Center for the Protection of National Infrastructure CCTV GuidanceStay Safe FilmRecognising the Terrorist ThreatProtecting Crowded Places from TerrorismUK: NCSC Cyber Security: Small Charity Guide
Hostile Vehicle MitigationCrowded Places GuidanceCyber Risk Management GuidanceNational Counter Terrorism Security Office10 Steps to Cyber Security
Terrorism and National Emergencies; UK Threat LevelMI5: What You Can DoSuspicious Activity and BehaviorInternet Edge Device SecurityNCSC releases core questions to help Britain's biggest boards understand their cyber risk
Board Toolkit: Five Questions for Your Board's AgendaNational Stakeholder Menu of Tactical Options
Australian National SecurityAustralian National Security List of Relevant PublicationsThe Small Business Cyber Security Best Practice Guide Terrorists can use chemicals found in everyday products to make powerful homemade explosives and toxic weaponsHostile Vehicle Guidelines for Crowded Places
Security and Your Community Australia's Strategy for Protecting Crowded Places from Terrorism [PDF 1.3MB]Crowded Places Security Audit [PDF 782KB]Crowded Places Self-Assessment Tool [PDF 360KB]Active Armed Offender Guidelines for Crowded Places
Improvised Explosive Device (IED) Guidelines for Crowded PlacesChemical Weapon Guidelines for Crowded Places
National Terrorism Advisory System (NTAS)Various Resources on "How to Respond" as a Private CitizenActive Shooter Workshop ParticipantBest Practices for Managing Mail Screening and Handling Processes: A Guide for the Public and Private SectorsCommercial Facilities Pandemic Influenza Guides
Unmanned Aircraft Systems (UAS) - Critical InfrastructureWhat To Do - Bomb ThreatCIS Controls: Follow our prioritized set of actions to protect your organization and data from known cyber attack vectorsSecurity of Targets and Crowded Places Resource GuidePlanning Considerations for Emergency Managers
Department of Homeland Security Indicators InfographicSafe Mail Handling Procedures
Ready.govBusiness Continuity Planning SuitePrepare Yourself for HurricanesFlood Safety TipsPrepare for Tornadoes
Prepare for Extreme HeatPrepare for All Kinds of EmergenciesReady PublicationsEarthquake PreparednessActive Shooter Preparedness
Office of Homeland Security and Preparedness - Active Shooter Response Infrastructure Protection ResourcesNew Jersey Office of Homeland Security and Preparedness
Small Business Big ThreatSANS Institute Information Security ResourcesSANS Institute: Securing the HumanFree "Cybersecurity for Dummies" eBookProtecting Small Businesses
Johns Hopkins Center for Health Security: Pandemic Risk Communications Exercise ScenarioUS ICS-CERT Standards & ReferencesSeven Strategies to Defend Industrial Control Systems (ICS) (pdf)US-CERT: Securing Network Infrastructure DevicesGuide and Advice on Creating a Cybersecurity Policy for your Business (and corresponding template)
Click here for Template
Sandy Hook Promise VideoDeveloping Your Family Preparedness PlanOnline SAR Training for Law Enforcement and Hometown Security PartnersPandemic Planning for BusinessIntroduction to Public-Private Partnerships
Cybersecurity for Small BusinesGuidance on Suspicious Mail or Packages USPSMail Center Security Quick Reference Guide USPSSuspicious Packages Guidance from the US NavyInsider Threat Program: Maturity Framework
California Resiliency Alliance: Resource Collection on Suspicious Packages and Mail
Developing Your Faith Organization Preparedness PlanResources for Church Safety and Security Safeguarding Houses of WorshipResources to Protect Your House of WorshipTraining to Safeguard Places of Worship
Planning Considerations for Emergency ManagersResources to Protect Your House of WorshipThe Role of Voluntary Organizations in Emergency ManagementReligious and Cultural Literacy and Competency in DisasterRed Cross: Supporting Communities Before, During and After Collective Trauma Events
Cybersecurity Resources for Non-ProfitsFEMA: Resources, Partners, and Tips to Help Keep Your House of Worship, Office, or Community Center Safe