Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Breadcrumb
  1. Home
  2. Topics
  3. Physical Security
  4. Conflict Prevention
Share:
Red and blue cyber node design

Conflict Prevention

A single individual can help deter threats and prevent harm by spotting suspicious activity and reporting it.

Physical Security

  • Active Shooter Preparedness
  • Bombing Prevention
  • Insider Threat Mitigation
  • Conflict Prevention
  • Protecting Houses of Worship
  • School Safety
  • Securing Public Gatherings
  • Be Air Aware
  • Vehicle Ramming Mitigation

Overview

Industries face a variety of threats - both internal and external - from hostile governments, terrorist groups, disgruntled employees, and malicious introducers. Alert employees can spot suspicious activity and report it. The power is in the employee, citizen, patron, or any person who can observe and report. 

CISA’s Role

CISA offers a variety of tools and resources to empower and educate employees, citizens, patrons, or any person with the skills and support they need to identify and report suspicious behavior. CISA recognizes the power that a single individual can have in deterring threats and preventing harm. CISA offers a variety of resources and tools tailored to harness the power of the individual in the securing the safety of our nation.

Featured Content

De-escalation Products and Resources

CISA encourages organizations to train all personnel to recognize suspicious behaviors and activities and to safely address the situation. When properly trained, alert employees can recognize, assess, de-escalate, and report.

Power of Hello

The OHNO approach – Observe, Initiate a Hello, Navigate the Risk, and Obtain Help – helps employees observe and evaluate suspicious behaviors, and empowers them to mitigate potential risk, and obtain help when necessary.

Insider Threat Mitigation

An insider is any person who has or had authorized access to or knowledge of an organization’s resources. Insider threat is the potential for an insider to use their authorized access or understanding of an organization to harm that organization. 

Violence Prevention Through De-escalation Video

CISA developed the Violence Prevention Through De-escalation Video to help the critical infrastructure community and public gathering locations identify concerning behaviors and mitigate the risk from incidents of targeted violence.

Translated Resources

Explore our Power of Hello and De-Escalation Series resources, both of which are available in a variety of translations.

Power of Hello Translated Resources

The Power of Hello products provide stakeholders with information to assist in identifying and effectively responding to suspicious behavior. 

De-Escalation Series Translations

The De-Escalation Series helps critical infrastructure owners, operators, and staff identify and navigate suspicious activity or potentially escalating situations as well as safely dis-engage and report these situations.

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA SayCISA@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback