Our resource library is broken up by topic and is kept up to date. If you have questions about any of the resources and how use them, please reach out to the team. The team can also assist organizations with resource utilization such as with the development of an Emergency Operations Plan or with conducting an After Action Review.
Security of Crowded Places
- CISA: Mitigating Attacks on Houses of Worship Security Guide
- CISA: The Power of Hello Guide For Houses of Worship
- CISA: The De-Escalation Series
- After Action Reports from the Texas AstroWorld Tragedy
- DHS: Protecting Houses of Worship
- DHS: Options for consideration Active Shooter Preparedness Video
- Sandy Hook Promise: Video
- Center for Personal Protection and Safety: Beyond Lockdown
Arson
Mail and Package and Bag Checks
- USPS: Guidance on Suspicious Mail or Packages USPS
- USPS: Mail Center Security Quick Reference Guide USPS
- US Navy: Suspicious Packages Guidance from the US Navy
Vehicle Ramming
- DHS / CISA: Vehicle Ramming Security Awareness for Soft Targets and Crowded Places
- NCTC: Vehicle-Borne Attacks: Tactics and Mitigation (First Responders Toolbox)
- CISA: Vehicle Ramming Attack Mitigation Video
- FBI: Vehicle Rental Ramming Video
- FBI: Vehicle Rentals and Vehicle Ramming
- UK: Countering Vehicle as a Weapon: Best Practice Guidance for Goods Vehicle Operators and Drivers
- UK: Hostile Vehicle Mitigation (HVM)
- Australia: Hostile Vehicle Guidelines for Crowded Places
Bombing Prevention
- DHS: What To Do: Bomb Threat
- DHS / CISA: Counter-IED Training Video Series
- DHS / CISA: Bomb-Making Materials Awareness Program
Acid Attack
First Aid and Stop the Bleed
Exercises
- DHS: School Safety and Security
- CISA: K-12 School Security Guide Suite
- CISA: Protecting Our Future – Partnering to Safeguard K-12 Organizations from Cybersecurity Threats Toolkit
- U.S. Secret Service: Averting Targeted School Violence
- FBI: In The Aftermath
- Everytown Research: Keeping Our Schools Safe
General
- CISA: ACSC Releases Small Business Cybersecurity Guide
- CISA: Cyber Guidance for Small Business
- CISA: Cyber Essential Toolkits
- CISA: Avoiding Social Engineering and Phishing Attacks
- CISA: NCSC-NZ Releases Cyber Governance Resource for Leaders
- UK: Cyber Security Toolkit for Boards
- CISA: Technical Approaches to Uncovering and Remediating Malicious Activity
- FBI: Protected Voices
- FTC: Scams and Your Small Business: A Guide for Business
- FTC: Cybersecurity Resources for Non-Profits
- FTC: Cybersecurity for Small Business
- SBA: Small Business Cybersecurity
- UK NCSC: Internet Edge Device Security
- AVAST: Guide for Creating A Cyber Security Policy for your Business
- Australian Cyber Security Center: The Essential Eight: Strategies to Mitigate Cyber Security Incidents
- Center for Internet Security: Controls Telework and Small Office Network Security Guide
- Global Cyber Alliance: Cybersecurity Toolkit
- Top 10 IT Security Actions to Protect Internet Connected Networks and Information
- DHS: Insider Threat – Cyber
Ransomware
- DHS Epidemic/Pandemic Resources
- Johns Hopkins Center for Health Security: Pandemic Risk Communications Exercise Scenario
- READY.GOV: Ready Publications
- READY.GOV: General Preparedness Resources
- READY.GOV: Business Continuity Planning Suite
- READY.GOV: Prepare Yourself for Hurricanes
- READY.GOV: Flood Safety Tips
- READY.GOV: Prepare for Tornadoes
- READY.GOV: Prepare for Extreme Heat
- READY.GOV: Prepare for All Kinds of Emergencies
- READY.GOV: Earthquake Preparedness
- EPA: Supporting Healthy Houses of Worship
- World Health Organization: OpenWHO
- National Oceanic and Atmospheric Administration: HEAT.GOV
General
- DHS: Prevention Resource Finder
- DHS: CISA Services Catalogue
- DHS: Indicators Infographic
- DHS: Hometown Security
- DHS: Employee Vigilance – Power of Hello for Houses of Worship
- DHS / CISA: Physical Security Performance Goals for Faith-Based Communities
- DHS / CISA: Mitigating Attacks on Houses of Worship Security Guide
- DHS / CISA: The De-Escalation Series
- DHS: Vehicle Ramming Attack Mitigation
- DHS: Vehicle Ramming Self-Assessment Tool
- DHS: Active Shooter Emergency Action Plan Guide and Template
- DHS: Nationwide Suspicious Activity Reporting (SAR) Initiative
- CISA: The Infrastructure Dependency Primer To Strengthen Community Resilience
- CISA: Securing Public Gatherings
- DNI: First Responder Toolbox
- NCTC: Threats Against Houses of Worship Highlight the Importance of Religious Community Outreach
- FEMA: Strategic and Operational Planning
- FEMA: Guide for Developing High Quality Emergency Operations Plans for Houses of Worship
- FEMA: Resources, Partners, and Tips to Help Keep Your House of Worship, Office, or Community Center Safe
- FEMA: Preparedness Training for Community-Based Organizations
- FEMA: Religious and Cultural Literacy and Competency in Disaster
- FEMA: Improving Preparedness and Resilience through Public-Private Partnerships
- FEMA: Preparedness Training for Community Based Organizations
- FEMA: Introduction to Public-Private Partnerships
- Ready NOVA: Developing Your Family Preparedness Plan
- Ready NOVA: Developing Your Faith Organization Preparedness Plan
- CAIR: Best Practices for Mosque and Community Safety
- Fairfax County, Virginia: Community Emergency Response Guide
- Church Mutual: Security and Emergency Preparedness
- Water-ISAC: Virginia Beach Tragedy and Active Shooter Preparedness Resources
- Southern Baptist Convention: Resources for Church Safety and Security
- Jewish Community Relations Council of New York: Security and Emergency Resources
- JCC Association of North America: Security Readiness
- Week of Compassion: How to Prepare for a Disaster
- Week of Compassion: A Congregational Guide for Disaster Preparedness and Response
- NIJ: Safety and Security Planning App for Houses of Worship
- Herut: Synagogue Security Tool Kit
Insider Threat
Exercises
MDM (Mis, Dis, Malinformation)
- DHS: Countering False Information on Social Media in Disasters and Emergencies
- DHS: Best Practices for Incorporating Social Media into Exercises
- DHS: The War on Pineapple: Understanding Foreign Interference in 5 Steps
- DHS / CISA: Public Safety Communications: Ten Keys to Improving Emergency Alerts, Warnings & Notifications
- DHS: Foreign Influence Taxonomy
- U.S Cert: Social Media Bots Overview
- New Jersey Office of Homeland Security and Preparedness: Disinformation Portal
- Arizona State University: Threatcasting Lab
Mitigating the Threat from Domestic Violence
- National Counterterrorism Center: Domestic Violent Extremism Poses Heightened Threat in 2021
- DHS: National Threat Evaluation and Reporting Office
- DHS: Countering Violent Extremism and Active Shooter Web Portal
- DNI: Terrorism Prevention
- Profiles of Individual Radicalization in the United States
- Handbook of Terrorism Prevention and Preparedness
- Personal Security of First Responders in the Digital Age
- Natural Gas and Propane Terrorist Tactics
- Programmable Microcontrollers: Potential for Illicit Use
- Hexamethylene Triperoxide Diamine: Indicators of Acquisition, Manufacture, and Considerations for Response
- Plant-Derived Toxins: Identification, Indicators of Acquisition and Manufacture, and Considerations for Response
- Overview of Community Engagement in Targeted Violence and Terrorism Prevention
- Impact of COVID-19 on Violent Extremism and Terrorism
- Monitoring Social Media: Lessons for Future Department of Defense Social Media Analysis in Support of Information Operations
- Researching Extremist Content on Social Media Platforms: Data Protection and Research Ethics Challenges and Opportunities
- Anti-Defamation League: Hate Symbols Database
- New Zealand: Know the Signs – A Guide to Identifying the Signs of Violent Extremism