Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

No cookies to display.

Download the Paper: Crisis STOP®

When something dramatic occurs, whether a traditional exposure to your organization such as fire or flood, or…

Continue reading »

Download the Paper: Cyber Crisis 2017 – The Heavyweights Weigh In

Every business faces escalating cyber risk. A cyber breach is a business crisis, not an IT crisis….

Continue reading »

Download the Brief: Time is Not on Your Side

Implementing a PREDICT.PLAN.PERFORM.® methodology to your crisis management efforts will help build a solid, reliable plan in…

Continue reading »

Download the Brief: Behavioral Risk Threat Assessment – How do you stop bullying, suicide and guns before it’s too late?

Jim Satterfield, Firestorm CEO/President and Co-Founder, presented a webinar focusing on BERTHA – Behavioral Risk Threat Assessment….

Continue reading »

Download the Post-Session Paper: Livestreaming, Sexting, Cyberstalking and Cyberbullying

On February 2, Firestorm Senior Leadership and national partners joined together to present a groundbreaking, two-hour interactive…

Continue reading »

Download the Paper: Bioterrorism, Fake News and Alternative Facts by Steve Crimando

Steve Crimando, is an internationally known consultant and educator specializing in the application of the behavioral sciences…

Continue reading »

Behavioral Risk Threat Assessment (BeRThA®) License Agreement

Signing up your entire district or school system? Contact The Firestorm Bertha Team at berthateam@firestorm.com or call…

Continue reading »

Download EAF EBook: Disaster Ready People for a Disaster Ready America

The Book

Firestorm founders Harry Rhulen, Suzy Loughlin and Jim Satterfield wrote Disaster Ready People for a Disaster Ready…

Continue reading »

Download the Brief: Benchmarking Preparedness – How do we know if we’re ready?

Based upon a webinar presentation by Jim Sattefield, Firestorm CEO/President and Co-Founder, this brief addresses steps to…

Continue reading »

Download the Brief Everyone’s Doing It – The Evolution of Monitoring and Intelligence

Firestorm founded its predictive intelligence practice more than five years ago, and much has changed. There are…

Continue reading »