PSA Perspective Blog | Contact Us | (800) 677-7887 |

Survive an Active Shooting

In an active shooter incident, every second and every decision has critical implications. Proper training can make all the difference in helping you and your employees make good decisions under immensely stressful conditions to save lives.

Join us to learn from law enforcement and certified Homeland Security professionals, Terry Choate and Joe Hileman, both with extensive experience in active shooting incidents. They will share highly effective strategies and the proper mindset you’ll need to help maximize your chances to survive an active shooter incident.

LEARNING OUTCOMES

  1. Key factors to significantly enhance your organizational security
  2. Awareness, avoidance, and visualization skills
  3. How to proactively recognize signs of violence
  4. An understanding of your adversary’s mindset to create opportunities to survive
  5. De-escalation techniques

DATE
Tuesday, September 26, 2017

TIME
8:30 – 9:00 a.m. Registration & Breakfast
9:00 – 11:15 a.m. Seminar

LOCATION
PSA Learning Center
11311 McCormick Rd, 5th floor
Hunt Valley, MD 21031

AUDIENCE
C-Level Executives, HR Professionals &
Risk Managers

QUESTIONS:
Contact Emilia Barnes at ebarnes@psafinancial.com.

At many of the PSA Insurance and Financial Services’ (“PSA”) partnership seminars and events, we and our guest speakers photograph and record the events and attendees for use in future marketing and other materials.  Accordingly, by registering for and/or attending PSA partnership seminars and events, you hereby authorize PSA and any speaker at such events, and their respective affiliates, successors, and assigns (each an “Authorized Person”), to photograph and record your name, likeness, image, voice and other features on film, tape, or otherwise (a “recording”), edit such recording as such Authorized Person may desire, and incorporate such recording into print, videos, films, and other printed and electronic media, and all related materials thereof, including, without limitation, promotion and advertising materials (each a “bi-product”).  It is understood and agreed that each Authorized Person shall retain final editorial, artistic and technical control of the bi-product and the content thereof.  Each Authorized Person may use the bi-products, any portions thereof and the recordings in all markets, manner, formats and media, whether now known or hereafter developed, through the world, in perpetuity.  Each Authorized person shall own all right, title and interest, including the copyright, in and to its bi-product and related materials, to be used and disposed of, without limitation, as such Authorized Person may determine in its sole and absolute discretion.

Areas of About

Recent Blog Posts

Aug
10th
Game of Stones: Examining the Foundational Elements of Effective Negotiation

According to Mark Jankowski, founder of Amplified Learning, effective negotiation requires three things: attitude, tools, and skills. “You can have any one, or even two of those things, but if you don’t put them all together, you won’t be effective,” he said at a recent PSA Partnership Event, “Game of Stones.” Where did he first […]

Aug
3rd
Don’t let interview bias and other missteps lead to a bad hire

When you are recruiting for an open position at your company, you want to hire someone who will succeed in the role. But that’s not always what actually happens. Often, interviewers are drawn to the people they relate to or simply like the most, rather than the candidates who are the most qualified. While that […]

Jul
27th
HIPAA and the Cloud (Benefit Minute)

Cloud computing allows convenient on-demand network access to a shared pool of computing resources (such as networks, servers, storage and applications) that can be rapidly supplied and used with minimal management effort or service provider interaction.   The computing resources are pooled to serve multiple customers and can be scaled to meet changes in demand. 

Jul
20th
A Snapshot of Today’s Most Prevalent Cyber Threats for the Non-Technical Executive, Part 2

In a recent blog post, we shared two prevalent cyber risks that your organization should be aware of — phishing and malware. Of course, those aren’t the only two threats you face when using technology or handling electronic data. This blog post provides an overview of two additional cyber threats to help you build a […]