CISA provides all stakeholders with information and resources to prepare for and respond to various threats including active assailants, vehicular assaults, bombings, small unmanned aircraft systems (sUAS), and more. Anyone can use CISA’s suite of in-person and online trainings, tools, and informational materials to maintain situational awareness and prepare for and protect themselves during an incident. These resources help all stakeholders, including business owners, employees, and private sector security personnel better understand suspicious behaviors that may pose a threat and detail how to notify the appropriate authorities.
Business Continuity and Preparedness
CISA Tabletop Exercise Packages
CISA has an extensive scenario library and ready-to-use exercise packages—known as CISA Tabletop Exercise Packages (CTEPs). Each CTEP is customizable and includes template exercise objectives, scenarios, and discussion questions, as well as a collection of references and resources. Available scenarios cover a broad array of cybersecurity and physical security topics such as ransomware, election security, industrial control systems, pandemic, vehicle ramming, insider threat, active assailant, small unmanned aircraft systems (sUAS), and natural disasters.
COVID-19 Vaccine Distribution Physical Security Measures
Organizations involved in the development and distribution of the COVID-19 vaccine should take proactive measures to enhance their overall physical security posture. To achieve secure and resilient vaccine distribution, workers within the supply chain and vaccine recipients should use available resources to assess suggested mitigation methods against physical security attacks. To help meet this need, CISA created the COVID-19 Vaccine Distribution Physical Security Measures infographic. This product provides a list of physical security resources available to the public to help facility owners and operators enhance physical security to protect workers and individuals.
CISA Tabletop Exercise Packages Training Workshop
CISA Exercises hosts monthly workshops to provide an overview of the CISA Tabletop Exercise Packages (CTEPs) and assists partners in using the CTEPs in their organizations. The workshops provide an opportunity for stakeholders to ask questions and provide feedback on the CTEPs, as well as learn more about the variety of CTEPs available.
Stakeholder Exercise Planning and Conduct
CISA Exercises uses the Homeland Security Exercise and Evaluation Program (HSEEP) methodology to design, develop, conduct, and evaluate exercises ranging from small-scale, limited-scope, discussion-based exercises (e.g., two-hour seminars) to large-scale, internationally-scoped, operations-based exercises (e.g., multi-day, full-scale exercises).
Election Security Resource Library
This library provides state and local governments, election officials, campaigns, vendors, and voters with voluntary tools to secure election-related assets, facilities, networks, and systems from cyber and physical threats.
Identify Suspicious Behavior
Fact Sheet – Insider Threat Mitigation Program
This fact sheet provides DHS resources to help organizations design a comprehensive program that protects against physical and cyber insider threats.
Insider Threat Mitigation Web Page
This web page explains ways to help organizations detect, assess, and manage insider threats before it can threaten the workforce.
Insider Threat Mitigation Guide
This guide provides comprehensive information for organizations of all sizes to establish or enhance an insider threat mitigation program. The information within the guide is scalable to the level of maturity and size of the organization.
Pathway to Violence Video
This video identifies behavioral indicators based on expert research that assailants often demonstrate before a violent act. It describes six progressive indicators a colleague might observe as well as engagement strategies and recommended responses.
Pathway to Violence: Warning Signs and What You Can Do
This fact sheet explains warning signs that may lead to violence and what individuals can do to mitigate a potential incident.
Personal Security Considerations
This document encourages critical infrastructure owners and their personnel to remain vigilant and report suspicious behavior to thwart a potential attack. It also contains several recommended security measures that can mitigate threats to personal safety.
Power of Hello Slick-Sheet and Placemat
These products provide stakeholders with information to assist in identifying and effectively responding to suspicious behavior.
Additional DHS Resources:
Blue Campaign: Indicators of Human Trafficking
This campaign provides tips for recognizing key human trafficking indicators and how to report incidents to law enforcement.
“If You See Something, Say Something®”: Partnership and Campaign Materials
This campaign provides free outreach materials, such as posters, brochures, and web graphics, to help raise public awareness of terrorism and terrorism-related crime indicators. Video and radio public service announcements are also available in English and Spanish, and DHS can work with partners to address specific language needs. The topics include "protect your every day" for all citizens, hospitality for travelers and owners and operators of hotels, and information for major sport leagues officials.
Prepare and Respond to Active Assailants
Active Shooter Attacks – Security Awareness for Soft Targets and Crowded Places
This guide lists potential active shooter warning signs, along with steps to follow if an incident occurs. It includes helpful tips to help develop protective measures to mitigate future attacks.
Active Shooter Event Quick Reference Guide
This guide provides key active shooter response information in a short, easy-to-read format.
Active Shooter: How to Respond Educational Booklet
This booklet provides information on how to respond to an active shooter in your vicinity, how to react when law enforcement arrives, and how to train staff and prepare for an active shooter situation, including roles and responsibilities.
Active Shooter: How to Respond Poster
This poster highlights key information for responding when an active shooter is in your vicinity.
Active Shooter Pocket Card
This card provides immediate actions for responding during an active shooter situation.
Active Shooter Preparedness
This site provides access to DHS products, tools, and resources to help prepare for and respond during an active shooter incident.
Active Shooter Preparedness: Access & Functional Needs – What You Should Know
This video provides information organizations can incorporate into an Emergency Action Plan (EAP) to protect individuals with access and functional needs during an active shooter incident.
Chemical Attack – What You Should Know
This video provides individuals with an introduction to the threat and the impacts of chemical weapons. It also explains how to prepare for and respond during a chemical incident.
Chemical Attacks – Security Awareness for Soft Targets and Crowded Places
This guide identifies potential scenarios and symptoms related to possible chemical exposure. It also explains how individuals can respond during an attack and mitigate future attacks.
Complex Coordinated Attacks – Security Awareness for Soft Targets and Crowded Places
This guide identifies potential indicators, tactics, and techniques related to a complex coordinated attack. It also recommends mitigation strategies and protection measures.
Fire as a Weapon – Security Awareness for Soft Targets and Crowded Places
This guide helps identify potential indicators of an attack using fire as a weapon and provides mitigation strategies and recommended response procedures.
Mass Gatherings – Take Charge of Your Personal Safety
This guide outlines immediate actions individuals can take during an incident or attack on a mass gathering.
Options for Consideration Active Shooter Preparedness Video
This instructional video demonstrates possible actions for individuals during an active shooter situation, such as running, hiding, or, as a last resort, confronting the shooter. It also describes how to assist authorities once law enforcement arrives.
Private Citizen: Vehicle Ramming Attack Mitigation
This video provides information on mitigating the threat of vehicle ramming attacks with technical analysis from public and private sector subject matter experts. It leverages real-world events and provides recommendations for protecting organizations and individuals from a potential vehicle ramming incident.
Translated Active Shooter Resources
These materials help businesses, government offices, and schools prepare for an active shooter situation and are available in the following languages: Arabic, Chinese, Korean, Portuguese, Punjabi, Russian, Somali, Spanish, and Urdu.
Vehicle Ramming – Security Awareness for Soft Targets and Crowded Places
This guide identifies warning signs an individual might exhibit when planning a vehicle ramming attack. It also includes suggested mitigation strategies and protective measures.
Additional DHS Resources:
Stop the Bleed
This awareness campaign encourages bystanders to become trained, equipped, and empowered to help in a bleeding emergency before professional help arrives.
You Are the Help Until Help Arrives
This web-based training program provides materials and other resources on emergency response procedures and providing first aid care until first responders arrive.
Prevent and Respond to Bombings
DHS Bomb Threat Checklist
This checklist is designed to help employees and decision-makers within commercial facilities, schools, and other organizations execute a strategic and controlled response to a bomb threat.
Unattended vs. Suspicious Item Poster and Card
This awareness reference poster and card helps individuals recognize the difference between unattended and suspicious items and provides suggested responses.
Vehicle-Borne Improvised Explosive Device Identification Card
This reference card helps identify the potential indicators of a vehicle-borne improvised explosive device (VBIED) and suspicious behaviors. It also recommends actions in response to suspicious vehicles.
What to Do – Bomb Threat
This site provides guidance and resources for responding in the event of bomb threats or encounters with suspicious items or behaviors. It also provides guidance to help prepare for and respond during an incident, along with other planning and preparedness resources.
Protect Against Small Unmanned Aircraft Systems
Small Unmanned Aircraft Systems and Critical Infrastructure – Understanding the Risk Video
This video provides information on critical infrastructure challenges associated with small unmanned aircraft systems (sUAS), counter-UAS security practices, actions to consider for risk mitigation, and specific preparedness efforts for facilities and organizations. It can be found under the sUAS and Critical Infrastructure – Understanding the Risk tab.
Small Unmanned Aircraft Systems Frequently Asked Questions
This site provides answers to common questions about small unmanned aircraft systems (sUAS) for critical infrastructure owners and operators.
Small Unmanned Aircraft Systems Critical Infrastructure Drone Pocket Card
This card provides a quick reference guide for critical infrastructure security and operations officers and the general public on how to report small unmanned aircraft systems (sUAS) activity, including what information to share and what actions to take.
Indicators of Suspicious Small Unmanned Aircraft Systems
This reference aid, provided through the Office for Bombing Prevention (OBP), aims to enhance situational awareness for those who may encounter a suspicious small unmanned aircraft systems (sUAS). The document can be found under OBP's Open Source Intelligence (OSINT) Team’s Emergency Responder Note (ERN) on TRIPwire.
Safeguard and Secure Cyberspace
Avoiding Social Engineering and Phishing Attacks Security Tip
This security tip describes social engineering tactics, techniques, and procedures linked to cyber criminals. It also details common indicators related to social engineering attacks and how to avoid falling for these methods.
CISA Cyber Essentials
This campaign is for small businesses and local government agencies to understand and address cybersecurity risk. Cyber Essentials includes two parts – guiding principles to develop security culture and specific actions for leaders and IT professionals.
Link: CISA Cyber Essentials
Federal Virtual Training Environment
The Federal Virtual Training Environment (FedVTE) provides free online cybersecurity training to federal, state, local, tribal, and territorial government employees, federal contractors, and U.S. military veterans. Courses range from beginner to advanced levels and are mapped to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework.
National Initiative for Cybersecurity Careers and Studies Website and Training Catalog
The National Initiative for Cybersecurity Careers and Studies (NICCS) is the premier online resource for cybersecurity training. NICCS connects government employees, students, educators, and industry with cybersecurity training providers throughout the Nation. NICCS provides tools to ensure citizens and the workforce have more dynamic cybersecurity skills. The courses in the training catalog are delivered by accredited universities, National Centers of Academic Excellence, federal agencies, and other training providers. Each course is mapped to the National Cybersecurity Workforce Framework, the foundation of the National Initiative for Cybersecurity Education (NICE) effort to standardize the cybersecurity field.
STOP. THINK. CONNECT.™
This national public awareness campaign aims to empower the American public to be safer and more secure online through a better understanding of cyber threats.
Telework Essentials Toolkit
This toolkit is designed to help business leaders, IT staff, and end users transition to a secure, permanent telework environment through simple, actionable recommendations. It provides three modules tailored for executive leaders, IT professionals, and teleworkers.
Prepare for and Respond to Vehicle Ramming Attacks
Vehicle Ramming Attacks Resources
The use of a vehicle as a weapon in a terrorist attack is not new. Recent terrorist incidents and violent extremist propaganda demonstrate that the use of vehicles as a weapon continues to be of interest by those wishing to cause harm. Attacks of this nature require minimal capability, but can have a devastating impact in crowded places with low levels of visible security.