top of page
Ivy Tech logo

Resources

That password is incorrect. Please try again.

BIT/CARE Webinar Series

2nd Wednesday of the month, 10:00-11:30 CT/11:00-12:30 ET

Join the Zoom

We will offer 8 monthly webinars for the Ivy Tech Community College System in a flexible, interactive format to discuss various core topics for newer teams and reinforce core concepts for more seasoned teams. These sessions will be offered live, with recordings posted here each month.

March 12: Reducing Legal Risk and Ensuring Proper Interventions using a Triage Risk Rubric

The Evolving Nature of Threat and Violence Risk Assessment in College Counseling Centers
NaBITA Risk Rubric Tri-Fold

BIT/CARE Framework

Join the Zoom

12:00-1:30 CT/1:00-2:30 ET

April 4, April 11, April 18, April 25, May 16, May 30

Take the Survey

Team Development

BIT Team Standards
CARE Audit Tool
elephant.png
BIT/CARE Team Development Checklist
Marketing Your BIT/CARE Team: Building a Team Website
BIT/CARE Team Guide Template
Marketing Your BIT/CARE Team: The Concern Form
Building the Team - Conduct
Marketing Your Team
Documentation and Case Notes
The CASE Process

Threat Assessment Basics

11 Key Questions to be Addressed in a Behavioral Threat Assessment
Social Media Basics
An Exploration of the Risk, Protective, and Mobilization Factors Related to Violent Extremism in College Populations
The Evolving Nature of Threat and Violence Risk Assessment in College Counseling Centers
Behavioral Threat Assessment Units
Threat Assessment Glossary
Beyond the Red Flags
Types of Threat

Intake and Interviewing

Advanced Interview Skills
How Trauma Impacts the Brain
Bias Mitigation
Impression Management
Emotional Intelligence
Safety in the Title IX Environment
Establishing Rapport
Trauma Reactions

Interventions

Adverse Childhood Experiences
Bystander Empowerment
Helping Student Veterans
Adverse Childhood Experiences Questionnaire
Common Challenges for Minorites Accessing Mental Health Treatment
Referral Checklist and Service Audit
Boston University's Leave of Absence Guide
Creating Intervention Plans
Working with Resistant and Difficult Students

Our Team

Chris Taylor, PhD

Chris Taylor, PhD

InterACTT

Amy Murphy, PhD

Amy Murphy, PhD

Angelo State University

Bethany Smith

Bethany Smith

Director of Safety

Brian Van Brunt, EdD

Brian Van Brunt, EdD

Director of Behavior & Threat Management

AWARE TEAM TRAINING SURVEY

DPrep Safety has been contracted to provide training for Ivy Tech's Aware Teams. We are committed to making all of our training relevant to the work you do and tailored to the needs of your institution. To that end, we ask that you complete this short survey to allow us to take your needs into consideration while building the program.

A checklist on a chalkboard
A diverse team working together
A group of people putting large puzzle pieces together
Two people working together across a desk
A diverse team working together

Consider the following areas below and rate them based on how important the subject is to cover.

1 = Not needed, 2 = Somewhat needed, 3 = Useful if time allows, 4 = Very needed, 5 = Critical area

Your Role:

Team Foundations

Marketing the team
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Documentation best practices: dos and don’ts
Not neededSomewhat neededUseful if time allowsVery neededCritical area
How threat assessment fits into a BIT/CARE model on a college campus
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Using triage tools and assessments consistently at each meeting
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Information sharing within the BIT (FERPA, HIPAA, and state confidentiality laws)
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Sharing information outside the team with faculty and staff
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Setting up a successful, effective, and efficacious team process for meetings
Not neededSomewhat neededUseful if time allowsVery neededCritical area

Advanced/Practical Team Concepts

End-of-semester and end-of-year reports
Not neededSomewhat neededUseful if time allowsVery neededCritical area
When (and how) to close a case
Not neededSomewhat neededUseful if time allowsVery neededCritical area
The risks and benefits of enlisting parents or guardians
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Common legal pitfalls for a team
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Successful interventions for students who are non-compliant with BIT requests
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Mandated assessment and treatment
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Addressing student alcohol and drug use via the BIT/CARE
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Bias and how it impacts our decision-making on assessments and interventions
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Office safety and the involvement of law enforcement during the interview
Not neededSomewhat neededUseful if time allowsVery neededCritical area

BIT/CARE Working with Campus Departments

Case management and the BIT/CARE model
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Managing chronic behaviors related to mental illness
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Addressing faculty, staff, and students who feel threatened
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Understanding student conduct and BIT intersections
Not neededSomewhat neededUseful if time allowsVery neededCritical area
The role (and limitations) of clinical counselors on the BIT
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Intersectionality between BIT and Title IX processes
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Best practices in conducting a welfare check with law enforcement
Not neededSomewhat neededUseful if time allowsVery neededCritical area
How to talk to faculty about the difference between feeling threatened vs. being threatened
Not neededSomewhat neededUseful if time allowsVery neededCritical area

Violence Risk and Threat Assessment

The difference between substantive and transient threats
Not neededSomewhat neededUseful if time allowsVery neededCritical area
A review of targeted/mission-oriented vs. instrumental/affective violence
Not neededSomewhat neededUseful if time allowsVery neededCritical area
The difference between mandated assessment and mandated treatment
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Violence risk assessment and foundational concepts of threats
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Violence risk assessment with a focus on social media and written content
Not neededSomewhat neededUseful if time allowsVery neededCritical area
The difference between a psychological assessment and violence risk/threat assessment
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Using a checklist to guide information gathering and decision-making
Not neededSomewhat neededUseful if time allowsVery neededCritical area
A review of protective, anchor, and stabilizing factors
Not neededSomewhat neededUseful if time allowsVery neededCritical area
A guided path on how to become more knowledgeable in violence risk and threat assessment (courses, books, articles, and materials)
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Building a threat mitigation plan after the violence risk assessment is completed
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Working with third-party agencies like fusion centers, FBI, ATF, DHS, and local police
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Common forms of implicit bias that impact information gathering and risk assignment
Not neededSomewhat neededUseful if time allowsVery neededCritical area
bottom of page