Beneath the Surface of Fraud, Corruption, and Compliance Risk Investigations

In this episode In this episode, Chuck Randolph talks with James Tunkey, COO of I-OnAsia, about the nuanced world of fraud, corruption, and compliance risk. James shares how true risk often hides beneath the surface, requiring a collective and unbiased approach to uncover it. With decades of global investigative experience, he breaks down the differences…

Read More

Family Offices: What They Get Right About Security, and What Companies Can Learn from Them

This article was originally featured on ASIS Security Management Family offices are privately held companies that often handle wealth management and investments for heads of companies, executives, and high-profile individuals—many of whom are quite wealthy. But these organizations often have broader responsibilities. Over the years, they’ve become among the best when it comes to protective intelligence and…

Read More

Spotlighting the One Year Anniversary of Women Who Protect with Dr. Marisa Randazzo

Dr. Marisa Randazzo, PhD joins the podcast for a special round-up episode to celebrate the one-year mark on our Protective Intelligence Podcast series, Women Who Protect. This series spotlights women working in a wide range of positions within security, protection, and law enforcement. We’ve compiled highlights from some of our episodes featuring guests ranging from…

Read More

Red Teaming at Scale to Uncover Your Big Unknowns

This article was originally featured on Dark Reading During the global war on terror, a group of commissioned and noncommissioned officers in the United States military participated in a unique training event. Soldiers of various ranks, all with different specialties, assembled in a remote location where they were stripped of rank and other identifying markers.…

Read More

5 Essential Metrics and Methods to Prove Your Corporate Security Program’s ROI

Business executives are taking a blade-like approach to stabilize their budgets in today’s challenging economy.  The technology industry is feeling the brunt of the cost-cutting measures. According to the Wall Street Journal, tech giants like Alphabet, Dell, and Meta are cutting an estimated 28,000 jobs combined. Banking behemoths like Goldman Sachs, McKinsey, and PayPal plan…

Read More

How to Measure Your Risk Monitoring Activities

This article was originally featured in ASIS International Ideally, businesses should use data to inform and contextualize their most important decisions, both inside and outside the security function. But obtaining accurate data to measure the value and effectiveness of security services such as risk monitoring or threat mitigation—which can be inherently less tangible—is often much…

Read More

Tomorrow’s Security Teams Need a Female Talent Pipeline

I’ve worked in various roles within law enforcement and security, from positions in the U.S. Secret Service to campus public safety at a large urban university, to private sector security consulting.  And while there have been significant advances in the field of security generally, there are still too few women, in professional roles, in both…

Read More

6 Things to Consider When Buying a Case Management Solution

Despite the fact that leaders in physical security, cybersecurity, IT, human resources, and legal and compliance all deal with threats and business risks, each department often has a unique method and tool for documenting and managing incidents. These organizational divisions across departments isolate threat intelligence and negatively affect business continuity. In a recent study, 50%…

Read More

Drones and the Law: Can They Hover Over Your House or Property?

This blog was written by Texas A&M University Professor and former Assistant United States Attorney, Ron Sievert. As we enter 2023, many of us understand that in the next few years, we will be confronted with over flights by and questions about drones. Those of us involved in law enforcement, intelligence, scientific exploration and research…

Read More

The Enemy of My Enemy is My Friend: The Unification of the CSO and CISO

Don’t be surprised by what can be accomplished when a CSO and CISO join forces to mitigate insider risk How Do We Unify the Approach? What Does a Collaborative Approach Look Like? How to Define an Insider Threat Pre-Incident Indicators of Compromise The Common Insider Incident Investigation Scenario A Typical Genesis of a SIEM Alert…

Read More

Trust Through Transparency — MITRE’s Enterprise Security Philosophy to Being a Trusted Advisor

In this episode Being vulnerable and identifying what you don’t know sets great leaders apart from the mediocre. However, setting your ego aside and being transparent in your communication is not a standard practice among many security practitioners. Josh Massey, Department Manager of The MITRE Corporation’s Enterprise Security Assurance department, has relied on this approach…

Read More