 
Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1Hillard Heintze
 
Hillard Heintze Presentation The Strategic Value of Assurance
Hillard Heintze Presentation   The Strategic Value of AssuranceHillard Heintze Presentation   The Strategic Value of Assurance
Hillard Heintze Presentation The Strategic Value of AssuranceHillard Heintze
 
Insights on Enhancing the Security of Your Family
Insights on Enhancing the Security of Your FamilyInsights on Enhancing the Security of Your Family
Insights on Enhancing the Security of Your FamilyHillard Heintze
 
Hillard heintze Presentation for ATAP
Hillard heintze Presentation for ATAP Hillard heintze Presentation for ATAP
Hillard heintze Presentation for ATAP Hillard Heintze
 
Security in Today's Global Threat Environment
Security in Today's Global Threat EnvironmentSecurity in Today's Global Threat Environment
Security in Today's Global Threat EnvironmentHillard Heintze
 
Protecting the Family Office
Protecting the Family OfficeProtecting the Family Office
Protecting the Family OfficeHillard Heintze
 
Hillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active ShooterHillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active ShooterHillard Heintze
 
How to Prevent An Active Shooter in Your Workplace
How to Prevent An Active Shooter in Your WorkplaceHow to Prevent An Active Shooter in Your Workplace
How to Prevent An Active Shooter in Your WorkplaceHillard Heintze
 

More from Hillard Heintze (11)

Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4
 
Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3
 
Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2
 
Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1
 
Hillard Heintze Presentation The Strategic Value of Assurance
Hillard Heintze Presentation   The Strategic Value of AssuranceHillard Heintze Presentation   The Strategic Value of Assurance
Hillard Heintze Presentation The Strategic Value of Assurance
 
Insights on Enhancing the Security of Your Family
Insights on Enhancing the Security of Your FamilyInsights on Enhancing the Security of Your Family
Insights on Enhancing the Security of Your Family
 
Hillard heintze Presentation for ATAP
Hillard heintze Presentation for ATAP Hillard heintze Presentation for ATAP
Hillard heintze Presentation for ATAP
 
Security in Today's Global Threat Environment
Security in Today's Global Threat EnvironmentSecurity in Today's Global Threat Environment
Security in Today's Global Threat Environment
 
Protecting the Family Office
Protecting the Family OfficeProtecting the Family Office
Protecting the Family Office
 
Hillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active ShooterHillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active Shooter
 
How to Prevent An Active Shooter in Your Workplace
How to Prevent An Active Shooter in Your WorkplaceHow to Prevent An Active Shooter in Your Workplace
How to Prevent An Active Shooter in Your Workplace
 

Recently uploaded

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 

Recently uploaded (20)

(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 

Hillard Heintze Radicalization in the Workplace