Why Does Convergence Matter? A Q&A with Bob Hayes, Founder of the Security Executive Council
Bob Hayes is a global pioneer of corporate security. A former CSO at Georgia Pacific, and a security operations manager at 3M, he’s designed and guided some of the most complex enterprise security programs in the world. He was also one of the first security executives to successfully implement a program to unify corporate security,…
Read MoreThe Balancing Act Behind Sporting and Entertainment Venues Opening to the Public
As events cautiously open up to the public, security teams are faced with an unforeseen element of protection — personal health and safety. Event security teams are forced to weigh the benefits of increased security measures with the goals of the venue’s event, making it enjoyable, profitable, and well-attended. In this episode, Fred discusses sporting…
Read MoreGaining Control of a Rapidly Expanding Threat Landscape
Managing Increased Cyber-Physical Security Threats in a Hyper-Connected World
This article was originally featured in Dark Reading. When it comes to enterprise security, the physical world and the cyber domain have long been treated as separate — like a Venn diagram whose circles don’t overlap. Those days are over. Companies are facing an enormous increase in threats, with physical exposures interacting with the cyber…
Read MoreAmerican Companies Are Not Prepared for Physical Threats
The threat landscape has changed dramatically. As a nation, we’re seeing an uneven recovery, with masks and social distancing in some places, while others are wide open. Concerts and outdoor events are selling out in record time, even as law enforcement agencies warn that domestic extremists could exploit them for violence. The pandemic spurred 15…
Read MoreWhen Seconds Matter: How Active Shooter Training Saves Lives
The average attack is typically around six minutes. The hard truth is that law enforcement is able to confront the issue while it is occurring only half of the time. This leaves tremendous opportunity for training and informing the civilian response to protect themselves and the organizations they represent. In this episode, Fred discusses the…
Read MoreRevealing the Most Prevalent Physical Security Threats at U.S. Companies
For many executives leading major companies, the threat of violence in the workplace is distant. They don’t think it could ever happen to them, and few want to openly discuss the threats they do receive. Security professionals don’t have that option. They swim in a fast-moving river of threats made by strangers, activists, co-workers and…
Read MoreExpediting the Investigative Process to Stay One Step Ahead of Threats
Brad Thor on the Inspiration Behind his 20th Thriller, Black Ice
It’s hard to imagine a different path for Brad Thor. However, being a writer (and a New York Times bestselling one, at that) was not an easy leap. With a vast fan base (a large majority being in the security and protection business) he shares an important lesson that we can all learn from: “That…
Read MoreLevel Up Your Threat Hunting Game: Creating Intelligence from Anomalies and Patterns
In this whitepaper, you’ll learn the key elements of threat hunting, including:
Read More
2021 Mid-Year Outlook
State of Protective
Intelligence Report
Download the report for insights on:
Read MoreThe Cyber-Physical Threat Connection Demands Attention
On a daily basis companies experience minor and major cyber violations that range from phishing for individual login passwords to significant ransomware attacks that can disrupt entire industries. No matter what the level of cyber infraction, these are security issues hyper connected to physical threats. This cyber-physical linkage — and the large-scale potential business continuity…
Read MoreRon Worman on the Cultural Challenge Behind the Cyber-Physical Convergence
The unification of cyber and physical security information is a challenge that technology alone cannot solve. However, what many do not realize is that it is most certainly a culture problem — rooted in deeply embedded belief systems. In order to be changed and viewed under the same roof, it has to be articulated and…
Read MoreDiscovering Important Security Lessons in Unexpected Places
This article originally appeared on LinkedIn I was flying solo in a single engine Cessna 172, departing from Austin Bergstrom International Airport (ABIA) to two small airports 20 miles away. This trip was categorized as a mini cross country flight as I was gearing up for my final check-ride to get my private pilot license…
Read MoreDigital Transformation and the Evolution of Corporate Security
Practicalities for Security Teams in the Information Age Protective intelligence has always been focused on the future — seeking to prevent risk events from impacting the organization. With a focus on proactive synchronization across channels and landscapes, security teams bring a preemptive approach to managing threats. Tactically speaking, how do we take that same type…
Read MoreChuck Randolph on the Evolution of Technology in Executive Protection
It’s no secret that the nature of threats are evolving; however, the C-suite narrowing in on cyber threats leaves room for error that no company can afford. The physical side of threats is still disregarded by many leadership teams, and it will take forward thinking leaders to stay committed to using common operating information, or…
Read More