Insider Risk Management Program
Guidance & Resources
Insider Risk Management Guidance
& Resources
Workplace Violence Mitigation Resources
Insider Risk Management requires a comprehensive, holistic,
multidisciplinary and collaborative approach to be effective. Insider
Threats is not just a Human Resources Department problem, or a
technical problem solved by the CIO / IT Network Security
Administrators.
The
success of an organizations Insider Risk Management efforts, is
heavily dependent on the collaboration between many departments (Key
Stakeholders) and individuals within an an organization. (Insider Risk
Program Managers, Insider Threat Analyst, CSO CIO - IT Network Security,
CISO, Human Resources, Legal, Etc.)
This website will provide an abundance of educational resources and
guidance needed for developing, managing or enhancing an Insider Risk
Management
Program.
This website is also very well suited for any organization that is not
required to implement an Insider Risk Management Program, but is concerned with
employee risk and threat identification and mitigation, and interested in
implementing an Insider Risk Management Framework.
INSIDER THREAT INCIDENTS
AND THE SERIOUS IMPACTS
Managing employee risks
and threats
in a organization, is more than just dealing with Employee
Dissatisfaction, Employee - Supervisor Relation Problems, Negative
Performance Reviews, Diversity Problems, Suspicious Technical Behaviors,
preventing Sexual Harassment, Workplace Violence,. etc.
There are many other types of Malicious Actions caused employees, who
may be very disgruntled, that can be very damaging and have very serious
impacts to an organization;
Examples
Financial Loss (Trade
Secrets / Data Theft, Embezzlement)
Operational Impact For The
Organization To Execute Its Mission (IT / Network Sabotage, Data
Destruction. Facility Sabotage)
Legal, Compliance &
Liability Impacts
Stock Price Reduction
Employees Lose Jobs
Company Goes Out Of
Business and more
CISA
Insider Threat Types Chart
CERT Insider
Threat Chart
(Threats Vs. Damages)
Research indicates many
employees may not be disgruntled, but have other motives such as
financial gain to live a better lifestyle, etc.
Most Trusted Employees who turn Malicious and harm their employers by
committing financial theft, leaking sensitive data, sabotaging computer
networks, or committing violence in the workplace, are not spontaneous
in their actions. Often Malicious Employees exhibit behaviors of
concerns weeks or months before they act.
The NITSIG in conjunction with the Insider Threat Defense have
researched and analyzed over 5,400 Insider Threat incidents over
13+ years, and produces EYE OPENING monthly reports on how
serious the Insider Threat problem is, and the very costly and damaging
impacts to businesses and organizations of all types and sizes.
The
SEVERE IMPACTS can be caused by JUST 1 EMPLOYEE, or by MULTIPLE
EMPLOYEES WORKING WITH EXTERNAL CO-CONSPIRATORS.
We encourage you to read the reports on this
link, to grasp the magnitude of the Insider Threat problem.
U.S. GOVERNMENT / DEPARTMENT OF DEFENSE
Insider Threat Program Policies
National Insider Threat Policy
United States Department of Agriculture Insider Threat Program Policy
General Services Administration Insider Threat Program Policy
Department Of Treasury Insider Threat Program Policy
Department Of Energy Insider Threat Program Policy
Department Of Justice Insider Threat Program Policy
NASA Insider Threat Program Policy
Nuclear
Regulatory Commission Insider Threat Program Policy & Implementation
Plan
Defense
Security Service Insider Threat Identification And Mitigation Program
Policy
Navy Bureau Of Medicine And Surgery Insider Threat Program Policy
U.S. Marines Insider
Threat Program Policy
Peace Corps
Insider Threat Program Policy
DoD
Insider Threat Management & Analysis Center (DITMAC)
DITMAC FAQ's
DITMAC Overview
Presentation
DoD 2022 Audit On DoD Components Reporting To DITMAC (Summary)
DoD 2022 Audit On DoD Components Reporting To DITMAC (Full Report)
INSIDER THREAT PROGRAM (ITP) DEVELOPMENT, MANAGEMENT & OPTIMIZATION
TRAINING
Offered By:
Insider Threat Defense Group (ITDG)
ITP Development, Management & Optimization Training Course
2 Day In Person / Classroom Training
1 Day Live Web Based Training
This
highly sought after and
very
comprehensive training course will ensure that the ITP Manager and other
key stakeholders that support the ITP (Insider Threat Analyst, FSO, CSO,
CISO, Human Resources, CIO - IT, Network Security, Counterintelligence
Investigators, Mental Health / Behavioral Science Professionals, Legal
Etc.), have the Core / Advanced Knowledge, Blueprint, Resources
needed for developing, managing, or optimizing an ITP / Working Group.
(Training
Course Brochure)
The
ITDG has certified 1000+ individuals as ITP Managers.
Our students have endorsed
and given this training EXCEPTIONAL reviews for the comprehensive
knowledge and resources provided. We encourage you to read the feedback
from our students on this
link.
The ITDG is so confident that our training greatly surpasses the
knowledge and resources provided in other related ITP Management
Training Courses, that all our training courses come with a money back
training guarantee
Other Insider Risk Management Program Training Courses Offered By ITDG
The ITDG Has
Provided Insider Risk Management Program Training & Consulting Services
To An Impressive List Of 675+ Clients:
White House, U.S. Government Agencies, Department Of Defense (U.S.
Army, Navy, Air Force & Space Force, Marines), Defense Contractors,
Intelligence Community Agencies (DIA, NSA, NGA), Law Enforcement (DHS,
TSA, FBI, U.S. Secret Service, DEA, Police Departments), Critical
Infrastructure Providers (Power & Water), Aviation / Aerospace Providers
(JetBlue Airways, Delta Airlines, Spacecraft Manufacturing & Launch),
Banking & Financial Industry (Visa, Capital One Bank, BB&T Bank, HSBC
Bank, KeyBank, Goldman Sachs, American Express, Equifax, TransUnion),
Health Care Industry, Universities, Fortune 100 / 500 companies and
others; Microsoft, Verizon, Walmart, Home Depot, Nike, Tesla, Dell
Technologies, Nationwide Insurance, Discovery Channel, United Parcel
Service, FedEx Custom Critical, and many more.
Client Listing
INSIDER
RISK MANAGEMENT (IRM) PROGRAM CONSULTING SERVICES
OFFERED BY: THE ITDG
Conducted Via Classroom / Onsite / Web Based
-
Executive Management
& Stakeholder Briefings For IRM
-
IRM Program Training
& Workshops For C-Suite, Insider Risk Program Manager / Working Group,
Insider Threat Analysts & Investigators
-
IRM Program
Development, Management & Optimization Training & Related Courses
Insider Risk – Threat Vulnerability Assessments
-
IRM Program Maturity
Evaluation, Gap Analysis & Strategic Planning Guidance
Insider Threat Awareness Training For Employees’
-
Insider Threat
Detection Tool Gap Analysis & Pre-Purchasing Guidance / Solutions
Data Exfiltration Assessment (Executing The Malicious Insiders Playbook
Of Tactics)
-
Technical
Surveillance Counter-Measures Inspections (Covert Audio / Video Device
Detection)
-
Employee Continuous
Monitoring & Reporting Services (External Data Sources)
-
Customized IRM
Consulting Services For Our Clients
More Information
INSIDER THREAT PROGRAM DEVELOPMENT, MANAGEMENT & OPTIMIZATION GUIDANCE / RESOURCES
Developing An Insider Threat Program - It Starts With Security 101
Foundations
(Federal New Radio Interview W/ Jim Henderson - NITSIG Founder / Chairman)
Common Pitfalls For Insider Risk Management Programs
(NITSIG-ITDG)
Effective Insider Threat Programs: Understanding And Avoiding Potential
Pitfalls (CMU ITC)
CPNI Insider Risk Mitigation Framework Diagram
Exterro Best Practices Guide For Insider Threat Mitigation
(NITSIG-ITDG)
Exterro Insider Threat Program Checklist
(NITSIG-ITDG)
Insider Threat Program Development - Management Manual
NCSC Guidance On Establishing An Insider Risk Program
CISA Insider Threat Mitigation Framework Guide
CISA Insider Risk Mitigation Program Evaluation Guide (Mouse
Right Click To Download)
INSA Insider Threat Program Naming Convention
INSIDER
THREAT REPORTING & INVESTIGATIONS
Insider Risk Investigation Decision Tree
Insider Threat Reporting & Investigations Templates (CISA)
Workplace Investigations Overview - Basic Issues For Employers / Legal
Considerations
INSIDER
THREAT MITIGATION GUIDANCE / RESOURCES
Preventing Insider Threats Starts With The Risk Management 101
(NITSIG)
A Worst Practices Guide To Insider Threats: Lessons From Past Mistakes
Insider Threats: A
Worst Practices Guide To Preventing Leaks, Thefts, Attacks, and Sabotage
(Video)
DHS
CERT Combating The Insider Threat
SANS Insider Threat Mitigation Guidance
Insider Threat
Mitigation Best Practices Guide
(Securities Industry &
Financial Markets Association)
Intel Insider Threat Field Guide
The Definitive Guide To Security Inside the Perimeter
Teleworking Guidance To Mitigate Employee Risks
(ITDG)
COVID Vaccine Mandate
And Insider Threat Implications
(NITSIG)
Insider Threat Mitigation For The Critical Infrastructure
INSA Managing Insider Risks During Mergers & Acquisitions
UK Centre
For The Protection Of National Infrastructure (CPNI)
CPNI
Guidance For Reducing Insider Threat Risk
CPNI Insider Risk Mitigation Framework
CPNI Insider Risk Mitigation Framework Diagram
Insider Threat Mitigation Checklists
National Insider Threat Task Force - Best Practices Guide For Insider Threat
CERT Common Sense Guide To Mitigating Insider Threats -
6th Edition
CERT Common Sense Guide To Mitigating Insider Threats 7th Edition
CERT Insider Threat Risk Mitigation Best Practices - Mapped To NIST
SP800-53 Security Controls
CERT Insider Threat Risk Mitigation Best Practices
Insider Threat Risk Mitigation Checklist
(Based Of Of
CERT Insider Threat Risk Mitigation Best Practices)
DoD PERSEREC- Insider Risk Evaluation And Audit Tool Checklist
Considerations For Outsourcing Work To Third Party Contractors Checklist
Employee
Monitoring For Computer Systems / Networks
Guidance
& Legal Aspects For Employee Monitoring
Workplace Privacy And Employee Monitoring Guidance (Privacy
Rights Clearinghouse)
A Comprehensive Guide to Employee Monitoring Laws in The U.S.
Monitoring Employees' Use Of Company Computers And The Internet By Texas
Workforce Commission
Guidance For
Implementing An Employee User Activity Monitoring Program
Insider Threat Detection Tool Research & Workshop Conducted By NITSIG &
University Of Maryland’s Applied Research Laboratory For Intelligence &
Security
Presentation To NITSIG Members
Insider Threat Red Flag Checklists
The documents listed below can be used to tweak existing network
security tools for Insider Threat detection. Additionally they can be
used when evaluating Insider Threat Detection Tools for evaluation and
purchase.
Insider Threat Red Flags Indicators Checklist
(DTex Systems)
Insider Threat Red Flags Indicators Checklist
(ObserveIT)
Free USB
Security Test - Will Your Employee's Plug In A USB Device They Find?
Employee Monitoring Policies
University Of Nottingham (Covers GDPR) / Covers Monitoring For Physical,
Telephones. E-Mails, IT / Internet
Company Acceptable User & Monitoring Policy For IT Systems
INSIDER THREAT PROGRAM MATURITY & OPTIMIZATION
GUIDANCE
Insider Threat Program
Maturity Model Report (2019)
The Insider Threat
Defense Group initially developed the Insider Threat Program
Maturity Model Report for Veriato. Veriato provides various Employee
Activity Monitoring solutions for detecting and mitigating Insider
Threats.
The Veriato Insider Threat
Program Maturity Model report was
created to help Insider Threat Program Managers and security professionals, assess their organization’s
ability to monitor for, detect, and respond to Insider Threats.
The report is an extensive 23 page document developed to assess the
several maturity stages that companies go through when implementing an
Insider Threat Program. The document will aid Insider Threat Program
Managers in optimizing their individual Insider Threat Programs.
By using a maturity model for reference, organizations can see where
their Insider Threat Programs needs improvement, working towards an optimized level of
maturity.
To provide context around the current state of Insider Threat Program's, Veriato surveyed
150 information security professionals to see at what level their
Insider Threat Program was
in, and what’s influencing it. This data is included in the report, to
provide you with insight into the necessary steps to optimize your current
Insider Threat Program. (Source)
How Did NASA Rate
The Maturity Of Their Insider Threat Program?
They used the above referenced Insider Threat Program Maturity
Model.
NASA Insider Threat
Program Report (Reference Insider Threat Defense Group Page 17)
Insider Threat Program Maturity Framework (2018)
The National Threat Task Force (NITTF) released the Insider Threat
Program Maturity Framework on November 1, 2018.
The Framework is an aid
for advancing federal agencies’ programs beyond the Minimum Standards,
and builds upon best practices found in the 2017 NITTF Insider Threat
Guide.
The goal is to help
programs become more proactive, comprehensive, and better postured to
deter, detect, and mitigate insider threat risk. (Source)
Measuring The
Effectiveness Of Insider Threat Programs (INSA)
This
document provides guidance on building effective ways to measure the
success of an Insider Threat Program. It is important to assess whether
and to what extent the Insider Threat Program has an impact. Moreover,
specific metrics can help to justify the Insider Threat Program to
leadership resulting in continued funding, resources, and support. The
effective measurement of an Insider Threat Program depends on an
organization’s unique set of requirements and its desired business
outcomes.
INSIDER THREAT PROGRAM GUIDANCE / RESOURCES FOR DOD CONTRACTORS
OFFERED BY DEFENSE
COUNTERINTELLIGENCE & SECURITY AGENCY (DCSA)
Insider Threat Program Requirement For Defense Contractors (NISPOM
ISL 2016)
DCSA Insider Threat Program Guidance
DCSA Establishing An Insider Threat Program for Your Organization.zip
DCSA Insider Threat Program Training / Insider Threat Awareness Training
DCSA Roles And Responsibilities For Personnel Security - A Guide For
Supervisors
SECURITY CLEARANCE GUIDANCE / RESOURCES
National Security Adjudicative Guidelines (DNI)
DNI Employee Continuous Evaluation For Security Clearance Holders FAQs
DoD PERSEREC Adjudicative Desk Reference - Version 4 - March 2014
Classified
Information Nondisclosure Agreement SF312 Briefing Booklet
(See Page 9 To Page 19 For Legislative & Executive Authorities. The Pages Should
Be Briefed And Signed By The Individual Signing The SF312)
Security Clearance Holder Reporting Requirements (DNI)
Security Clearance Holder Reporting Requirements (DCSA)
Reporting Requirements For Personnel With Access To Classified
Information Or Who Hold a Sensitive Position
(Briefing) (DNI)
DSS How To Receive And Maintain A Security Clearance
DOD
Security Clearance Briefing
(Presentation)
LEGAL CONSIDERATIONS / GUIDANCE FOR INSIDER THREAT PROGRAMS
Laws And Regulations Related To Insider Threats - Espionage - Fraud
(NITSIG)
Identifying And Safeguarding Personally Identifiable Information
Training
(DISA)
Insider Threat Best Practices Guide
(Securities Industry &
Financial Markets Association (SIFMA) -
Legal Guidance
Pages 18-27)
Insider Threat Best Practices Guide
(SIFMA 2nd Edition )
Workplace Privacy And Employee Monitoring Guidance (Privacy
Rights Clearinghouse)
Department Of Justice
Prosecuting Computer Crimes Manual
Department Of Justice
Prosecuting
Intellectual Property Crimes Manual
Department Of
Justice Searching - Seizing Computers And Obtaining Electronic Evidence
In Criminal Investigations Manual
EMPLOYEE
HIRING / BACKGROUND INVESTIGATIONS / SEPARATIONS - TERMINATIONS
Human Resources And Insider Threat Mitigation - A Powerful Pairing
Human Resources Role In Preventing Insider Threats
The Safe
Hiring Manual (By Attorney Lester Rosen)
Top Ten Background Check Trends For
2021
Background Checks - What Employers Need to Know
(Federal Trade Commission)
Background Checks - Common Ways Prospective Or Current Employees Sue
Employers Under The FCRA
Ten Potential Dangers When Using Social Media Background Checks
Employment Separation And Termination Strategies - Checklist
Guidance For Suspensions And Terminations Of Employees
Supervisors Guide To Employee Separation
Employee Termination Best Practices
Employee
Separation Checklist-1
Employee
Separation Checklist-2
Best Practices For Protecting Your Data When Employees Leave Your
Company
Best Practices For The Separation / Termination Of IT - Network Security
Professionals
Firing
Violent Employees Safely
Preventing Workplace Violence When Terminating An Employee
Guidance For Terminating A Violent Employee
Deadly Terminations And How To Avoid Them
EMPLOYEE
CONTINUOUS MONITORING & REPORTING
Insider Threat Detection And Mitigation Using External Data Sources
(NITSIG)
A Guide For Employers To Implement Continuous Screening Program
The Use of Publicly Available Electronic Information For Insider Threat
Monitoring
Continuous Screening of Employees Will Gain More Acceptance As Critical
Post-Hire Due Diligence Tool
Endera EBook: 5 Reasons Background Screenings Are Obsolete
Endera Employee Continuous
Monitoring Service Overview
CLEAR Online Investigative Platform Investigation By Thomson Reuters
IDI Employee Risk
Management-Investigation Solutions
TLOXP Employee Risk
Management-Investigation Solutions By Transunion
INSIDER
THREAT BEHAVIORAL INDICATORS GUIDANCE
Insider Threat Behavioral Indicators Guidance, Webinars, Presentations
Behavioral Indicators Of Concern
For Insider Threat Programs
Part 1 (NITSIG)
Behavioral Indicators Of Concern
For Insider Threat Programs
Part 2
(NITSIG)
DCSA Insider Threat
Behavioral Indicators Brochure
DCSA Insider Threat Potential Risk Indicators Guide
DCSA Roles And Responsibilities For Personnel Security - A Guide For
Supervisors
Behavioral Indicators For Malicious Insider Theft Of Intellectual
Property
Insider Threat Behavioral Science
Behavioral Analysis In Insider Threat Programs Webinar (Dr. Robert Gallagher
- NITSIG Advisory Board Member / Scientific Director)
Behavioral Indicators And The Critical Pathway To Insider Threats (DITMAC - Dr.
Gallagher)
Application Of The Critical-Path Method To Evaluate Insider Risks
Assessing The Mind Of The Malicious Insider
Psychology Of Spies
Webinar (DCSA)
INSIDER
THREAT AWARENESS GUIDANCE / TRAINING
Insider Threat Awareness & Incident Response Flowchart For DoD
This guide /
flowchart assists in three areas. First, it aides military leaders and
all personnel to be aware of the indicators associated with insider
threat activity while serving in a partnering environment. Second, this
guide informs commanders and other leaders by giving them options on how
to mitigate insider threat activities. Lastly, this guide is meant to
generate open dialogue between coalition partners and partner nation
personnel. Partnering in itself is a sensitive mission and only by
creating trust and having an open dialogue with all forces will the
mission be accomplished. This guide is not all encompassing so there are
other options a commander has dependent on their operating environment.
Insider Threats In Partnering
Environments Flowchart For DoD
Insider Threat & Counterintelligence Awareness Training Resources
Insider Threat Awareness Briefing
Espionage- Insider Threat Indicators Briefing - Dept Of Commerce
DoDD
5240.06 - Counterintelligence Awareness And Reporting Requirements
DSS Insider Threat
Awareness Web Based Training
DSS Insider Threat Awareness Training Student Guide
DSS
Insider Threat Awareness Training
DSS Insider Threat Awareness Trifold - What To Report
DSS
Roles And Responsibilities For Personnel Security- A Guide For
Supervisors
DSS
Elicitation And Recruitment Brochure
FBI The Insider Threat - An Introduction To Detecting And Deterring
An Insider Spy
FBI Economic Espionage - How To Spot A Possible Insider Threat
FBI Counterintelligence
FBI Elicitation Techniques
NSA
Insider Threat Brochure
US CERT- Combating The Insider Threat
NCSC Countering Foreign Intelligence Threat - Implementation & Best
Practices Guide
Insider Threat Awareness Briefing - US Marines
Army Threat Awareness And Reporting Program Regulation 381-12 -- June
2016
Insider Threat & Espionage Awareness Videos / Movies
FBI Video The
Nevernight Connection
This video details an Intelligence Community Official who was
targeted by China via a fake profile on a professional networking site,
and was recruited to turn over classified information before being
arrested. (Watch)
DNI Insider
Threat Awareness Video
Department of Homeland Security
(DHS) - Insider Threat Awareness Video
If You See
Something, Say Something -Insider Threat Awareness Video
FBI
Movie - The Company Man
(Watch On-Line / Download)
FBI Movie: Game Of
Pawns (Watch On Internet Or Download)
FBI Movie: Betrayed
(Request Showing By FBI At Your Organization)
Voices Of The
Betrayed - Co-Workers Speak About The People They Knew And Trusted
Witness To
History: The Investigation of Robert Hansen
Terminal Risk Economic And
Industrial Espionage Awareness Videos
Insider
Threat / Espionage Posters
Insider Threat Security Poster - Your Name Here
Insider
Threat - Hidden Threat Poster
Uncle
Sam - Insider Threat Poster
Preventing Espionage - CI-Security Programs Poster
Robert Hansen Poster
Espionage Does Pay - Prison Is The Bank Poster
National
Counterintelligence And Security Center Posters
Army Poster- Indicators Of Potential Terrorist / Associated Insider
Threat
DATA LOSS
PREVENTION / PROTECTION
Data Lifecycle
Security
Data Leakage
For Dummies
Best Practices For Protecting Data When Employees Leave Your Company
Data / Information Exfiltration
DoD PERSERC Report Summary - Data Exfiltration Project
(2019)
DoD
PERSERC Report - How Trusted Insiders Exfiltrated Data In The DoD
(2019)
3M Visual Hacking Experiment - How Trusted Insiders Stole Data From
Companies
10 Indicators Of Data Abuse With Case Studies
Data Loss Prevention Policies
Data
Loss Prevention Policy-1
Data
Loss Prevention Policy-2
Data
Loss Prevention Policy-3
Data
Loss Prevention Procedures
Data
Security Policies Examples
GDPR Internal Data Protection Policy
Experian Data Breach Response Guide
Data
Breach Response Checklist
FRAUD GUIDANCE
& RESOURCES
Fraud Tree Diagram
Association of Certified Fraud Examiners (ACFE) 2024 Report On Fraud
ACFE Fraud Risk Schemes Assessment Guide
Fraud Risk
Management Scorecards
Other Fraud Tools From ACFE
Fraud Risk Exposures And Descriptions Guide
Anti-Fraud Policies - Procedures Templates
DOD FRAUD GUIDANCE &
RESOURCES
General Fraud Indicators & Scenarios
Fraud Red Flags And Indicators
Comprehensive Listing Of Fraud Indicators
WORKPLACE VIOLENCE PREVENTION
NITSIG
Insider Threat Workplace Violence E-Magazine
(Workplace Violence Incidents)
Workplace Violence Prevention Guidance
OSHA Workplace
Violence Website
OSHA Workplace Violence Presentation
OSHA
Workplace Violence Factsheet
Workplace Violence Program Mitigation Flowchart
FBI
Workplace Violence Guidance
Violence In The Federal Workplace - A Guide For Prevention And Response
Taking Threats Seriously: Establishing A Threat Assessment Team
21 Ways To Prevent Workplace Violence In Your Organization
Preventing Violence In The Workplace
Presentation
(National Crime Prevention Council)
Workplace Violence Prevention Program / Plans / Policies
USDA Handbook On
Workplace Violence Prevention And Response
U.S. Department Of Labor Workplace Violence Prevention Program
U.S. Coast Guard Workplace Violence And Threatening Behavior Instruction
Duke University Workplace Violence Prevention And Response Policy
Boston University Workplace Violence Prevention Policy
University At Buffalo New York Workplace Violence Prevention Policy
Sample Workplace Violence Prevention Plan
Active Shooter Guidance (Prepare, Respond)
DSS Active Shooter Awareness Training Guide
Active Shooter Preparedness Checklist
Active Shooter & Hostile Event Guide
DHS Active Shooter-How To Respond
DHS Poster - How To Respond To An Active Shooter Event
DHS Active
Shooter Preparedness Resources
(Active Shooter Booklet,
Pamphlet, Poster, Pocket Card)
FBI Active Shooter Resources
Maryland Active Assailant Guidance
/ Guidance For First Responders
State Alabama Active Shooter Strategic Response Plan
Crime Prevention Through Environmental Design Concepts
Workplace Violence Prevention / Active Shooter-Assailant Awareness
Training
Workplace Violence
Prevention Training Video
(California Department Of
Human Resources)
DHS Active Shooter
Emergency Action Plan Video
FBI Active Shooter
Video - The Coming Storm
RUN HIDE FIGHT
Video - Surviving An Active Shooter Event
FEMA Training Course - Active Shooter What You Can Do
Active Shooter Detection Systems
Emergency Automatic Gunshot Lockdown System
FireFly Wireless Gunshot Detector
FireFly CityWeb Ballistic Detector
Guardian Indoor Active Shooter Detection System
Wireless Active Shooter Sensors