5 Threat And Risk Assessment Approaches for Security Professionals in 2023 | Second Sight Training Systems | Threat Assessment Training | Online Courses and In-Person Training (2024)

Commerce. Retrieved January 2023 from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf

Botha, A. (2021). Chapter 28: Prevention of Terrorist Attacks on Critical Infrastructure. In the Handbook of Terrorism Prevention and Preparedness. Retrieved January 2023 from https://icct.nl/app/uploads/2021/04/Handbook-Ch-28-Botha-Prevention-of-Terrorist-Attacks-on-Critical-Infrastructure.pdf

Brayne, S., & Christin, A. (2021). Technologies of crime prediction: The reception of algorithms in policing and criminal courts. Social Problems, 68(3), 608-624. Retrieved January 2023 from http://www.angelechristin.com/wp-content/uploads/2020/03/Technologies-of-Crime-Prediction_SocProblems.pdf

Browning-Wright, D. (2003). “Eleven Questions to Guide Data Collection in a Threat Assessment Inquiry.” U.S. Secret Service: Department of Education. Retrieved January 2023 from https://locker.txssc.txstate.edu/f40474bcbab5f025bb1570f1bfbf9f06/Eleven-Questions-to-Guide-Data-Collection-in-a-Threat-Assessment-Inquiry.pdf

Capellan, J.A., & Jiao, A.Y. (2019). Deconstructing Mass Public Shootings: Exploring Opportunities for Intervention. Rowan University: Rockefeller Institute of Government. Retrieved January 2023 from https://rockinst.org/wp-content/uploads/2019/10/10-24-19-Deconstructing-Mass-Shootings-Brief-1.pdf

Chohlas-Wood, A. (2020). Understanding Risk Assessment Instruments in Criminal Justice. The Brookings Institution. Retrieved January 2023 from https://www.brookings.edu/research/understanding-risk-assessment-instruments-in-criminal-justice/

Cornell, D.G. (2020). Threat assessment as a school violence prevention strategy. Criminology & Public Policy, 19(1), 235-252. Retrieved January 2023 from https://onlinelibrary.wiley.com/doi/abs/10.1111/1745-9133.12471

Criminal Intelligence Coordinating Council (CICC). (2016). Understanding Digital Footprints: Steps to Protect Personal Information, A Guide For Law Enforcement. Global Advisory Committee: U.S. Department of Homeland Security. Retrieved January 2023 from https://bja.ojp.gov/sites/g/files/xyckuh186/files/media/document/Understanding_Digital_Footprints-09-2016.pdf

Cybersecurity and Infrastructure Security Agency (CISA). (2014). Emergency Services Sector Roadmap to Secure Voice and Data Systems. Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/emergency-services-sector-roadmap-to-secure-voice-and-data-systems-032014-508.pdf

Cybersecurity and Infrastructure Security Agency (CISA). (2015). Emergency Services Sector-Specific Plan. Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/emergency-services-sector-specific-plan-112015-508_0.pdf

Cybersecurity and Infrastructure Security Agency (CISA). (2017). A Guide to Securing Networks for Wi-Fi, Version 1.0. Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/uscert/sites/default/files/publications/A_Guide_to_Securing_Networks_for_Wi-Fi.pdf

Cybersecurity and Infrastructure Security Agency (CISA). (2019). A Guide to Critical Infrastructure Security and Resilience. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/Guide-Critical-Infrastructure-Security-Resilience-110819-508v2.pdf

Cybersecurity and Infrastructure Security Agency (CISA). (2019). Emergency Services Sector Landscape, Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/emergency-services-sector-landscape-082019-508.pdf

Cybersecurity and Infrastructure Security Agency (CISA). (2020). Cyber Resilience Review (CRR) Question Set with Guidance. Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/3_CRR_4.0_Self-Assessment_Questions_%26amp%3B_Guidance_April_2020.pdf

Cybersecurity and Infrastructure Security Agency (CISA). (2020). Cyber Resilience Review (CRR) Cybersecurity Frameworks. Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/4_CRR_4.0_Self_Assessment-NIST_CSF_v1.1_Crosswalk-April_2020.pdf

Cybersecurity and Infrastructure Security Agency (CISA). (ND). “State, Local, Tribal, and Territorial Authorities, Government, and First Responders.” Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/state-local-tribal-and-territorial-authorities-government-and-first-responders

Defense Science Board (DSB). (2012). Predicting Violent Behavior. Task Force Report. U.S. Department of Defense. Retrieved January 2023 from https://irp.fas.org/agency/dod/dsb/predicting.pdf

Desmarais, S. L., & Zottola, S. A. (2019). Violence risk assessment: Current status and contemporary issues. Marquette Law Review, 103, 793. Retrieved January 2022 from https://scholarship.law.marquette.edu/cgi/viewcontent.cgi?article=5441&context=mulr

Dipshan, R., Hudgins, V., Ready, F., & Warren, Z. (2020). “The Most Widely Used Risk Assessment Tool in Each U.S. State.” Retrieved January 2023 from https://www.law.com/legaltechnews/2020/07/13/the-most-widely-used-risk-assessment-tool-in-each-u-s-state/?slreturn=20230019150826

Enang, I., Murray, J., Dougall, N., Aston, E., Wooff, A., Heyman, I., & Grandison, G. (2021). Vulnerability assessment across the frontline of law enforcement and public health: A systematic review. Policing and Society, 1-20. Retrieved January 2022 from https://www.tandfonline.com/doi/full/10.1080/10439463.2021.1927025

International Association of Chiefs of Police (IACP). (2017). Managing Cybersecurity Risk: A Law Enforcement Guide. Retrieved January 2023 from https://www.iacpcybercenter.org/wp-content/uploads/2015/04/Managing_Cybersecurity_Risk_2017.pdf

Mayorkas, A.N. (2022). Summary of Resources for State, Local, Tribal, Territorial, and Campus Law Enforcement Partners. U.S. Department of Homeland Security. Retrieved January 2023 from https://www.dhs.gov/sites/default/files/2022-04/22_0407_OSLLE_LE-resource-guide-signed_508.pdf

Miller, A. (2014). Threat Assessment in Action. The American Psychological Association. Retrieved January 2023 from https://www.apa.org/monitor/2014/02/cover-threat.aspx.

Modzeleski, W., & Randazzo, M.R. (2018). School threat assessment in the USA: Lessons learned from 15 years of teaching and using the federal model to prevent school shootings. Contemporary School Psychology, 22(2), 109-115. Retrieved January 2023 from https://link.springer.com/article/10.1007/s40688-018-0188-8

National Association for Behavioral Intervention and Threat Assessment (NABITA). (2014). “NABITA Threat Assessment Tool.” Retrieved January 2023 from https://cdn.nabita.org/website-media/nabita.org/wordpress/wp-content/uploads/2014/04/2014-NaBITA-Threat-Assessment-Tool.pdf

National Association for Behavioral Intervention and Threat Assessment (NABITA). (2014). “21 Questions: A Supplemental Flow Chart for the NABITA Threat Assessment Tool.” Retrieved January 2023 from http://nabita.moatusers.com/Rubric/21-Questions_0518.pdf

National Association of School Psychologists (NASP). (2015). School Violence Prevention: Guidelines for Administrators and Crisis Teams. Retrieved January 2023 from https://www.nasponline.org/resources-and-publications/resources-and-podcasts/school-safety-and-crisis/school-violence-resources/school-violence-prevention/school-violence-prevention-guidelines-for-administrators-and-crisis-teams

National Institute for Occupational Safety and Health (NIOSH). (2020). “Violence Risk Assessment Tools.” The Centers for Disease Control and Prevention. Retrieved January 2023 from https://wwwn.cdc.gov/WPVHC/Nurses/Course/Slide/Unit6_8

National Threat Assessment Center (NTAC). (2018). Enhancing School Safety Using a Threat Assessment Model: An Operational Guide for Preventing Targeted School Violence. U.S. Secret Service: Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/18_0711_USSS_NTAC-Enhancing-School-Safety-Guide.pdf.

National Threat Assessment Center (NTAC). (2019). Protecting America’s Schools: A U.S. Secret Service Analysis of Targeted School Violence. U.S. Secret Service: Department of Homeland Security. Retrieved January 2023 from https://www.secretservice.gov/sites/default/files/2020-04/Protecting_Americas_Schools.pdf

National Threat Assessment Center (NTAC). (2020). Mass Attacks in Public Spaces - 2019. U.S. Secret Service: Department of Homeland Security. Retrieved January 2023 from https://www.secretservice.gov/sites/default/files/reports/2020-09/MAPS2019.pdf

National Threat Assessment Center (NTAC). (2021). Averting Targeted School Violence. U.S. Secret Service: Department of Homeland Security. Retrieved January 2023 from https://www.secretservice.gov/sites/default/files/reports/2021-03/USSS%20Averting%20Targeted%20School%20Violence.2021.03.pdf

National Threat Evaluation and Reporting Program. (ND). “Behavioral Approach to Violence Prevention.” Office of Intelligence Analysis: Department of Homeland Security. Retrieved January 2023 from https://sites.ed.gov/whhbcu/files/2022/01/Behavioral-Approach-to-Violence-Prevention.pdf

Occupational Safety and Health Administration (OSHA). (ND). “Evacuation Planning Matrix.” U.S. Department of Labor. Retrieved January 2023 from https://www.osha.gov/emergency-preparedness/evacuation-matrix

“Ohio Risk Assessment System: Pretrial Assessment Tool (ORAS-PAT).” (2018). Retrieved January 2023 from https://cjdata.tooltrack.org/sites/default/files/2018-10/ORAS%20Scoring%20Assessment.pdf

Partnership on Artificial Intelligence. (2019). Report on Algorithmic Risk Assessment Tools in the U.S. Criminal Justice System. Retrieved January 2023 from https://pde.is/posts/docs/Report-on-Algorithmic-Risk-Assessment-Tools.pdf

RAND Corporation (ND). “Follow-Up Actions: No Prevention Opportunity Missed.” Mass Attacks Defense Toolkit. Retrieved January 2023 from https://www.rand.org/pubs/tools/TLA1613-1/toolkit/prevent/follow-up-actions.html

RAND Corporation (ND). “In Depth: Databases to Support Threat Assessments.” Mass Attacks Defense Toolkit. Retrieved January 2023 from https://www.rand.org/pubs/tools/TLA1613-1/toolkit/prevent/threat-assessment/databases.html#:~:text=Most%2DCommonly%20Used%20Data%20Systems,and%20state%20and%20local%20databases

RAND Corporation (ND). “Initial Detection: Through Increasing Tips and Leads Through Information Sharing.” Mass Attacks Defense Toolkit. Retrieved January 2023 from https://www.rand.org/pubs/tools/TLA1613-1/toolkit/prevent/initial-detection.html

RAND Corporation (ND). “Prevent Phase Framework.” Mass Attacks Defense Toolkit. Retrieved January 2023 from https://www.rand.org/pubs/tools/TLA1613-1/toolkit/prevent/framework.html

RAND Corporation (ND). “Threat Assessment: Finding and Putting Together the Puzzle Pieces.” Mass Attacks Defense Toolkit. Retrieved January 2023 from https://www.rand.org/pubs/tools/TLA1613-1/toolkit/prevent/threat-assessment.html

Ready Campaign. (2021). “Risk Assessment.” Retrieved January 2022 from https://www.ready.gov/risk-assessment

Ready Campaign. (2022). “Disasters and Emergencies.” Retrieved January 2023 from https://www.ready.gov/risk-assessment

Ready Campaign. (2022). “Emergency Response Plan.” Retrieved January 2023 from https://www.ready.gov/business/implementation/emergency

Ready Campaign. (2022). “Resource Management.” Retrieved January 2023 from https://www.ready.gov/resource-management

Ready Campaign. (2022). “Risk Mitigation.” Retrieved January 2023 from https://www.ready.gov/risk-mitigation

Renfroe, N.A. and Smith, J.L. (2016). “Threat / Vulnerability Assessments and Risk Analysis.” Applied Research Associates. Retrieved January 2023 from https://www.wbdg.org/resources/threat-vulnerability-assessments-and-risk-analysis.

Romano, S.J., Levi-Minzi, M.E., Rugala, E.A., & van Hasselt, V.B. (2011). Workplace Violence Prevention. Federal Bureau of Investigation: U.S. Department of Justice. Retrieved January 2023 from https://www.fbi.gov/file-repository/stats-services-publications-workplace-violence-workplace-violence/view

Ruggiero, P., & Foote, J. (2011). Cyber Threats to Mobile Phones. U.S. Computer Readiness Team: Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/uscert/sites/default/files/publications/cyber_threats_to_mobile_phones.pdf

Savage, T.A., and Woitaszewski, S.A. (2018). School-Based Threat Assessment: Best Practices and Resources. Presentation at the Minnesota School Psychologists Association: Plymouth, MN. Retrieved January 2023 from https://www.mspaonline.net/resources/Documents/past%20conference%20materials/2018/School-Wide%20Practices/School-Based%20Threat%20Assessment_%20Best%20Practices%20and%20Resources%20-%20Savage,%20Woitaszewski.pdf

Serin, R.C., Lowenkamp, C.T., Johnson, J.L., & Trevino, P. (2016). Using a multi-level risk assessment to inform case planning and risk management: Implications for officers.Federal Probation,80, 10. Retrieved January 2023 from https://www.uscourts.gov/sites/default/files/80_2_2_0.pdf

Simons, A., & Meloy, J. R. (2017). Foundations of threat assessment and management. In The Handbook of Behavioral Criminology, 627-644. Retrieved January 2023 from https://link.springer.com/chapter/10.1007/978-3-319-61625-4_36

Sokolow, B.A., Lewis, W.S., Schuster, S.K., Swinton, D.C., van Brunt, B.J. (2014). Threat Assessment in the Campus Setting. National Behavioral Intervention Team Association. Retrieved January 2023 from http://nabita.moatusers.com/Rubric/2014%20NaBITA%20Whitepaper.pdf

South Dakota Department of Corrections. (2015). “Policy 1.4.B.123: LSI-R Assessment and Case Planning.” Retrieved January 2023 from https://doc.sd.gov/documents/about/policies/LSI-R%20Assessment%20and%20Case%20Planning.pdf

“Violence Risk Assessments.” (ND). Retrieved January 2023 from https://psychology.iresearchnet.com/forensic-psychology/violence-risk-assessment/

Virginia Department of Criminal Justice Service. (2018). Virginia Pretrial Risk Assessment Instrument (VPRAI) Instruction Manual, Version 4.3. Retrieved January 2023 from https://www.dcjs.virginia.gov/sites/dcjs.virginia.gov/files/publications/corrections/virginia-pretrial-risk-assessment-instrument-vprai_0.pdf

Whole Building Design Guide (WBDG). (2017). “Natural Hazards Mitigation.” Secure/Safe Committee. Retrieved January 2023 from https://www.wbdg.org/design-objectives/secure-safe/natural-hazards-mitigation

Whole Building Design Guide (WBDG). (2017). “Occupant Safety and Health.” Secure/Safe Committee. Retrieved January 2023 from https://www.wbdg.org/design-objectives/secure-safe/occupant-safety-health

5 Threat And Risk Assessment Approaches for Security Professionals in 2023 | Second Sight Training Systems | Threat Assessment Training | Online Courses and In-Person Training (2024)
Top Articles
Latest Posts
Article information

Author: Annamae Dooley

Last Updated:

Views: 5548

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Annamae Dooley

Birthday: 2001-07-26

Address: 9687 Tambra Meadow, Bradleyhaven, TN 53219

Phone: +9316045904039

Job: Future Coordinator

Hobby: Archery, Couponing, Poi, Kite flying, Knitting, Rappelling, Baseball

Introduction: My name is Annamae Dooley, I am a witty, quaint, lovely, clever, rich, sparkling, powerful person who loves writing and wants to share my knowledge and understanding with you.