Lessons Businesses Must Learn from the Nashville Bombing

The sound of gunfire punctuated the peaceful hush of Christmas morning. According to one witness, “It sounded like an automatic weapon.” About 10 minutes later she heard a second round of gunfire, then a third. When police arrived at the scene a little after 5:30am they found an RV parked in front of a nondescript building in downtown Nashville. A message repeated from a loudspeaker warning of an explosion. The aftermath of that explosion brought communications down in six states, disrupted the entire economy of the greater Nashville region, and shut down most of downtown Nashville. Thankfully, there were no serious injuries — the attack designed to minimize human loss, it seems. 

If inflicting mass casualties wasn’t the goal of the bombing suspect, what was? “The target, it appears, was infrastructure… specifically a large AT&T Data Center in downtown,” according to Nashville’s Mayor John Cooper. The explosion affected communications in 6 states, causing disruptions to 911 systems as far away as Knoxville, and even interfered with aviation.

How to Protect Your Business from Threats

“You don’t need an enormous neon sign that says ‘data center’ for people to know what’s going on…”

Steve Goins, Managing Director Chesley Brown Nashville

So what lessons can businesses learn from the Nashville bombing? Because of our direct proximity to the affected area in Nashville, Chesley Brown has been actively responding along with local, state and federal law enforcement to provide assistance. “The big takeaway here is that you don’t need an enormous neon sign that says ‘data center’ for people to know what’s going on there” says Steve Goins, Chesley Brown’s Managing Director of Nashville. “We have intentionally remained quiet to ensure we are meeting the needs of our clients and staff during this time. Our field staff have played a vital role by helping our clients gain access to the affected location, working directly with law enforcement to ensure an active crime scene is maintained, and helping maintenance staff close up and secure the building while the investigation is ongoing.” 

Due to the sheer volume of questions we’ve been asked in the wake of the Nashville bombing, I thought it would be helpful to share some strategies that organizations can use to gain a better understanding of which assets may be at risk in this new risk landscape. 

Resources:

  1. Ensuring the Prosperity of your Business: Threat Assessments
  2. The Anatomy of a Crisis Management Plan
  3. Business Impact Analysis: 4 things to know
  4. 5 Tips for Creating Better Crisis Management Plans
  5. 10 Steps for Building a Crisis Communication Strategy
  6. Budgeting for Risk
  7. 10 Steps for Developing an Emergency Response Plan

“The fact is, everyone in an organization has a role to play in security,” according to Director Goins. “Besides boots on the ground and technology like cameras, companies and their staff need regular training as part of the organization’s broader risk management strategy. Things like best practices, remaining vigilant, and safety training can really help mitigate a disaster. I think that’s one of the big lessons the Nashville bombing can teach.”

Conclusion

You can’t fully eliminate risk from your organization. Although preparing for risk is a complicated and time-consuming process, it can literally save lives. When disaster does strike, it pays to have a partner who can help you make sense of the chaos and chart a clear path forward. 4 out of 5 businesses without a crisis management plan close forever within a year of a serious disruption. That’s why, for over 30 years, Chesley Brown has dedicated ourselves to helping organizations anticipate and navigate risk before it becomes a crisis. If you have serious questions about your security, our experts are always here to help. 

Sign up!

For industry-leading guides and analysis sign up for our blog below.

  • This field is for validation purposes and should be left unchanged.

Latest News

risk management

Fighting Terrorism with Strong Private Sector Relationships

By Chesley Brown | October 14, 2018

Fighting Terrorism with Strong Private Sector Relationships From Chesley Brown International Risk Management [dpArticleShare] “Threat mitigation is a team effort; it’s this relationship and collaboration which is critical to the counterterrorism fight.” We face the…

Read More
face recognition, automatic face recognition biometric identification; biometric authentication; identity verification

Facial Recognition: the First Catch

By Chesley Brown | September 11, 2018

Facial Recognition Makes its Grand Entry The new technology, deployed in airports across the country, makes its first catch. From Chesley Brown International Risk Management [dpArticleShare] On its third day of testing, facial recognition technology…

Read More
hands on a keyboard as if hacking into something

Are Employees an Unintentional Security Risk for Cyber Attacks?

By Chesley Brown | August 20, 2018

Are Your Employees an Unintentional Security Risk for Cyber Attacks? In these times when malware is prevalent and easily disguised as email attachments or seemingly innocent software updates, one of the questions that arises is:…

Read More

DHS and Canada Team up for First Responders

By Chesley Brown | July 27, 2018

DHS and Canada Team Up to Develop Resources for First Responders From Chesley Brown International Risk Management [dpArticleShare] Artificial Intelligence Meets Boots on the Ground to Improve Patient Outcomes The United States and Canada have…

Read More
preventing economic espionage, trade secret theft and intellectual property theft

Supreme Court Decision Regarding the Privacy of Digital Data

By Chesley Brown | July 2, 2018

Supreme Court Decision Personal Rights and the Expectation of Privacy in the Digital Age From Chesley Brown International Risk Management [dpArticleShare] In Major Privacy Case, Court Rules Law Enforcement Must Obtain Warrant To Track Cellphone…

Read More
The 7 Step Guide for Building Business Continuity Plans that Work