Archer Knox — Intelligence-Led Security Operations
Archer Knox Security Archer Knox Security

Security Resources

A working shelf of briefs, checklists, and tools for security leaders.

This is where we bridge theory and execution: short, opinionated resources you can mark up, adapt, and issue to your teams without starting from a blank page.

The examples here are illustrative. In a live engagement, these get tied to your actual facilities, staff, jurisdictions, and incident modes—then loaded into your portal and training pipeline.

Nothing here counts as legal advice; it’s security craft—meant to sit alongside counsel, not replace it.

How different leaders use the same resources

The same checklist reads differently to a CISO, a Head of Security, or a General Counsel. Toggle between perspectives to see how the emphasis shifts.

Head of Security view

Resources as repeatable instructions for teams on the ground.

For physical security, the value is in clarity. Checklists and quick-reference briefs reduce variance between shifts and sites. A guard, supervisor, or EP agent should be able to run a checklist as written during a 03:00 shift change.

  • Post resources to guard posts, SOC consoles, and mobile devices.
  • Align resource content with access control, camera layouts, and escalation paths.
  • Use after-action templates to feed real events back into training and procedures.
See how operations connects the dots →

CISO / Cyber view

Resources as a way to bind digital and physical signals.

For security leadership on the digital side, resources need to encode when a cyber signal becomes a physical concern: leaked floor plans, staff lists, travel data, or targeted harassment that started online and may move into the real world.

  • Define handoffs from SOC (digital) to GSOC / physical security when risk crosses domains.
  • Use briefs to clarify how threat intel, brand monitoring, and IR teams collaborate.
  • Standardize how digital evidence is packaged for law enforcement or outside investigators.
How we treat signals that bridge domains →

Legal / Compliance view

Resources as evidence of diligence and control.

For Legal, resources are part of the audit trail. They show that the organization had written expectations, that staff were trained, and that incidents were documented in a way that survives external scrutiny.

  • Align checklists and templates with policy language and regulator guidance.
  • Use incident logs and after-action templates to anchor privileged reviews.
  • Show that training and refresh cycles are documented—not just claimed.
How playbooks and records align →

Example resource library

Filter by type and focus area to see how a working library might be organized. In production, these become portal tiles with download, acknowledge, and training tracking.

Sample resources
These are intentionally generic, but the structure is real: each item has an owner, a review cadence, and a clear place in your operating model.
Brief — Executive Executive Threat Briefing Framework

A short briefing template for executives that explains threat levels, current posture, and specific asks from leadership, without drowning them in jargon.

Owner: Threat intel / EP Used for board / ELT updates
Checklist — Executive Executive Residence Security Sweep

A repeatable sweep pattern for primary residences, covering doors, windows, cameras, lighting, and protective intelligence points-of-interest.

Owner: Executive protection Issued to field teams
Checklist — Facility Lobby Incident Quick Actions

A one-page decision tree for lobby and reception staff when behavior escalates: de-escalation, notification, access control, and documentation.

Owner: Site security / HR Posted at lobby positions
Template — Facility After-Action Review (Facility Incident)

A structured after-action template capturing what happened, decisions taken, evidence handled, and required follow-ups for site incidents.

Owner: Operations / Legal Feeds into policy updates
Brief — Digital Online Threat & Harassment Primer

A primer for leadership on how online harassment, doxxing, and coordinated campaigns are detected, triaged, and connected to physical security.

Owner: Threat intel / Comms Used with comms and HR
Template — Digital Threat Intake & Escalation Form

A form for capturing threats from social platforms, email, or phone that ensures key details are captured the first time and routed correctly.

Owner: Threat intel / GSOC Feeds case management
Checklist — Travel Executive Travel Pre-Departure

A pre-departure checklist for higher-risk travel: routes, hotels, local partners, communications, and emergency contacts.

Owner: EP / Travel operations Aligned with travel policy
Tool — Facility Site Security Lab (3D)

An interactive 3D lab to rough-in buildings, courtyards, and city blocks, place cameras, and start thinking about coverage and blind spots.

Owner: Archer Knox Labs Open the lab →

Interactive tools and labs

Not everything should live as a PDF. Some problems are better explored in an interactive workspace that mirrors the way your teams think.

Lab Site Security Lab (3D)

Sketch buildings and cameras in 3D to explore how access points, lines of sight, and zones interact before you ever move hardware.

Best for: Security + Facilities Launch lab →
Concept Signal-to-Playbook Mapping Board

A future module that will let you map intel signals directly to playbooks, so an analyst can see, at a glance, which actions each signal might trigger.

Best for: Threat intel, GSOC See threat intel approach →
Concept Exercise & Drill Tracker

A planned tracker that logs which resources have been exercised, by whom, and when—connecting training reality to policy and playbooks.

Best for: Operations, Training How operations executes this →

Assemble a resource pack for your environment

Use the toggles to sketch what a practical resource pack might look like for your organization. The summary updates as you select areas of focus.

In practice, this becomes an inventory of what exists, what’s missing, who owns each item, and how often it’s refreshed and rehearsed.

Baseline resource pack

Executives Facilities Digital

A baseline pack typically includes a handful of executive briefs, core facility checklists, and digital threat intake templates. That alone closes a surprising amount of day-to-day risk.