Security Consultant Shares Extensive Knowledge about Active Shooters at ASIS 2013

Security Consultant Shares Extensive Knowledge about Active Shooters at ASIS 2013

Security Consultant Shares Extensive Knowledge about Active Shooters at ASIS 2013Patrick V. Fiel, Sr., currently serving as a security consultant, brings more than 35 years of security and law enforcement experience to ASIS 2013. Tap into his extensive knowledge as he relies on his background knowledge from his time in the U.S. Army, as executive director of school security for the Washington, D.C. public school system, and as public safety advisor for ADT Security Services to educate you about active shooters.

Presentation Title:  Before, During and After the Active Shooter Event-Are You Prepared?

Session # 4306,   Thursday, September 26, 2013    Time: 3:30pm – 4:30pm

Patrick V. Fiel (Security Consultant)

Dr. Steve Albrecht (Security Consultant)

Summary:

The experts will discuss threat assessments, the shooter's behavior, innovative security solutions and preparedness, aimed at mitigating this risk.

Abstract:

The experts will present current information that will help organizations prepare for a potential crisis situation involving an active shooter.  The experts will speak on risk assessments of facilities, innovative security technologies, shooter behavior, and threat assessment teams.  The presentation will present ideas and solutions that will help organizations mitigate the risk of an active shooter event.  The ideas presented will address what an organization can do to prevent such an event from occurring as well as what steps can be taken during and after a crisis situation. 

What will the attendees learn from the program?

1. Ways to prevent a crisis situation from occurring: Attendees will learn how a risk assessment can identify potential short falls in their organization's security as well as what innovative security technologies and other solutions are available to address these short falls.

2. Ways to deal with an active shooter prior to police arrival: Attendees will learn steps that can be taken to handle an active shooter situation as it is occurring and prior to police arrival.

3. How to create and staff a Threat Assessment Team (TAT): Attendees will learn about active shooter behavior and Threat Assessment Teams.  Learning objectives will include TAT response protocols, getting additional outside help, the difference between “hunters” and howlers”, “The Safe Room” concept, and workplace violence prevention concepts.

Featured

  • Making the Grade with Locks and Door Hardware

    Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations. Read Now

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3