DHS Announces National Preparedness Guidelines

The Department of Homeland Security announced recently publication of two important tools to organize and synchronize national efforts to strengthen preparedness: the National Preparedness Guidelines, which establish a vision for national preparedness and provide a systematic approach for prioritizing preparedness efforts across the Nation; and the Target Capabilities List, which describes the collective national capabilities required to prevent, protect against, respond to and recover from terrorist attacks, major disasters and other emergencies.

"The National Preparedness Guidelines and Target Capabilities List are the culmination of extensive efforts to define the specific plans and capabilities our nation must possess in order to address catastrophic threats," said Homeland Security Secretary Michael Chertoff. "These documents will help focus policy, planning and investments at all levels of government and the private sector in order to strengthen our collective capabilities and better prepare for major incidents."

Publication of the Guidelines and Target Capabilities List fulfills a major component of Homeland Security Presidential Directive 8, "National Preparedness," and establishes a framework for understanding what it means for the nation to be prepared for all hazards. There are four critical elements to the National Preparedness Guidelines:

1. The national preparedness vision, which provides a concise statement of the core preparedness goal for the nation.

2. The fifteen National Planning Scenarios, which collectively depict the broad range of natural and man-made threats facing our nation and guide overall homeland security planning efforts at all levels of government and with the private sector. They form the basis for national planning, training, investments and exercises needed to prepare for emergencies of all types.

3. Universal Task List (UTL), which is a menu of some 1,600 unique tasks that can facilitate efforts to prevent, protect against, respond to and recover from the major events that are represented by the National Planning Scenarios. Although no single entity will perform every task, the UTL presents a common language and vocabulary that supports all efforts to coordinate national preparedness activities.

4. Target Capabilities List (TCL), which defines 37 specific capabilities that states and communities and the private sector should collectively develop in order to respond effectively to disasters.

Developed through an extensive process that involved more than 1,500 federal, state and local officials, and more than 120 national associations, the Guidelines replace the Interim National Preparedness Goal issued on March 31, 2005. The guidelines also integrate lessons learned following Hurricane Katrina and a 2006 review of states’ and major cities’ emergency operations and evacuation plans.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3