Three Pillars of a Truly Converged Security Operations Model
Why today’s security environment demands tighter alignment across teams and the business Targeted violence, geopolitical instability, and rising domestic activism have reshaped the risk landscape for organizations of every size. Threats no longer emerge in isolation or stay confined to a single facility, executive, or region. They unfold across physical locations, digital channels, employee populations,…
Read MoreOntic Connect Los Angeles
In Los Angeles, a local protest is now a global brand event. When activism moves from the street to your internal comms in minutes, your security and leadership teams can’t afford to be out of sync.Geopolitical events and periods of heightened visibility increasingly force executive protection, investigations, intelligence, and operations programs to engage all at…
Read MoreThank You for Registering for Ontic Connect Los Angeles!
From Activism to Geopolitics: Building a Converged Security Operations Model
This guide outlines essential steps to building a converged operating model, including how to:
Read MoreFrom Activism to Geopolitics: Building a Converged Security Operations Model
Thank You for Registering for Ontic Connect Workshop: Tyson’s Corner
Measuring Program Impact: Threat Intelligence
12 outcome-based metrics for communicating the value of your threat intelligence program to business executives Resilience metrics Risk reduction metrics Cost savings metrics Time efficiency metrics Intelligence programs play a critical role in enabling organizations to anticipate threats, mitigate risks before they materialize, and support proactive decision-making across the enterprise. Strong intelligence can inform decisions…
Read MoreInside Cold Zero: Brad Thor on Intelligence Operations Gone Wrong
In this episode Fred Burton sits down with #1 New York Times bestselling author Brad Thor to discuss his latest thriller, Cold Zero. Centered on a CIA extraction gone wrong in the Arctic Circle, the novel explores the realities of modern intelligence operations, global competition, and high-stakes decision-making under extreme pressure. Thor shares the real-world…
Read MoreOntic Connect Workshop: Tysons Corner
Early signs of insider risk are often subtle and scattered across teams like HR, Security, Legal, IT, and Operations. One of the clearest moments where these signals converge is off-boarding, when access, intent, timing, and organizational trust intersect. In Washington, DC, regulatory pressure and public-private overlap elevate these risks, making fast communication, clear escalation, and…
Read MoreBridging Cyber and Physical Security in High-Risk Environments with Wayman Cummings
In this episode Manish Mehta sits down with Wayman Cummings, Chief Information Security Officer at Ochsner Health, to explore what cyber-physical security convergence really looks like in practice. Wayman shares how his unconventional path into cybersecurity shaped his leadership style and his perspective on risk in high-stakes environments like healthcare. The conversation dives into insider…
Read MoreTurning Signals Into Action in the Ontic Platform
Location-Based Intelligence Foundations
Building Topics in Ontic: Best Practices
Ontic Connect Boston
Boston is increasingly a focal point for coordinated activism and geopolitical discourse. Major global events, geopolitical disruptions, and periods of heightened visibility increasingly force executive protection, investigations, intelligence, and operations programs to engage all at once—often without shared context or clear decision-making. Employee activism and public protests are now frequent catalysts for these moments, accelerating…
Read MoreThank You for Registering for Ontic Connect Boston!
Ontic Connect San Francisco
Major global events, geopolitical disruptions, and periods of heightened visibility increasingly force executive protection, investigations, intelligence, and operations programs to engage all at once, often without shared context or clear decision-making. These moments demand faster communication, clearer escalation, and tighter coordination across security, HR, cyber, legal, communications, and executive leadership. This session is built for…
Read More