Strategies for Effective Insider Risk Programs with Honeywell’s Mike Pierce and Kevin Renwick

In this episode In this episode, Manish dives into the dynamic world of corporate security through the firsthand experiences of Honeywell’s seasoned professionals, Mike Pierce and Kevin Renwick, transitioning from law enforcement. Their conversation emphasizes the critical role of relationship-building in mitigating insider risks while highlighting innovative strategies for breaking down organizational silos. Listen in…

Read More

How to Elevate Your GSOC’s Impact in a World of Rising Threats

Keep your organization safe and drive real business impact with better situational awareness, threat monitoring, and communication As a student of protection history and former counter-terrorism special agent who investigated countless embassy bombings, kidnappings, hijackings, and assassinations, I know all too well that the threat landscape has always been dynamic. It ebbs and flows, primarily…

Read More

Prioritizing Protection: Integrating GSOCs with Organizational Security

In this episode Mike Gilbert discusses his extensive experience in product management and the evolution of Global Security Operations Centers (GSOCs) in this podcast episode. He highlights the crucial role GSOCs play as the central nervous system of an organization, managing complex security operations and evolving from reactive to proactive functions. Mike also touches on…

Read More

Connected Intelligence and the Future of Security: Manish Mehta’s Perspective

In this episode In this episode, Manish Mehta, Ontic’s Chief Product Officer, sits down with hosts Chuck Randolph and Fred Burton to discuss the evolution of security and the importance of Connected Intelligence in modern protective practices. Manish also shares his insights on technological disruptions and how they shape industries beyond just security. The conversation…

Read More

Enhance Your Insider Risk Program with These 6 Systems Integrations

Learn how the right integrations close critical data gaps, helping you gain a more complete view of your organization’s insider risk Cyber Threat Intelligence Systems Human Resources Information Systems Data Loss Prevention Solutions Inventory Management Systems Access Control and Visitor Management Systems License Plate Recognition and Video Management Systems To fully understand and mitigate your…

Read More

Aligning Security with Business Goals: Insights from Scott Lindahl

In this episode Scott Lindahl, Vice President Corporate Services and Chief Security Officer at Kellanova, shares his insights on aligning security with business goals. Scott explores the evolving role of security professionals in risk management and the importance of partnership and active listening within organizations. His conversation with Chuck provides practical guidance on balancing multiple…

Read More

Applying the Intelligence Cycle in our New Days of Rage

Learn how the time-tested framework can help you understand and manage politically-motivated threats In December 2024, UnitedHealthcare CEO Brian Thompson was murdered. Pro-Palestinian groups have targeted companies with ties to the Israeli defense industry. Tesla dealerships have been repeatedly vandalized since the 2024 election. And in June 2025, two Minnesota lawmakers were killed in their…

Read More

How to Build Cross-Departmental Alliances to Tackle Insider Risk

Security teams can’t manage insider risk alone — cross-departmental collaboration is key to early risk identification and mitigation The 5 steps to Fostering a Collaborative Insider Risk Approach Align on Common Goals and Objectives Develop Mutual Trust and Communication Implement Joint Policies and Processes Leverage Technology to Create a Common Operating Picture Track and Report…

Read More

Overcoming Common Challenges in Identity Research and POI Management

In this episode Host Chuck Randolph speaks with Ian Johnson, Threat Manager on the Coinbase Protective Intelligence team, about the evolving landscape of security in the FinTech industry. They discuss Ian’s career path, the challenges and opportunities in managing life safety threats, and how technology and Artificial Intelligence are transforming investigative processes in corporate security.…

Read More

How to Make Your Security Teams More Effective

Top security managers use the power of research and case management This article was originally published on Securityinfowatch.com. Here’s a true story that many in the security field may find familiar. After an acquisition almost doubled the size of a major grocery wholesaler, the company’s corporate security team started training leaders to identify concerning behaviors…

Read More

Navigating the Workplace Violence Threat Management Process 

An overview of how to investigate workplace violence incidents, make an assessment, and intervene when necessary  As a corporate security professional, you know organizations across all industries face various workplace violence risks. And the evolving threat landscape can make prevention feel overwhelming, but it doesn’t have to be. By following a workplace violence threat management…

Read More

Counterterrorism Insights: A Deep Dive with Dr. Matthew Levitt

In this episode Fred Burton interviews Dr. Matthew Levitt, a renowned expert in counterterrorism and intelligence. Dr. Levitt shares insights from his extensive career, including his work with the FBI, his time at the U.S. Department of Treasury, and his current role at the Washington Institute for Near East Policy. They discuss the development of…

Read More

How to Modernize Security Operations Centers

GSOC modernization is a journey that starts with understanding your unique business needs This article was originally published in ASIS Security Management Magazine. In the past decade, global security operations centers (GSOCs) have been in their early adolescence. They were focused on baseline physical security functions such as monitoring alarm systems and video surveillance feeds.…

Read More