Filter the catalog

Filter by category or sector, search across threats, NIST functions, objectives, and module names. Click any scenario to sign up free and launch it.

Category

Source: cisa.gov/resources-tools/services/cisa-tabletop-exercise-packages

Cybersecurity

23 scenarios
CybersecurityChemical SectorUnmanned aircraft system (UAS), insider threat, Industrial Control System (ICS)/Supervisory Control and Data Acquisition (SCADA) system breach

Chemical Sector

A threat actor targets a system administrator through a UAS as an entry point into networks/systems. Attackers compromise information technology (IT) and operational technology (OT) networks.

4 objectives2 modules74 discussion questions
Show objectives and module outline

Objectives

  • Examine the response capabilities of <Chemical Sector Organization> during a significant cyber incident.
  • Assess information sharing, notification, and coordination processes during a cyber-physical convergence incident.
  • Explore plans to recover critical systems.
  • Identify areas of improvement in cyber incident response plans and overall organizational resilience during and following a significant cyber incident.

Modules

  • Module 1 — 44 discussion questions
  • Module 2 — 30 discussion questions
CybersecurityCommercial FacilitiesCyber Incident – Phishing, Ransomware

Commercial Facilities

Commercial facility event staff receive a phishing email asking for login credentials.

3 objectives2 modules71 discussion questions
Show objectives and module outline

Objectives

  • Assess organizational cyber resilience before, during, and following a cyber incident impacting a special event.
  • Examine incident response plans, policies, and capabilities.
  • Discuss the procedures for cyber incident information sharing and coordination.

Modules

  • Module 1 — 38 discussion questions
  • Module 2 – Day of the Special Event — 33 discussion questions
CybersecurityCommunicationsCyber Incident

Communications

A cyber threat actor sends phishing emails to both your personnel and customers, as an entry point into your network/systems. A Distributed Denial of Service (DDoS) attack follows, with an inadvertent Telephony Denial of Service (TDoS) created by customers calling in to report…

3 objectives2 modules53 discussion questions
Show objectives and module outline

Objectives

  • Discuss organizational resilience to threats and disruptions targeting the communications sector.
  • Examine plans, policies, and procedures in response to a cyber incident.
  • Assess internal/external communications processes.

Modules

  • Module 1 — 26 discussion questions
  • Module 2 — 27 discussion questions
CybersecurityCritical ManufacturingCyber Incident

Critical Manufacturing

A malicious actor uses a phishing email as an entry point to networks/systems. Attackers compromise information technology (IT) and operational technology (OT) networks, resulting in a shutdown of operations.

3 objectives2 modules67 discussion questions
Show objectives and module outline

Objectives

  • Examine the response capabilities of <Critical Manufacturing Sector Organization> during a significant cyber incident.
  • Assess information sharing, notification, and coordination processes during a cyber incident.
  • Identify areas of improvement in cyber incident response plans and overall organizational resilience before, during, and following a significant cyber incident.

Modules

  • Module 1 — 38 discussion questions
  • Module 2 — 29 discussion questions
CybersecurityDamsCyber Incident

Dams Sector

A network compromise resulting from an insider threat leads to the deletion of operation files, causing a shutdown of operations.

3 objectives2 modules62 discussion questions
Show objectives and module outline

Objectives

  • Examine the response capabilities of <organization> during a significant cyber incident.
  • Examine plans, policies, and procedures in response to a cyber incident.
  • Assess internal and external communications processes.

Modules

  • Module 1 — 32 discussion questions
  • Module 2 — 30 discussion questions
CybersecurityDefense Industrial BaseCyber incident

Defense Industrial Base

A cyber threat actor targets your employees with a phishing email, gaining elevated access to your network/systems and stealing sensitive data.

3 objectives3 modules55 discussion questions
Show objectives and module outline

Objectives

  • Discuss organizational resilience and response to threats targeting the defense industrial base (DIB) sector.
  • Examine plans, policies, and procedures for responding to a cyber incident.
  • Assess internal and external communications processes.

Modules

  • Module 2
  • Module 1 — 33 discussion questions
  • Module 2 — 22 discussion questions
CybersecurityEnergyCyber Attack

Electricity Subsector

A network compromise leads to impacts to information and communication systems, loss of control of power generation output, and customer outages.

3 objectives2 modules76 discussion questions
Show objectives and module outline

Objectives

  • Discuss organizational resilience and response to threats targeting the energy sector.
  • Examine plans, policies, and procedures in response to a cyber incident.
  • Assess internal/external communications processes.

Modules

  • Module 1 — 42 discussion questions
  • Module 2 — 34 discussion questions
CybersecurityEmergency ServicesCyber Incident

Emergency Services Sector

A cyber threat actor targets personnel through a phishing email as an entry point into networks/systems, later compromising devices and data using malware. The communications call center also experiences a Telephony Denial of Service (TDoS) attack.

3 objectives2 modules59 discussion questions
Show objectives and module outline

Objectives

  • Assess the cyber resilience of <emergency services sector organization> before, during, and following a cyber incident impacting emergency services.
  • Review plans, procedures, roles, responsibilities, and capabilities for responding to a cyber incident.
  • Discuss coordination and collaboration across the <emergency services sector organization>.

Modules

  • Module 1 — 30 discussion questions
  • Module 2 — 29 discussion questions
CybersecurityCross-SectorCyber Incident

Executives And Senior Leadership

Vignette 1: A threat actor targets a senior executive through a whaling email as an entry point into networks/systems, then installs ransomware on the network.

4 objectives2 modules29 discussion questions
Show objectives and module outline

Objectives

  • Identify ways to enhance the cybersecurity resilience of your organization.
  • Improve the decision-making process of senior leadership during a cyber incident.
  • Examine the roles and responsibilities of senior leadership in response to a cyber incident.
  • Discuss the reputational risks and impacts on business operations in the event of a cyber incident.

Modules

  • Module 1 — 13 discussion questions
  • Module 2 — 16 discussion questions
CybersecurityCross-SectorDistributed Denial of Service

Federal Distributed Denial Of Service

A cyber threat actor launches a DDoS attack against Federal Civilian Executive Branch (FCEB) agencies, overwhelming servers.

4 objectives2 modules50 discussion questions
Show objectives and module outline

Objectives

  • Examine <federal agency>’s ability to detect and respond to a DDoS attack.
  • Discuss <federal agency>’s information sharing protocols with internal and external stakeholders/partners.
  • Review <federal agency>’s reporting protocols to meet Federal Incident Notification Guidelines.
  • Discuss <federal agency>’s plans to restore capabilities/services impacted by a cyber incident.

Modules

  • Module 1 — 21 discussion questions
  • Module 2 — 29 discussion questions
CybersecurityFinancial ServicesCyber Attack

Financial Services

A TSP compromise leads to impacts to cloud-based applications and systems, online banking services, and institutional reputation.

3 objectives3 modules63 discussion questions
Show objectives and module outline

Objectives

  • Discuss organizational resilience and response to cyber threats targeting the financial services sector.
  • Identify areas for improvement within processes and plans in response to a cyber incident.
  • Discuss internal and external communications plans and processes.

Modules

  • Module 2
  • Module 1 — 32 discussion questions
  • Module 2 — 31 discussion questions
CybersecurityFood & AgricultureCyber Incident

Food Ag Sector

A malicious actor uses a phishing email as an entry point to networks/systems. Attackers compromise information technology (IT) networks, resulting in a shutdown of operations.

3 objectives2 modules64 discussion questions
Show objectives and module outline

Objectives

  • Assess the cyber resilience of <organization> before, during, and following a cyber incident.
  • Examine plans, policies, and procedures in response to a cyber incident.
  • Assess information sharing, notification, and coordination processes with partners during a cyber incident.

Modules

  • Module 1 — 35 discussion questions
  • Module 2 — 29 discussion questions
CybersecurityHealthcare & Public HealthPhishing, Ransomware

Healthcare And Public Health

A threat actor targets employees through phishing emails. Imaging equipment, patient records, and other medical equipment begin malfunctioning/displaying incorrect data. Personal Health Information (PHI) data is exfiltrated, and ransomware compromises computer systems and…

4 objectives2 modules71 discussion questions
Show objectives and module outline

Objectives

  • Assess the cyber resilience of <Organization> during and following a cyber incident impacting network connected medical devices.
  • Evaluate the impacts of a cyber incident on patient care and operations.
  • Improve IT and OT cybersecurity coordination to enhance the cybersecurity posture of <Organization>.
  • Evaluate <Organization’s> ability to restore operations after disruptions from cyber intrusions.

Modules

  • Module 1 — 38 discussion questions
  • Module 2 — 33 discussion questions
CybersecurityInformation TechnologyCyber Incident

Industrial Control Systems

During a transition of systems to the cloud, employees receive a possibly fraudulent email, encounter odd vendor activity, and detect suspicious network traffic. After receiving reports of service disruptions, ICS failures occur, and malware encrypts systems.

3 objectives3 modules67 discussion questions
Show objectives and module outline

Objectives

  • Assess the resilience of <Organization> during and following a cyber incident impacting ICS.
  • Improve IT and OT cybersecurity coordination to enhance organizational cybersecurity posture.
  • Evaluate the ability to restore operations after disruptions from cyber intrusions.

Modules

  • Module 2
  • Module 1 — 37 discussion questions
  • Module 2 — 30 discussion questions
CybersecurityInformation TechnologyCyber Incident

Information Technology

One of your employees downloads an application infected with malware. A software update your organization pushes to customers is infected with malware as well. Data exfiltration occurs on both your systems and client systems.

3 objectives3 modules71 discussion questions
Show objectives and module outline

Objectives

  • Discuss organizational resilience and response to threats targeting the IT sector.
  • Examine plans, policies, and procedures for responding to a cyber incident.
  • Assess internal and external communications processes.

Modules

  • Module 2
  • Module 1 — 32 discussion questions
  • Module 2 — 39 discussion questions
CybersecurityCross-SectorInsider Threat – Cyber

Insider Threat

A disgruntled former employee takes advantage of their new position at one of your third-party vendors to exploit vulnerabilities in your systems created by a supply chain issue. An error by another employee discloses personally identifiable information (PII).

3 objectives2 modules53 discussion questions
Show objectives and module outline

Objectives

  • Evaluate <Organization’s> supply chain-oriented threats and the impact on organizational cyber resilience.
  • Discuss <Organization’s> risk and vulnerabilities associated with malicious and unmalicious insider threats.
  • Identify areas of improvement in cyber incident response plans and overall organizational resilience during and following a significant cyber incident.

Modules

  • Module 1 — 22 discussion questions
  • Module 2 — 31 discussion questions
CybersecurityEducation (K-12)Phishing, Ransomware

K 12

A threat actor targets <your school/district> employees through phishing emails as an entry point into networks/systems. Attackers compromise Personally Identifiable Information (PII) and install ransomware on <your school/district> computers.

3 objectives2 modules48 discussion questionsNIST CSF: Govern, Identify, Protect, Detect, Respond, Recover
Show objectives and module outline

Objectives

  • Assess cybersecurity policies, procedures, and processes to manage cybersecurity risk.
  • Evaluate the efficacy of organizational cybersecurity education and training.
  • Discuss organizational resilience through risk management, back-up procedures, and recovery/restoration capabilities.

Modules

  • Module 1 — 30 discussion questions
  • Module 2 — 18 discussion questions
CybersecurityGovernment FacilitiesCyber Incident

Local Governments

A threat actor targets <local government>’s employees through a phishing email as an entry point into networks/systems. Threat actors compromise devices and data using ransomware. Impacts are felt across multiple organizations as additional cyber incidents occur following the…

4 objectives2 modules66 discussion questions
Show objectives and module outline

Objectives

  • Examine <local government>’s preparedness to detect, respond to, and manage a cyber incident.
  • Identify areas of improvement in cyber incident response plans.
  • Explore internal and external information sharing processes during a cyber incident.
  • Improve overall organizational cyber resilience.

Modules

  • Module 1 — 35 discussion questions
  • Module 2 — 31 discussion questions
CybersecurityTransportationCyber Incident

Maritime Ports

A zero-day vulnerability leads to a cyberattack impacting port and maritime transportation operations.

3 objectives2 modules54 discussion questions
Show objectives and module outline

Objectives

  • Assess the resilience of <Organization> during and following a cyber incident impacting the maritime sub-sector.
  • Evaluate <Organization’s> ability to continue operations during and after a cyberattack.
  • Identify areas for improvement in cyber incident response plans.

Modules

  • Module 1 — 29 discussion questions
  • Module 2 — 25 discussion questions
CybersecurityCross-SectorCyber Incident

Open Source

A vulnerability is discovered in your open source community’s toolchain. Before the patch is completed, cyber threat actors activate ransomware on your systems, causing widespread issues across the open source community.

4 objectives2 modules35 discussion questions
Show objectives and module outline

Objectives

  • Discuss organizational resilience and response to threats targeting open source projects.
  • Familiarize stakeholders in public, private, and non-profit sectors with reporting processes and respective roles and responsibilities during a cyber incident stemming from a critical open source project.
  • Identify areas for improvement in incident reporting processes, policies, and procedures.
  • Examine response coordination efforts between public, private, and community stakeholders during a cyber incident.

Modules

  • Module 1 — 12 discussion questions
  • Module 2 — 23 discussion questions
CybersecurityCross-SectorRansomware

Ransomware

A threat actor targets <Organization>’s system administrator through a phishing email as an entry point into networks/systems. Attackers compromise Personally Identifiable Information (PII) and install ransomware on <Organization> computers.

4 objectives2 modules58 discussion questionsNIST CSF: Govern, Identify, Protect, Detect, Respond, Recover
Show objectives and module outline

Objectives

  • Examine the response capabilities of <Organization> during a significant cyber incident.
  • Evaluate the ability for <Organization> to coordinate information sharing during a significant cyber incident.
  • Identify areas of improvement in cyber incident response plans and overall organizational resilience during and following a significant cyber incident.
  • Explore <Organization>’s plans to recover and restore services, mission critical assets, or systems.

Modules

  • Module 1 — 26 discussion questions
  • Module 2 — 32 discussion questions
CybersecurityCross-SectorCyber incident

Vendor Supply Chain Compromise

Your organization’s Managed Service Provider (MSP) is the victim of a cyber incident, leading to impacts on the managed services they provide to your organization.

3 objectives3 modules55 discussion questionsNIST CSF: Govern, Identify, Protect, Detect, Respond, Recover
Show objectives and module outline

Objectives

  • Examine the response capabilities of <Organization> during a significant cyber incident impacting the supply chain.
  • Evaluate vulnerabilities associated with third-party vendor relationships.
  • Identify areas for improvement in cyber incident response plans and overall organizational resilience during and following a significant cyber incident.

Modules

  • Module 2
  • Module 1 — 31 discussion questions
  • Module 2 – 6 months later — 24 discussion questions
CybersecurityWater & Wastewater SystemsCyber – Phishing, Insider Threat, Ransomware

Water Wastewater Systems

During routine operations, employees receive a possibly fraudulent email, and observe potential insider threat activity and suspicious network traffic.

3 objectives2 modules49 discussion questions
Show objectives and module outline

Objectives

  • Assess the cyber resilience of <Organization> during and following a cyber incident impacting IT and OT.
  • Improve IT and OT cybersecurity coordination to enhance the cybersecurity posture of <Organization>.
  • Evaluate <Organization’s> ability to recover and restore operations after disruptions from cyber intrusions.

Modules

  • Module 1 — 23 discussion questions
  • Module 2 — 26 discussion questions

Cyber-Physical Convergence

2 scenarios
Cyber-Physical ConvergenceChemical SectorCyber-Attack [insert additional threat vector, as necessary].

Chemical Sector Cyber

The Supervisory Control and Data Acquisition (SCADA) and / or business system(s) at a chemical facility is compromised by computer malware.

4 objectives2 modules89 discussion questions
Show objectives and module outline

Objectives

  • Review intelligence and information sharing and dissemination processes in relation to a credible threat to domestic critical infrastructure owners / operators.
  • Assess information sharing capabilities with the public; sector partners; and federal, state, local, tribal, and territorial government departments and agencies in accordance with applicable plans and procedures.
  • Discuss private sector stakeholders’ emergency preparedness plans and response procedures to a threat-initiated incident and the coordination activities under the National Incident Management System (NIMS) with local, state, and federal agencies.
  • Discuss gaps and challenges in private sector stakeholders’ emergency preparedness plans and response procedures to a cyber-related incident.

Modules

  • Module One: Threat — 57 discussion questions
  • Module Two: Incident and Incident Aftermath — 32 discussion questions
Cyber-Physical ConvergenceWater & Wastewater SystemsCyberattack (domestic and international).

Water Wastewater Cyber

The exercise begins with a series of cyber-attacks on water and wastewater systems overseas and a threat against similar systems in the United States. Following that, there are multiple cyber-attacks on domestic water and wastewater systems.

3 objectives2 modules48 discussion questions
Show objectives and module outline

Objectives

  • Review intelligence and information sharing and dissemination processes in relation to a credible threat to domestic critical infrastructure owners / operators.
  • Assess information sharing capabilities with the public; sector partners; and federal, state, local, tribal, and territorial government departments and agencies in accordance with applicable plans and procedures.
  • Discuss private sector stakeholders’ emergency preparedness plans and response procedures to a threat-initiated incident and the coordination activities under the National Incident Management System (NIMS) with local, state, and federal agencies.

Modules

  • Module One: Threat and Initial Incident — 23 discussion questions
  • Module Two: Incident and Incident Aftermath — 25 discussion questions

Physical Security

64 scenarios
Physical SecuritySuspicious Activity, Bomb Threat

Bomb Threat

An interactive, discussion-based exercise focused on a suspicious activity, followed by a bomb threat. The scenario consists of three modules: Intelligence and Information Sharing, Incident Response, and Recovery and Continuity.

4 objectives5 modules121 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures to a suspicious activity event and a follow-on bomb threat.
  • Examine threat and incident information sharing, notification, and communication procedures between [insert facility or organization] partners, focusing on intelligence community partners and law enforcement.
  • Examine public messaging and information plans and procedures related to an active threat.
  • Discuss recovery and continuity plans and procedures following suspicious activity events and a bomb threat.

Modules

  • Module 1: Intelligence and Information Sharing — 23 discussion questions
  • Module 1: Scenario Update — 18 discussion questions
  • Module 2: Incident Response — 31 discussion questions
  • Module 2: Scenario Update — 26 discussion questions
  • Module 3: Recovery and Continuity — 23 discussion questions
Physical SecurityChemical SectorActive Shooter

Chemical Sector Active Shooter

An interactive, discussion-based exercise focused on an active shooter at a chemical sector facility. The scenario consists of three modules: Incident and Response, Sustained Response, and Short-Term Recovery.

4 objectives3 modules251 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures to an active shooter incident at a chemical sector facility.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS)
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Review organizational interdependencies and recovery plans.

Modules

  • Module One: Incident and Response — 94 discussion questions
  • Module Two: Sustained Response — 90 discussion questions
  • Module Three: Short-Term Recovery — 67 discussion questions
Physical SecurityChemical SectorActive Shooter, Complex Coordinated Attack, Edged Weapon, Improvised Explosive Device (IED), Vehicle-Borne Improvised Explosive Device (VBIED), and Vehicle Ramming. [Insert additional threat vector, as necessary]

Chemical Sector Active Threat

An interactive, discussion-based exercise focused on an attack on a chemical sector facility. The scenario consists of three modules: Incident and Response, Sustained Response, and Short-Term Recovery.

4 objectives3 modules252 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures for a [insert threat vector] at a chemical sector facility.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS).
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Review organizational interdependencies and recovery plans.

Modules

  • Module One: Incident and Response — 99 discussion questions
  • Module Two: Sustained Response — 84 discussion questions
  • Module Three: Short-Term Recovery — 69 discussion questions
Physical SecurityChemical SectorPotential Civil Unrest [Insert additional threat vector, as necessary]

Chemical Sector Civil Unrest

A protest that turns violent disrupts a chemical facility.

3 objectives3 modules125 discussion questions
Show objectives and module outline

Objectives

  • Review intelligence and information sharing processes for a security incident with local or regional chemical sector critical infrastructure owners / operators.
  • Discuss private sector stakeholders’ emergency preparedness plans and response procedures to a security-initiated incident and the coordination activities under National Incident Management System (NIMS) with local, state, and federal agencies.
  • Examine recovery and business continuity plans and procedures following a security incident at a chemical facility.

Modules

  • Module One: Information Sharing — 22 discussion questions
  • Module Two: Incident — 44 discussion questions
  • Module Three: Response and Recovery — 59 discussion questions
Physical SecurityChemical SectorCCA, involving an active shooter and Improvised Explosive Device (IED) [insert additional threat vector, as necessary]

Chemical Sector Complex Coordinated Attack

An interactive, discussion-based exercise focused on a CCA involving an active shooter with a potential IED at a chemical sector facility. The scenario consists of three modules: Incident and Response, Sustained Response, and Short-Term Recovery.

4 objectives3 modules248 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures for a [insert threat vector] at a chemical sector facility.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS)
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Review organizational interdependencies and recovery plans.

Modules

  • Module One: Incident Response — 98 discussion questions
  • Module Two: Sustained Response — 81 discussion questions
  • Module Three: Short-Term Recovery — 69 discussion questions
Physical SecurityChemical SectorThreat of Terrorist Attack [insert additional threat vector, as necessary]

Chemical Sector Domestic Threat

Multiple executed and attempted terrorist attacks overseas lend credibility to a potential attack on a critical Chemical Sector Facility.

4 objectives2 modules76 discussion questions
Show objectives and module outline

Objectives

  • Review intelligence and information sharing, and dissemination processes in relation to a credible threat and / or [insert threat vector] to domestic Chemical Sector infrastructure owners / operators.
  • Assess information sharing capabilities with public sector partners and federal, state, local, tribal, and territorial government departments and agencies in accordance with applicable plans and procedures.
  • Discuss and identify private sector stakeholders’ emergency preparedness plans and response procedures to a threat-initiated incident and the coordination activities under the National Incident Management System (NIMS) with local, state, and federal agencies.
  • Discuss gaps and challenges in private sector stakeholders’ emergency preparedness plans and response procedures to a threat-initiated incident.

Modules

  • Module One: Overseas Attacks and Domestic Threat — 46 discussion questions
  • Module Two: Imminent Threat — 30 discussion questions
Physical SecurityChemical SectorEdged Weapon [insert additional threat vector, as necessary]

Chemical Sector Edged Weapon

An interactive, discussion-based exercise focused on an edged weapon attack at a chemical sector facility. The scenario consists of three modules: Incident and Response, Sustained Response, and Short-Term Recovery.

4 objectives3 modules235 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures for a [insert threat vector] at a chemical sector facility.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS).
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Review organizational interdependencies and recovery plans.

Modules

  • Module One: Incident and Response — 82 discussion questions
  • Module Two: Sustained Response — 87 discussion questions
  • Module Three: Short-Term Recovery — 66 discussion questions
Physical SecurityChemical SectorThreat from an employee in the workplace who uses fire as a weapon.

Chemical Sector Fire As A Weapon

A disgruntled employee starting a fire in the workplace.

3 objectives3 modules163 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident and incident intelligence and information sharing procedures between public and private sector stakeholders.
  • Examine emergency response plans and procedures during a complex coordinated attack with a focus on Incident Command System / National Incident Management System, Evacuation Procedures, and Public Messaging Protocols.
  • Examine recovery plans following an attack.

Modules

  • Module One: Threat — 30 discussion questions
  • Module Two: Incident — 84 discussion questions
  • Module Three: Recovery — 49 discussion questions
Physical SecurityChemical SectorIED

Chemical Sector Ied

A discussion-based exercise focused on an IED attack at a chemical sector facility. The scenario consists of three modules: Incident and Response, Sustained Response, and Short-Term Recovery.

4 objectives3 modules253 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures for an IED attack on a chemical sector facility.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS).
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Review organizational interdependencies and recovery plans.

Modules

  • Module One: Incident and response — 99 discussion questions
  • Module Two: Sustained Response — 97 discussion questions
  • Module Three: Short-Term Recovery — 57 discussion questions
Physical SecurityChemical SectorInsider Threat

Chemical Sector Insider Threat

An interactive, discussion-based exercise focused on an insider threat at a chemical sector facility. The scenario consists of two modules: Pre-Incident and Incident.

5 objectives2 modules88 discussion questions
Show objectives and module outline

Objectives

  • Examine organizational recovery procedures and recovery operations coordination across stakeholder groups.
  • Review intelligence and information sharing processes, and examine plans for addressing a potential insider threat.
  • Discuss private sector stakeholders’ emergency preparedness plans and response procedures to a threat-initiated incident and coordination activities under the National Incident Management System (NIMS) with local, state, and federal agencies.
  • Assess the existing methods and effectiveness of internal and external communications and coordination during and / or immediately after becoming aware of an adversarial event.
  • Discuss gaps and challenges in private sector stakeholders’ emergency preparedness plans and response procedures to a cyber-related incident.

Modules

  • Module One: Pre-Incident — 31 discussion questions
  • Module Two: Incident — 57 discussion questions
Physical SecurityChemical SectorTheft / Diversion

Chemical Sector Theft And Diversion

An interactive, discussion-based exercise focused on an attempted theft at a chemical sector facility. The scenario consists of two modules: Pre-Incident and Incident

4 objectives2 modules95 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures for a theft and diversion incident at a chemical sector owner’s / operator’s facility.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS).
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Review organizational interdependencies.

Modules

  • Module One: Pre-Incident — 15 discussion questions
  • Module Two: Incident — 80 discussion questions
Physical SecurityChemical SectorThreat from a UAS-Borne Improvised Explosive Device (IED) on Chemical Sector Infrastructure.

Chemical Sector Uas Threat

An interactive, discussion-based exercise focused on an active threat involving a UAS device at a chemical sector facility.

5 objectives3 modules191 discussion questions
Show objectives and module outline

Objectives

  • Examine intelligence and information sharing dissemination processes in relation to a credible threat to domestic Chemical Sector infrastructure, including public messaging protocols.
  • Assess information sharing capabilities with public sector partners; federal, state, local, tribal, and territorial government departments; and agencies in accordance with applicable plans and procedures.
  • Discuss and identify private sector stakeholders’ emergency preparedness plans and response procedures to a threat-initiated incident and the coordination activities under National Incident Management System (NIMS) with local, state, and federal agencies.
  • Discuss gaps and challenges in private sector stakeholders’ emergency preparedness plans and response procedures to a threat-initiated incident involving a UAS.
  • Discuss recovery and business continuity in the wake of a UAS incident, including public messaging protocols.

Modules

  • Module One: Intelligence and Information Sharing — 53 discussion questions
  • Module Two: Incident and Response Phase — 64 discussion questions
  • Module Three: Recovery and Business Continuity — 74 discussion questions
Physical SecurityChemical SectorVBIED

Chemical Sector Vehicle Borne Improvised Explosive Device

A discussion-based exercise focused on a potential VBIED attack at a chemical sector facility. The scenario consists of three modules: Incident and Response, Sustained Response, and Short-Term Recovery.

4 objectives3 modules265 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures for an attack on a chemical sector facility.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS).
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Review organizational interdependences and recovery plans.

Modules

  • Module One: Incident and Response — 104 discussion questions
  • Module Two: Sustained Response — 101 discussion questions
  • Module Three: Short-Term Recovery — 60 discussion questions
Physical SecurityChemical SectorVehicle Ramming [insert additional threat vector, as necessary]

Chemical Sector Vehicle Ramming

An interactive, discussion-based exercise focused on a vehicle ramming at a chemical sector facility. The scenario consists of three modules: Incident and Response, Sustained Response, and Short-Term Recovery.

4 objectives3 modules246 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures for vehicle ramming and [insert threat vector, as necessary] at a chemical sector facility.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS).
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Review organizational interdependencies and recovery plans.

Modules

  • Module One: Incident and Response — 89 discussion questions
  • Module Two: Sustained Response — 88 discussion questions
  • Module Three: Short-Term Recovery — 69 discussion questions
Physical SecurityCrowd Surge

Crowd Surge

An interactive, discussion-based exercise focused on a crowd surge at a performance venue. The scenario consists of three modules: Pre-Incident Information Sharing, Incident Response, and Short-Term Recovery.

3 objectives3 modules153 discussion questions
Show objectives and module outline

Objectives

  • Review intelligence and information sharing capabilities between public and private sector entities before and during an incident.
  • Examine operational coordination and response protocols with private sector personnel, law enforcement, and EMS personnel during a crowd surge incident with a focus on mass casualty incident (MCI) and public messaging procedures.
  • Discuss plans, policies, and procedures to ensure continuity of operations and business continuity.

Modules

  • Module One: Pre-Incident Information Sharing — 44 discussion questions
  • Module Two: Incident Response — 61 discussion questions
  • Module Three: Short-Term Recovery — 48 discussion questions
Physical SecurityDrone / Improvised Explosive Device (IED)

Cruise Ship Incident

A radical environmental group has launched a swarm drone attack against a docked cruise ship seeking to damage navigational systems to stop cruise ship operations.

3 objectives3 modules127 discussion questions
Show objectives and module outline

Objectives

  • Examine response and recovery plans and procedures following a drone attack.
  • Discuss information sharing procedures and communication and coordination protocols between private and local public sector partners.
  • Examine company and port security short-term recovery plans.

Modules

  • Module One: Pre-Incident Phase — 22 discussion questions
  • Module Two: Incident and Response Phase — 56 discussion questions
  • Module Three: Recovery Phase — 49 discussion questions
Physical SecurityDamsActive Shooter

Dams Sector Active Shooter

An interactive, discussion-based exercise focused on an international and domestic adversarial threat incident. The scenario consists of three modules: Initial Response Phase, Tactical Response Phase, and the Assessment Phase.

7 objectives3 modules71 discussion questions
Show objectives and module outline

Objectives

  • Assess the roles and effectiveness of coordination between public safety officials and dam owners / operators in reacting to an adversarial event in accordance with existing plans and standard operating procedures (e.g., security plans, emergency actions plans, emergency response plans, memoranda of agreement, memoranda of understanding).
  • Examine the effectiveness of overall emergency response procedures in a no-notice adversarial event regarding the Incident Command Structure and logistical coordination among on-scene authorities.
  • Examine and evaluate facility incident response plans (e.g., security plans, emergency action plans, emergency response plans, or other appropriate plans) used during an adversarial event.
  • Assess the methods and effectiveness of internal and external communications during an adversarial event in accordance with existing plans and standard operating procedures.
  • Identify and evaluate response, mitigation, and recovery actions associated with an adversarial event at the facility.
  • Review information and threat sharing procedures and challenges between owners / operators and federal, state, and local government agencies.
  • Identify gaps, redundancies, developmental activities, and best practices in standard procedures in response to an adversarial situation.

Modules

  • Module One: Initial Response Phase — 28 discussion questions
  • Module Two: Tactical Response Phase — 21 discussion questions
  • Module Three: Assessment Phase — 22 discussion questions
Physical SecurityDamsAdversarial Attack (domestic and international).

Dams Sector Adversarial Threat

An interactive, discussion-based exercise focused on an international and domestic adversarial threat incident. The scenario consists of three modules: International Threat Period, Domestic Threat Period, and the Domestic Attack.

7 objectives3 modules48 discussion questions
Show objectives and module outline

Objectives

  • Assess the roles and effectiveness of coordination between public safety officials and dam owners / operators when reacting to an adversarial event in accordance with existing plans and standard operating procedures (e.g., security plans, emergency action plans, emergency response plans, memoranda of agreement, memoranda of understanding, etc.).
  • Examine the effectiveness of overall emergency response procedures in a no-notice adversarial event regarding the Incident Command Structure and logistical coordination among on-scene authorities.
  • Examine and evaluate facility incident response plans (e.g., security plans, emergency action plans, emergency response plans, or other appropriate plans) used during an adversarial event.
  • Assess the methods and effectiveness of internal and external communications during an adversarial event in accordance with existing plans and standard operating procedures.
  • Identify and evaluate response, mitigation, and recovery actions associated with an adversarial event at the facility.
  • Review information and threat sharing procedures and challenges between owners / operators and federal, state, and local government agencies.
  • Identify gaps, redundancies, developmental activities, and best practices in standard operating procedures in response to an adversarial situation.

Modules

  • Module One: International Threat Period — 15 discussion questions
  • Module Two: Domestic Threat Period — 16 discussion questions
  • Module Three: Domestic Attack — 17 discussion questions
Physical SecurityDefense Industrial BaseActive Shooter and IED

Defense Industrial Base

An interactive, discussion-based exercise focused on an active shooter / IED incident threatening a large DIB workshop facility. The scenario consists of three modules: Intelligence and Information Sharing, Incident and Response, and Business Continuity and Recovery.

3 objectives3 modules135 discussion questions
Show objectives and module outline

Objectives

  • Review pre-incident and incident response information sharing procedures between military branches, military service components, military installation command, corporate leadership, employees, and emergency responders.
  • Discuss private sector stakeholders’ emergency preparedness plans and response procedures to an active shooter / improvised explosive device (IED) incident and coordination activities under National Incident Management System (NIMS) with local, state, and federal agencies.
  • Consider participating organizations’ business continuity plans or continuity of operations plans to identify best practices in the aftermath of a complex coordinated attack on a large defense industrial base (DIB) workshop facility.

Modules

  • Module One: Intelligence and Information Sharing — 30 discussion questions
  • Module Two: Incident and Response — 76 discussion questions
  • Module Three: Business Continuity and Recovery — 29 discussion questions
Physical SecurityEnergySabotage Incident

Electric Substation Sabotage

An attack targeting equipment disrupts an electric power grid at an electric substation.

3 objectives2 modules46 discussion questions
Show objectives and module outline

Objectives

  • Identification of key regional and local critical infrastructure stakeholders and facilities.
  • Review of incident reporting, intelligence threat warning, and information sharing and dissemination processes between state, local, tribal, and territorial entities; law enforcement; facility owners and operators; and federal departments and agencies in relation to a credible threat to, a security incident at, or attack on, regional or local critical infrastructure.
  • Discuss regional and local stakeholders’ emergency preparedness plans and procedures to a security incident or attack on an electric substation and the coordination of activities under the National Incident Management System (NIMS) with federal, state, local, tribal, and territorial entities.

Modules

  • Module One: Incident Detection, Notification, and Reporting — 23 discussion questions
  • Module Two: Incident and Incident Aftermath — 23 discussion questions
Physical SecurityEducation (K-12)Active Shooter

Elementary School Active Shooter

An interactive, discussion-based exercise focused on an active shooter threat at an elementary school. The scenario consists of three modules: Pre-Incident Information Sharing, Incident Response, and Short-Term Recovery and Continuity.

8 objectives3 modules230 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident threat intelligence, information sharing, and notification and communication procedures between critical stakeholders.
  • Examine current emergency plans, procedures, and capabilities for incident response to an active shooter threat with a focus on:
  • Alert and communication procedures
  • Incident Command System (ICS) / National Incident Management System (NIMS)
  • Physical and psychological first aid
  • Evacuation and shelter-in-place procedures
  • Examine public messaging and media relations procedures during and immediately following an incident, including the role that critical stakeholders play in the aftermath of the incident.
  • Discuss recovery and continuity plans and procedures following an active threat incident, with a focus on family reunification and academic continuation.

Modules

  • Module One: Pre-Incident Information Sharing — 29 discussion questions
  • Module Two: Incident response — 147 discussion questions
  • Module Three: Short-Term Recovery and continuity — 54 discussion questions
Physical SecurityFaith-BasedActive Shooter and Improvised Explosive Device (IED) (international threat and domestic attack).

Faith Based Organization

An interactive, discussion-based exercise focused on an international and domestic active shooter and IED attack. The scenario consists of two modules: Threat, and Incident.

2 objectives2 modules66 discussion questions
Show objectives and module outline

Objectives

  • Review intelligence and information sharing and dissemination processes in relation to a credible threat to Faith-Based Organizations (FBOs).
  • Discuss emergency preparedness plans and public messaging procedures to a threat-initiated incident.

Modules

  • Module One: Threat — 20 discussion questions
  • Module Two: Incident — 46 discussion questions
Physical SecurityFood & AgricultureAgroterrorism and Infectious Disease

Food And Agriculture Supply

An interactive, discussion-based exercise focused on an infectious disease outbreak in livestock triggered by an agroterrorism attack on the Food and Agriculture Sector. The scenario consists of three modules: Pre-Incident Information Sharing, Incident Outbreak, and Recovery.

3 objectives3 modules74 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident and incident information sharing procedures between public and private sector stakeholders, including public messaging procedures.
  • Discuss emergency response plans and procedures to a threat-initiated incident at a Food and Agriculture Supply owner’s / operator’s facility with a focus on coordination between public and private sector stakeholders.
  • Consider participating organizations’ business continuity plans or continuity of operations plans in the aftermath of a threat-initiated incident at a Food and Agriculture Supply owner’s / operator’s facility.

Modules

  • Module One: Pre-Incident Information Sharing — 33 discussion questions
  • Module Two: Incident Outbreak — 27 discussion questions
  • Module Three: Recovery — 14 discussion questions
Physical SecurityFood & AgricultureThe malicious introduction of chemicals of interest (COI) into a food manufacturing production chain.

Food Manufacturing Facility

This TTX focuses on an insider attack at [Insert Name] food manufacturing facility. The scenario consists of three modules: Pre-incident Information Sharing, Incident Response, and Recovery.

3 objectives3 modules98 discussion questions
Show objectives and module outline

Objectives

  • Discuss information sharing procedures and communication and coordination protocols between private and public sector partners.
  • Identify organizational risk factors and examine emergency response plans for addressing a potential threat at a food manufacturing facility.
  • Examine business continuity and recovery plans and procedures following a chemical contamination in a food manufacturing facility.

Modules

  • Module One: Pre-Incident Information Sharing — 24 discussion questions
  • Module Two: Incident Response — 47 discussion questions
  • Module Three: Recovery — 27 discussion questions
Physical SecurityTransportationImprovised Explosive Device (IED) with Hazardous Materials (HAZMAT) release

Freight Rail Explosion Tabletop Exercise

An interactive, discussion-based exercise focused on a domestic threat and subsequent domestic incident at a freight yard. The scenario consists of three modules: Pre-Incident Information Sharing, Incident Response, and Short-Term Recovery.

4 objectives3 modules200 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident threat intelligence, information sharing, and notification and communication procedures between public and private sector partners including identifying threat assessment procedures, prevention resources and programs, and discussing pertinent privacy protection concerns.
  • Discuss coordination between private sector organizations and responding local, state, and federal agencies under the Incident Command System (ICS) / National Incident Management System (NIMS).
  • Examine public messaging and media relations procedures during and immediately following an incident.
  • Discuss recovery and continuity plans and procedures following an incident with a focus on business continuity and community recovery.

Modules

  • Module One: Pre-Incident Information Sharing — 42 discussion questions
  • Module Two: Incident Response — 97 discussion questions
  • Module Three: Short-term Recovery — 61 discussion questions
Physical SecurityActive Shooter / Complex Coordinated Attack (CCA) / IED

Gaming Industry

An interactive, discussion-based exercise focused on an active shooter / IED incident on the gaming industry. The scenario consists of three modules: Threat, Incident Response, and Post-Incident Recovery.

4 objectives3 modules168 discussion questions
Show objectives and module outline

Objectives

  • Examine the effectiveness of overall emergency plans and procedures in response to an active shooter / improvised explosive device (IED) incident using the Incident Command System.
  • Assess the existing methods of coordination and communication between public (federal, state, tribal, and local) and gaming sector partners during response to an incident.
  • Examine post-incident alert and communication procedures as well as evacuation procedures for guests and employees following an incident.
  • Identify and examine critical functions, business continuity, and recovery plans to include roles and responsibilities in short and long-term recovery efforts following an active shooter / IED incident.

Modules

  • Module One: Threat — 20 discussion questions
  • Module Two: Incident Response — 99 discussion questions
  • Module Three: Short-Term Recovery — 49 discussion questions
Physical SecurityGovernment FacilitiesIED, VBIED

Government Facilities Ied Vbied

A domestic extremist group with nationwide reach targets government facilities.

4 objectives3 modules121 discussion questions
Show objectives and module outline

Objectives

  • Review intelligence and information sharing and dissemination processes in relation to a credible threat to domestic critical infrastructure owners / operators.
  • Assess information sharing capabilities with government sector partners; federal, state, local, tribal, and territorial government departments and agencies; and the public in accordance with applicable plans and procedures.
  • Discuss critical infrastructure stakeholders’ emergency preparedness plans and response procedures to a threat-initiated incident and the coordination of activities under the National Incident Management System (NIMS) with local, state, and federal agencies.
  • Examine recovery and business continuity plans following an improvised explosive device (IED) and vehicle-borne IED (VBIED) attack.

Modules

  • Module One: Pre-Incident Information Sharing — 46 discussion questions
  • Module Two: Incident Response — 51 discussion questions
  • Module Three: Recovery — 24 discussion questions
Physical SecurityTruck ramming and hazardous material (HAZMAT) spill

Hazardous Materials

An interactive, discussion-based exercise focused on pre-incident information sharing, as well as response to and recovery from a vehicle ramming and HAZMAT spill.

4 objectives3 modules125 discussion questions
Show objectives and module outline

Objectives

  • Examine threat and incident information sharing, notification, and alert procedures between public and private partners, including public messaging protocols.
  • Examine operational coordination using Incident Command System (ICS) concepts during a multi-agency, multi-jurisdictional response to an active threat.
  • Examine public and private organization response procedures, interaction, and public relations collaboration during an active threat.
  • Discuss recovery and business continuity plans in the wake of an active threat in an open-air venue.

Modules

  • Module One: Intelligence and Information Sharing — 23 discussion questions
  • Module Two: Incident and Response — 66 discussion questions
  • Module Three: Recovery and Business Continuity — 36 discussion questions
Physical SecurityHealthcare & Public HealthSuicide Bomber / Improvised Explosive Device (IED)

Healthcare And Public Health Suicide Bomber

An interactive, discussion-based exercise focused on a domestic IED attack. The scenario consists of three modules: Pre-Incident, Incident, and Recovery.

5 objectives3 modules111 discussion questions
Show objectives and module outline

Objectives

  • Examine information sharing between HPH owners / operators and various stakeholders, including the public; other HPH owners / operators; and federal, state, and local government departments and agencies when dealing with a credible threat.
  • Assess your facility’s plans, policies, and procedures related to an adversarial threat, including incident management, evacuation, and personnel accountability.
  • Assess the ability of existing recovery plans and business continuity / continuity of operations plans to address facility and stakeholder needs following an active threat incident.
  • Enhance the ability of healthcare facilities to provide care during all-hazards incidents and mitigate the threat of disruptions to healthcare services.
  • Discuss and validate internal incident management communication processes in accordance with existing plans and procedures.

Modules

  • Module One: Pre-Incident — 20 discussion questions
  • Module Two: Incident — 52 discussion questions
  • Module Three: Recovery — 39 discussion questions
Physical SecurityHealthcare & Public HealthVBIED

Healthcare And Public Health Vbied

An interactive, discussion-based exercise focused on a domestic VBIED attack. The scenario consists of three modules: Pre-Incident, Incident, and Recovery.

5 objectives3 modules110 discussion questions
Show objectives and module outline

Objectives

  • Examine information sharing between HPH owners / operators and various stakeholders, including the public; other HPH owners / operators; and federal, state, and local government departments and agencies when dealing with a credible threat.
  • Assess your facility’s plans, policies, and procedures related to an adversarial threat, including incident management, evacuation, and personnel accountability.
  • Assess the ability of existing recovery plans and business continuity / continuity of operations plans to address facility and stakeholder needs following an active threat incident.
  • Enhance the ability of healthcare facilities to provide care during all-hazards incidents and mitigate the threat of disruptions to healthcare services.
  • Discuss and validate internal incident management communication processes in accordance with existing plans and procedures.

Modules

  • Module One: Pre-Incident — 20 discussion questions
  • Module Two: Incident — 53 discussion questions
  • Module Three: Recovery — 37 discussion questions
Physical SecurityEducation (K-12)Active Shooter

High School Active Shooter

An interactive, discussion-based exercise focused on an active shooter threat at a high school. The scenario consists of three modules: Pre-Incident Information Sharing, Incident Response, and Short-Term Recovery.

3 objectives3 modules239 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident threat intelligence, information sharing, and notification and communication procedures between public and private sector partners.
  • Evaluate response procedures to an active shooter event at a high school with a focus on Incident Command Systems (ICS) / National Incident Management System (NIMS), mass care services, coordination and communication, and evacuation and shelter-in-place procedures.
  • Assess recovery and continuity plans in the aftermath of an active shooter incident with a focus on prioritizing health and social services (including behavioral health) in the community and reunification.

Modules

  • Module One: Pre-Incident Information Sharing — 32 discussion questions
  • Module Two: Incident Response — 172 discussion questions
  • Module Three: Short-Term Recovery — 35 discussion questions
Physical SecurityEducation (Higher Ed)Complex Coordinated Attack

Higher Education Active Threat

An interactive, discussion-based exercise focused on a complex coordinated attack involving a vehicle-ramming and active shooter incident. The scenario consists of three modules: Intelligence and Information Sharing, Incident Response, and Recovery and Continuity.

4 objectives3 modules153 discussion questions
Show objectives and module outline

Objectives

  • Examine threat and incident information sharing, notification, and communication procedures between public and private partners, with a focus on intelligence community partners and higher education facilities.
  • Examine multi-agency coordination using Incident Command System (ICS) concepts during a complex coordinated attack, including collaboration with higher education facilities.
  • Examine public and private organization response procedures, interaction, and public relations collaborations during an active threat.
  • Discuss recovery and continuity plans and procedures following a complex coordinated attack.

Modules

  • Module One: Intelligence and Information Sharing — 36 discussion questions
  • Module Two: Incident Response — 72 discussion questions
  • Module Three: Recovery and Continuity — 45 discussion questions
Physical SecurityEducation (Higher Ed)Bomb threat, Unattended item, Suspicious package, IED

Higher Education IED

An interactive, discussion-based exercise focused on a phoned-in bomb threat, followed by the discovery of an abandoned item, a suspicious package, and an explosion. The scenario consists of three modules: Intelligence and Information Sharing, Incident Response, and Recovery and…

4 objectives3 modules194 discussion questions
Show objectives and module outline

Objectives

  • Examine threat and incident information sharing, notification, and communication procedures between [insert college or university] partners, with a focus on intelligence community partners and higher education facilities.
  • Examine multi-agency coordination using Incident Command System (ICS) concepts during a complex coordinated attack, including collaboration between higher education facilities and public sector partners.
  • Examine [insert college or university] response procedures, interaction, and public relations collaborations during an active threat.
  • Discuss recovery and continuity plans and procedures following a complex coordinated attack.

Modules

  • Module One: Intelligence and Information Sharing — 42 discussion questions
  • Module Two: Incident Response — 107 discussion questions
  • Module Three: Recovery and Continuity — 45 discussion questions
Physical SecurityFaith-BasedActive Shooter

House Of Worship Active Shooter

Active shooter incident

12 objectives5 modules111 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident intelligence and information sharing procedures between public and private sector stakeholders.
  • Examine response plans and procedures during an incident with a focus on:
  • Incident Command System (ICS) / National Incident Management System (NIMS)
  • Evacuation and shelter-in-place protocols
  • Public messaging protocols
  • Public Health, Healthcare, and Emergency Medical Services (EMS)
  • Mass casualty incident (MCI) procedures
  • Public / private sector coordination
  • Examine recovery and business continuity plans following an incident with a focus on:
  • Family reunification
  • Mental health and behavioral counseling
  • Victim assistance

Modules

  • Module 1: Pre-Incident Information Sharing — 21 discussion questions
  • Module 2: Incident Response — 26 discussion questions
  • Module 2: Scenario Update — 25 discussion questions
  • Module 3: Recovery — 19 discussion questions
  • Module 3: Scenario Update — 20 discussion questions
Physical SecurityHealthcare & Public HealthSuspicious Package / Improvised Explosive Device (IED)

Hph Suspicious Package

An interactive, discussion-based exercise focused on a potential IED attack. The scenario consists of three modules: Pre-Incident, Incident, and Recovery.

5 objectives3 modules98 discussion questions
Show objectives and module outline

Objectives

  • Examine information sharing between HPH owners / operators and various stakeholders, including the public, other HPH owners / operators, and federal, state, and local government departments and agencies when dealing with a credible threat.
  • Assess your facility’s plans, policies, and procedures related to an adversarial threat, including incident management, evacuation, and personnel accountability.
  • Assess the ability of existing recovery plans and business continuity / continuity of operations plans to address facility and stakeholder needs following an active threat incident.
  • Enhance the ability of healthcare facilities to provide care during all-hazards incidents and mitigate the threat of disruptions to healthcare services.
  • Discuss and validate internal incident management communication processes in accordance with existing plans and procedures.

Modules

  • Module One: Pre-Incident — 20 discussion questions
  • Module Two: Incident — 51 discussion questions
  • Module Three: Recovery — 27 discussion questions
Physical SecurityVehicle ramming incident with an active shooter.

Indoor Performing Arts Theater

The TTX will focus on pre-incident information sharing and response to and recovery from a complex coordinated attack.

3 objectives3 modules121 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident and incident information sharing procedures between public and private sector partners.
  • Examine emergency response, evacuation, and shelter-in-place plans and procedure to a complex coordinated attack.
  • Examine recovery and business continuity plans following a complex coordinated attack.

Modules

  • Module One: Intelligence and Information Sharing — 21 discussion questions
  • Module Two: Incident Response — 51 discussion questions
  • Module Three: Recovery and Business Continuity — 49 discussion questions
Physical SecurityFaith-BasedPhishing Attack, Vehicle Ramming, Active Shooter, and potential Improvised Explosive Device (IED)

Interfaith Community Video

An interactive, discussion-based exercise focused on a vehicle ramming and active shooter. The scenario consists of three modules: Pre-Incident Information Sharing, Incident Response, and Recovery.

4 objectives3 modules133 discussion questions
Show objectives and module outline

Objectives

  • Examine threat and incident information sharing, notification, and communication procedures between public and private sector partners, with a focus on intelligence community partners and faith-based organizations (FBO)s.
  • Examine private sector policies and procedures in response to a cyber-based attack.
  • Examine public and private organization response procedures, interaction, and public relations collaboration during an active threat at an FBO.
  • Discuss recovery and continuity plans and procedures following a complex coordinated attack.

Modules

  • Module One: Pre-Incident Information Sharing — 20 discussion questions
  • Module Two: Incident Response — 84 discussion questions
  • Module Three: Recovery — 29 discussion questions
Physical SecurityEducation (K-12)Active Shooter

K 12 Active Threat

An interactive, discussion-based exercise focused on an active shooter threat at a K-12 school. The scenario consists of three modules: Intelligence and Information Sharing, Incident Response, and Recovery and Continuity.

9 objectives4 modules172 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident threat intelligence, information sharing, and notification and communication procedures between public and private partners including identifying threat assessment procedures, prevention resources and programs, and discussing pertinent privacy protection concerns.
  • Examine current emergency plans, procedures, and capabilities for incident response to an active shooter threat with a focus on:
  • Alert and communication procedures
  • Integration and coordination between public and private partners using Incident Command System (ICS) concepts
  • Eliminating the threat
  • Medical and patient triage
  • Training programs
  • Examine public messaging and media relations procedures during and immediately following an incident, including the Public Information Officer (PIO) role.
  • Discuss recovery and continuity plans and procedures following an incident, with a focus on prioritizing health and social services (including behavioral health) in the community and reunification.

Modules

  • Module Three: Recovery and Continuity
  • Module One: Intelligence and Information Sharing — 23 discussion questions
  • Module Two: Incident Response — 95 discussion questions
  • Module Three: Recovery and Continuity — 54 discussion questions
Physical SecurityActive Shooter and IED

Large Box Store Retail

An interactive, discussion-based exercise focused on an Active Shooter / IED incident threatening a large box store. The scenario consists of three modules: Intelligence and Information Sharing; Incident and Response; and Business Continuity and Recovery.

3 objectives3 modules109 discussion questions
Show objectives and module outline

Objectives

  • Review pre-incident and incident response information sharing procedures between corporate leadership, employees, customers, and emergency responders.
  • Discuss private sector stakeholders’ emergency preparedness plans and response procedures to an Active Shooter / Improvised Explosive Device (IED) incident and the coordination of activities under National Incident Management System (NIMS) with local, state, and federal agencies.
  • Consider participating organizations’ business continuity plans or continuity of operations plans to identify best practices in the aftermath of a complex coordinated attack on a large box store.

Modules

  • Module One: Intelligence and Information Sharing — 19 discussion questions
  • Module Two: Incident and Response — 66 discussion questions
  • Module Three: Business Continuity and Recovery — 24 discussion questions
Physical SecurityCivil Unrest, Active Shooter

Large Sportingevent Active Shooter Video

An interactive, discussion-based exercise focused on a civil unrest incident and subsequent active shooter attack at a large sporting event during an athletic tournament. The scenario consists of three modules: Pre-Incident Intelligence and Information Sharing, Incident…

8 objectives3 modules184 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident and incident intelligence and information sharing procedures between public and private sector stakeholders.
  • Examine emergency response plans and procedures to an active shooter incident at a large sporting event with a focus on:
  • Incident Command System (ICS) / National Incident Management System (NIMS)
  • Evacuation and shelter-in-place procedures
  • Mass casualty incident (MCI) procedures
  • Public messaging protocols
  • Family reunification procedures
  • Examine immediate recovery plans following an incident, including victim assistance and mental and behavioral health resources.

Modules

  • Module One: Pre-Incident Intelligence and Information Sharing — 49 discussion questions
  • Module Two: Incident Response — 83 discussion questions
  • Module Three: Immediate Recovery and Business Continuity — 52 discussion questions
Physical SecurityTransportationVehicle Ramming and Improvised Explosive Device (IED)

Maritime Domestic Terror

An interactive, discussion-based exercise focused on a maritime domestic threat and subsequent domestic terror incident on critical maritime domestic infrastructure.

3 objectives3 modules133 discussion questions
Show objectives and module outline

Objectives

  • Examine intelligence and information sharing processes, including public messaging protocols, in relation to a credible threat to maritime domestic critical infrastructure.
  • Discuss and identify private sector stakeholders’ emergency preparedness plans and response procedures to a threat-initiated incident and the coordination activities under the National Incident Management System (NIMS) with local, state, and federal agencies.
  • Discuss recovery and business continuity plans in the wake of a maritime domestic terror incident including public messaging protocols.

Modules

  • Module One: Domestic Threat — 46 discussion questions
  • Module Two: Incident — 43 discussion questions
  • Module Three: Recovery — 44 discussion questions
Physical SecurityEducation (K-12)Active Shooter

Middle School Active Shooter

An interactive, discussion-based exercise focused on an active shooter threat at a middle school. The scenario consists of three modules: Pre-Incident Information Sharing, Incident Response, and Short-Term Recovery.

4 objectives3 modules242 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident threat intelligence, information sharing, and notification and communication procedures between public and private sector partners.
  • Evaluate the ability to establish an effective command structure; provide a safe and secure environment for students, staff, and first responders; and provide mass care services during the response to an active shooter incident occurring on school grounds.
  • Assess the ability to deliver coordinated, actionable, age-appropriate, and timely information to critical partners and stakeholders when faced with an active shooter incident and immediately following an incident.
  • Assess recovery and continuity plans in the aftermath of an active shooter incident with a focus on prioritizing health and social services (including behavioral health) in the community and family reunification.

Modules

  • Module One: Pre-Incident Information Sharing — 30 discussion questions
  • Module Two: Incident Response — 159 discussion questions
  • Module Three: Short-Term Recovery — 53 discussion questions
Physical SecurityCivil Unrest, Active Shooter, Vehicle-Borne Improvised Explosive Device (VBIED)

Motor Speedway Civil Unrest Active Threat

An interactive, discussion-based exercise focused on a civil unrest event with a shooting outside of [Insert speedway] and a subsequent VBIED detonation inside of the speedway on race day. The scenario consists of three modules: Pre-Incident Information Sharing, Incident…

6 objectives3 modules186 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident intelligence and information sharing procedures between private and public sector stakeholders.
  • Examine emergency response plans and procedures during a civil disturbance and active threat scenario with a focus on:
  • Incident Command System (ICS) / National Incident Management System (NIMS)
  • Evacuation and shelter-in-place procedures
  • Public messaging protocols
  • Examine recovery plans following an incident, including restoration of raceway services and victim assistance.

Modules

  • Module One: Pre-Incident Information Sharing — 27 discussion questions
  • Module Two: Incident Response — 92 discussion questions
  • Module Three: Recovery and Business Continuity — 67 discussion questions
Physical SecurityIED

Multi Jurisdictional Ied Bridge

An interactive, discussion-based exercise focused on a multijurisdictional attack on critical infrastructure. The scenario consists of three modules: Pre-Incident Sharing, Incident Response, and Short-Term Recovery.

6 objectives3 modules218 discussion questions
Show objectives and module outline

Objectives

  • Evaluate multi-jurisdictional information sharing capabilities and processes among participating organizations responding to a potential threat and then a confirmed improvised explosive device (IED) explosion.
  • Evaluate the ability to establish an effective command structure; provide a safe and secure environment for first responders, law enforcement, and commuters; and provide mass care services during the response to an explosion on [insert bridge name].
  • Examine recovery plans following an attack from an IED with a focus on:
  • Family reunification process
  • Victim assistance
  • Economic and community recovery

Modules

  • Module One: Pre-Incident Information Sharing — 51 discussion questions
  • Module Two: Incident Response — 106 discussion questions
  • Module Three: Short-Term Recovery — 61 discussion questions
Physical SecurityCivil Unrest, Improvised Explosive Device (IED) Attack

Music Festival Bombing Video

An interactive, discussion-based exercise focused on a civil unrest incident and subsequent explosion at a music festival. The scenario consists of three modules: Pre-Incident Intelligence and Information Sharing, Incident Response, and Immediate Recovery.

9 objectives3 modules192 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident and incident intelligence and information sharing procedures between public and private sector stakeholders.
  • Examine emergency response plans and procedures to a bombing at a music festival with a focus on:
  • Incident Command System (ICS) / National Incident Management System (NIMS)
  • Evacuation and shelter-in-place procedures
  • Mass casualty incident (MCI) procedures
  • Public messaging protocols
  • Family reunification procedures
  • Mental and behavioral health resources
  • Examine immediate recovery plans following an incident, including victim assistance following an active threat at a music festival.

Modules

  • Module One: Pre-Incident Intelligence and Information Sharing — 52 discussion questions
  • Module Two: Incident Response — 85 discussion questions
  • Module Three: Immediate Recovery and Business Continuity — 55 discussion questions
Physical SecurityCivil Unrest, Active Shooter Attack

Music Festival Shooting Video

An interactive, discussion-based exercise focused on an active shooter attack at a music festival. The scenario consists of three modules: Pre-Incident Intelligence and Information Sharing, Incident Response, and Immediate Recovery.

9 objectives3 modules206 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident and incident intelligence and information sharing procedures between public and private sector stakeholders.
  • Examine emergency response plans and procedures to a shooting at a music festival with a focus on:
  • Incident Command System (ICS) / National Incident Management System (NIMS)
  • Evacuation and shelter-in-place procedures
  • Mass casualty incident (MCI) procedures
  • Public messaging protocols
  • Family reunification procedures
  • Mental and behavioral health resources
  • Examine immediate recovery plans following an incident, including victim assistance following an active threat at a music festival.

Modules

  • Module One: Pre-Incident Intelligence and Information Sharing — 60 discussion questions
  • Module Two: Incident Response — 85 discussion questions
  • Module Three: Immediate Recovery and Business Continuity — 61 discussion questions
Physical SecurityGovernment FacilitiesImprovised Explosive Device (IED)

National Monuments And Icons

An interactive, discussion-based exercise focused on an IED attack. The scenario consists of three modules: Intelligence and Information Sharing, Incident Response, and Short-Term Recovery.

3 objectives3 modules101 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident intelligence and information sharing procedures in relation to a credible threat to domestic critical infrastructure between public and private stakeholders.
  • Examine private sector stakeholders’ emergency preparedness plans and response to procedures to a threat-initiated incident and coordination activities with local, state, and federal agencies.
  • Examine short-term recovery plans and business continuity plans following an attack.

Modules

  • Module One: Intelligence and Information Sharing — 17 discussion questions
  • Module Two: Incident Response — 51 discussion questions
  • Module Three: Short-Term Recovery — 33 discussion questions
Physical SecurityVehicle Ramming, Active Shooter, Improvised Explosive Device (IED)

Outdoor Events Active Assailant Ied

An interactive, discussion-based exercise focused on an attack on an outdoor event. The scenario consists of three modules: Pre-Incident Intelligence and Information Sharing, Incident and Response, and Short-Term Recovery.

5 objectives3 modules160 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident and incident intelligence and information sharing procedures between public and private sector stakeholders.
  • Review emergency preparedness plans and response procedures to an attack on an outdoor event.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS).
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Review organizational interdependencies and recovery plans.

Modules

  • Module One: Pre-Incident Intelligence and Information Sharing — 47 discussion questions
  • Module Two: Incident and Response — 68 discussion questions
  • Module Three: Short-Term Recovery — 45 discussion questions
Physical SecurityVehicle Ramming, Active Assailant, Improvised Explosive Device (IED).

Outdoor Events Active Threat Active Shooter

An interactive, discussion-based exercise focused on an attack on an outdoor event. The scenario consists of three modules: Incident and Response, Sustained Response, and Short-Term Recovery.

4 objectives3 modules248 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures to an attack on an outdoor event.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS).
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Review organizational interdependencies and recovery plans.

Modules

  • Module One: Incident and Response — 84 discussion questions
  • Module Two: Sustained Response — 97 discussion questions
  • Module Three: Short-Term Recovery — 67 discussion questions
Physical SecurityVehicle Ramming, Edged Weapon Attack

Outdoor Events Active Threat Edged Weapon

An interactive, discussion-based exercise focused on an attack on an outdoor event. The scenario consists of three modules: Incident and Response, Sustained Response, and Short-Term Recovery.

4 objectives3 modules241 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures to an attack on an outdoor event.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS).
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Review organizational interdependencies and recovery plans.

Modules

  • Module One: Incident and Response — 77 discussion questions
  • Module Two: Sustained Response — 97 discussion questions
  • Module Three: Short-Term Recovery — 67 discussion questions
Physical SecurityActive Shooter and Hostage Situation

Outdoor Events Active Threat Hostage Component

An interactive, discussion-based exercise focused on an attack on an outdoor event. The scenario consists of three modules: Incident and Response, Sustained Response, and Short-Term Recovery.

4 objectives3 modules252 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures to an attack on an outdoor event.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS).
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Review organizational interdependencies and recovery plans.

Modules

  • Module One: Incident and Response — 86 discussion questions
  • Module Two: Sustained Response — 99 discussion questions
  • Module Three: Short-Term Recovery — 67 discussion questions
Physical SecurityVehicle Ramming, Active Shooter, Vehicle-Borne Improvised Explosive Device (VBIED), and Hostages.

Outdoor Events Active Threat Hostage Vbied

An interactive, discussion-based exercise focused on an attack on an outdoor event. The scenario consists of three modules: Incident and Response, Sustained Response, and Short-Term Recovery.

4 objectives3 modules250 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures to an attack on an outdoor event.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS).
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Review organizational interdependencies and recovery plans.

Modules

  • Module One: Incident and Response — 96 discussion questions
  • Module Two: Sustained Response — 89 discussion questions
  • Module Three: Short-Term Recovery — 65 discussion questions
Physical SecuritySupply Chain Disruption (Infectious Disease)

Pandemic Supply Chain Disruption

This is an interactive, discussion-based exercise on a supply chain disruption resulting from a pandemic virus. The scenario consists of three modules: Information Sharing, Peak Response, and Transition to Recovery.

4 objectives1 module73 discussion questions
Show objectives and module outline

Objectives

  • Evaluate how effective current plans, procedures, and agreements are in mitigating and responding to impacts from a catastrophic event to the relevant supply chain.
  • Identify threats, hazards, vulnerabilities, and consequences for the supply chain.
  • Identify critical functions, actions, and timeframes to maintain supply chain continuity during a catastrophic incident.
  • Discuss and validate multidirectional communication processes in accordance with existing supply chain continuity plans and procedures.

Modules

  • Module 3: Transition to Recovery — 73 discussion questions
Physical SecuritysUAS-based attack

Suas Ied

An interactive, discussion-based exercise focused on an active threat involving an sUAS. The scenario consists of three modules: Intelligence and Information Sharing, Incident and Response, and Recovery and Business Continuity.

4 objectives3 modules137 discussion questions
Show objectives and module outline

Objectives

  • Examine threat and incident information sharing, notification systems, and alert procedures between public and private partners, including public messaging protocols.
  • Examine operational coordination using Incident Command System (ICS) / National Incident Management System (NIMS) concepts during a multi-agency, multi-jurisdictional response to an sUAS incident.
  • Examine public and private sectors organization’s response procedures, interaction, and public relations collaboration during an sUAS incident.
  • Discuss recovery and business continuity plans in the wake of an sUAS incident.

Modules

  • Module One: Intelligence and Information Sharing — 26 discussion questions
  • Module Two: Incident and Response — 80 discussion questions
  • Module Three: Recovery and Business Continuity — 31 discussion questions
Physical SecuritysUAS-based attack

Suas Ied Airport

An interactive, discussion-based exercise focused on an active threat involving an sUAS device and IED incident. The scenario consists of three modules: Intelligence and Information Sharing, Incident Response, and Recovery and Business Continuity.

4 objectives3 modules141 discussion questions
Show objectives and module outline

Objectives

  • Examine threat and incident information sharing, notification systems, and alert procedures between public and private sector partners, including public messaging protocols.
  • Examine operational coordination using Incident Command System (ICS) concepts during a multi-agency, multi-jurisdictional response to an sUAS incident.
  • Examine public and private organization response procedures, interaction, and public relations collaboration during an sUAS incident.
  • Discuss recovery and business continuity plans in the wake of an sUAS incident.

Modules

  • Module One: Intelligence and Information Sharing — 26 discussion questions
  • Module Two: Incident Response — 82 discussion questions
  • Module Three: Recovery and Business Continuity — 33 discussion questions
Physical SecuritysUAS-based attack

Suas Ied Nefarious Intent

An interactive, discussion-based exercise focused on an active threat involving an sUAS device. The scenario consists of three modules: Intelligence and Information Sharing, Incident Response, and Recovery and Business Continuity.

4 objectives3 modules127 discussion questions
Show objectives and module outline

Objectives

  • Examine threat and incident information sharing, notification systems, and alert procedures between public and private sector partners, including public messaging protocols.
  • Examine operational coordination using Incident Command System (ICS) / National Incident Management System (NIMS) concepts during a multi-agency, multi-jurisdictional response to an sUAS incident.
  • Examine public and private sector organization’s response procedures, interaction, and public relations collaboration during an sUAS incident.
  • Discuss recovery and business continuity plans in the wake of an sUAS incident.

Modules

  • Module One: Intelligence and Information Sharing — 26 discussion questions
  • Module Two: Incident and Response — 71 discussion questions
  • Module Three: Recovery and Business Continuity — 30 discussion questions
Physical SecuritysUAS-based attack

Suas Ied Non Nefarious Activity

An interactive, discussion-based exercise focused on an active threat involving an sUAS device. The scenario consists of three modules: Intelligence and Information Sharing, Incident and Response, and Recovery and Business Continuity.

4 objectives3 modules129 discussion questions
Show objectives and module outline

Objectives

  • Examine threat and incident information sharing, notification systems, and alert procedures between public and private sector partners, including public messaging protocols.
  • Examine operational coordination using Incident Command System (ICS) / National Incident Management System (NIMS) concepts during a multi-agency, multi-jurisdictional response to an sUAS incident.
  • Examine public and private sector organization’s response procedures, interaction, and public relations collaboration during an sUAS incident.
  • Discuss recovery and business continuity plans in the wake of an sUAS incident.

Modules

  • Module One: Intelligence and Information Sharing — 26 discussion questions
  • Module Two: Incident and Response — 76 discussion questions
  • Module Three: Recovery and Business Continuity — 27 discussion questions
Physical SecuritySupply Chain Disruption (Border Closure for Domestic Threat)

Supply Chain Border Closure

This is an interactive, discussion-based exercise focused on a border crossing closure resulting from a domestic threat. The scenario consists of three modules: Pre-Incident, Incident, and Post-Incident.

4 objectives1 module58 discussion questions
Show objectives and module outline

Objectives

  • Evaluate how effective current plans, procedures, and agreements are in mitigating and responding to impacts from a catastrophic event to the relevant supply chain
  • Identify threats, hazards, vulnerabilities, and consequences for the supply chain.
  • Identify critical functions, actions, and timeframes to maintain supply chain continuity due to a catastrophic incident.
  • Discuss and validate multidirectional communication processes in accordance with existing supply chain continuity plans and procedures.

Modules

  • Module 3: Post-Incident — 58 discussion questions
Physical SecuritySupply Chain Disruption (Hurricane)

Supply Chain Hurricane

This is an interactive, discussion-based exercise focused on a supply chain disruption resulting from a hurricane. The scenario consists of three modules: Pre-Incident, Incident, and Post-Incident.

4 objectives3 modules50 discussion questions
Show objectives and module outline

Objectives

  • Evaluate how effective current plans, procedures, and agreements are in mitigating and responding to and recovering from impacts from a catastrophic event to the relevant supply chain.
  • Identify threats, hazards, vulnerabilities, and consequences for the supply chain.
  • Identify critical functions, actions, and timeframes to maintain supply chain continuity due to a catastrophic incident.
  • Discuss and validate multidirectional communication processes in accordance with existing supply chain continuity plans and procedures.

Modules

  • Module One: Pre-Incident — 31 discussion questions
  • Module Two: Incident — 9 discussion questions
  • Module Three: Post-Incident — 10 discussion questions
Physical SecuritySupply Chain Disruption (Severe Flooding)

Supply Chain Severe Flooding

This is an interactive, discussion-based exercise focused on a supply chain disruption resulting from a severe flooding incident. The scenario consists of three modules: Pre-Incident, Incident, and Post-Incident.

4 objectives3 modules52 discussion questions
Show objectives and module outline

Objectives

  • Evaluate how effective current plans, procedures, and agreements are in mitigating and responding to and recovering from impacts from a catastrophic event to the relevant supply chain.
  • Identify threats, hazards, vulnerabilities, and consequences for the supply chain.
  • Identify critical functions, actions, and timeframes to maintain supply chain continuity due to a catastrophic incident.
  • Discuss and validate multidirectional communication processes in accordance with existing supply chain continuity plans and procedures.

Modules

  • Module One: Pre-Incident — 32 discussion questions
  • Module Two: Incident — 10 discussion questions
  • Module Three: Post-Incident — 10 discussion questions
Physical SecuritySupply Chain Disruption (Winter Weather)

Supply Chain Winter Weather

This is an interactive, discussion-based exercise focused on a supply chain disruption resulting a winter weather event. The scenario consists of three modules: Pre-Incident, Incident, and Post-Incident.

4 objectives1 module59 discussion questions
Show objectives and module outline

Objectives

  • Evaluate how effective current plans, procedures, and agreements are in mitigating and responding to and recovering from impacts from a catastrophic event to the relevant supply chain.
  • Identify threats, hazards, vulnerabilities, and consequences for the supply chain.
  • Identify threats, hazards, vulnerabilities, and timeframes to maintain supply chain continuity due to a catastrophic incident.
  • Discuss and validate multidirectional communication processes in accordance with existing supply chain continuity plans and procedures.

Modules

  • Module 3: Post-Incident — 59 discussion questions
Physical SecurityTornado

Tornado

An interactive, discussion-based exercise focused on tornados threating a community and private sector business. The scenario consists of three modules: Pre-Incident Information Sharing, Incident Response, and Short-Term and Continuous Recovery.

9 objectives3 modules160 discussion questions
Show objectives and module outline

Objectives

  • Examine emergency response plans and procedures before and during a tornado incident with a focus on:
  • Incident Command System (ICS) / National Incident Management System (NIMS)
  • Critical infrastructure protection
  • Public messaging protocols
  • Assess procedures for coordinating and sharing information within the organization.
  • Examine recovery protocols following a tornado with a focus on:
  • Business continuity
  • Critical infrastructure resilience
  • Supply chain integrity

Modules

  • Module One: Pre-Incident Information Sharing — 55 discussion questions
  • Module Two: Incident Response — 32 discussion questions
  • Module Three: Short Term and Continuous Recovery — 73 discussion questions
Physical SecurityUAS / drone incident

Uas Stadium Crash Video

An interactive, discussion-based exercise focused on a UAS incident at a sporting event stadium. The scenario consists of three modules: Pre-Incident Intelligence and Information, Incident Response, and Recovery.

8 objectives2 modules91 discussion questions
Show objectives and module outline

Objectives

  • Examine pre-incident and incident intelligence and information sharing procedures between public and private stakeholders.
  • Examine emergency response plans and procedures for an attack at a sporting event with a focus on:
  • Incident Command System (ICS) / National Incident Management System (NIMS)
  • Evacuation and shelter-in-place procedures
  • Public messaging protocols
  • Family reunification procedures
  • Mental and behavioral health resources
  • Examine immediate recovery and business continuity plans following an incident, including victim assistance following an active threat at a large sporting event.

Modules

  • Module One: Incident Response — 41 discussion questions
  • Module Two: Recovery — 50 discussion questions
Physical SecurityWildfire

Wildfire Threat

An interactive, discussion-based exercise focused on wildfire threatening a community. The scenario consists of three modules: Intelligence and Information Sharing, Incident and Response, and Short-Term Recovery.

4 objectives3 modules153 discussion questions
Show objectives and module outline

Objectives

  • Review emergency preparedness plans and response procedures to a wildfire.
  • Assess procedures for coordinating and sharing information within organizations, between organizations, and with the public.
  • Discuss the coordination between private sector organizations and responding local, state, and federal agencies under the National Incident Management System (NIMS).
  • Review organizational interdependencies and recovery plans.

Modules

  • Module One: Intelligence and Information Sharing — 20 discussion questions
  • Module Two: Incident and Response — 87 discussion questions
  • Module Three: Short-Term Recovery — 46 discussion questions