How to Assess Your
Executive’s Digital Footprint
to Identify Threats
In this 45-minute webinar, you’ll learn valuable insights about:
Read MoreConsiderations for Personal Safety and Small Office Protection
Not all organizations have large security teams observing and protecting employees and their customers during their day-to-day operations. Small office environments who lack the resources for security staff are often left scrambling when something doesn’t feel right, or, conversely, overreact when presented with an unwanted situation. However, employees and business owners working at organizations of…
Read MoreThe Digital Transformation of Protective Intelligence within a GSOC
This podcast was originally featured on The Great Conversation. Global Security Operations Centers are increasingly expanding their investigative capabilities by formalizing the methodology within a digital transformation model. We turn to a top-performing security professional with over 15 years of physical security experience covering the entire spectrum of Physical Security; Security Operations, Executive Protection, Security…
Read MoreSupporting Mental Health in a Time Where Corporate Security Teams Need it Most
There are times in my career when there are simply no words and silence is the best option. The never-ending chaos of terrorism certainly affected me, particularly when I was a young special agent. When I close my eyes, I can still see the devastation from many crime scenes, such as hijackings and plane crashes.…
Read MoreBehind the Scenes of the JonBenét Ramsey Investigation
The feeling of knowing you are being observed from afar by someone with ill intentions is unequivocally a worst-case scenario. Whether the pre-operational surveillance takes place over days, weeks or months, there are few things that can stand in the way of a true psychopath — such as the unidentified individual who murdered JonBenét Ramsey…
Read MoreProtective Intelligence Lessons From the U.S. Capitol Riot For Companies
This article was originally featured in Security Magazine. After a lifetime in the protection business, the one constant in Washington that I’ve learned is that it takes tragedy to force change. The January 6 Capitol riot is not an enigma. This was a clear protective intelligence failure. The key finding of Retired Army LTG. Russel…
Read MoreThe Unmatched Value of Crisis and Contingency Planning for Situations You Least Expect
If you’re in trouble, even in the most intricate of situations, there’s a high likelihood that Frederic (Fred) Piry can think of a way out. With a background working in Mobile Security Deployments (MSD) — the 911 for diplomatic security — Fred has quite literally moved mountains to get protectees out of unimaginable situations. In…
Read MoreAs Athletes Play, Bad Actors Can Prey: Why Protective Intelligence is Needed in Sports
This article was originally published in Athletic Business. Last year, Hall of Fame quarterback Joe Montana was at home with his family when he discovered an intruder trying to kidnap his granddaughter from her playpen. Fortunately, Montana and his wife were able to wrestle the 9-month old out of the woman’s arms before any serious…
Read MoreScott Stewart’s Lasting Impact on Protective Intelligence
The following is a personal message from the Executive Director, Fred Burton, regarding Scott Stewart’s nomination as a Pioneer in the Protective Intelligence Honors Program: One cold and rainy Thanksgiving Day many years ago in Washington, D.C., our command center notified us about a domestic threat from a person of interest against the Secretary of…
Read More2021 State of Protective Intelligence Infographic
Jack Carr’s Path from Former Navy SEAL to New York Times Bestselling Author
If you’re a protection officer, chances are you’ve read a Jack Carr novel (or six) while in a down room or taking a break in a follow car. Whether you’re in the field of protection, a retired officer, or want to escape into an adrenaline-filled place of being a Navy SEAL sniper, pick up one…
Read MoreA Tribute to Clint Hill, Protective Intelligence Honors Pioneer
The following is a personal message from the Executive Director, Fred Burton, regarding Clint Hill’s nomination as a Pioneer in the Protective Intelligence Honors Program: When we first started thinking about the Protective Intelligence Honors program, Clint Hill was the first person that came to mind. Some may not recognize the name, but anybody who…
Read MoreContinuous Monitoring in the Intelligence Cycle
In this whitepaper, learn the elements of continuous monitoring, including:
Read MoreThe Case Files: Nasim Najafi Aghdam
In this blog series, we explore historical events to teach us what pre-incident indicators were present to reduce the chance of bad things happening in the future. History tells us that there is no detail too small, as even the slightest move off-center can set off an unfortunate domino effect. This Case File shares a…
Read MoreHow to Create Intelligence from Anomalies and Patterns
In this 45-minute webinar, hear from security leaders from Ontic share the core elements of threat hunting, including:
Read MoreTaking Back Control of Online Reputation and Privacy
In this episode Digital breadcrumbs can pose real-world dangers—especially for high-profile executives. In this episode, Fred Burton sits down with Rich Matta, CEO of ReputationDefender, to break down how online privacy is becoming a frontline issue in physical security. With threats on the rise, the conversation explores how removing or obscuring personal details online can…
Read More