Threat Management Team Training
Online Course
Threat Management Team Training Course
Overview
Become an effective member of your Threat Management Team!
Members of a Threat Management Team (TMT) require the most training regarding behavioral and psychological aspects of violence.
This course ensures that TMT members receive formal training as a team and equips them with the skills needed to be an effective stakeholder performing Behavioral Threat Assessment and Management (BTAM).
While individuals may complete and benefit from this course, it’s designed to be completed by all members of a TMT.
Presenter
Dave Benson, MS, CTM
40+ years of combined public and private sector experience as a Threat Management expert.
What’s Included
Objectives
Modules
Check out the list below to learn about the individual modules presented in this course!
1. Course Introduction and WVPI Fundamentals (:28)
This module introduces foundational concepts in violence prevention, including establishing TMTs based on OSHA and ASIS standards, understanding the typologies of violence, and recognizing behaviors of concern before they escalate. The module teaches participants to identify warning signs, triggering events, and appropriate reporting protocols while emphasizing the prevention formula “Awareness + Action = Prevention.” Special attention is given to intimate partner violence and stalking impacts on workplace safety, and promoting a proactive, multidisciplinary approach.
2. A Model for Assessing Violence (:21)
This module introduces foundational concepts in violence prevention, including establishing TMTs based on OSHA and ASIS standards, understanding the typologies of violence, and recognizing behaviors of concern before they escalate. The module teaches participants to identify warning signs, triggering events, and appropriate reporting protocols while emphasizing the prevention formula “Awareness + Action = Prevention.” Special attention is given to intimate partner violence and stalking impacts on workplace safety, and promoting a proactive, multidisciplinary approach.
3. Threat Management (:26)
This module focuses on establishing and operationalizing Threat Management Teams, outlining the complete process from initial incident notification through data gathering, risk screening, threat team actions, risk management strategies, and safe resolution of threats. The module details team composition, their primary mission, and the practical steps for implementing a comprehensive program including policies, procedures, reporting mechanisms, training requirements, and communication protocols.
4. BTAM Core Concepts (:21)
This module introduces foundational concepts in violence prevention, including establishing TMTs based on OSHA and ASIS standards, understanding the typologies of violence, and recognizing behaviors of concern before they escalate. The module teaches participants to identify warning signs, triggering events, and appropriate reporting protocols while emphasizing the prevention formula “Awareness + Action = Prevention.” Special attention is given to intimate partner violence and stalking impacts on workplace safety, and promoting a proactive, multidisciplinary approach.
5. Information Gathering (:18)
Module Five focuses on Information Gathering in BTAM, emphasizing the importance of collecting relevant data from multiple sources to evaluate potential threats accurately. It outlines best practices for structured interviews, intelligence analysis, and verifying credibility to ensure informed decision-making in threat management.
6. Incident Management (:43)
This module introduces foundational concepts in violence prevention, including establishing TMTs based on OSHA and ASIS standards, understanding the typologies of violence, and recognizing behaviors of concern before they escalate. The module teaches participants to identify warning signs, triggering events, and appropriate reporting protocols while emphasizing the prevention formula “Awareness + Action = Prevention.” Special attention is given to intimate partner violence and stalking impacts on workplace safety, and promoting a proactive, multidisciplinary approach.
7. Interviewing Strategies (:21)
This module outlines techniques for structured interviews with victims, collateral sources, and instigators, emphasizing rapport-building, cognitive interviewing, and careful questioning to gather critical threat assessment information. It stresses interview location, timing, and security considerations to minimize risk while obtaining accurate intelligence.
8. Key Indicators of Higher Risk for Violence (:21)
Module eight highlights behavioral patterns, environmental influences, and situational triggers that indicate a higher risk of violence, focusing on the progression toward violence and motivational drivers. It provides an assessment formula combining personality traits, past behaviors, and environmental stressors to guide Threat Management Teams.
9. Intimate Partner Violence for Threat Assessors (:41)
This module examines Intimate Partner Violence (IPV), detailing key risk factors, workplace implications, and intervention strategies to support victims and assess potential threats. It underscores the connection between IPV and workplace violence, offering guidance on protection orders, law enforcement involvement, and corporate policies.
10. Safe Terminations (:18)
This module presents structured termination procedures to ensure a safe, professional separation of employment, detailing steps for preparation, meeting execution, and post-termination measures. It stresses legal considerations, secure employee exits, and outplacement services to mitigate risks while maintaining workplace safety.