5 Threat And Risk Assessment Approaches for Security Professionals in 2024 | Second Sight Training Systems | Threat Assessment Training | Online Courses and In-Person Training (2024)

Alathari, L., Drysdale, D., Blair, A., McGarry, J., Camilletti, C., Snook, A., & Driscoll, S. (2018). Enhancing school safety using a threat assessment model: An operational guide for preventing targeted school violence.

Alathari, L., Drysdale, D., Driscoll, S., Carlock A., & Cutler, M. (2023). Mass attacks in public spaces: 2016-2020. NTAC: DHS. https://www.secretservice.gov/sites/default/files/reports/2023-01/usss-ntac-maps-2016-2020.pdf

Arnold Ventures. (2017). Public Safety Assessment: A risk tool that promotes safety, equity, and justice. https://www.arnoldventures.org/stories/public-safety-assessment-risk-tool-promotes-safety-equity-justice/

CISA. (2014). Emergency services sector roadmap to secure voice and data systems. DHS. https://www.cisa.gov/sites/default/files/publications/emergency-services-sector-roadmap-to-secure-voice-and-data-systems-032014-508.pdf

CISA. (2015). Emergency services sector-specific plan: An annex to the NIPP 2013. DHS. https://www.cisa.gov/sites/default/files/publications/emergency-services-sector-specific-plan-112015-508_0.pdf

CISA. (2017). A guide to securing networks for wi-fi: Version 1.0. DHS. https://www.cisa.gov/uscert/sites/default/files/publications/A_Guide_to_Securing_Networks_for_Wi-Fi.pdf

CISA. (2017). Active shooter emergency action plan. DHS. https://www.cisa.gov/sites/default/files/publications/active-shooter-emergency-action-plan-112017-508v2.pdf

CISA. (2019). “Protecting Against Ransomware.” DHS. https://www.cisa.gov/news-events/news/protecting-against-ransomware

CISA. (2019). A guide to critical infrastructure security and resilience. https://www.cisa.gov/sites/default/files/publications/Guide-Critical-Infrastructure-Security-Resilience-110819-508v2.pdf

CISA. (2019). Emergency services sector landscape. DHS. https://www.cisa.gov/sites/default/files/publications/emergency-services-sector-landscape-082019-508.pdf

CISA. (2020). Cyber Resilience Review (CRR) question set with guidance. DHS. https://www.cisa.gov/sites/default/files/publications/3_CRR_4.0_Self-Assessment_Questions_%26amp%3B_Guidance_April_2020.pdf

CISA. (2021). “ISC Standard: Risk Management Process.” https://www.cisa.gov/resources-tools/resources/isc-standard-risk-management-process

CISA. (2022). Ransomware response checklist. DHS. https://www.cisa.gov/sites/default/files/publications/Ransomware_Response_Checklist_508.pdf

CISA. (2023). “Infrastructure Survey Tool (IST).” DHS. https://www.cisa.gov/resources-tools/services/infrastructure-survey-tool-ist

CISA. (N.d). “Critical Infrastructure Assessments.” DHS. https://www.cisa.gov/critical-infrastructure-assessments

CISA. (N.d). “Emergency Services Sector Continuity Planning Suite.” DHS. https://www.cisa.gov/emergency-services-sector-continuity-planning-suite

CISA. (N.d). “Managing Insider Threats.” DHS. https://www.cisa.gov/topics/physical-security/insider-threat-mitigation/managing-insider-threats

CISA. (N.d). “School Security Assessment Tool (SSAT).” DHS. https://www.cisa.gov/school-security-assessment-tool

CISA. (N.d). “Securing Public Gatherings.” DHS. https://www.cisa.gov/topics/physical-security/securing-public-gatherings

CISA. (N.d.). “State, Local, Tribal, and Territorial Authorities, Government, and First Responders.” DHS. https://www.cisa.gov/state-local-tribal-and-territorial-authorities-government-and-first-responders

Cornell, D.G. (2020). Threat assessment as a school violence prevention strategy. Criminology & Public Policy, 19(1), 235-252. https://onlinelibrary.wiley.com/doi/abs/10.1111/1745-9133.12471

Criminal Intelligence Coordinating Council (CICC). (2016). Understanding digital footprints: Steps to protect personal information, A guide for law enforcement. Global Advisory Committee: Department of Homeleand Security (DHS). https://bja.ojp.gov/sites/g/files/xyckuh186/files/media/document/Understanding_Digital_Footprints-09-2016.pdf

Dipshan, R., Hudgins, V., Ready, F., & Warren, Z. (2020). “The Most Widely Used Risk Assessment Tool in Each U.S. State.” https://www.law.com/legaltechnews/2020/07/13/the-most-widely-used-risk-assessment-tool-in-each-u-s-state/?slreturn=20230019150826

Douglas, K. S., Hart, S. D., Webster, C. D., & Belfrage, H. (N.d.). HCR-20 Version 3. http://hcr-20.com/

Fisher, R. E., Buehring, W. A., Whitfield, R. G., Bassett, G. W., Dickinson, D. C., Haffenden, R. A., Klett, M. S., & Lawlor, M. A. (2009). Constructing vulnerability and protective measures indices for the enhanced critical infrastructure protection program. Argonne National Laboratory, Department of Energy. https://publications.anl.gov/anlpubs/2009/10/65406.pdf

Harvard University Risk Management and Audit Services. (2024). Conducting a risk assessment. https://rmas.fad.harvard.edu/files/rmas/files/conducting_a_risk_assessment_guidance.pdf

International Association of Chiefs of Police (IACP). (2017). Managing cybersecurity risk: A law enforcement guide. https://www.iacpcybercenter.org/wp-content/uploads/2015/04/Managing_Cybersecurity_Risk_2017.pdf

Kropp, P. R., & Hart, S. D. (2000). The Spousal Assault Risk Assessment (SARA) guide: Reliability and validity in adult male offenders. https://emerge.ucsd.edu/r_1plrabytih9j494/

Kropp, P. R., Hart, S. D., Webster, C. D., Eavs, D. (1999). Spousal Assault Risk Assessment guide (SARA): Assessment of the likelihood of domestic violence. https://downloads.mhs.com/saRA/SARA_TechBrochure.pdf

Levi, R. (2023). “Ransomware Attacks Against Hospitals put Patients' Lives at Risk, Researchers Say.” Interview Transcript. National Public Radio. https://www.npr.org/2023/10/20/1207367397/ransomware-attacks-against-hospitals-put-patients-lives-at-risk-researchers-say

Logan, C., Borum, R., & Gill, P. (Eds.). (2023). Violent extremism: A handbook of risk assessment and management. UCL Press. https://www.uclpress.co.uk/products/185116

MacDonald, D. (2017). “Using the Violence Risk Appraisal Guide (VRAG).” https://dustinkmacdonald.com/using-violence-risk-appraisal-guide-vrag/

Mayorkas, A.N. (2022). Summary of resources for state, local, tribal, yerritorial, and campus law enforcement partners. DHS. https://www.dhs.gov/sites/default/files/2022-04/22_0407_OSLLE_LE-resource-guide-signed_508.pdf

Multi-State Information Sharing and Analysis Center (MS-ISAC). (2023). #StopRansomware Guide. CISA, FBI, and National Security Agency (NSA). https://www.cisa.gov/sites/default/files/2023-10/StopRansomware-Guide-508C-v3_1.pdf

National Association for Behavioral Intervention and Threat Assessment (NABITA). (2014). Threat Assessment Rubric. http://nabita.moatusers.com/Rubric/21-Questions_0518.pdf

NABITA. (2014). Threat Assessment Tool. https://cdn.nabita.org/website-media/nabita.org/wordpress/wp-content/uploads/2014/04/2014-NaBITA-Threat-Assessment-Tool.pdf

National Institute of Standards and Training (NIST). (2022). Getting started with cybersecurity management: Ransomware. https://csrc.nist.gov/files/pubs/other/2022/02/24/getting-started-with-cybersecurity-risk-management/final/docs/quick-start-guide--ransomware.pdf

National Threat Evaluation and Reporting (NTER). (2023). Behavioral Threat Assessment Master Trainer Program. https://www.dhs.gov/mtp

NTER. (2023). Foundations of Targeted Violence Prevention eLearning. https://www.dhs.gov/foundations-targeted-violence-prevention

Occupational Safety and Health Administration (OSHA). (N.d). “Evacuation Planning Matrix.” U.S. Department of Labor (DOL). https://www.osha.gov/emergency-preparedness/evacuation-matrix

Ohio Risk Assessment System. (2018). Pretrial Risk Assessment. https://cjdata.tooltrack.org/sites/default/files/2018-10/ORAS%20Scoring%20Assessment.pdf

Powis, B., Randhawa-Horne, K., & Bishopp, D. (2019). The structural properties of the extremism risk guidelines (ERG22+): A structured formulation tool for extremist offenders. Ministry of justice analytical series. https://assets.publishing.service.gov.uk/media/5d274ad140f0b61119a41cf1/the-structural-properties-of-the-extremism-risk-guidelines-ERG22.pdf

Public Risk Innovation, Solutions, and Management: PRISM. (2024). https://www.prismrisk.gov/

Readiness and Emergency Management for Schools (REMS). (2023). “SITE ASSESS: A Site Assessment Tool for Planning Team Members and Safety Leaders.” Department of Education. https://rems.ed.gov/SITEASSESS.aspx?

Ready Campaign. (2022). “Business Impact Analysis.” https://www.ready.gov/business/planning/impact-analysis

Ready Campaign. (2022). “Disasters and Emergencies.” https://www.ready.gov/risk-assessment

Ready Campaign. (2022). “Employee Training.” https://www.ready.gov/business/training/employee-training

Ready Campaign. (2022). “Risk Assessment.” https://www.ready.gov/business/planning/risk-assessment

Reeves, M., Conolly, C., & Woitaszewski, S. (2020). Behavior threat assessment and management: Best practice considerations for K-12 schools, Brief Overview. National Association of School Psychologists (NASP): Department of Education. https://www.nasponline.org/resources-and-publications/resources-and-podcasts/school-safety-and-crisis/systems-level-prevention/threat-assessment-at-school/behavior-threat-assessment-and-management-(btam)-best-practice-considerations-for-k%E2%80%9312-schools

Renfroe, N. A., & Smith, J. L. (2016). “Threat / Vulnerability Assessments and Risk Analysis.” Applied Research Associates. https://www.wbdg.org/resources/threat-vulnerability-assessments-and-risk-analysis.

Robinson, P. (2024). “15 Most Common Cyber Attack Types and How to Prevent Them.” https://www.lepide.com/blog/the-15-most-common-types-of-cyber-attacks/

Romano, S.J., Levi-Minzi, M.E., Rugala, E.A., & van Hasselt, V.B. (2011). Workplace violence prevention. FBI: Department of Justice. https://www.fbi.gov/file-repository/stats-services-publications-workplace-violence-workplace-violence/view

Ruggiero, P., & Foote, J. (2011). Cyber threats to mobile phones. U.S. Computer Readiness Team: DHS. https://www.cisa.gov/uscert/sites/default/files/publications/cyber_threats_to_mobile_phones.pdf

Savage, T. A., & Woitaszewski, S. A. (2018). School-based threat assessment: Best practices and resources. Presentation at the Minnesota School Psychologists Association: Plymouth, MN. https://www.mspaonline.net/resources/Documents/past%20conference%20materials/2018/School-Wide%20Practices/School-Based%20Threat%20Assessment_%20Best%20Practices%20and%20Resources%20-%20Savage,%20Woitaszewski.pdf

Serin, R. C., Lowenkamp, C. T., Johnson, J. L., Trevino, P. (2016). Using a multi-level risk assessment to inform case planning and risk management: Implications for officers. Federal Probation, 80(2), 10. https://www.uscourts.gov/sites/default/files/80_2_2_0.pdf

Slater, J. (2023). “Coordinated ‘Swatting’ Effort May be Behind Hundreds of School Shooting Hoaxes.” Washington Post. https://www.washingtonpost.com/nation/2023/10/04/school-swatting-hoax-active-shooter/

Sokolow, B.A., Lewis, W.S., Schuster, S.K., Swinton, D.C., van Brunt, B.J. (2014). Threat Assessment in the Campus Setting. National Behavioral Intervention Team Association (NABITA). http://nabita.moatusers.com/Rubric/2014%20NaBITA%20Whitepaper.pdf

South Dakota Department of Corrections. (2015). “Level of Service Inventory-Revised (LSI-R) and Case Planning.” ttps://doc.sd.gov/documents/about/policies/LSI-R%20Assessment%20and%20Case%20Planning.pdf

University of Illinois Chicago Office of Preparedness and Response. (2023). “Violence Prevention Plan.” https://ready.uic.edu/planning/violence-prevention/

Violent Extremism Risk Assessment 2 Revised (VERA-2R). https://www.vera-2r.nl/

Virginia Department of Criminal Justice Services. (2018). Virginia pretrial risk assessment instrument (VPRAI) instruction manual: Version 4.3. https://www.dcjs.virginia.gov/sites/dcjs.virginia.gov/files/publications/corrections/virginia-pretrial-risk-assessment-instrument-vprai_0.pdf

Washington School Safety Center. (N.d.) “Swatting: Mitigation Strategies and Reporting Procedures.” https://rems.ed.gov/docs/WA_Swatting.pdf

Whole Building Design Guide (WBDG). (2017). “Natural Hazards Mitigation. Secure/Safe Committee.” https://www.wbdg.org/design-objectives/secure-safe/natural-hazards-mitigation

5 Threat And Risk Assessment Approaches for Security Professionals in 2024 | Second Sight Training Systems | Threat Assessment Training | Online Courses and In-Person Training (2024)
Top Articles
Latest Posts
Article information

Author: Eusebia Nader

Last Updated:

Views: 5296

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Eusebia Nader

Birthday: 1994-11-11

Address: Apt. 721 977 Ebert Meadows, Jereville, GA 73618-6603

Phone: +2316203969400

Job: International Farming Consultant

Hobby: Reading, Photography, Shooting, Singing, Magic, Kayaking, Mushroom hunting

Introduction: My name is Eusebia Nader, I am a encouraging, brainy, lively, nice, famous, healthy, clever person who loves writing and wants to share my knowledge and understanding with you.