Growing Role of HR in Enhancing Workplace Security

Explore how Human Resources is partnering with security to foster a safer workplace culture. About a decade ago, one of my colleagues, Melissa Muir, was working in the courts as a young human resources (HR) manager and was preparing to terminate an employee.  In her effort to minimize embarrassment to the employee, she agreed to…

Read More

Case Management Software – A Complete Introduction

In the old days, protective intelligence case management software was very primitive. Typically, files sat on desktop hard drives or local servers. When a person of interest (POI) called to make threatening statements or mailed an unwanted package to an executive, an investigator would respond directly or involve local law enforcement. Then, they’d open the…

Read More

Where Strategic Intelligence Fits Into a Company’s Global Operations

Thinking beyond tactical day-to-day security operations is a goal we’ve heard time and time again. However, in today’s threat landscape it’s a choice we can’t ignore. Reading changes around the world that occur outside the boundaries of business operations is growing in importance to both corporations and non-government organizations alike. Rodger Baker joins host Fred…

Read More

The Value of Storytelling to Prove Security’s Company-Wide Impact

Straight from the floor of GSX 2022, Jim Bernhardt, Corporate Security Leader at the Nikola Motor Company, joins host Chuck Randolph to discuss the impact of storytelling to demonstrate the value of scenario planning and addressing risk before it becomes a larger issue. Thinking about what could go wrong is innate in nearly every security…

Read More

How Security Teams Have Expanded Their Duties

This article was originally featured on IFSEC Global Regarding gigabytes, physical security units are partnering with cyber security teams to manage the protection of highly valued assets, such as intellectual property. Many cyber security standards, including Payment Card Industry (PCI), have physical security components. But the convergence of physical and cyber security goes well beyond…

Read More

Legal and compliance teams: Where do they fit in the physical security picture?

Legal and compliance teams engage with nearly every aspect of the organization, from labor law to contracts, to cybersecurity. The role they play to reduce workplace violence and other security risks often go unnoticed and are seldom discussed. It’s worth having those discussions, because legal and compliance teams often set workplace violence policies, interpret regulations…

Read More

What Does Your C-Suite Need to Know? The Role of Data-Informed Decisions in Corporate Security

Straight from the floor of GSX 2022, Ken White, Expedia Group’s Senior Manager of Physical Risk, Intelligence, & Investigations, joins host Chuck Randolph to discuss the role of data-informed decisions and their effect on how information is addressed and dispersed. In a climate of distractions and information coming in from every angle, knowing what matters…

Read More

How to Get in Front of Threats at a Global Scale from Verizon’s CSO

When you have a retail footprint in nearly 40 countries around the globe, having the same security plan in each region is a straight path to chaos — or worse, harm to employees, customers, or assets. Dan Maloney, Chief Security Officer (CSO) and Senior Vice President of Global Corporate Security with Verizon Communications, knows a…

Read More

Addressing the Cracks to Build a Comprehensive Security Program

In this episode In this episode, Bryan Flannery, President of Foresight Consulting and Protective Intelligence Honors recipient, joins Chuck Randolph live from GSX 2022 to discuss how to build truly effective violence prevention programs. Bryan shares why modern protection is more than physical presence—it’s about creating environments where people feel safe because the systems behind…

Read More

Cyber-Physical Convergence is Happening, But Not Fast Enough

Leaders should drive discussions about triggers that cause decision-making. When and how should analysts escalate an issue? When should the cybersecurity team check in with HR about an employee’s behavior? Answering these questions and putting processes in place to help will increase your ability to respond proactively to threats and create a common operating picture…

Read More

Messing With Their Heads: Manipulating and Detecting Hostile Surveillance

One of the fundamentals of TorchStone’s approach to understanding and countering criminal behavior is that attacks “don’t just happen.” Crimes of all types are the result of processes and behaviors that can be understood and detected. One of these key bellwether behaviors is pre-operational surveillance. Almost every criminal act, from a purse-snatching to a terrorist bombing,…

Read More

What’s a Threat? That Depends on What Your Job Is

Extreme weather can stop trucks on the road and prevent key personnel from getting in the office, disruptions that can cost millions. Failure to comply with regulations can damage a company’s reputation and drive up operational costs.  These situations present real risks to the business.  Too often, executives in charge of managing one type of…

Read More

The Crucial Role of Critical Infrastructure Protection in Security

Many listeners remember where they were on 9/11. For Lt. Charnele Sanders, Special Projects Manager (Security and Integrity) at Great Lakes Water Authority, her career in protection was inspired by the events of 9/11 and the repercussions of securing assets in critical infrastructure. In her discussion with host Dr. Marisa Randazzo, Lt. Sanders discusses how…

Read More

Using Insider Threat Awareness as a Risk Management Strategy

Insider Threat Awareness header image

Searching for Insider Threat Indicators Insider Threat Awareness Strategies Teamwork Enhances Insider Threat Management Keys to Workforce Engagement for Insider Threat Prevention Effective Insider Threat Awareness Management Does Ontic Offer an Insider Threat Monitoring Solution? Companies are increasing their focus on building insider threat awareness to create more resilient defenses against theft and unauthorized access…

Read More