SlideShare a Scribd company logo
1 of 26
Download to read offline
©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
   www.SigmaTMA.com	
  
BEHAVIORAL THREAT ASSESSMENT
ON CAMPUS:
WHAT YOU NEED TO KNOW	
  
MARISA	
  R.	
  RANDAZZO,	
  PH.D.	
  
SIGMA	
  Threat	
  Management	
  Associates	
  
WEBINAR OVERVIEW
§  What	
  is	
  Behavioral	
  Threat	
  Assessment?	
  
	
  
§  Current	
  Best	
  PracCces	
  in	
  Campus	
  Threat	
  Assessment	
  
	
  
§  Components	
  of	
  EffecCve	
  Programs	
  
	
  
§  Steps	
  in	
  the	
  Threat	
  Assessment	
  Process	
  
	
  
§  Resources	
  
Slide	
  3	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
 
WHAT	
  IS	
  	
  
BEHAVIORAL	
  THREAT	
  ASSESSMENT?	
  
Slide	
  4	
  
BEHAVIORAL THREAT ASSESSMENT
1	
  
•  Identify person of concern
2	
  
•  Gather information / investigate
3	
  
•  Assess information and situation
4	
  
•  Manage the person / situation
A	
  systemaEc	
  process	
  that	
  is	
  designed	
  to:	
  
	
  
Slide	
  5	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
THREAT ASSESSMENT PROCESS
Facts Conclusions Strategies
Threat	
  assessment	
  is	
  a	
  deducEve	
  process:	
  
Slide	
  6	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
WHY THREAT ASSESSMENT WORKS
§  Targeted	
  campus	
  aMacks	
  are	
  preventable;	
  they	
  follow	
  a	
  
logical	
  &	
  detectable	
  pathway	
  to	
  violence.	
  
§  A	
  person’s	
  ideas	
  and	
  plans	
  for	
  violence	
  are	
  potenCally	
  
detectable	
  before	
  harm	
  occurs.	
  
§  InformaCon	
  is	
  likely	
  to	
  be	
  scaMered	
  and	
  fragmented.	
  
§  Team	
  should	
  act	
  quickly	
  upon	
  iniCal	
  report,	
  gather	
  
informaCon	
  and	
  pieces	
  of	
  the	
  puzzle,	
  and	
  assemble	
  the	
  
informaCon	
  to	
  see	
  is	
  person	
  is	
  on	
  pathway	
  to	
  violence.	
  
§  Threat	
  assessment	
  and	
  case	
  management	
  is	
  not	
  an	
  
adversarial	
  process.	
  	
  Engagement	
  with	
  a	
  person	
  of	
  
concern	
  can	
  be	
  criCcal	
  to	
  prevenCng	
  violence	
  or	
  harm.	
  
BROAD CONSENSUS
Recommended	
  by:	
  
§  Virginia	
  Tech	
  Review	
  Panel	
  (governor’s	
  panel)	
  
§  Report	
  to	
  President	
  from	
  U.S.	
  Departments	
  of	
  
EducaCon,	
  JusCce,	
  Health	
  &	
  Human	
  Services;	
  
§  Numerous	
  professional	
  associaCons:	
  
•  AASCU,	
  ASJA,	
  IACLEA,	
  MHEC,	
  NAAG,	
  NASPA	
  
§  Several	
  state	
  task	
  forces	
  on	
  campus	
  safety:	
  
•  CA,	
  FL,	
  IA,	
  IL,	
  KY,	
  MA,	
  MO,	
  NC,	
  NJ,	
  NM,	
  OK,	
  PA,	
  WI,	
  VA	
  
§  American	
  NaConal	
  Standard	
  (ANSI-­‐approved):	
  
	
  	
  “A	
  Risk	
  Analysis	
  Standard	
  for	
  Natural	
  and	
  Man-­‐Made	
  
Hazards	
  to	
  Higher	
  EducaCon	
  InsCtuCons”	
  	
  
Slide	
  8	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
REQUIRED IN 3 STATES
Required	
  by	
  law:	
  
§  Commonwealth	
  of	
  Virginia	
  
§  State	
  of	
  Illinois	
  
§  State	
  of	
  ConnecCcut	
  
Slide	
  9	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
CURRENT	
  BEST	
  PRACTICES	
  	
  
IN	
  	
  
CAMPUS	
  THREAT	
  ASSESSMENT	
  
Slide	
  10	
  
CURRENT BEST PRACTICES
§  MulC-­‐disciplinary	
  team	
  
§  Authority	
  to	
  engage	
  in	
  threat	
  assessment	
  
§  Basic	
  threat	
  assessment	
  training	
  
§  Standard	
  threat	
  assessment	
  processes	
  and	
  
procedures	
  
§  Resources	
  and	
  acCviCes	
  that	
  support	
  threat	
  
assessment	
  operaCons	
  
Slide	
  11	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
BEST PRACTICES REFERENCES
§  A	
  Risk	
  Analysis	
  Standard	
  for	
  Natural	
  and	
  Man-­‐Made	
  
Hazards	
  to	
  Higher	
  Educa<on	
  Ins<tu<ons	
  (2010).	
  	
  ASME	
  
InnovaCve	
  Technologies	
  InsCtute	
  LLC	
  
	
  
§  Campus	
  Threat	
  Assessment	
  and	
  Management	
  Teams:	
  
What	
  Risk	
  Managers	
  Need	
  to	
  Know	
  Now	
  (2011).	
  Nolan,	
  
Randazzo	
  &	
  Deisinger	
  
	
  
§  The	
  Handbook	
  for	
  Campus	
  Threat	
  Assessment	
  and	
  
Management	
  Teams	
  (2008).	
  	
  Deisinger,	
  Randazzo,	
  O’Neill	
  
&	
  Savage	
  
	
  
§  Implemen<ng	
  Behavioral	
  Threat	
  Assessment	
  on	
  Campus:	
  
A	
  Virginia	
  Tech	
  Demonstra<on	
  Project	
  (2009).	
  	
  Randazzo	
  &	
  
Plummer	
  
	
  
Slide	
  12	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
COMPONENTS	
  OF	
  EFFECTIVE	
  
CAMPUS	
  THREAT	
  ASSESSMENT	
  
PROGRAMS	
  
Slide	
  13	
  
COMPONENTS OF EFFECTIVE PROGRAMS
q MulC-­‐disciplinary	
  team(s)	
  
q  InsCtuCon-­‐wide	
  OR	
  	
  Student-­‐only	
  and	
  employee-­‐only	
  
q Training	
  from	
  qualified	
  &	
  experienced	
  trainer	
  
q Access	
  to	
  case	
  management	
  /	
  support	
  resources	
  
q AdministraCon	
  support	
  
q Legal	
  counsel	
  input	
  
q Database	
  /	
  case	
  documentaCon	
  
q ReporCng	
  mechanisms	
  &	
  campus-­‐wide	
  awareness	
  
q Community	
  relaConships	
  	
  
	
  
Slide	
  14	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
THREAT ASSESSMENT TEAM:
MulE-­‐Disciplinary	
  Membership	
  
n  Student	
  Affairs	
  
n  Human	
  Resources	
  
n  Campus	
  Police	
  /	
  Campus	
  Security	
  
n  Counseling	
  Center	
  /	
  Employee	
  Assistance	
  
n  Local	
  Law	
  enforcement	
  
n  General	
  Counsel	
  
n  Alternates	
  (opConal)	
  
n  Others	
  as	
  needed	
  
	
  
TRAINING FOR TEAM / CAMPUS
q 	
  Training	
  for	
  team	
  members	
  
§  Basic	
  training	
  in	
  behavioral	
  threat	
  assessment	
  procedures	
  
§  Self-­‐guided	
  tabletop	
  exercises	
  /	
  amer-­‐acCon	
  reviews	
  
§  Advanced	
  training	
  
	
  
q 	
  Trainers	
  should	
  be	
  qualified,	
  have	
  significant	
  direct	
  case	
  
experience	
  
§  Review	
  and	
  vet	
  potenCal	
  trainers	
  
§  Check	
  for	
  feedback	
  from	
  other	
  clients	
  
	
  
q 	
  Campus-­‐wide	
  training	
  /	
  strategies	
  to	
  encourage	
  
community	
  to	
  report	
  threats	
  and	
  other	
  troubling	
  behavior	
  
WAYS TO ENCOURAGE REPORTING
For	
  effecEve	
  reporEng,	
  people	
  need	
  to	
  know:	
  
§  Their	
  role	
  and	
  responsibility	
  to	
  report	
  
§  What	
  to	
  report	
  
§  Where	
  to	
  report	
  
§  Reports	
  are	
  wanted	
  
§  Something	
  will	
  be	
  done	
  
§  Regular	
  reminders	
  of	
  issues	
  and	
  process	
  
	
  
“If	
  you	
  see	
  something,	
  say	
  something.”	
  
Source:	
  NYC	
  Metropolitan	
  TransportaEon	
  Authority	
  
	
  
Slide	
  17	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
STEPS	
  	
  
IN	
  THE	
  	
  
THREAT	
  ASSESSMENT	
  	
  
PROCESS	
  
	
  
Slide	
  18	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
THREAT ASSESSMENT PROCESS
1.  Encourage	
  reporCng	
  to	
  the	
  team(s)	
  
	
  
2.  IdenCfy	
  person	
  /	
  situaCon	
  of	
  concern	
  
	
  
3.  Screen	
  case	
  for	
  imminence	
  /	
  team	
  scope	
  
	
  
4.  Gather	
  InformaCon	
  
§  Seek	
  out	
  informaCon	
  from	
  mulCple	
  sources	
  
§  Include	
  person	
  of	
  concern	
  where	
  possible	
  
§  Include	
  Internet	
  /	
  social	
  media	
  search	
  
§  Include	
  previous	
  schools	
  /	
  employers	
  
§  Include	
  local	
  law	
  enforcement	
  checks	
  
©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
THREAT ASSESSMENT PROCESS (CONT.)
5.  Analyze	
  informaCon	
  &	
  Assess	
  person	
  of	
  concern	
  
§  Answer	
  Key	
  InvesCgaCve	
  QuesCons	
  
§  Answer	
  Assessment	
  QuesCons	
  
	
  
6.  Manage	
  person	
  /	
  situaCon	
  if	
  needed	
  
§  Develop	
  threat	
  management	
  plan	
  
§  Implement	
  threat	
  management	
  plan	
  
§  Monitor	
  and	
  re-­‐evaluate	
  plan	
  to	
  ensure	
  safety	
  
©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
CAMPUS	
  
THREAT	
  ASSESSMENT	
  	
  
RESOURCES	
  
	
  
Slide	
  21	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
HANDS-ON RESOURCES
Books	
  
§  The	
  Handbook	
  for	
  Campus	
  Threat	
  
Assessment	
  &	
  Management	
  Teams	
  
	
  
www.SigmaTMA.com/about/our-­‐books/	
  
	
  
§  Implemen<ng	
  Behavioral	
  Threat	
  
Assessment	
  on	
  Campus:	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
A	
  Virginia	
  Tech	
  Demonstra<on	
  Project	
  
	
  
www.SigmaTMA.com/about/our-­‐books/	
  
	
  
	
  
Slide	
  22	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
HANDS-ON RESOURCES
Training	
  &	
  Tabletop	
  Resources	
  
	
  
§  Campus	
  Threat	
  Assessment	
  Case	
  Studies:	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
A	
  Training	
  Tool	
  for	
  Inves<ga<on,	
  Evalua<on	
  &	
  
Interven<on	
  
www.CampusThreatAssessment.org	
  
	
  
§  How	
  to	
  Find	
  a	
  Good	
  Threat	
  Assessment	
  Consultant:	
  	
  	
  	
  	
  	
  	
  	
  
5	
  Ques<ons	
  to	
  Ask	
  Before	
  You	
  Hire	
  	
  
	
  
www.SigmaTMA.com/news/	
  
	
  
	
  
	
   Slide	
  23	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
§  PrevenCon	
  is	
  possible	
  
§  Threat	
  assessment	
  team	
  is	
  most	
  effecCve	
  when	
  
supported	
  	
  by	
  campus	
  and	
  community	
  resources	
  
§  Team	
  needs	
  quality	
  training	
  to	
  work	
  effecCvely	
  
§  Focus	
  is	
  on	
  safety	
  for	
  all	
  
§  Evaluate	
  periodically	
  
§  Consult,	
  consult,	
  consult!	
  
CONCLUSION
Slide	
  24	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
CONTACT INFORMATION:
Marisa	
  Randazzo,	
  PhD	
  
Managing	
  Partner	
  
SIGMA	
  Threat	
  Management	
  Associates	
  
703-­‐647-­‐7419	
  
MRandazzo@SigmaTMA.com	
  
	
  
www.SigmaTMA.com	
  
	
  
Stay	
  in	
  touch	
  with	
  us	
  on:	
  
	
  
Facebook 	
  SIGMA	
  Threat	
  Management	
  
Twiber 	
   	
  @SigmaTMA	
  
LinkedIn	
   	
  SIGMA	
  Threat	
  Management	
  
	
  
	
  
	
  
Book	
  available	
  at:	
  www.SigmaTMA.com	
  
Slide	
  25	
  ©	
  SIGMA	
  Threat	
  Management	
  Associates	
  (2015)	
  
Behavioral Threat Assessment on Campus: What You Need to Know

More Related Content

What's hot

Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt  Part IV- Bomb Threat Response- Richard GarritySkyscraper Security Mgt  Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard GarrityRichard Garrity
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligencekelsports
 
407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPT407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPTBrandon D'Andrea
 
Active shooter updated
Active shooter   updatedActive shooter   updated
Active shooter updatedJim Bane
 
Anti-terrorism training
Anti-terrorism trainingAnti-terrorism training
Anti-terrorism trainingjturner67
 
Chapter 06
Chapter 06Chapter 06
Chapter 06Joe
 
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 MatrixJorge Orchilles
 
ASIS CPP Study Flash Cards and Quiz
ASIS CPP Study Flash Cards and QuizASIS CPP Study Flash Cards and Quiz
ASIS CPP Study Flash Cards and QuizBrandon Gregg, CPP
 
Crisis Management Powerpoint Presentation Slides
Crisis Management Powerpoint Presentation SlidesCrisis Management Powerpoint Presentation Slides
Crisis Management Powerpoint Presentation SlidesSlideTeam
 
Chapter 14
Chapter 14Chapter 14
Chapter 14glickauf
 
Antiterrorism Point of Instruction
Antiterrorism Point of InstructionAntiterrorism Point of Instruction
Antiterrorism Point of InstructionCaleb Lin, MBA
 
Introduction To Risk Management
Introduction To Risk Management Introduction To Risk Management
Introduction To Risk Management Sagar Garg
 

What's hot (20)

Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt  Part IV- Bomb Threat Response- Richard GarritySkyscraper Security Mgt  Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard Garrity
 
Bomb threat sop
Bomb threat sopBomb threat sop
Bomb threat sop
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
Alice training
Alice trainingAlice training
Alice training
 
407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPT407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPT
 
Active shooter updated
Active shooter   updatedActive shooter   updated
Active shooter updated
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Anti-terrorism training
Anti-terrorism trainingAnti-terrorism training
Anti-terrorism training
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix
 
ASIS CPP Study Flash Cards and Quiz
ASIS CPP Study Flash Cards and QuizASIS CPP Study Flash Cards and Quiz
ASIS CPP Study Flash Cards and Quiz
 
Crisis Management Powerpoint Presentation Slides
Crisis Management Powerpoint Presentation SlidesCrisis Management Powerpoint Presentation Slides
Crisis Management Powerpoint Presentation Slides
 
Conceptualizacion del area de seguridad
Conceptualizacion del area de seguridadConceptualizacion del area de seguridad
Conceptualizacion del area de seguridad
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Chapter Four
Chapter FourChapter Four
Chapter Four
 
Antiterrorism Point of Instruction
Antiterrorism Point of InstructionAntiterrorism Point of Instruction
Antiterrorism Point of Instruction
 
Threat Modeling Using STRIDE
Threat Modeling Using STRIDEThreat Modeling Using STRIDE
Threat Modeling Using STRIDE
 
Chapter Fifteen
Chapter FifteenChapter Fifteen
Chapter Fifteen
 
Introduction To Risk Management
Introduction To Risk Management Introduction To Risk Management
Introduction To Risk Management
 

Viewers also liked

Adding International Incidents to Your Campus All-Hazard Emergency Response P...
Adding International Incidents to Your Campus All-Hazard Emergency Response P...Adding International Incidents to Your Campus All-Hazard Emergency Response P...
Adding International Incidents to Your Campus All-Hazard Emergency Response P...National Center for Campus Public Safety
 
Campus Safety at York University
Campus Safety at York UniversityCampus Safety at York University
Campus Safety at York UniversityTaha Syed
 
Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...National Center for Campus Public Safety
 
Campus Safety | Merit Weekend 2017
Campus Safety | Merit Weekend 2017Campus Safety | Merit Weekend 2017
Campus Safety | Merit Weekend 2017ukyenroll
 
Comprehensive safety-planning
Comprehensive safety-planningComprehensive safety-planning
Comprehensive safety-planningFaisal Shahriman
 
Virginia Tech - Campus Safety, Security, and Preparedness
Virginia Tech - Campus Safety, Security, and PreparednessVirginia Tech - Campus Safety, Security, and Preparedness
Virginia Tech - Campus Safety, Security, and Preparednessvt-hr-service-center
 

Viewers also liked (9)

Adding International Incidents to Your Campus All-Hazard Emergency Response P...
Adding International Incidents to Your Campus All-Hazard Emergency Response P...Adding International Incidents to Your Campus All-Hazard Emergency Response P...
Adding International Incidents to Your Campus All-Hazard Emergency Response P...
 
Business Continuity: Getting Your Ducks in a Row
Business Continuity: Getting Your Ducks in a RowBusiness Continuity: Getting Your Ducks in a Row
Business Continuity: Getting Your Ducks in a Row
 
Social Media’s Role in Campus Safety: What, Why, and What Now?
Social Media’s Role in Campus Safety: What, Why, and What Now?Social Media’s Role in Campus Safety: What, Why, and What Now?
Social Media’s Role in Campus Safety: What, Why, and What Now?
 
Campus Safety at York University
Campus Safety at York UniversityCampus Safety at York University
Campus Safety at York University
 
Framing Three Key Issues in Campus Public Safety
Framing Three Key Issues in Campus Public SafetyFraming Three Key Issues in Campus Public Safety
Framing Three Key Issues in Campus Public Safety
 
Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...
 
Campus Safety | Merit Weekend 2017
Campus Safety | Merit Weekend 2017Campus Safety | Merit Weekend 2017
Campus Safety | Merit Weekend 2017
 
Comprehensive safety-planning
Comprehensive safety-planningComprehensive safety-planning
Comprehensive safety-planning
 
Virginia Tech - Campus Safety, Security, and Preparedness
Virginia Tech - Campus Safety, Security, and PreparednessVirginia Tech - Campus Safety, Security, and Preparedness
Virginia Tech - Campus Safety, Security, and Preparedness
 

Similar to Behavioral Threat Assessment on Campus: What You Need to Know

Managing risk with deliverables planning
Managing risk with deliverables planningManaging risk with deliverables planning
Managing risk with deliverables planningGlen Alleman
 
Improving risk-return and resilience through Enterprise Risk Management — Jul...
Improving risk-return and resilience through Enterprise Risk Management — Jul...Improving risk-return and resilience through Enterprise Risk Management — Jul...
Improving risk-return and resilience through Enterprise Risk Management — Jul...Ian-Edward Stafrace
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident ResponseEC-Council
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
 
Threat Based Risk Assessment
Threat Based Risk AssessmentThreat Based Risk Assessment
Threat Based Risk AssessmentMichael Lines
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability Resolver Inc.
 
Social entrepreneurship topic 9
Social entrepreneurship topic 9Social entrepreneurship topic 9
Social entrepreneurship topic 9Anis Amira
 
The Future Of Pipeline Risk Management
The Future Of Pipeline Risk ManagementThe Future Of Pipeline Risk Management
The Future Of Pipeline Risk ManagementKathy Walsh
 
Procedural Risk Management
Procedural Risk ManagementProcedural Risk Management
Procedural Risk ManagementLouis A. Poulin
 
Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Jisc
 
Risk Mgt in Today's World
Risk Mgt in Today's WorldRisk Mgt in Today's World
Risk Mgt in Today's Worldfmbabs
 

Similar to Behavioral Threat Assessment on Campus: What You Need to Know (20)

Handling Threats and Other Disturbing Behavior on Campus
Handling Threats and Other Disturbing Behavior on CampusHandling Threats and Other Disturbing Behavior on Campus
Handling Threats and Other Disturbing Behavior on Campus
 
Managing risk with deliverables planning
Managing risk with deliverables planningManaging risk with deliverables planning
Managing risk with deliverables planning
 
Improving risk-return and resilience through Enterprise Risk Management — Jul...
Improving risk-return and resilience through Enterprise Risk Management — Jul...Improving risk-return and resilience through Enterprise Risk Management — Jul...
Improving risk-return and resilience through Enterprise Risk Management — Jul...
 
Risk Based Approach In cyber Security In Nepal
Risk Based Approach In cyber Security In NepalRisk Based Approach In cyber Security In Nepal
Risk Based Approach In cyber Security In Nepal
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
Threat Based Risk Assessment
Threat Based Risk AssessmentThreat Based Risk Assessment
Threat Based Risk Assessment
 
ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Data Driven Cybersecurity Governance
Data Driven Cybersecurity GovernanceData Driven Cybersecurity Governance
Data Driven Cybersecurity Governance
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
Social entrepreneurship topic 9
Social entrepreneurship topic 9Social entrepreneurship topic 9
Social entrepreneurship topic 9
 
The Future Of Pipeline Risk Management
The Future Of Pipeline Risk ManagementThe Future Of Pipeline Risk Management
The Future Of Pipeline Risk Management
 
SunGard Risk Assessment Module
SunGard Risk Assessment ModuleSunGard Risk Assessment Module
SunGard Risk Assessment Module
 
Risk management of supply chain
Risk management of supply chainRisk management of supply chain
Risk management of supply chain
 
Procedural Risk Management
Procedural Risk ManagementProcedural Risk Management
Procedural Risk Management
 
Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?
 
Risk Mgt in Today's World
Risk Mgt in Today's WorldRisk Mgt in Today's World
Risk Mgt in Today's World
 
Konsep Dasar.pdf
Konsep Dasar.pdfKonsep Dasar.pdf
Konsep Dasar.pdf
 

More from National Center for Campus Public Safety

Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...National Center for Campus Public Safety
 
Understanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationUnderstanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationNational Center for Campus Public Safety
 

More from National Center for Campus Public Safety (20)

Remaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX RegulationsRemaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX Regulations
 
Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019
 
Get to Know SEVP: An Introduction to Working with International Students
Get to Know SEVP: An Introduction to Working with International StudentsGet to Know SEVP: An Introduction to Working with International Students
Get to Know SEVP: An Introduction to Working with International Students
 
Campus Threat Assessment: An In-Depth Expert Q&A
Campus Threat Assessment: An In-Depth Expert Q&ACampus Threat Assessment: An In-Depth Expert Q&A
Campus Threat Assessment: An In-Depth Expert Q&A
 
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
 
Reunification Planning: The Next Step
Reunification Planning: The Next StepReunification Planning: The Next Step
Reunification Planning: The Next Step
 
Unmanned Aircraft Systems on Campus
Unmanned Aircraft Systems on CampusUnmanned Aircraft Systems on Campus
Unmanned Aircraft Systems on Campus
 
The Importance of Learning from Averted and Completed School Attacks
The Importance of Learning from Averted and Completed School AttacksThe Importance of Learning from Averted and Completed School Attacks
The Importance of Learning from Averted and Completed School Attacks
 
Next Steps for Campus Threat Assessment Teams
Next Steps for Campus Threat Assessment TeamsNext Steps for Campus Threat Assessment Teams
Next Steps for Campus Threat Assessment Teams
 
Hazing Prevention: A Call to Action
Hazing Prevention: A Call to ActionHazing Prevention: A Call to Action
Hazing Prevention: A Call to Action
 
Human Trafficking: What Your Campus Needs to Know
Human Trafficking: What Your Campus Needs to KnowHuman Trafficking: What Your Campus Needs to Know
Human Trafficking: What Your Campus Needs to Know
 
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
 
Understanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationUnderstanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher Education
 
Legalization of Marijuana: Challenges Facing College Campuses
Legalization of Marijuana: Challenges Facing College CampusesLegalization of Marijuana: Challenges Facing College Campuses
Legalization of Marijuana: Challenges Facing College Campuses
 
Bystander Intervention in Action: Training the How-Tos of Intervention
Bystander Intervention in Action: Training the How-Tos of InterventionBystander Intervention in Action: Training the How-Tos of Intervention
Bystander Intervention in Action: Training the How-Tos of Intervention
 
Building and Assessing Your Physical Security Program
Building and Assessing Your Physical Security ProgramBuilding and Assessing Your Physical Security Program
Building and Assessing Your Physical Security Program
 
Violence Prevention/De-Escalation of Emotionally Charged Situations
Violence Prevention/De-Escalation of Emotionally Charged SituationsViolence Prevention/De-Escalation of Emotionally Charged Situations
Violence Prevention/De-Escalation of Emotionally Charged Situations
 
Top 5 Challenges with the Clery Act and Title IX
Top 5 Challenges with the Clery Act and Title IXTop 5 Challenges with the Clery Act and Title IX
Top 5 Challenges with the Clery Act and Title IX
 
Ten Years After Virginia Tech: Impacts on Campus Mental Health
Ten Years After Virginia Tech: Impacts on Campus Mental HealthTen Years After Virginia Tech: Impacts on Campus Mental Health
Ten Years After Virginia Tech: Impacts on Campus Mental Health
 
Designing Safety on Higher Ed Campuses: A CPTED Primer
Designing Safety on Higher Ed Campuses: A CPTED PrimerDesigning Safety on Higher Ed Campuses: A CPTED Primer
Designing Safety on Higher Ed Campuses: A CPTED Primer
 

Recently uploaded

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

Behavioral Threat Assessment on Campus: What You Need to Know

  • 1.
  • 2. ©  SIGMA  Threat  Management  Associates  (2015)   www.SigmaTMA.com   BEHAVIORAL THREAT ASSESSMENT ON CAMPUS: WHAT YOU NEED TO KNOW   MARISA  R.  RANDAZZO,  PH.D.   SIGMA  Threat  Management  Associates  
  • 3. WEBINAR OVERVIEW §  What  is  Behavioral  Threat  Assessment?     §  Current  Best  PracCces  in  Campus  Threat  Assessment     §  Components  of  EffecCve  Programs     §  Steps  in  the  Threat  Assessment  Process     §  Resources   Slide  3  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 4.   WHAT  IS     BEHAVIORAL  THREAT  ASSESSMENT?   Slide  4  
  • 5. BEHAVIORAL THREAT ASSESSMENT 1   •  Identify person of concern 2   •  Gather information / investigate 3   •  Assess information and situation 4   •  Manage the person / situation A  systemaEc  process  that  is  designed  to:     Slide  5  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 6. THREAT ASSESSMENT PROCESS Facts Conclusions Strategies Threat  assessment  is  a  deducEve  process:   Slide  6  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 7. WHY THREAT ASSESSMENT WORKS §  Targeted  campus  aMacks  are  preventable;  they  follow  a   logical  &  detectable  pathway  to  violence.   §  A  person’s  ideas  and  plans  for  violence  are  potenCally   detectable  before  harm  occurs.   §  InformaCon  is  likely  to  be  scaMered  and  fragmented.   §  Team  should  act  quickly  upon  iniCal  report,  gather   informaCon  and  pieces  of  the  puzzle,  and  assemble  the   informaCon  to  see  is  person  is  on  pathway  to  violence.   §  Threat  assessment  and  case  management  is  not  an   adversarial  process.    Engagement  with  a  person  of   concern  can  be  criCcal  to  prevenCng  violence  or  harm.  
  • 8. BROAD CONSENSUS Recommended  by:   §  Virginia  Tech  Review  Panel  (governor’s  panel)   §  Report  to  President  from  U.S.  Departments  of   EducaCon,  JusCce,  Health  &  Human  Services;   §  Numerous  professional  associaCons:   •  AASCU,  ASJA,  IACLEA,  MHEC,  NAAG,  NASPA   §  Several  state  task  forces  on  campus  safety:   •  CA,  FL,  IA,  IL,  KY,  MA,  MO,  NC,  NJ,  NM,  OK,  PA,  WI,  VA   §  American  NaConal  Standard  (ANSI-­‐approved):      “A  Risk  Analysis  Standard  for  Natural  and  Man-­‐Made   Hazards  to  Higher  EducaCon  InsCtuCons”     Slide  8  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 9. REQUIRED IN 3 STATES Required  by  law:   §  Commonwealth  of  Virginia   §  State  of  Illinois   §  State  of  ConnecCcut   Slide  9  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 10. CURRENT  BEST  PRACTICES     IN     CAMPUS  THREAT  ASSESSMENT   Slide  10  
  • 11. CURRENT BEST PRACTICES §  MulC-­‐disciplinary  team   §  Authority  to  engage  in  threat  assessment   §  Basic  threat  assessment  training   §  Standard  threat  assessment  processes  and   procedures   §  Resources  and  acCviCes  that  support  threat   assessment  operaCons   Slide  11  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 12. BEST PRACTICES REFERENCES §  A  Risk  Analysis  Standard  for  Natural  and  Man-­‐Made   Hazards  to  Higher  Educa<on  Ins<tu<ons  (2010).    ASME   InnovaCve  Technologies  InsCtute  LLC     §  Campus  Threat  Assessment  and  Management  Teams:   What  Risk  Managers  Need  to  Know  Now  (2011).  Nolan,   Randazzo  &  Deisinger     §  The  Handbook  for  Campus  Threat  Assessment  and   Management  Teams  (2008).    Deisinger,  Randazzo,  O’Neill   &  Savage     §  Implemen<ng  Behavioral  Threat  Assessment  on  Campus:   A  Virginia  Tech  Demonstra<on  Project  (2009).    Randazzo  &   Plummer     Slide  12  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 13. COMPONENTS  OF  EFFECTIVE   CAMPUS  THREAT  ASSESSMENT   PROGRAMS   Slide  13  
  • 14. COMPONENTS OF EFFECTIVE PROGRAMS q MulC-­‐disciplinary  team(s)   q  InsCtuCon-­‐wide  OR    Student-­‐only  and  employee-­‐only   q Training  from  qualified  &  experienced  trainer   q Access  to  case  management  /  support  resources   q AdministraCon  support   q Legal  counsel  input   q Database  /  case  documentaCon   q ReporCng  mechanisms  &  campus-­‐wide  awareness   q Community  relaConships       Slide  14  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 15. THREAT ASSESSMENT TEAM: MulE-­‐Disciplinary  Membership   n  Student  Affairs   n  Human  Resources   n  Campus  Police  /  Campus  Security   n  Counseling  Center  /  Employee  Assistance   n  Local  Law  enforcement   n  General  Counsel   n  Alternates  (opConal)   n  Others  as  needed    
  • 16. TRAINING FOR TEAM / CAMPUS q   Training  for  team  members   §  Basic  training  in  behavioral  threat  assessment  procedures   §  Self-­‐guided  tabletop  exercises  /  amer-­‐acCon  reviews   §  Advanced  training     q   Trainers  should  be  qualified,  have  significant  direct  case   experience   §  Review  and  vet  potenCal  trainers   §  Check  for  feedback  from  other  clients     q   Campus-­‐wide  training  /  strategies  to  encourage   community  to  report  threats  and  other  troubling  behavior  
  • 17. WAYS TO ENCOURAGE REPORTING For  effecEve  reporEng,  people  need  to  know:   §  Their  role  and  responsibility  to  report   §  What  to  report   §  Where  to  report   §  Reports  are  wanted   §  Something  will  be  done   §  Regular  reminders  of  issues  and  process     “If  you  see  something,  say  something.”   Source:  NYC  Metropolitan  TransportaEon  Authority     Slide  17  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 18. STEPS     IN  THE     THREAT  ASSESSMENT     PROCESS     Slide  18  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 19. THREAT ASSESSMENT PROCESS 1.  Encourage  reporCng  to  the  team(s)     2.  IdenCfy  person  /  situaCon  of  concern     3.  Screen  case  for  imminence  /  team  scope     4.  Gather  InformaCon   §  Seek  out  informaCon  from  mulCple  sources   §  Include  person  of  concern  where  possible   §  Include  Internet  /  social  media  search   §  Include  previous  schools  /  employers   §  Include  local  law  enforcement  checks   ©  SIGMA  Threat  Management  Associates  (2015)  
  • 20. THREAT ASSESSMENT PROCESS (CONT.) 5.  Analyze  informaCon  &  Assess  person  of  concern   §  Answer  Key  InvesCgaCve  QuesCons   §  Answer  Assessment  QuesCons     6.  Manage  person  /  situaCon  if  needed   §  Develop  threat  management  plan   §  Implement  threat  management  plan   §  Monitor  and  re-­‐evaluate  plan  to  ensure  safety   ©  SIGMA  Threat  Management  Associates  (2015)  
  • 21. CAMPUS   THREAT  ASSESSMENT     RESOURCES     Slide  21  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 22. HANDS-ON RESOURCES Books   §  The  Handbook  for  Campus  Threat   Assessment  &  Management  Teams     www.SigmaTMA.com/about/our-­‐books/     §  Implemen<ng  Behavioral  Threat   Assessment  on  Campus:                                                 A  Virginia  Tech  Demonstra<on  Project     www.SigmaTMA.com/about/our-­‐books/       Slide  22  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 23. HANDS-ON RESOURCES Training  &  Tabletop  Resources     §  Campus  Threat  Assessment  Case  Studies:                                                     A  Training  Tool  for  Inves<ga<on,  Evalua<on  &   Interven<on   www.CampusThreatAssessment.org     §  How  to  Find  a  Good  Threat  Assessment  Consultant:                 5  Ques<ons  to  Ask  Before  You  Hire       www.SigmaTMA.com/news/         Slide  23  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 24. §  PrevenCon  is  possible   §  Threat  assessment  team  is  most  effecCve  when   supported    by  campus  and  community  resources   §  Team  needs  quality  training  to  work  effecCvely   §  Focus  is  on  safety  for  all   §  Evaluate  periodically   §  Consult,  consult,  consult!   CONCLUSION Slide  24  ©  SIGMA  Threat  Management  Associates  (2015)  
  • 25. CONTACT INFORMATION: Marisa  Randazzo,  PhD   Managing  Partner   SIGMA  Threat  Management  Associates   703-­‐647-­‐7419   MRandazzo@SigmaTMA.com     www.SigmaTMA.com     Stay  in  touch  with  us  on:     Facebook  SIGMA  Threat  Management   Twiber    @SigmaTMA   LinkedIn    SIGMA  Threat  Management         Book  available  at:  www.SigmaTMA.com   Slide  25  ©  SIGMA  Threat  Management  Associates  (2015)