Protective Security Advisor Program Brief PRIMA Idaho Chapter Meeting – Pocatello, ID May 2018 FOR OFFICIAL USE ONLY
Protective Security Advisor Program FOR OFFICIAL USE ONLY Protective Security Advisor Program Plan, coordinate, and conduct security surveys and assessments – PSAs conduct voluntary security surveys and assessments on critical infrastructure Plan and conduct outreach activities – PSAs conduct outreach activities with critical infrastructure owners and operator and public sector stakeholders Support National Special Security Events and Special Event Activity Rating events – PSAs plan, lead, and coordination special event security Respond to incidents – PSAs deploy to Unified Area Command Groups, Joint Operations Centers, and/or State and local Emergency Operations Centers Coordinate and support improvised explosive device awareness and risk mitigation training Idaho PSA: Eric Puype, eric.puype@hq.dhs.gov FOR OFFICIAL USE ONLY
Active Shooter Preparedness Program FOR OFFICIAL USE ONLY Active Shooter Preparedness Program Active Shooter Preparedness Program DHS maintains a comprehensive set of resources and in-person and online training Active Shooter Online Training One-hour online course (IS-907 Active Shooter: What You Can Do) provides an introductory lesson http://www.training.fema.gov/is/crslist.aspx (type Active Shooter in the search bar) Active Shooter Preparedness Workshop Series Scenario-based workshops feature facilitated discussions to inform participants on best practices Contact the Active Shooter Preparedness Program at ASworkshop@hq.dhs.gov Active Shooter Online Resources Booklets, pocket guides, 90-minute webinar, and other resources http://www.dhs.gov/activeshooter Contact Information For general information email ASworkshop@hq.dhs.gov. FOR OFFICIAL USE ONLY
National Cybersecurity Assessments and Technical Services FOR OFFICIAL USE ONLY National Cybersecurity Assessments and Technical Services Cybersecurity services available at no-cost to stakeholders Confidential and non-attributable information collected Cyber Hygiene: Vulnerability Scanning Scanning of internet accessible systems for vulnerabilities, configuration errors, and security Phishing Campaign Assessments Measures propensity to click on email phishing lures to increase training and awareness Risk Assessments Risk and Vulnerability Assessments Remote Penetration Testing Red Team Assessments Validated Architecture Design Review Evaluates resiliency systems, networks, and security Training and Qualification Assist in training third-party teams w/ DHS assessment standards Request at: NCATS_INFO@hq.dhs.gov FOR OFFICIAL USE ONLY
Improvised Explosive Devise and Risk Mitigation Training FOR OFFICIAL USE ONLY Improvised Explosive Devise and Risk Mitigation Training Virtual Instructor Led Training IED Construction and Classification Introduction to the Terrorist Attack Cycle Response to Suspicious Behaviors and Items IED Explosive Effects and Mitigation Homemade Explosives (HME) and Precursor Awareness Computer Based Training IED Awareness and Safety Procedures Homemade Explosives and Precursor Chemicals Awareness for Public Safety Instructor Led Training Protective Measures Awareness Bombing Prevention Awareness Vehicle-Borne Improvised Explosive Device (VBIED) Detection Protective Measures IED Search Procedures Surveillance Detection for Law Enforcement and Security Professionals Bomb Threat Management Planning FOR OFFICIAL USE ONLY
Eric Puype Protective Security Advisor eric.puype@hq.dhs.gov