Download presentation
Presentation is loading. Please wait.
1
Protective Security Advisor Program Brief
PRIMA Idaho Chapter Meeting – Pocatello, ID May 2018 FOR OFFICIAL USE ONLY
2
Protective Security Advisor Program
FOR OFFICIAL USE ONLY Protective Security Advisor Program Plan, coordinate, and conduct security surveys and assessments – PSAs conduct voluntary security surveys and assessments on critical infrastructure Plan and conduct outreach activities – PSAs conduct outreach activities with critical infrastructure owners and operator and public sector stakeholders Support National Special Security Events and Special Event Activity Rating events – PSAs plan, lead, and coordination special event security Respond to incidents – PSAs deploy to Unified Area Command Groups, Joint Operations Centers, and/or State and local Emergency Operations Centers Coordinate and support improvised explosive device awareness and risk mitigation training Idaho PSA: Eric Puype, FOR OFFICIAL USE ONLY
3
Active Shooter Preparedness Program
FOR OFFICIAL USE ONLY Active Shooter Preparedness Program Active Shooter Preparedness Program DHS maintains a comprehensive set of resources and in-person and online training Active Shooter Online Training One-hour online course (IS-907 Active Shooter: What You Can Do) provides an introductory lesson (type Active Shooter in the search bar) Active Shooter Preparedness Workshop Series Scenario-based workshops feature facilitated discussions to inform participants on best practices Contact the Active Shooter Preparedness Program at Active Shooter Online Resources Booklets, pocket guides, 90-minute webinar, and other resources Contact Information For general information FOR OFFICIAL USE ONLY
4
National Cybersecurity Assessments and Technical Services
FOR OFFICIAL USE ONLY National Cybersecurity Assessments and Technical Services Cybersecurity services available at no-cost to stakeholders Confidential and non-attributable information collected Cyber Hygiene: Vulnerability Scanning Scanning of internet accessible systems for vulnerabilities, configuration errors, and security Phishing Campaign Assessments Measures propensity to click on phishing lures to increase training and awareness Risk Assessments Risk and Vulnerability Assessments Remote Penetration Testing Red Team Assessments Validated Architecture Design Review Evaluates resiliency systems, networks, and security Training and Qualification Assist in training third-party teams w/ DHS assessment standards Request at: FOR OFFICIAL USE ONLY
5
Improvised Explosive Devise and Risk Mitigation Training
FOR OFFICIAL USE ONLY Improvised Explosive Devise and Risk Mitigation Training Virtual Instructor Led Training IED Construction and Classification Introduction to the Terrorist Attack Cycle Response to Suspicious Behaviors and Items IED Explosive Effects and Mitigation Homemade Explosives (HME) and Precursor Awareness Computer Based Training IED Awareness and Safety Procedures Homemade Explosives and Precursor Chemicals Awareness for Public Safety Instructor Led Training Protective Measures Awareness Bombing Prevention Awareness Vehicle-Borne Improvised Explosive Device (VBIED) Detection Protective Measures IED Search Procedures Surveillance Detection for Law Enforcement and Security Professionals Bomb Threat Management Planning FOR OFFICIAL USE ONLY
6
Eric Puype Protective Security Advisor
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.