Welcome to Your Threat Management Team Development Guide
Please take a moment to add this page to your Bookmarks bar or favorites for easy access in the future.
Overview
A Threat Management Team (TMT) is an instrumental component of a comprehensive Violence Prevention program. This specialized team is responsible for assessing, investigating, managing, and resolving threats, threatening behavior, and reports made under the workplace violence policy. TMTs play a crucial role in maintaining a safe and secure work environment by proactively addressing potential threats before they escalate into serious incidents.
The effectiveness of a TMT lies in its ability to bring together diverse expertise from various departments such as HR, security, legal, and IT. This multidisciplinary approach ensures a well-rounded perspective on threats and enhances the team's ability to develop effective intervention strategies. The video and resources below outline the importance and development of a TMT for your organization, offering you a detailed guide on how to establish and maintain a proficient team.
By following the guidelines provided, your organization can build a robust Threat Management Team that not only meets regulatory requirements but also fosters a culture of safety and vigilance. This guide covers everything from identifying key roles within the team to implementing continuous training programs, ensuring your team is always prepared to handle any threat. Whether you are starting from scratch or looking to enhance your current TMT, these resources are designed to equip you with the knowledge and tools necessary for effective threat management.
Enhance Your Threat Management Program
While you review your guide, consider exploring our Behavioral Threat Assessment Management (BTAM) Service Package. This package includes:
Real-Time Threat Assessment Support (TMAT) Retainer
Live Scenario Training for Threat Management Teams
Online Threat Management Team eLearning Program for 10 People
These services are designed to provide continuous support and advanced training to ensure your team is always prepared.
Before you work through the information on this page…
Download this Threat Management Program Development Checklist
What is Behavioral Threat Assessment?
Behavioral Threat Assessment is a critical practice within the realm of workplace violence prevention, focusing on determining the credibility and seriousness of potential threats and the probability that these threats will materialize. This methodical approach involves collecting and analyzing information to assess the intent and capability of the individual posing the threat.
The process of threat assessment is information-driven, relying on a multidisciplinary team to gather, evaluate, and synthesize data from various sources. These sources may include direct observations, reports from coworkers, social media activity, and background checks. By examining behaviors, communications, and other indicators, the team can make informed decisions about the level of risk and the appropriate intervention strategies.
The key components of a successful Behavioral Threat Assessment include:
Identification: Recognizing behaviors or communications that suggest a potential for violence.
Assessment: Evaluating the context, history, and specifics of the threat, including the individual's current circumstances and stressors.
Management: Developing and implementing strategies to mitigate the risk, which may involve direct intervention, monitoring, and providing support to the individual.
Follow-Up: Continuously monitoring the situation to ensure that the threat does not escalate and that the individual receives ongoing support if needed.
By systematically assessing threats, organizations can prevent potential violence and create a safer work environment. Behavioral Threat Assessment is not only about identifying imminent threats but also about understanding the underlying issues that may lead to such behaviors, thereby addressing problems before they escalate.
This proactive approach is a key component of any effective Violence Prevention Program, providing a structured method to manage and reduce the risk of workplace violence. Implementing a robust Behavioral Threat Assessment protocol helps organizations fulfill their duty of care to employees, ensuring a secure and supportive workplace.
The Importance of Threat Assessment
This video from CPPS Principal Advisor and Certified Threat Manager Dave Benson breaks down Threat Assessment and gives some basic definitions.
Components of a Threat Management Team
As mentioned in the above video, your Threat Management Program needs multidisciplinary involvement, a formal incident management process, training, and external support. Not only are these components an integral part of a Threat Management Program, they are required to be consistent with the OSHA 02-01-058 requirements and ASIS WVPI AA-2020 Standard.
Development of a Multidisciplinary Threat Management Team
Creating an effective Threat Management Team (TMT) requires the integration of diverse expertise from various departments within the organization. This multidisciplinary approach ensures that the team can comprehensively assess, manage, and respond to potential threats. Here’s an expanded overview of the core functions and potential members of the TMT:
Core Functions
Security:
Role: The security team is responsible for the physical safety and security protocols within the organization. They provide insights into potential vulnerabilities, coordinate incident response, and implement preventive measures.
Responsibilities: Conducting threat assessments, managing security systems, and coordinating with law enforcement if necessary.
Human Resources (HR):
Role: HR plays a crucial role in managing employee relations and ensuring that workplace policies are enforced. They handle reports of concerning behavior and provide support for affected employees.
Responsibilities: Managing incident reports, facilitating conflict resolution, and providing training on workplace violence prevention.
Legal:
Role: The legal team ensures that all actions taken by the TMT comply with relevant laws and regulations. They provide guidance on legal implications and help mitigate liability risks.
Responsibilities: Reviewing policies and procedures, advising on legal compliance, and managing any legal proceedings related to threats or incidents.
Other Potential Members
Communications:
Role: The communications team handles internal and external messaging during a threat or incident. They ensure that information is disseminated accurately and efficiently.
Responsibilities: Crafting communication plans, managing media relations, and maintaining transparent communication with employees.
Union Representatives:
Role: Union representatives advocate for the rights and safety of unionized employees. They work with the TMT to ensure that measures respect union agreements and support employee welfare.
Responsibilities: Liaising with union members, ensuring compliance with union agreements, and providing input on safety policies.
Employee Assistance Program (EAP):
Role: EAP professionals offer confidential support services to employees dealing with personal or work-related issues that could impact their behavior.
Responsibilities: Providing counseling, facilitating access to support services, and assisting with employee wellness initiatives.
Facilities Management:
Role: The facilities team ensures that the physical work environment is safe and secure. They collaborate with the security team to manage access control and safety infrastructure.
Responsibilities: Overseeing building security, managing access control systems, and maintaining safety equipment.
Risk Management:
Role: The risk management team assesses potential risks and develops strategies to mitigate them. They work closely with all members of the TMT to identify and address vulnerabilities.
Responsibilities: Conducting risk assessments, developing mitigation strategies, and monitoring risk factors.
Importance of a Multidisciplinary Approach
A multidisciplinary TMT leverages the unique perspectives and expertise of each department to create a holistic threat management strategy. This collaborative approach enhances the team’s ability to:
Identify and assess threats: By integrating diverse insights, the TMT can more accurately identify and assess potential threats.
Develop comprehensive responses: A multidisciplinary team can devise well-rounded response strategies that address all aspects of an incident.
Ensure compliance and support: By involving HR, legal, and union representatives, the TMT ensures that all actions comply with regulations and support employee rights.
Enhance communication: Effective communication before, during, and after an incident is crucial. The communications team ensures that messaging is clear and consistent.
By assembling a multidisciplinary Threat Management Team, organizations can significantly enhance their ability to prevent, manage, and respond to workplace threats, ensuring a safer and more secure environment for all employees.
BTAM Governance Document
Establishing a Framework for Effective Threat Management
Creating a robust Behavioral Threat Assessment and Management (BTAM) program requires a well-defined governance document. This document serves as the foundation for your program, outlining critical aspects such as team composition, formalized processes, and implementation plans. It ensures that all team members understand their roles and responsibilities, and that the organization adheres to best practices and regulatory standards.
Key Components of a BTAM Governance Document
Team Composition:
Roles and Responsibilities: Clearly define who will be part of the Threat Management Team (TMT). This typically includes representatives from security, HR, legal, communications, and other relevant departments. Each member’s role should be explicitly stated to ensure accountability and clarity.
Expertise and Training: Detail the qualifications required for each role and outline the ongoing training programs that team members must complete to stay updated on the latest threat management practices.
Formalized Threat Management Process:
Threat Identification: Establish protocols for identifying potential threats, including the types of behaviors and indicators to watch for.
Assessment and Investigation: Describe the procedures for assessing the credibility and seriousness of threats. This should include guidelines for gathering information, conducting interviews, and using threat assessment tools.
Intervention Strategies: Provide a framework for developing and implementing intervention strategies. This might include monitoring the individual, engaging with mental health professionals, or involving law enforcement.
Documentation and Reporting: Standardize the process for documenting threats and incidents, ensuring that all relevant information is recorded and accessible for future reference.
Incident Management Process:
Immediate Response: Outline the steps to be taken when a threat is identified, including who should be notified and what immediate actions should be taken.
Crisis Management: Develop a crisis management plan that includes roles and responsibilities during an incident, communication protocols, and post-incident procedures.
Debriefing and Review: After an incident, conduct a thorough debriefing to analyze the response and identify areas for improvement. This should be documented and used to refine the BTAM program.
Implementation Plan:
Program Rollout: Provide a detailed plan for rolling out the BTAM program across the organization. This includes timelines, milestones, and responsibilities.
Training and Awareness: Develop a training program to educate employees about the BTAM program, their role in threat management, and how to report concerns.
Monitoring and Evaluation: Establish metrics and processes for monitoring the effectiveness of the BTAM program. This includes regular evaluations and updates to the governance document as needed.
Ensuring Compliance and Best Practices
A comprehensive governance document should adhere to the latest ANSI/ASIS, OSHA, and other applicable workplace violence prevention standards. By aligning with these standards, your organization can ensure legal compliance and implement best practices in threat management.
Optional Orientation Session
To support the successful implementation of your BTAM program, consider scheduling a 90-minute orientation session with our experts. During this session, we will review the governance document, provide tailored advice for your organization, and outline next steps for effective rollout and integration.
Conclusion
A well-crafted governance document is essential for the effective management of threats within an organization. It formalizes the processes, defines roles and responsibilities, and ensures compliance with industry standards. By leveraging our expertise, you can develop a comprehensive governance framework that enhances your organization's ability to prevent and manage workplace violence effectively.
Contact us today to learn more about developing a robust BTAM governance document tailored to your organization’s needs.
This enhanced section provides a detailed, informative overview of the governance document's role in a BTAM program, emphasizing the importance of clear procedures, compliance, and continuous improvement, without being overly sales-oriented.
Training
Building Competence and Cohesion in Threat Management Teams
Given the critical nature of their work, Threat Management Teams (TMTs) require both initial and ongoing training to remain effective. The complexity of assessing and managing threats demands a high level of expertise, coordination, and preparedness. Training is not only about imparting knowledge but also about building a cohesive team that can operate seamlessly under pressure.
Importance of Initial Training
Foundational Knowledge:
Core Concepts: Initial training provides TMT members with a comprehensive understanding of the principles of threat assessment and management. This includes recognizing potential threats, understanding the psychology behind threatening behavior, and learning the legal and ethical considerations involved in threat management.
Role-Specific Skills: Each team member must understand their specific role within the TMT, including the responsibilities of security personnel, HR, legal advisors, and other involved departments. This ensures that every member knows how they contribute to the overall strategy.
Team Dynamics:
Collaborative Exercises: Initial training often includes collaborative exercises that help team members develop a strong working relationship. These exercises foster trust and improve communication, which are essential for effective teamwork during actual threat situations.
Scenario-Based Training: Practical, scenario-based training allows team members to apply their knowledge in controlled environments. These exercises simulate real-world situations, helping the team practice their response strategies and identify areas for improvement.
Importance of Periodic Training
Continuous Improvement:
Ongoing Education: Threat management is a dynamic field, with new threats and strategies emerging regularly. Periodic training ensures that TMT members stay up-to-date with the latest developments and best practices. This ongoing education can include advanced courses, workshops, and seminars.
Refresher Courses: Regular refresher courses help reinforce foundational skills and knowledge, ensuring that team members retain critical information and remain prepared for any situation.
Team Cohesion:
Regular Team Training: Just as initial training focuses on building team cohesion, periodic training should reinforce these bonds. Training the team as a unit helps maintain a high level of coordination and readiness. It also provides opportunities to integrate new members smoothly into the team.
Real-Time Feedback: Periodic training sessions offer the chance to review past performance and incorporate feedback. This continuous loop of practice and evaluation helps the team refine their strategies and improve their response times.
Methods of Training
eLearning Courses:
Flexible Learning: eLearning courses provide flexibility, allowing team members to complete training at their own pace. These courses can cover a wide range of topics, from basic threat assessment principles to advanced management techniques.
Interactive Content: High-quality eLearning programs often include interactive elements such as quizzes, simulations, and case studies, which enhance learning and retention.
Live Scenario Training:
Real-World Practice: Live scenario training involves practical exercises that simulate actual threat situations. This type of training is invaluable for building hands-on experience and confidence. Participants can practice their skills in a safe, controlled environment, receiving immediate feedback from instructors.
Team Integration: Live training sessions help integrate new team members and ensure that all members are familiar with the protocols and strategies. This type of training also allows for the testing of new approaches and the fine-tuning of existing procedures.
Effective training is crucial for the success of any Threat Management Team. Both initial and periodic training are essential to ensure that team members are well-prepared, knowledgeable, and capable of working together seamlessly. By investing in comprehensive training programs, organizations can significantly enhance their ability to identify, assess, and manage threats, thereby maintaining a safe and secure workplace.
Additional Resources
To learn more about developing and training an effective Threat Management Team, consider exploring our eLearning courses and live scenario training programs. These resources provide the tools and knowledge necessary to build a competent and cohesive TMT, tailored to your organization's unique needs. Learn More About Training Programs
External Support
Enhancing Your Threat Management Team’s Effectiveness
Building a capable Threat Management Team (TMT) within your organization is a crucial step toward ensuring a safe and secure work environment. However, even the most well-rounded internal teams can benefit significantly from external support. Engaging third-party experts can provide additional expertise, perspectives, and resources that enhance your Behavioral Threat Assessment and Management (BTAM) program’s overall effectiveness. Here’s why incorporating external support is vital:
Supplementary Expertise
Specialized Knowledge: External threat assessment professionals bring specialized knowledge that may not be available within your organization. These experts have extensive experience dealing with a wide range of threats and can offer insights into best practices and innovative solutions.
Legal Expertise: Legal advisors who specialize in workplace violence and threat assessment can ensure that your BTAM program complies with all relevant laws and regulations. They can help navigate complex legal issues, mitigate liability risks, and provide guidance on the legal implications of various threat management strategies.
Objectivity and Unbiased Perspectives
Neutral Assessment: External experts provide an unbiased perspective on potential threats. Their objective assessment can identify issues that internal teams might overlook due to familiarity or internal politics. This neutral standpoint is crucial for making fair and effective decisions.
Fresh Insights: External consultants can introduce new approaches and methodologies that your internal team may not have considered. Their fresh insights can lead to more comprehensive and effective threat management strategies.
Enhanced Capabilities
Resource Augmentation: Third-party support can augment your team’s capabilities, providing additional resources during critical times. For instance, in the event of a high-stakes threat, having external experts on standby can ensure a swift and effective response.
Advanced Training: External organizations can offer advanced training programs that keep your TMT updated with the latest techniques and best practices in threat assessment and management. Continuous learning from industry leaders helps maintain high standards of readiness and competence.
Crisis Management
Expert Intervention: During a crisis, external experts can step in to provide immediate intervention and support. Their experience in handling similar situations can be invaluable in managing the incident effectively and minimizing impact.
Strategic Planning: External consultants can assist in developing and refining crisis management plans, ensuring that your organization is prepared for various scenarios. They can conduct simulations and tabletop exercises to test and improve your response strategies.
Choosing the Right External Support
While many organizations offer threat management retainer services, it is crucial to select a partner that aligns with your specific needs and standards. CPPS’ Threat Management Assessment and Training (TMAT) Retainer is renowned for its comprehensive support and expertise. Here’s what to look for when choosing external support:
Proven Track Record: Look for a provider with a history of successful threat management and positive client testimonials.
Comprehensive Services: Ensure the provider offers a range of services, including real-time threat assessment support, advanced training, and legal advisory.
Customized Solutions: The best external support will tailor their services to fit your organization’s unique requirements, ensuring the most effective support possible.
Incorporating external support into your BTAM program is not just about adding extra hands; it’s about enhancing your team’s capabilities with specialized expertise, unbiased perspectives, and advanced resources. By partnering with experienced professionals, you can ensure that your organization is better equipped to prevent, assess, and manage threats effectively, safeguarding your employees and maintaining a secure workplace environment.
For more information on how to enhance your Threat Management Team with external support, explore our TMAT Retainer services and see how we can help your organization achieve its security goals.
Threat Management Team Models
There are three models by which most Threat Management Teams are formed: centralized, satellite, and regional.
Centralized Model
Consists of a single team located at the organizational HQ.
A centralized model for Threat Management Teams involves consolidating all threat assessment and management functions into a single, specialized team based at the organization's headquarters. This approach ensures a consistent and unified strategy for handling threats, as the central team can establish standardized procedures, streamline communication, and leverage their expertise across the entire organization. By centralizing these functions, the organization benefits from a dedicated group of professionals who can maintain a high level of readiness, respond swiftly to emerging threats, and ensure that best practices and compliance standards are uniformly applied throughout all branches and locations. This model also facilitates the efficient allocation of resources and enhances coordination, allowing the team to effectively manage and mitigate risks.
Satellite Model
One team centrally located at the HQ with additional satellite teams that are smaller and subordinate to the corporate team.
The satellite model features a primary Threat Management Team (TMT) based at the organizational headquarters, complemented by smaller, subordinate satellite teams dispersed across various regional or branch locations. This structure allows the central team to maintain strategic oversight and consistency in threat management protocols, while the satellite teams provide localized support and rapid response capabilities. These satellite teams are essential for addressing region-specific threats and ensuring immediate action, leveraging their intimate knowledge of local environments and conditions. The centralized HQ team coordinates the overall strategy, conducts high-level threat assessments, and supports satellite teams with specialized expertise and resources, thereby fostering a cohesive and comprehensive approach to threat management across the entire organization. This model balances the benefits of centralized control with the agility and responsiveness of localized teams, enhancing the organization’s ability to mitigate risks effectively.
Regional Model
Decentralized teams that work independently or in coordination with each other. An oversight team may be present but doesn’t need to be.
The regional model features decentralized Threat Management Teams (TMTs) that operate independently across various geographical regions or business units, with the flexibility to coordinate with each other when necessary. Each regional team is empowered to assess and respond to threats specific to their locale, utilizing their in-depth understanding of local risks and cultural nuances. This model allows for a highly responsive and adaptable threat management approach, as regional teams can act swiftly and autonomously without waiting for central directives. While an oversight team at the headquarters may exist to provide strategic guidance and ensure alignment with organizational policies, it is not a mandatory component, allowing each regional team to tailor its operations to best meet local needs. This decentralized structure promotes agility, fosters specialized regional expertise, and enhances the organization’s overall resilience by distributing the threat management workload across multiple teams.
Learn more from a Certified Threat Manager
The following videos feature CPPS Principal Advisor of Global Operations and Threat Mitigation, Dave Benson, CTM, an accomplished security professional with over 40 years of Public and Private Sector expertise in the areas of Security Management, Protective Operations, Contingency Planning and Vulnerability/Risk Assessment & Mitigation. Dave oversees CPPS' Behavioral Threat Assessment and Management training program, as well as the company's real-time threat assessment advisory service.
Introducing the Behavioral Threat Management & Assessment (BTAM) Service
Everything you need for a comprehensive Threat Management Program
The BTAM Service includes:
Annual license for 10 people to our NEW Threat Management Team eLearning Program
Threat Management Advisory Retainer
Have our Certified Threat Manager available to you 24/7
Unlimited use
4-hours with our Certified Threat Manager for live scenario training for your Threat Management Team
Kick-off call to get your comprehensive program started off on the right path
Hear From Our Clients
See how our solutions have transformed security strategies for organizations like yours.
"The CPPS BTAM package has been a game-changer for our security team. The training and support are unparalleled."
"With CPPS’s help, we’ve significantly improved our threat management capabilities."