A Unique Approach to Corporate Security in Biotech: A Q&A with Exact Sciences

We recently sat down with Scott Brinkman, the Associate Director of Global Security at Exact Sciences Corporation, to discuss the approach his team takes to protective intelligence, threat assessment, and how his corporate security program differs within a fast-moving biotech company. Exact Sciences Corporation is an international molecular diagnostics company specializing in the detection of…

Read More

Forging Her Own Path: Creating a Threat Intelligence Company from Scratch

Identifying who could be posing a threat to an organization is far from a one-person job. It takes the right training and a team that represents multiple viewpoints and areas of expertise beyond security. Janet Lawless had a vision to create a company to provide that training and help organizations to build a threat intelligence…

Read More

Where to Start When Building a School Safety Plan

If it’s not front of mind, time and time again security measures get pushed aside until an unfortunate event surfaces. What surprises many is that the infrastructure is there for measured risk mitigation practices to occur. It comes down to the small group that all eyes are watching — the leadership team. Creating this unified…

Read More

Using The Indications and Warning (I&W) Analysis to Manage Organizational Risk

The Center for Connected Intelligence partnered with Scott McHugh who works for the Institute for Homeland Security at Sam Houston State University to develop this piece.  One of the key reasons we created the Ontic Center for Connected Intelligence (CCI) was to share industry tools, best practices and lessons learned to help those who protect…

Read More

Running Towards Fire — How to Mitigate Threats for Journalists in High-Risk Areas

Security professionals have increasingly demanding responsibilities in keeping people and assets safe as new threats arise and old ones loom in the periphery. When you’re charged with protecting nearly 1,000 individuals running towards action – oftentimes high-risk and in remote locations – it takes a certain type of individual to mitigate risk. Matt Bohatch is…

Read More

Reining in an Epidemic of Workplace Violence in Healthcare

Fred Burton offers strategies and solutions for navigating the surge in workplace violence incidents within the healthcare industry. This article was originally featured in MedCity News The murders of four healthcare workers earlier this year, including two physicians, by a patient at a medical center in Tulsa was a grave reminder of an ever-growing epidemic:…

Read More

Why Corporate Execs Should Prepare For Heightened Polarization

This article was originally featured on Forbes This year alone, the Department of Homeland Security has issued over half a dozen National Terrorism Advisory Bulletins. The latest warned that the U.S. remains in a heightened threat environment. Sadly, the DHS’s bulletins aren’t a new development. For the past few years, domestic extremists and foreign adversaries alike…

Read More

Soft Skills That Set Security Professionals Apart When Moving From Public to Private Sectors

Whether it’s a SWAT team investigation or organized retail crime, there’s always more to the story than it appears. The simple, but often overlooked skill of taking time to listen to people, versus reacting to surface-level information, allows investigators to understand the complete picture of what is happening and how it’s connected to surrounding events.…

Read More

The Need for Nuance in Protective Intelligence Part 4: Extinction Rebellion

This is the fourth installment in an occasional series examining threat actors from a protective intelligence perspective. Earlier articles in this series examined the Islamic State pole of jihadism, Antifa, and the Boogaloo movement. This article discusses the background of some of the activists behind the Extinction Rebellion campaign (XR), their ideology, their past activities, and the implications of this…

Read More

Why an Objective-Centric Security Strategy Matters

More often than not, security teams forget to use common operating language when sharing critical risk intel with C-suite leaders, making it challenging for them to take action before threats arise. Bruce McIndoe has been a visionary and serial entrepreneur in the national security, intelligence, and operational risk management space for global organizations over the…

Read More

Why Rock Bands Demand a Unique Security Strategy

If you’ve attended a concert recently, chances are you noticed routine security screening upon entry and possibly security near the stage to monitor crowd activity and interaction with the performers. However, beneath the surface, there is a web of information and advanced work that takes place – from monitoring hotel rooms for stalkers to online…

Read More

Proving the Value of Security: How to Avoid the ‘Break Glass Now’ Label

This article was originally featured on Total Security Advisor Keeping employees healthy and safe and property secure is crucial, especially in light of the current geopolitical landscape, ongoing issues stemming from the most recent pandemic, and the tragic events in Highland Park, Uvalde, Buffalo, Tulsa, and many more cities. In a seemingly non-stop threat environment, corporate…

Read More

The Art of Turning Information into Intelligence

Straight from the floor of GSX 2022, George Taylor, Chief Operating Officer of Exlog Global, joins host Chuck Randolph to discuss why approaching intelligence as an art versus a science is a plan for success. Surprises are never met with open arms in the world of a security professional. Scenarios – both good and bad…

Read More