CISA provides businesses and critical infrastructure partners with resources to identify, develop, and implement scalable security measures to build or improve capabilities across the private and public sectors. These resources allow industry partners to assess and identify vulnerabilities to critical infrastructure. They also enable businesses and critical infrastructure to prevent, protect against, respond to, and mitigate security incidents through technical assistance, training, and information sharing.
![]() |
![]() |
![]() |
![]() |
![]() |
Business Continuity and Preparedness
Business Case for Security
CISA provides this resource to assist small and mid-size organizations where funds for security expenditures may be limited. Amid competing financial priorities, investments in physical and cybersecurity measures are crucial for operational continuity and employee safety. This resource provides data and considerations for senior leaders as they prioritize budget items.
Link: Business Case for Security (.pdf, 569 KB)
CISA Tabletop Exercise Packages
CISA has an extensive scenario library and ready-to-use exercise packages—known as CISA Tabletop Exercise Packages (CTEPs). Each CTEP is customizable and includes template exercise objectives, scenarios, and discussion questions, as well as a collection of references and resources. Available scenarios cover a broad array of cybersecurity and physical security topics such as ransomware, election security, industrial control systems, pandemic, vehicle ramming, insider threat, active assailant, small unmanned aircraft systems (sUAS), and natural disasters.
Link: CISA Tabletop Exercise Packages
Convergence Action Guide
CISA defines convergence as formal collaboration between previously disjointed security functions. This guide describes the risks associated with siloed security functions, benefits of convergence, a flexible framework for aligning security functions, and several case studies.
Link: Convergence Action Guide (.pdf, 1,299 KB)
COVID-19 Vaccine Distribution Physical Security Measures
Organizations involved in the development and distribution of the COVID-19 vaccine should take proactive measures to enhance their overall physical security posture. To achieve secure and resilient vaccine distribution, workers within the supply chain and vaccine recipients should use available resources to assess suggested mitigation methods against physical security attacks. To help meet this need, CISA created the COVID-19 Vaccine Distribution Physical Security Measures infographic. This product provides a list of physical security resources available to the public to help facility owners and operators enhance physical security to protect workers and individuals.
Link: COVID-19 Vaccine Distribution Physical Security Measures Infographic (.pdf, 667 KB), Action Guide (.pdf, 330 KB), and Security Considerations (.pdf, 844 KB)
CISA Tabletop Exercise Packages Training Workshop
CISA Exercises hosts monthly workshops to provide an overview of the CISA Tabletop Exercise Packages (CTEPs) and assists partners in using the CTEPs in their organizations. The workshops provide an opportunity for stakeholders to ask questions and provide feedback on the CTEPs, as well as learn more about the variety of CTEPs available.
Link: CISA Tabletop Exercise Packages Training Workshop
Hometown Security
DHS encourages businesses to Connect, Plan, Train, and Report. Applying these four steps in advance of an incident or attack can help business owners and their employees better prepare and proactively think about the role they play in the safety and security of their businesses and communities.
Link: Hometown Security
Stakeholder Exercise Planning and Conduct
CISA Exercises uses the Homeland Security Exercise and Evaluation Program (HSEEP) methodology to design, develop, conduct, and evaluate exercises ranging from small-scale, limited-scope, discussion-based exercises (e.g., two-hour seminars) to large-scale, internationally-scoped, operations-based exercises (e.g., multi-day, full-scale exercises).
Link: Stakeholder Exercise Planning and Conduct
Additional DHS Resources:
Critical Infrastructure Security and Resilience Courses
These courses aim to train and educate the critical infrastructure community through security awareness and sector-specific courses. DHS developed these courses in conjunction with federal, state, local, tribal, and territorial government partners, critical infrastructure owners and operators, and private sector partners to support the implementation of the National Infrastructure Protection Plan (NIPP).
Link: Critical Infrastructure Security and Resilience Courses
FEMA Center for Domestic Preparedness
The FEMA Center for Domestic Preparedness (CDP) provides advanced, all-hazards training to approximately 50,000 emergency responders annually from state, local, tribal, and territorial governments, as well as the federal government, foreign governments, and private entities. The scope of training includes preparedness, protection, and response.
Link: FEMA Center for Domestic Preparedness
FEMA Emergency Management Institute
The FEMA Emergency Management Institute (EMI) is the flagship training institution for the emergency management community and provides training to federal, state, local, tribal, volunteer, public, and private sector officials to strengthen core competencies for professional, career-long training.
Link: FEMA Emergency Management Institute
Homeland Security Information Network-Critical Infrastructure
The Homeland Security Information Network (HSIN) serves as the primary information sharing platform between critical infrastructure sector stakeholders and government. HSIN-Critical Infrastructure (HSIN-CI) enables federal, state, local, and private sector critical infrastructure owners and operators to communicate, coordinate, and share sensitive and sector-relevant information to protect critical assets, systems, functions, and networks.
Link: Homeland Security Information Network-Critical Infrastructure
CISA Regional Services
Assist Visits
This service helps critical infrastructure owners and operators understand their role and function in the broader critical infrastructure sector. Protective Security Advisors (PSAs) conduct these visits with critical infrastructure facility representatives to help build relationships and enhance communication.
Link: Assist Visits
CISA Regional Office Fact Sheets
CISA Regional Offices, located throughout the U.S., deliver trainings, exercises, programs, and other resources to critical infrastructure owners and operators.
Link: Regional Office Fact Sheets: Region 1 Fact Sheet (.pdf, 1,686 KB); Region 2 Fact Sheet (.pdf,1,636 KB); Region 3 Fact Sheet (.pdf, 1,623 KB); Region 4 Fact Sheet (.pdf,1,609 KB); Region 5 Fact Sheet (.pdf, 1,636 KB); Region 6 Fact Sheet (.pdf, 1,749 KB); Region 7 Fact Sheet (.pdf, 1,684 KB); Region 8 Fact Sheet (.pdf, 1,525 KB); Region 9 Fact Sheet (.pdf, 323 KB); Region 10 Fact Sheet (.pdf, 1,480 KB)
Infrastructure Survey Tool
Protective Security Advisors (PSAs) conduct this voluntary, web-based security survey with facility owners and operators to identify and document a facility's overall security and resilience.
Link: Infrastructure Survey Tool
Infrastructure Visualization Platform
This platform supports critical infrastructure security and response operations by integrating high-resolution, interactive data, as well as additional assessment information.
Link: Infrastructure Visualization Platform
Protective Security Advisors
Protective Security Advisors (PSAs) engage with federal, state, local, tribal, and territorial (FSLTT) government partners, businesses, and critical infrastructure owners and operators in their regions to offer steady-state DHS risk mitigation tools, products, and services. PSAs also support National Special Security Events (NSSEs) and Special Event Assessment Rating (SEAR) events; assist with responses to all-hazard incidents through field-level coordination and information sharing; and provide expertise on reconstituting affected critical infrastructure.
Link: Protective Security Advisors
Security Assessment at First Entry
The Security Assessment at First Entry (SAFE) tool is designed to help facility owners and operators evaluate current physical and operational security practices and explore opportunities to protect against threats. These assessments are conducted by Protective Security Advisors (PSAs) and provide a high-level review of the security posture and mitigation options for a facility.
Link: Security Assessment at First Entry
Election Security
Election Security Resource Library
This library provides state and local governments, election officials, campaigns, the vendor community, and voters with voluntary tools to secure election-related assets, facilities, networks, and systems from cyber and physical threats.
Link: Election Security Resource Library
Identify Suspicious Behavior
ASSESS - How To Navigate the Risk When Someone is Escalating
This assessment process helps determine what an escalating person looks like, whether an emergency response is needed, if de-escalation is possible, or if a more formal assessment is needed.
Link: ASSESS (.pdf, 894 KB)
Autonomous Ground Vehicle Security Guide: Transportation Systems Sector
This guide provides Chief Security Officers (CSOs) and Chief Information Security Officers (CISOs) within the Transportation Systems Sector to enhance awareness of current autonomous ground vehicle systems (AGVs), introduce a taxonomy to characterize cyber-physical threats related to AGVs, and recommend strategies to mitigate security risks at both the enterprise and asset levels.
Link: Autonomous Ground Vehicle Security Guide: Transportation Systems Sector (.pdf, 724 KB)
DE-ESCALATION - How You Can Help Defuse Potentially Violent Situations
This product defines de-escalation and identifies communication or other techniques during an encounter to stabilize, slow, or reduce the intensity of a potentially violent situation without using physical force.
Link: DE-ESCALATION (.pdf, 1,644 KB)
Employee Vigilance – Power of Hello
This library provides state and local governments, election officials, campaigns, vendors, and voters with voluntary tools to secure election-related assets, facilities, networks, and systems from cyber and physical threats.
Link: Employee Vigilance - Power of Hello
Fact Sheet – Insider Threat Mitigation Program
This fact sheet provides resources to help organizations design a comprehensive program that protects against insider threats.
Link: Insider Threat Mitigation Program Fact Sheet (.pdf, 491 KB)
Insider Threat Mitigation Web Page
This web page explains ways to help organizations detect, assess, and manage insider threats before it can threaten the workforce.
Link: Insider Threat Mitigation
Insider Risk Self-Assessment Tool
This tool asks questions about an organization's existing enterprise, including Program Management, Personnel and Training, and Data Collection and Analysis to objectively evaluate their immunity to insider threat incidents. The response also includes guidance to interpret the numbers and provides suggested safety measures.
Link: Insider Risk Mitigation Program Evaluation (IRMPE): Assessment Instrument (.pdf, 5,361 KB); IRMPE Question Set and Guidance (.pdf, 786 KB); IRMPE Quick Start Guide (.pdf, 1,147 KB); IRMPE User Guide (.pdf, 1,046 KB); IRMPE One-Pager (.pdf, 608 KB)
No Reservations: Suspicious Behavior in Hotels
This video helps hotel employees rapidly identify and report suspicious activities and threats by highlighting suspicious activity indicators. It is also available in Spanish.
Link: No Reservations: Suspicious Behavior in Hotels
Power of Hello Slick-Sheet and Placemat
These products provide stakeholders with information to assist in identifying and effectively responding to suspicious behavior.
Link: CISA Power of Hello Slick-Sheet (.pdf, 273 KB) and CISA Power of Hello Placemat (.pdf, 314 KB)
Protecting Patrons During the Holiday Shopping Season
This product advises shopping venues and employees to assess existing security practices are in place due to an increase of patrons in shopping venues during the holidays.
Link: Protecting Patrons During the Holiday Shopping Season (.pdf, 408 KB)
RECOGNIZE - How You Can Notice the Warning Signs of Violence
This product helps critical infrastructure owners and operators identify warning signs of violence and how to effectively inform others.
Link: RECOGNIZE (.pdf, 1,600 KB)
Recognize Suspicious Small Unmanned Aircraft Systems Poster and Postcard
This poster and postcard explain how small unmanned aircraft systems (sUAS) are used for a range of tactical and recreational purposes, but can also be used to cause serious harm to individuals and infrastructure.
Link: Recognize Suspicious Unmanned Aircraft Systems (UAS) Poster (.pdf, 2,029 KB) and Postcard (.pdf, 1,346 KB)
REPORT - How To Engage Your Organization and Community
This product explains how reporting plays an essential role in protecting individuals from a potentially violent situation, identifies two types of reporting, and details important information to include in a report.
Link: REPORT (.pdf, 1,643 KB)
Suspicious Behavior Advisory Posters
These resources help businesses, first responders, and local governments identify suspicious activities and behaviors to prevent the illicit sale of explosive precursor chemicals and components. The posters are available under the Suspicious Activities and Bomb Threats – What to Do section of the TRIPwire website.
Link: Suspicious Behavior Advisory Posters
Additional DHS Resources:
Suspicious Activity Reporting Private Sector Security Training Overview
This Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) training module helps private sector security personnel recognize suspicious behaviors associated with terrorism activities; understand how and where to report suspicious activities; and protect privacy, civil rights, and civil liberties when documenting information.
Link: Suspicious Activity Reporting Private Sector Security Training Overview
Prepare and Respond to Active Assailants
Active Shooter Emergency Action Plan Video, Guide, and Template
These resources describe the fundamental concepts for developing an Emergency Action Plan (EAP) to respond during an active shooter situation, including important considerations for EAP development. The video shows first-hand perspectives from active shooter survivors, first responder personnel, and other subject matter experts. The guide and template supplement the Active Shooter EAP video. Together, the guide, template, and video create a virtual training tool designed to help develop an organization’s Active Shooter EAP.
Link: Guide (.pdf, 1,066 KB), Template (.pdf, 242 KB), Video
Active Shooter Preparedness: Access & Functional Needs – What You Should Know
This video provides information organizations can incorporate into an Emergency Action Plan (EAP) to protect individuals with access and functional needs during an active shooter incident.
Link: Active Shooter Preparedness: Access & Functional Needs
Active Shooter Recovery Guide
This guide provides information on establishing a recovery process and outlines the necessary actions for short-term and long-term recovery following an active shooter incident.
Link: Active Shooter Recovery Guide (.pdf, 1,322 KB)
Active Shooter Workshop
These scenario-based workshops include facilitated discussions to train private sector professionals and law enforcement representatives from federal, state, and local agencies to prepare for and respond to an active shooter situation. Workshop participants evaluate current response concepts, plans, and capabilities for coordinated responses to active shooter incidents.
Link: Active Shooter Workshop
Mass Gatherings – Security Awareness for Soft Targets and Crowded Places
This guide identifies how businesses can prepare for and mitigate future attacks, including recommended protective measures and actions to consider.
Link: Mass Gatherings - Soft Targets and Crowded Places (.pdf, 529 KB)
Personal Security Considerations
This guide identifies behavioral and suspicious activity indicators and provides basic personal security measures to reduce the probability of becoming a victim of an attack.
Link: Personal Security Considerations (.pdf, 534 KB)
Protecting Infrastructure During Public Demonstrations
This fact sheet offers security recommendations for businesses during public demonstrations. The document also provides options to mitigate risk and access to CISA resources to assist with decision-making.
Link: Protecting Infrastructure During Public Demonstrations (.pdf, 165 KB)
Protecting Patrons in Outdoor Eating Venues
This fact sheet identifies security measures for restaurants conducting business outside. COVID-19 guidelines led restaurants to set up tables outside, creating potential vulnerabilities. It identifies threats such as vehicle ramming and includes security measures to help mitigate threats.
Link: Protecting Patrons in Outdoor Eating Venues (.pdf, 310 KB)
Prevent and Respond to Bombings
Bomb-Making Materials Awareness Program
The Bomb-Making Materials Awareness Program (BMAP) is designed to promote bomb-making materials (BMM) awareness and reporting of suspicious activity to prevent the intentional misuse of common consumer goods to make improvised explosive devices (IEDs).
Link: Bomb-Making Materials Awareness Program
Bombing Prevention Lanyard Cards
These quick reference lanyard cards provide key reminders and actions related to bombing prevention, including recommended actions during a bombing incident.
Link: Bombing Prevention Lanyard Cards
Counter-Improvised Explosive Devices Training Courses
These courses provide general information and strategies to prevent, protect against, respond to, and mitigate bombing incidents. To request direct delivery trainings, please contact your local Protective Security Advisor (PSA) or email OBP@cisa.dhs.gov. For more information or a full list of counter-improvised explosive devices (C-IED) and Risk Mitigation trainings, visit the C-IED Training Courses Website or the C-IED and Risk Mitigation Training Fact Sheet.
Link: Counter-Improvised Explosive Devices Training Courses
DHS-Department of Justice Bomb Threat Guidance
This quick reference guide provides information on threat preparation, threat assessment considerations, staff response guidelines, and evacuation and shelter-in-place considerations.
Link: Bomb Threat Guidance (.pdf, 977 KB)
Security and Resiliency Guide: Counter-Improvised Explosive Device Concepts, Common Goals, and Available Assistance
This guide and corresponding annexes provide individuals, businesses, first responders, and law enforcement with guidance to enhance preparedness for potential improvised explosive device (IED) incidents in their communities. The guide includes risk information, a framework of 10 common counter-IED (C-IED) preparedness goals, planning considerations, and available federal resources. It is complemented by five annexes with additional information relevant to venues at high risk for IED-related incidents, such as lodging, healthcare facility. outdoor events, public assembly, and sports leagues and venues.
Link: Security and Resiliency Guide Fact Sheet (.pdf, 356 KB) and Security and Resiliency Guide Counter IED (.pdf, 2,284 KB)
Sports and Entertainment Venues Bombing Prevention Solutions Portfolio
This tool is a one-stop-shop for training, products, and resources that support sports and entertainment organizations and venues with building counter-improvised explosive device (C-IED) capabilities. This interactive product connects organizational leadership with C-IED resources to empower venue personnel to play an active role in security.
Link: Sports and Entertainment Venues Bombing Prevention (.pdf, 2,328 KB)
TRIPwire Website
CISA’s Office for Bombing Prevention (OBP) developed and maintains TRIPwire, the DHS Technical Resource for Incident Prevention. It serves as a 24/7 collaborative information-sharing network for bomb squads, first responders, military personnel, government officials, intelligence analysts, and security professionals. TRIPwire combines expert analyses and reports with relevant documents, images, and videos gathered directly from terrorist source materials to help users anticipate, identify, and prevent Improvised Explosive Device (IED) incidents. The site requires registration to access information or partners can log in using a HSIN account.
Link: Tripwire Website
What to Do – Bomb Threat: Bomb Threat Training Video
This video, developed in partnership with the University of Central Florida and International Association of Chiefs of Police, demonstrates what to do in the event of a phoned-in bomb threat.
Link: What to Do - Bomb Threat: Bomb Threat Training Video
What to Do – Training Video Series
This training video series (TVS) communicates threats posed by and how to react to improvised explosive devices (IEDs). This includes videos on suspicious vs. unattended items, bomb searches, surviving a bombing attack, and bomb threats.
Link: What to Do - Training Video Series
Protect Against Small Unmanned Aircraft Systems
Cybersecurity Best Practices for Operating Commercial Small Unmanned Aircraft Systems
This guide provides cybersecurity best practices to help commercial operators protect their networks, information, and personnel. Critical infrastructure operators, law enforcement, and all levels of government are increasingly incorporating small unmanned aircraft systems (sUAS) into their operational functions. Although sUAS offer benefits to their operators, they can also pose cybersecurity risks.
Link: Best Practices for Operating Small Commercial UASs (.pdf, 369 KB)
Small Unmanned Aircraft Systems and Critical Infrastructure – Understanding the Risk Video
This video provides information on critical infrastructure challenges associated with small unmanned aircraft systems (sUAS), counter-UAS security practices, actions to consider for risk mitigation, and specific preparedness efforts for facilities and organizations. It can be found under the sUAS and Critical Infrastructure – Understanding the Risk tab.
Link: sUAS Understanding the Risk Video
Small Unmanned Aircraft Systems Frequently Asked Questions
This site provides answers to common questions about small unmanned aircraft systems (sUAS) for critical infrastructure owners and operators.
Link: sUAS Frequently Asked Questions
Unauthorized Drone Activity Over Sporting Venues
This document presents options for sporting venue owners and operators to consider to prevent, protect from, and respond to unauthorized drone activity.
Link: Unauthorized Drone Over Sporting Venues (.pdf, 207 KB)
Small Unmanned Aircraft Systems: Addressing Critical Infrastructure Security Challenges
This fact sheet provides an overview of sUAS-related threats and actions owners and operators can take to protect their facilities.
Link: sUAS Security Challenges (.pdf, 128 KB) and sUAS Considerations for Law Enforcement Actions (.pdf, 637 KB)
Small Unmanned Aircraft Systems Critical Infrastructure Drone Pocket Card
This card provides a quick reference guide for critical infrastructure security and operations officers and the general public on how to report small unmanned aircraft systems (sUAS) activity, including what information to share and what actions to take.
Link: sUAS Drone Pocket Card (.pdf, 403 KB)
Protect, Screen, and Allow Access to Facilities and Venues
Commercial Facilities Publications: Protective Measures Guides
These guides provide businesses with an overview of threats and offer suggestions for planning, coordinating, and training activities that contribute to a safe environment for guests and employees. They are For Official Use Only (FOUO), but businesses can request access through the Commercial Facilities page of the Homeland Security Network-Critical Infrastructure (HSIN-CI), which requires registration.
- Protective Measures Guide for U.S. Sports Leagues
- Protective Measures Guide for the U.S. Lodging Industry
- Protective Measures Guide for Mountain Resorts
- Protective Measures Guide for Outdoor Venues
- Protective Measures Guide for Commercial Real Estate
Link: Commercial Facilities Publications
Dams Sector Active and Passive Vehicle Barriers Guide
This guide assists dam owners and operators in understanding various types of active and passive vehicle barriers and how to incorporate them into their overall security plan. It also provides technical information to assist owners and operators in properly designing protective schemes and selecting vehicle barriers and their safety and security systems.
Link: Dams Active and Passive Vehicle Barriers Guide (.pdf, 5,066 KB)
Evacuation Planning Guide for Stadiums
This guide helps stadium owners and operators prepare evacuation plans and determine when and how to evacuate, shelter-in-place, or relocate. It also includes a template to create a plan based on policies and procedures of state and local governments, surrounding communities, and specific stadium characteristics.
Link: Evacuation Planning Guide for Stadiums (.pdf, 519 KB)
Public Venue Security Screening Guide
This guide provides options for stakeholders to consider when developing and implementing security screening procedures at public venues hosting a variety of events, including sporting events concerts, fairs and family festivals, conventions, theme parks, and other events or functions where Americans gather.
Link: Public Venue Security Screening Guide (.pdf, 901 KB)
Public Venue Security Screening Guide Touchless Screening Annex
This guide provides options for consideration when developing and implementing security screening procedures for major sporting events, concerts, fairs and expos, and similar large gatherings. The purpose of this annex is to outline specific considerations for touchless screening protocols as a supplement to the general screening considerations outlined in the Cybersecurity and Infrastructure Security Agency’s (CISA) Public Venue Security Screening Guide.
Link: Public Venue Security Screening Guide Touchless Screening Annex (.pdf, 524 KB)
Protecting Patrons During the Holiday Shopping Season
This resource provides potential security measures for shopping venues during the holiday season and identifies suspicious behaviors, protective measures, and resources to enhance security.
Link: Protecting Patrons During the Holiday Shopping Season (.pdf, 408 KB)
Public Venue Bag Search Procedures Guide
This guide provides suggestions for developing and implementing bag search procedures at venues hosting major events. Venue owners, operators, and event organizers should engage local partners to implement the procedures outlined in this guide.
Link: Public Venue Bag Search Procedures Guide (.pdf, 1,931 KB)
Public Venue Credentialing Guide
This guide offers best practices for developing and implementing credentialing procedures at venues hosting a variety of public gatherings.
Link: Public Venue Credentialing Guide (.pdf, 707 KB)
Vehicle-Borne Improvised Explosive Device Identification Guide and Video
This guide is designed for stakeholders tasked with identifying suspected vehicle-borne improvised explosive devices (VBIEDs) and provides instruction for vehicle search techniques for law enforcement, bomb squads, hazardous materials (HAZMAT) teams, and other emergency and security personnel. The Vehicle Inspection Guide, Vehicle Inspection Video, and VBIED Identification Guide are all available to registered users on TRIPwire.
Link: Vehicle-Borne Improvised Explosive Device Identification Guide and Video
Safeguard and Secure Cyberspace
Stadium Spotlight: Connected Devices and Integrated Security Considerations
This resource provides stadium operators and security professionals with a quick-hit product that highlights the connected stadium environment, key vulnerabilities and consequences, and recommended enterprise- and asset-level risk mitigations. It also points stakeholders to relevant CISA and National Center for Spectator Sports Safety and Security (NCS⁴) tools and resources.
Link: Stadium Spotlight: Connected Devices and Integrated Security Considerations (.pdf, 1,213 KB)
Assessments: Cyber Resilience Review
The Cyber Resilience Review (CRR) is a no-cost, voluntary, non-technical assessment to evaluate an organization's operational resilience and cybersecurity practices. The CRR may be conducted as a self-assessment or as an on-site assessment facilitated by CISA cybersecurity professionals. The CRR assesses enterprise programs and practices across a range of ten domains, including risk management, incident management, service continuity, and others. The assessment is designed to measure existing organizational resilience, as well as provide a gap analysis for improvement based on recognized best practices.
Link: Assessments: Cyber Resilience Review
Avoiding Social Engineering and Phishing Attacks Security Tip
This security tip describes social engineering tactics, techniques, and procedures linked to cyber criminals. It also details common indicators related to social engineering attacks and how to avoid falling for these methods.
Link: Avoiding Social Engineering and Phishing Attacks Security Tip
CISA Community Webinars
These cybersecurity webinars provide information on cyber risk management practices, tools, and procedures. Past webinars have focused on COVID-19 Response: Lessons Learned on Cybersecurity and Resilience in a Pandemic; Smart Cities; and 5G: Security and Vulnerabilities.
Link: CISA Community Webinars
CISA Cyber Essentials
This campaign is for small businesses and local government agencies to understand and address cybersecurity risk. Cyber Essentials includes two parts – guiding principles to develop security culture and specific actions for leaders and IT professionals.
Link: CISA Cyber Essentials (.pdf, 1,201 KB)
Cybersecurity Advisors
Cybersecurity Advisors (CSAs) offer assistance to help prepare and protect private sector entities and state, local, tribal and territorial (SLTT) governments from cybersecurity threats. CSAs promote cybersecurity preparedness, risk mitigation, and incident response capabilities, working to engage stakeholders through partnership and direct assistance activities.
Link: Cybersecurity Advisors
Cyber Resource Hub
This site provides cybersecurity assessments that evaluate operational resilience, cybersecurity practices, organizational management of external dependencies, and other elements that comprise a robust cybersecurity strategy.
Link: Cyber Resource Hub
Cybersecurity Resources Road Map: A Guide for Critical Infrastructure – Small and Midsize Businesses
This guide helps businesses identify cybersecurity resources that best align with their needs.
Link: Cybersecurity Resources Road Map
National Cyber Awareness System
The National Cyber Awareness System (NCAS) provides cybersecurity advisories and alerts via social media, news syndication, and email.
Link: National Cyber Awareness System
Stadium Spotlight: Connected Devices and Integrated Security Considerations
This resource provides stadium operators and security professionals with a quick-hit product that highlights the connected stadium environment, key vulnerabilities and consequences, and recommended enterprise- and asset-level risk mitigations. It also points stakeholders to relevant CISA and National Center for Spectator Sports Safety and Security (NCS⁴) tools and resources.
Link: Stadium Spotlight: Connected Devices and Integrated Security Considerations (.pdf, 1,213 KB)
Telework Essentials Toolkit
This toolkit is designed to help business leaders, IT staff, and end users transition to a secure, permanent telework environment through simple, actionable recommendations. It provides three modules tailored for executive leaders, IT professionals, and teleworkers.
Link: Telework Essentials Toolkit (.pdf, 251 KB)