A Unique Approach to Corporate Security in Biotech: A Q&A with Exact Sciences
We recently sat down with Scott Brinkman, the Associate Director of Global Security at Exact Sciences Corporation, to discuss the approach his team takes to protective intelligence, threat assessment, and how his corporate security program differs within a fast-moving biotech company. Exact Sciences Corporation is an international molecular diagnostics company specializing in the detection of…
Read MoreForging Her Own Path: Creating a Threat Intelligence Company from Scratch
Identifying who could be posing a threat to an organization is far from a one-person job. It takes the right training and a team that represents multiple viewpoints and areas of expertise beyond security. Janet Lawless had a vision to create a company to provide that training and help organizations to build a threat intelligence…
Read MoreWhere to Start When Building a School Safety Plan
If it’s not front of mind, time and time again security measures get pushed aside until an unfortunate event surfaces. What surprises many is that the infrastructure is there for measured risk mitigation practices to occur. It comes down to the small group that all eyes are watching — the leadership team. Creating this unified…
Read MoreUsing The Indications and Warning (I&W) Analysis to Manage Organizational Risk
The Center for Connected Intelligence partnered with Scott McHugh who works for the Institute for Homeland Security at Sam Houston State University to develop this piece. One of the key reasons we created the Ontic Center for Connected Intelligence (CCI) was to share industry tools, best practices and lessons learned to help those who protect…
Read MoreRunning Towards Fire — How to Mitigate Threats for Journalists in High-Risk Areas
Security professionals have increasingly demanding responsibilities in keeping people and assets safe as new threats arise and old ones loom in the periphery. When you’re charged with protecting nearly 1,000 individuals running towards action – oftentimes high-risk and in remote locations – it takes a certain type of individual to mitigate risk. Matt Bohatch is…
Read MoreThe Evolution of Addressing Targeted Violence Since the 1996 Centennial Olympic Park Bombing
Receiving a call to be notified that there has been violent activity in the middle of the night is every security professional’s worst nightmare. However, when that activity is a bomb in the middle of Centennial Olympic Park, it takes on much broader implications. Dave Benson speaks of his experience as a Special Agent for…
Read MoreReining in an Epidemic of Workplace Violence in Healthcare
Fred Burton offers strategies and solutions for navigating the surge in workplace violence incidents within the healthcare industry. This article was originally featured in MedCity News The murders of four healthcare workers earlier this year, including two physicians, by a patient at a medical center in Tulsa was a grave reminder of an ever-growing epidemic:…
Read MoreMaking the Case to Fund Your Corporate Security Program
In this one-hour webinar, you’ll learn valuable insights including how to:
Read MoreThe All-Encompassing Meaning of “Risk” — Acknowledging Protection Beyond Physical Barriers
It’s no secret that threats often begin in the cyber domain and swiftly move over into the physical. However, connecting the two worlds has yet to be a standard in the protection industry. Today’s threats are too severe to solve with guards, gates, and guns — the domestic and global threat landscape demands a holistic…
Read MoreWhy Corporate Execs Should Prepare For Heightened Polarization
This article was originally featured on Forbes This year alone, the Department of Homeland Security has issued over half a dozen National Terrorism Advisory Bulletins. The latest warned that the U.S. remains in a heightened threat environment. Sadly, the DHS’s bulletins aren’t a new development. For the past few years, domestic extremists and foreign adversaries alike…
Read MoreSoft Skills That Set Security Professionals Apart When Moving From Public to Private Sectors
Whether it’s a SWAT team investigation or organized retail crime, there’s always more to the story than it appears. The simple, but often overlooked skill of taking time to listen to people, versus reacting to surface-level information, allows investigators to understand the complete picture of what is happening and how it’s connected to surrounding events.…
Read MoreThe Need for Nuance in Protective Intelligence Part 4: Extinction Rebellion
This is the fourth installment in an occasional series examining threat actors from a protective intelligence perspective. Earlier articles in this series examined the Islamic State pole of jihadism, Antifa, and the Boogaloo movement. This article discusses the background of some of the activists behind the Extinction Rebellion campaign (XR), their ideology, their past activities, and the implications of this…
Read MoreWhy an Objective-Centric Security Strategy Matters
More often than not, security teams forget to use common operating language when sharing critical risk intel with C-suite leaders, making it challenging for them to take action before threats arise. Bruce McIndoe has been a visionary and serial entrepreneur in the national security, intelligence, and operational risk management space for global organizations over the…
Read MoreWhy Rock Bands Demand a Unique Security Strategy
If you’ve attended a concert recently, chances are you noticed routine security screening upon entry and possibly security near the stage to monitor crowd activity and interaction with the performers. However, beneath the surface, there is a web of information and advanced work that takes place – from monitoring hotel rooms for stalkers to online…
Read MoreProving the Value of Security: How to Avoid the ‘Break Glass Now’ Label
This article was originally featured on Total Security Advisor Keeping employees healthy and safe and property secure is crucial, especially in light of the current geopolitical landscape, ongoing issues stemming from the most recent pandemic, and the tragic events in Highland Park, Uvalde, Buffalo, Tulsa, and many more cities. In a seemingly non-stop threat environment, corporate…
Read MoreThe Art of Turning Information into Intelligence
Straight from the floor of GSX 2022, George Taylor, Chief Operating Officer of Exlog Global, joins host Chuck Randolph to discuss why approaching intelligence as an art versus a science is a plan for success. Surprises are never met with open arms in the world of a security professional. Scenarios – both good and bad…
Read More