top of page



Threat Assessments Near Kapolei, HI: Building Safer Schools and Stronger Communities
Threat Assessments Near Kapolei, HI: Building Safer Schools and Stronger Communities


The Redhook Resilience Project: A Case Study in Ballistic Preparedness and Design Collaboration
The Redhook Resilience Project: A Case Study in Ballistic Preparedness and Design Collaboration


What Is an Example of a Threat Assessment?
According to the U.S. Secret Service NTAC, over 90% of targeted violence cases reviewed from 2016–2022 involved people who had previously shown observable warning behaviors — often noticed but not documented.


Who Conducts a Threat Assessment?
When potential violence or concerning behavior surfaces — in a school, corporate office, or community setting — the question arises: “Who actually handles a threat assessment?”
The answer isn’t one person. It’s a multidisciplinary team — professionals trained to recognize behavioral indicators, assess risk, and intervene before violence occurs.


Hawaiʻi Targeted Violence Prevention: How CrisisWire Strengthens the State’s Mission
Hawaiʻi’s Office of Homeland Security leads statewide targeted violence prevention (TVP). CrisisWire explains how private consulting integrates with state efforts, using federal standards, academic research, and leadership liability frameworks.


Cyber-Physical Security in Hawaiʻi: Where Access Control Meets Cyber Risk
Cyber-physical threats are rising in Hawaiʻi. Learn how hackers exploit badge systems, visitor logs, and building access points — and how to defend against them.


CrisisWire: America’s Trusted Resource for Threat Assessment Books, Training & Intelligence
In today’s environment of rapidly evolving risks, organizations across every sector—schools, businesses, hospitals, and government agencies—need more than reactive security. They need proven threat assessment strategies backed by credible expertise. That’s where CrisisWire leads the wa


Why ASIS’s New Executive Protection Standard Changes the Game for Leaders
ASIS’s new Executive Protection Standard redefines how CEOs and boards must safeguard leaders, families, and assets. Here’s what it means for your organization.


Autonomous Threat Hunting: How AI Is Changing Corporate Security
AI-driven autonomous threat hunting is reshaping corporate security. But is it a breakthrough — or just another illusion of safety for executives?


Do Armed Guards Prevent School Shootings
Do armed guards actually prevent school shootings? We examine the evidence, case studies, and what school leaders must consider in 2025.


Campus Under Siege: Why Universities Are Still Soft Targets — And How to Fix Them
Universities are soft targets for active shooters, hazing, and mass notification failures. Campus Under Siege reveals why — and how leaders can fix it.


Locked Down: Why Access Control Is the Missing Piece of Campus and Corporate Security
Access control failures are fueling school and workplace tragedies. Locked Down reveals why every unlocked door is a risk — and how leaders can fix it.


Emergency Preparedness for Hospitals: Beyond IT Continuity
Hospital emergency preparedness must go beyond IT backups. Learn how to build resilience across power, staffing, and life-saving systems in 2025.


Ransomware in Healthcare: How Lives Depend on Cybersecurity
Ransomware is no longer just about data — in hospitals, it can shut down life-saving equipment. Here’s why cybersecurity is now a matter of life and death.


Threat Assessment 2025: How Schools, Businesses, and Institutions Separate Real vs. Fake Threats
Threat assessment in 2025 is more urgent than ever. Learn how schools, businesses, and leaders separate real vs. fake threats using proven models.


Medical Device Vulnerabilities: When Cyberattacks Turn Physical
Medical device cybersecurity failures can become life-threatening. Learn why hospitals remain vulnerable to cyber-physical attacks and how leaders can protect patients, staff, and reputations.


Why Threat Assessments and Business Continuity Planning Are No Longer Optional
Every unlocked door is an invitation. Every overlooked risk is a liability.
In today’s world, schools, businesses, and government institutions face a wide spectrum of threats — from active shooters and workplace violence to cyberattacks, insider threats, and natural disasters.


What is the CSTAG Model and How Do Schools Use It?
Schools face the difficult challenge of separating empty threats from credible ones. A casual comment might be brushed off, but what if it’s a warning sign? That’s where the Comprehensive School Threat Assessment Guidelines (CSTAG) come in.


How Do Schools Identify Potential Threats
Identifying a potential threat means recognizing behaviors, communications, or circumstances that suggest a student could harm themselves or others. These are not always direct threats—sometimes they appear as “leakage” (clues in behavior, writing, or social media) or patterns of concerning conduct.


What are the Steps in a School Threat Assessment
A school threat assessment is only as effective as the process behind it. Without a clear, step-by-step structure, schools risk overlooking warning signs or responding inconsistently. To protect students and staff, the assessment process must be both systematic and evidence-based.
email us
bottom of page