How to Identify Those Who Pose a Threat from Those Who Make a Threat
Threat assessors must balance the opposite errors of underestimating a potentially serious risk with overreacting to the many concerns brought forward that ultimately don't pose a risk or require a full-press security response.
Highlights
In this on-demand webinar with WAVR-21, you'll learn how to distinguish those who pose a threat from those who make a threat, including why it’s important to:
![](https://ontic.co/wp-content/uploads/2023/10/NB-2023-Icons-dots-and-lines_outline_02.png)
Gather Pertinent Information
Potential data sources are invaluable to understanding threats as well as the person
![](https://ontic.co/wp-content/uploads/2023/08/Glyph-1_EPThreatChecklist.png)
Understand Credible Threats
Threat assessment teams have to be aware of why someone would — and would not — carry out their threat
![](https://ontic.co/wp-content/uploads/2023/10/NB-2023-Icons-pencil.png)
Plan Ahead for Intervention
Teams must decide on collection technique, conflict resolution, and monitoring strategies
Earn ASIS continuing professional education credits by watching this webinar.
Speakers
![](https://ontic.co/wp-content/uploads/2020/10/1.png)
Luke Quanstrom
CEO of Ontic![](https://ontic.co/wp-content/uploads/2020/10/2.png)
Dr. Stephen White
Co-developer of WAVR-21Earn ASIS continuing professional education credits by watching this webinar.