Corporate Security Teams Face a New Challenge Right In Their Backyards – Relevancy
Corporate security teams face a new challenge in the threat landscape – relevancy to the bottom line. Typically, board members view a security department as a cost center, and that’s a perception security leaders want to change. Security department heads look for novel ways to illustrate how their department helps achieve the business’s strategic goals.…
Read MoreBeneath the Surface of Fraud, Corruption, and Compliance Risk Investigations
In this episode In this episode, Chuck Randolph talks with James Tunkey, COO of I-OnAsia, about the nuanced world of fraud, corruption, and compliance risk. James shares how true risk often hides beneath the surface, requiring a collective and unbiased approach to uncover it. With decades of global investigative experience, he breaks down the differences…
Read MoreFamily Offices: What They Get Right About Security, and What Companies Can Learn from Them
This article was originally featured on ASIS Security Management Family offices are privately held companies that often handle wealth management and investments for heads of companies, executives, and high-profile individuals—many of whom are quite wealthy. But these organizations often have broader responsibilities. Over the years, they’ve become among the best when it comes to protective intelligence and…
Read MoreSpotlighting the One Year Anniversary of Women Who Protect with Dr. Marisa Randazzo
Dr. Marisa Randazzo, PhD joins the podcast for a special round-up episode to celebrate the one-year mark on our Protective Intelligence Podcast series, Women Who Protect. This series spotlights women working in a wide range of positions within security, protection, and law enforcement. We’ve compiled highlights from some of our episodes featuring guests ranging from…
Read MoreRed Teaming at Scale to Uncover Your Big Unknowns
This article was originally featured on Dark Reading During the global war on terror, a group of commissioned and noncommissioned officers in the United States military participated in a unique training event. Soldiers of various ranks, all with different specialties, assembled in a remote location where they were stripped of rank and other identifying markers.…
Read More5 Essential Metrics and Methods to Prove Your Corporate Security Program’s ROI
Business executives are taking a blade-like approach to stabilize their budgets in today’s challenging economy. The technology industry is feeling the brunt of the cost-cutting measures. According to the Wall Street Journal, tech giants like Alphabet, Dell, and Meta are cutting an estimated 28,000 jobs combined. Banking behemoths like Goldman Sachs, McKinsey, and PayPal plan…
Read MoreA Constant State of Crisis: How Corporate Security Teams Are Adapting to the New Normal
Corporate security teams face a new normal, and it’s called permacrisis – a state where instability and insecurity are constant. While many security teams already operate in this mindset, the difference is that the security department is one of many teams in constant vigilance. As a result, departments across organizations are becoming aware of permacrisis…
Read MoreHow to Measure Your Risk Monitoring Activities
This article was originally featured in ASIS International Ideally, businesses should use data to inform and contextualize their most important decisions, both inside and outside the security function. But obtaining accurate data to measure the value and effectiveness of security services such as risk monitoring or threat mitigation—which can be inherently less tangible—is often much…
Read MoreMaking it Easier to Have Conversations About Mental Health and Victimization on Campus
Content Warning: This episode contains content pertaining to sexual assault, which some may find difficult to listen to. This episode is not recommended for young children. While we often hear that it is important to be able to have discussions about mental health, addiction, and victimization, it can be incredibly difficult to do so. Talking…
Read MoreTomorrow’s Security Teams Need a Female Talent Pipeline
I’ve worked in various roles within law enforcement and security, from positions in the U.S. Secret Service to campus public safety at a large urban university, to private sector security consulting. And while there have been significant advances in the field of security generally, there are still too few women, in professional roles, in both…
Read MoreWhy Red Teaming Maximizes Resources and Minimizes Biases in the Face of Complex Security Decisions
If you’ve ever presented a recommendation and wished you had hard facts and logic to back up your reasoning, you’ll want to hear why red teaming is critical to not only solving this dilemma but maximizing time and resources that are often spent going back to the drawing board to think of alternate solutions for…
Read More6 Things to Consider When Buying a Case Management Solution
Despite the fact that leaders in physical security, cybersecurity, IT, human resources, and legal and compliance all deal with threats and business risks, each department often has a unique method and tool for documenting and managing incidents. These organizational divisions across departments isolate threat intelligence and negatively affect business continuity. In a recent study, 50%…
Read MoreHow Netflix is the Best Commercial for Mark Greaney’s Gray Man Series
We’re fortunate to have bestselling author Mark Greaney back on our show to share a preview of BURNER — the latest Gray Man novel that goes out on shelves on February 21, 2023. His research for the #1 New York Times bestselling Gray Man novels has taken him to more than thirty-five countries and given…
Read MoreDrones and the Law: Can They Hover Over Your House or Property?
This blog was written by Texas A&M University Professor and former Assistant United States Attorney, Ron Sievert. As we enter 2023, many of us understand that in the next few years, we will be confronted with over flights by and questions about drones. Those of us involved in law enforcement, intelligence, scientific exploration and research…
Read MoreThe Enemy of My Enemy is My Friend: The Unification of the CSO and CISO
Don’t be surprised by what can be accomplished when a CSO and CISO join forces to mitigate insider risk How Do We Unify the Approach? What Does a Collaborative Approach Look Like? How to Define an Insider Threat Pre-Incident Indicators of Compromise The Common Insider Incident Investigation Scenario A Typical Genesis of a SIEM Alert…
Read MoreTrust Through Transparency — MITRE’s Enterprise Security Philosophy to Being a Trusted Advisor
In this episode Being vulnerable and identifying what you don’t know sets great leaders apart from the mediocre. However, setting your ego aside and being transparent in your communication is not a standard practice among many security practitioners. Josh Massey, Department Manager of The MITRE Corporation’s Enterprise Security Assurance department, has relied on this approach…
Read More