This Best of GSX package contains 4 recordings that will equip security professionals with the latest BTA methodologies. You'll learn how to effectively identify, define, and act on the early warning signs that all too often go unnoticed. Discover the merits of implementing a proactive threat detection program to identify and manage concerning behaviors. Gain practical guidance on crafting policies, procedures, and practices that seamlessly integrate BTA into your organization. Give your team with the tools to lead BTA efforts with confidence, navigating the complex spectrum of behaviors that fall outside statutory definitions of threats or violence.
This package includes:
Behavior Threat Detection & Assessment: Moving from Response to Prevention
After almost every tragic security incident, we always discover that there were “red flags” and “opportunities” to prevent the incident. Behavior Threat Detection is a highly effective security method for protecting closed, controlled, and open-access operational environments. Behavior Threat Detection allows trained professionals to identify, define, and act on these red flags. Over the last decade, Behavior Threat Detection has become the proven security measure for organizations looking for proactive operations capable of deterring and detecting threat actors and preventing security incidents. This highly impactful and interactive presentation will provide a detailed overview of the latest in the field of Behavior Threat Detection, along with several recent examples of successful implementation, integration with technological solutions, and subsequent results.
When Minutes Matter: Online Threat Investigations
Mass shootings and attacks have increased significantly over the last decade in the United States partly due to the rise of social media and online engagement. Some of the largest mass shootings in history involve an attacker that publicly announced online their intentions to commit an act of violence hours, days, and sometimes weeks beforehand. This session will discuss the merits of having an proactive threat detection program for online violent threats and proactively providing disclosures to law enforcement. The session will also dive into imminent threat assessment methodology in the online space, and will include a case study from an imminent threat referral that led to a positive outcome.
Establishing Behavioral Threat Assessment Teams That Are a Bonus, Not a Burden
Identifying and managing behaviors that indicate an elevated risk of violence (“Behavioral Threat Assessment and Management” or “BTAM”) is no longer an optional practice for many security teams in education, healthcare, and the private sector. Security managers tasked with standing up or training teams can often feel like it is an impossible task in terms of personnel and resources required. This session offers practical guidance for creating policies, procedures, and practices that integrate BTAM with the mission of both the security program and the organization, as well as practical guidance for how to lead BTAM teams that operate effectively and efficiently—without overwhelming the organization’s resources.
A Case Study in Adapting Conflict Management Processes for Violence Prevention and Addressing Disruptive Behavior
This session presents an organization’s approach to managing the complex spectrum of behaviors that do not fit a statutory definition of a verbal threat or physical violence but are a concern for constituents and the organization. We will build out a definition of disruptive behavior—conduct that is perceived as concerning, disturbing, degrading, offensive, and/or negative, but does not meet legal elements for a crime and law enforcement intervention. The case study will review adaptive management strategies that align with traditional threat assessment principles and standards for workplace violence and active assailant—prevention, intervention, and response. We will explore practical applications across industries.
Title | Credit(s) | |
---|---|---|
1 | ||
2 | ||
3 | ||
4 |