Our resource library is broken up by topic and is kept up to date. If you have questions about any of the resources and how use them, please reach out to the team. The team can also assist organizations with resource utilization such as with the development of an Emergency Operations Plan or with conducting an After Action Review.
Security of Crowded Places
- DHS: Security of Targets and Crowded Places Resource Guide
- CISA: Mitigating Attacks on Houses of Worship Security Guide
- CISA: The Power of Hello Guide For Houses of Worship
- CISA: The De-Escalation Series
- After Action Reports from the Texas AstroWorld Tragedy
- DHS: Protecting Houses of Worship
- DHS: Options for consideration Active Shooter Preparedness Video
- DHS: Unmanned Aircraft Systems and Critical Infrastructure
- DHS: Pathway to Violence
- UK: Stay Safe Film
- UK: Just a minute: Spare 60 seconds to help save lives
- Sandy Hook Promise: Video
- Center for Personal Protection and Safety: Beyond Lockdown
Arson
Mail and Package and Bag Checks
- USPS: Guidance on Suspicious Mail or Packages USPS
- USPS: Mail Center Security Quick Reference Guide USPS
- DHS: Best Practices for Managing Mail Screening and Handling Processes: A Guide for the Public and Private Sectors
- US Navy: Suspicious Packages Guidance from the US Navy
- California Resiliency Alliance: Resource Collection on Suspicious Packages and Mail
Vehicle Ramming
- DHS / CISA: Vehicle Ramming Security Awareness for Soft Targets and Crowded Places
- DHS: Vehicle Ramming Attack Mitigation
- NCTC: Vehicle-Borne Attacks: Tactics and Mitigation (First Responders Toolbox)
- CISA: Vehicle Ramming Attack Mitigation Video
- FBI: Vehicle Rental Ramming Video
- FBI: Vehicle Rentals and Vehicle Ramming
- UK: Countering Vehicle as a Weapon: Best Practice Guidance for Goods Vehicle Operators and Drivers
- UK: Hostile Vehicle Mitigation (HVM)
- Australia: Hostile Vehicle Guidelines for Crowded Places
- European Commission: Review on Vehicle Barrier Protection Guidances
Bombing Prevention
- DHS: What To Do: Bomb Threat
- DHS / CISA: Bomb Threat Guidance
- DHS / CISA: Counter-IED Training Video Series
- DHS / CISA: Bomb-Making Materials Awareness Program
Acid Attack
First Aid and Stop the Bleed
Exercises
- DHS: School Safety and Security
- CISA: K-12 School Security Guide Suite
- CISA: Protecting Our Future – Partnering to Safeguard K-12 Organizations from Cybersecurity Threats
- CISA: Protecting Our Future – Partnering to Safeguard K-12 Organizations from Cybersecurity Threats Toolkit
- DHS: An Operational Guide for Preventing Targeted School Violence (for private and public schools)
- U.S. Secret Service: Averting Targeted School Violence
- FBI: In The Aftermath
- Everytown Research: Keeping Our Schools Safe
General
- CISA: Insights
- CISA: ACSC Releases Small Business Cybersecurity Guide
- CISA: Resources for Small and Mid-size Businesses
- CISA: Cyber Guidance for Small Business
- CISA: Cyber Essential Toolkits
- CISA: Avoiding Social Engineering and Phishing Attacks
- CISA: NCSC-NZ Releases Cyber Governance Resource for Leaders
- UK: Cyber Security Toolkit for Boards
- CISA: Technical Approaches to Uncovering and Remediating Malicious Activity
- FBI: Protected Voices
- FTC: Scams and Your Small Business: A Guide for Business
- FTC: Cybersecurity Resources for Non-Profits
- FTC: Cybersecurity for Small Business
- SBA: Small Business Cybersecurity
- US-CERT: Securing Network Infrastructure Devices
- UK NCSC: Internet Edge Device Security
- UK NCSC: Advice to Thwart Devastating Cyber Attacks on Small Charities
- AVAST: Guide for Creating A Cyber Security Policy for your Business
- Australian Cyber Security Center: The Essential Eight: Strategies to Mitigate Cyber Security Incidents
- NIST: Small Business Cybersecurity Corner
- Center for Internet Security: Controls Telework and Small Office Network Security Guide
- Global Cyber Alliance: Cybersecurity Toolkit
- The Emerging Cyber Threat to Industrial Control Systems
- Top 10 IT Security Actions to Protect Internet Connected Networks and Information
- DHS: Insider Threat – Cyber
Ransomware
- FBI: Ransomware
- FBI: How to Protect Your Networks from Ransomware
- CISA: Ransomware
- Canadian Center for Cybersecurity: Ransomware – Don’t Get Locked Out
- Canadian Center for Cybersecurity: Ransomware – How to Prevent and Recover
- U.K.: What board members should know and what they should be asking their technical experts
- DHS Epidemic/Pandemic Resources
- Johns Hopkins Center for Health Security: Pandemic Risk Communications Exercise Scenario
- READY.GOV: Ready Publications
- READY.GOV: General Preparedness Resources
- READY.GOV: Business Continuity Planning Suite
- READY.GOV: Prepare Yourself for Hurricanes
- READY.GOV: Flood Safety Tips
- READY.GOV: Prepare for Tornadoes
- READY.GOV: Prepare for Extreme Heat
- READY.GOV: Prepare for All Kinds of Emergencies
- READY.GOV: Earthquake Preparedness
- EPA: Supporting Healthy Houses of Worship
- World Health Organization: OpenWHO
- National Oceanic and Atmospheric Administration: HEAT.GOV
General
- DHS: Prevention Resource Finder
- DHS: CISA Services Catalogue
- DHS / CISA: Products / Resources
- DHS: Indicators Infographic
- DHS: Hometown Security
- DHS: Employee Vigilance – Power of Hello for Houses of Worship
- NEW! DHS / CISA: Physical Security Performance Goals for Faith-Based Communities
- DHS / CISA: Mitigating Attacks on Houses of Worship Security Guide
- DHS / CISA: The De-Escalation Series
- DHS: Vehicle Ramming Attack Mitigation
- DHS: Vehicle Ramming Self-Assessment Tool
- DHS: Active Shooter Emergency Action Plan Guide and Template
- DHS: Nationwide Suspicious Activity Reporting (SAR) Initiative
- CISA: The Infrastructure Dependency Primer To Strengthen Community Resilience
- CISA: Securing Public Gatherings
- DNI: First Responder Toolbox
- NCTC: Threats Against Houses of Worship Highlight the Importance of Religious Community Outreach
- FEMA: Strategic and Operational Planning
- FEMA: Guide for Developing High Quality Emergency Operations Plans for Houses of Worship
- FEMA: Resources, Partners, and Tips to Help Keep Your House of Worship, Office, or Community Center Safe
- FEMA: Preparedness Training for Community-Based Organizations
- FEMA: Religious and Cultural Literacy and Competency in Disaster
- FEMA: Improving Preparedness and Resilience through Public-Private Partnerships
- FEMA: Preparedness Training for Community Based Organizations
- FEMA: Introduction to Public-Private Partnerships
- Ready NOVA: Developing Your Family Preparedness Plan
- Ready NOVA: Developing Your Faith Organization Preparedness Plan
- Protect UK: Security Risk Management
- CAIR: Best Practices for Mosque and Community Safety
- Fairfax County, Virginia: Community Emergency Response Guide
- Church Mutual: Security and Emergency Preparedness
- Water-ISAC: Virginia Beach Tragedy and Active Shooter Preparedness Resources
- JTIC: Safeguarding Houses of Worship
- Southern Baptist Convention: Resources for Church Safety and Security
- Jewish Community Relations Council of New York: Security and Emergency Resources
- JCC Association of North America: Security Readiness
- Week of Compassion: How to Prepare for a Disaster
- Week of Compassion: A Congregational Guide for Disaster Preparedness and Response
- NIJ: Safety and Security Planning App for Houses of Worship
- Herut: Synagogue Security Tool Kit
Insider Threat
- DHS: Insider Threat – Workplace Violence
- DHS: Insider Threat Mitigation
- DHS: Insider Threat – Training & Awareness
- DHS: Insider Threat – Terrorism
Exercises
MDM (Mis, Dis, Malinformation)
- DHS: Countering False Information on Social Media in Disasters and Emergencies
- DHS: Best Practices for Incorporating Social Media into Exercises
- DHS: The War on Pineapple: Understanding Foreign Interference in 5 Steps
- DHS / CISA: Public Safety Communications: Ten Keys to Improving Emergency Alerts, Warnings & Notifications
- DHS: Foreign Influence Taxonomy
- U.S Cert: Social Media Bots Overview
- New Jersey Office of Homeland Security and Preparedness: Disinformation Portal
- Arizona State University: Threatcasting Lab
- Swedish Civil Contingencies Agency: Countering information influence activities: A handbook for communicators
- Hybrid Center of Excellence: Post-event analysis of the hybrid threat security environment: assessment of influence communication operations
Mitigating the Threat from Domestic Violence
- National Counterterrorism Center: 2021 U.S. Violent Extremist Mobilization Indicators Booklet
- National Counterterrorism Center: Domestic Violent Extremism Poses Heightened Threat in 2021
- DHS: National Threat Evaluation and Reporting Office
- DHS: Countering Violent Extremism and Active Shooter Web Portal
- DNI: Terrorism Prevention
- National Counterterrorism Center: Domestic Violent Extremism Poses Heightened Threat in 2021
- Profiles of Individual Radicalization in the United States
- Handbook of Terrorism Prevention and Preparedness
- Personal Security of First Responders in the Digital Age
- Natural Gas and Propane Terrorist Tactics
- Programmable Microcontrollers: Potential for Illicit Use
- Hexamethylene Triperoxide Diamine: Indicators of Acquisition, Manufacture, and Considerations for Response
- Plant-Derived Toxins: Identification, Indicators of Acquisition and Manufacture, and Considerations for Response
- Overview of Community Engagement in Targeted Violence and Terrorism Prevention
- Impact of COVID-19 on Violent Extremism and Terrorism
- Monitoring Social Media: Lessons for Future Department of Defense Social Media Analysis in Support of Information Operations
- Researching Extremist Content on Social Media Platforms: Data Protection and Research Ethics Challenges and Opportunities
- DNI: Homegrown Violent Extremist Mobilization Indicators 2019
- Anti-Defamation League: Hate Symbols Database
- DNI: First Responder Toolbox
- START: New Approaches to Countering Terror / Countering Violent Extremism
- New Zealand: Know the Signs – A Guide to Identifying the Signs of Violent Extremism