Center for the Protection of National Infrastructure CCTV GuidanceStay Safe FilmRecognising the Terrorist ThreatProtecting Crowded Places from TerrorismUK: NCSC Cyber Security: Small Charity Guide
Hostile Vehicle MitigationCrowded Places GuidanceCyber Risk Management GuidanceNational Counter Terrorism Security Office10 Steps to Cyber Security
Terrorism and National Emergencies; UK Threat LevelMI5: What You Can DoSuspicious Activity and BehaviorInternet Edge Device SecurityNCSC releases core questions to help Britain's biggest boards understand their cyber risk
Board Toolkit: Five Questions for Your Board's AgendaNational Stakeholder Menu of Tactical OptionsCyber Security for Major Events
Australian National SecurityAustralian National Security List of Relevant PublicationsThe Small Business Cyber Security Best Practice Guide Terrorists can use chemicals found in everyday products to make powerful homemade explosives and toxic weaponsHostile Vehicle Guidelines for Crowded Places
Security and Your Community Australia's Strategy for Protecting Crowded Places from Terrorism [PDF 1.3MB]Crowded Places Security Audit [PDF 782KB]Crowded Places Self-Assessment Tool [PDF 360KB]Active Armed Offender Guidelines for Crowded Places
Improvised Explosive Device (IED) Guidelines for Crowded PlacesChemical Weapon Guidelines for Crowded PlacesThe Essential Eight: Strategies to Mitigate Cyber Security Incidents
National Terrorism Advisory System (NTAS)Various Resources on "How to Respond" as a Private CitizenActive Shooter Workshop ParticipantBest Practices for Managing Mail Screening and Handling Processes: A Guide for the Public and Private SectorsCommercial Facilities Pandemic Influenza Guides
Unmanned Aircraft Systems (UAS) - Critical InfrastructureWhat To Do - Bomb ThreatCIS Controls: Follow our prioritized set of actions to protect your organization and data from known cyber attack vectorsSecurity of Targets and Crowded Places Resource GuidePlanning Considerations for Emergency Managers
Department of Homeland Security Indicators InfographicSafe Mail Handling ProceduresInsider Threat MitigationInsider Threat - CyberInsider Threat - Terrorism
Insider Threat - Workplace ViolenceInsider Threat - Training & AwarenessSecurity of Soft Targets and Crowded Places - Resource GuideSoft Targets and Crowded Places Security Plan OverviewPublic Venue Bag Search Procedures Guide
DHS: Emergency Action Plan GuideCISA: RansomwareCISA: InsightsCISA: ACSC Releases Small Business Cybersecurity Guide
DHS Video Resources
Options for consideration Active Shooter Preparedness VideoVehicle Ramming Attack MitigationUnderstanding the Insider Threat videoUAS and Critical InfrastructurePathway to Violence
Active Shooter Emergency Action Plan Video
Ready.govBusiness Continuity Planning SuitePrepare Yourself for HurricanesFlood Safety TipsPrepare for Tornadoes
Prepare for Extreme HeatPrepare for All Kinds of EmergenciesReady PublicationsEarthquake PreparednessActive Shooter Preparedness
Office of Homeland Security and Preparedness - Active Shooter Response Infrastructure Protection ResourcesNew Jersey Office of Homeland Security and PreparednessCyber Resilience Review ToolsActive Shooter Emergency Action Plan Development Guide and Template
US ICS-CERT Standards & ReferencesUS-CERT: Securing Network Infrastructure DevicesQuestions Every CEO Should Ask About Cyber RisksCyber Resilience Review Tools
FBI: Active Shooter ResourcesRansomware Prevention and Response for CISOsFBI: RansomwareFBI: Protected Voices
Small Business Big ThreatSANS Institute Information Security ResourcesSANS Institute: Securing the HumanFree "Cybersecurity for Dummies" eBookProtecting Small Businesses
Johns Hopkins Center for Health Security: Pandemic Risk Communications Exercise ScenarioCalifornia Resiliency Alliance: Resource Collection on Suspicious Packages and MailSeven Strategies to Defend Industrial Control Systems (ICS) (pdf)The Higher Education Cloud Vendor Assessment ToolGuide and Advice on Creating a Cybersecurity Policy for your Business (and corresponding template)
Click here for Template
Sandy Hook Promise VideoDeveloping Your Family Preparedness PlanOnline SAR Training for Law Enforcement and Hometown Security PartnersPandemic Planning for BusinessIntroduction to Public-Private Partnerships
Cybersecurity for Small BusinessGuidance on Suspicious Mail or Packages USPSMail Center Security Quick Reference Guide USPSSuspicious Packages Guidance from the US NavyInsider Threat Program: Maturity Framework
An Introduction to Detecting and Deterring an Insider SpyNational Counterintelligence and Security Center Awareness MaterialsHomegrown Violent Extremist Mobilization Indicators 2019Small Business Cybersecurity CornerCenter for Internet Security
Ready New York for BusinessCIS Controls Telework and Small Office Network Security GuideIncident Trends Report (October 2018 - April 2019)
Developing Your Faith Organization Preparedness PlanResources for Church Safety and Security Safeguarding Houses of WorshipResources to Protect Your House of WorshipTraining to Safeguard Places of Worship
Planning Considerations for Emergency ManagersResources to Protect Your House of WorshipThe Role of Voluntary Organizations in Emergency ManagementReligious and Cultural Literacy and Competency in DisasterRed Cross: Supporting Communities Before, During and After Collective Trauma Events
Cybersecurity Resources for Non-ProfitsFEMA: Resources, Partners, and Tips to Help Keep Your House of Worship, Office, or Community Center SafeSecurity of Soft Targets and Crowded Places–Resource GuideChurch Mutual: Security and Emergency Preparedness