5 Best Practices to Successfully Connect Systems in Your Technology Ecosystem
Integrating technology-based security solutions with manned guarding has gained significant traction, encompassing a wide range of applications. These include situational awareness and threat intelligence platforms, risk mitigation planning, and remote video and alarm monitoring. Major events such as natural disasters, cyber threats, violent hate crimes, and pandemics have consistently acted as catalysts for technology adoption.…
Read More9 Industry Leading Perspectives on How to Communicate the Value of Corporate Security
In this episode There’s no time like the present to prioritize security within organizations. Mitigating risk protects not only a business’s workforce and property but also its operations, financial stability, and reputation. Despite many leaders understanding this, in many cases, they are still leaving security in the dark, pulling away funds for critical programs, team…
Read MoreDangerous Admirers: How to Protect Public Figures From Harassers As Legal Protections Are in Jeopardy
In 2010, country-music singer Coles Whalen began receiving messages from a fan on her Facebook account. While Ms. Whalen ignored the relatively benign messages at first, the fan kept sending her messages—thousands over the course of several years. The fan praised her talents but also alluded to following her and knowing the whereabouts of her…
Read MoreFormer FBI Special Agent Shares What’s Essential to Managing Investigations
In this episode In this episode, Christine Oliver, a former FBI Special Agent and current corporate security leader, joins to talk bout building strong investigations and case management programs. Christine shares how she uses documentation, technology, and cross-functional collaboration to drive change, overcome resistance, and modernize security operations. She also reflects on her experience managing…
Read MoreUnited Natural Foods, Inc. Scales Case Management with Ontic
Jack Carr Answers All — Questions from the Audience and A Sneak Peek into Only the Dead
Jack Carr’s latest addition to the James Reece series, Only the Dead, is a captivating page-turner that does not disappoint. With meticulous research and attention to detail, he transports readers to the 1980s, immersing them in a volatile and divided political environment. Jack is a former Navy SEAL who led special operations teams as a…
Read More3 Critical Areas Technology is Influencing The Latest Executive Protection Strategies
Physical and cyberattacks are on the rise. According to the FBI, the most recent data shows an 82% rise in violent crimes from 2017 to 2021. Another study from the FBI reports a 52% increase in active shooter incidents in the same four years, and cybercrimes are also increasing. In the FBI’s 2022 Internet Crime…
Read MoreHow to Turn Your Security Program into a Strategic Business Advantage
In this one-hour webinar, you’ll learn valuable insights, including how to:
Read MoreMinimizing IP Theft and Insider Threats During Times of Layoffs
This article was originally featured on Security Today Building out cross-functional collaboration between cyber and physical security teams will create a more unified approach, where a common language is established to better understand each department’s key priorities and processes. Doing so ensures there is collective monitoring of identified risk groups or individuals. It also ensures…
Read MoreHow a Digitally-Informed Approach to Security Can Revolutionize the Patron Experience
Oftentimes when concert or sports venues ramp up their security measures, the guest experience is downgraded with longer lines and more processes and rules. This doesn’t have to be the case. A customer-backed model, keeping in mind what’s important to the patron and what information the GSOC needs to know, can transform the patron experience…
Read MoreFrom Coronations to Corporations: The Hidden Nuts and Bolts of Major Event Security Planning
This article was originally featured on IFSEC Insider When Queen Elizabeth was crowned in June 1953, the procession of dignitaries that followed numbered 16,000 people. It took the procession approximately 45 minutes to pass any one point along the route. When she died nearly 70 years later, London’s Metropolitan Police Service said her funeral was…
Read MoreFrom OSAC to DSAC to Visa’s GSOC: Identifying the Root Cause of Security Concerns
In the fields of security and intelligence, where definitive answers and data are often needed immediately to make critical decisions, taking the time to listen can get pushed aside. However, as Mary Hackman argues, looking for the root causes of security problems and finding time to ask for the opinions of others may be the…
Read MoreHow Security Teams Can Leverage Crime Data to Protect Their Assets and Facilities
Whether you’re scouting for a new business location or assessing the safety of an existing one, corporate security professionals focused on keeping facilities, employees, visitors or other assets safe, need a way to better understand the geographical risks surrounding them. With the increase in crime rates being a persistent and endemic problem in the United States,…
Read MoreThe Real-Life Spy Behind the James Bond 007 Series
James Bond is one of the most legendary characters in film witnessed over the past several decades. In 1953 when the character of James Bond came to fruition in Ian Fleming’s novels under the code name 007, many were unaware that the inspiration for the character came from Serbian double agent, Duško Popov. Author Larry…
Read MoreTips from the Top: Corporate Security Leaders Share How to Build a Team Today That’s Fit to Tackle Tomorrow’s Risks
Did you know that in 2021 the global estimated shortage of cybersecurity professionals was 2.72 million? Today, according to a study by (ISC)2, the global cybersecurity workforce gap has increased to 3.4 million people. Staff shortages are an all-to-familiar problem for corporate security teams, which is getting more complicated to solve. The skills needed to…
Read MoreDHS Senior Medical Officer Shares Expertise on the Level of Medical Training Needed From Today’s Security Professionals
Training for failure versus success is game changing when it comes to responding to a worst-case scenario. However, today’s threat landscape has shown us that being prepared extends far beyond typical protection responsibilities. Basic medical training for security professionals is becoming more and more necessary to fulfill one’s duty of care. Dr. Alex Eastman is…
Read More