Physical Threats Are Rising: Key Compliance, Legal Issues for GCs
This article was originally featured on Bloomberg Law. It is co-authored by Fred Burton, Executive Director of the Ontic Center for Protective Intelligence, and Scott Shepherd, Chief Legal Counsel. General counsel and chief legal officers are multidimensional leaders who touch every part of an organization, guardians guiding legal and regulatory matters for the business, navigating…
Read MoreGaining Deeper Insights Beyond Social Media Threat Intelligence
When we zoom out and think about corporate threat assessment investigations holistically, it’s clear that social media threat intelligence plays a significant role — but how significant is it? In this article, we’d like to explore the benefits of using social media threat monitoring when conducting investigative research, as well as the pitfalls of relying…
Read MoreBefore the IPO: When to Think About Security
Most CEOs of companies undergoing an IPO don’t know what they need. Understand the holistic threat before buying security software and systems. When it comes to physical security systems and programs, many get sold a Cadillac when all they need is a Chevrolet, so work with a trusted vendor. Over the years, I’ve been asked…
Read MoreWho’s Watching? The Role of Technical Surveillance Counter Measures in Corporate Security
The last time you checked into a hotel room you may not have thought to check the clock radio, outlets and lamps for bugs, or recording devices used for eavesdropping. This effort is commonly referred to as technical surveillance counter measures (TSCM), and Rob Kimmons has made a career off of this practice, performing 75-100…
Read MoreGetting Proactive with Protective Intelligence
This article was originally featured on ASIS International. The deadly riots at the U.S. Capitol on 6 January 2021 reinforced the concept that chief security officers’ modern day physical security programs must prioritize protective intelligence to proactively identify, assess, and mitigate harmful threats. As the FBI and law enforcement officials comb through hundreds of thousands…
Read MoreAsk Me Anything with Fred Burton & General James “Spider” Marks
In this Ask Me Anything on-demand webinar, watch as long-time security professionals answer your questions and share:
Read MoreWhat is Executive Protection? A Complete Introduction
Executive Protection (EP), also called Close Protection (CP) or executive personal protection, refers to private risk mitigation and security measures designed to ensure the safety of individuals (principals) and their families. Principals may require executive protection services due to higher personal risk related to their employment, geographic location, net worth, affiliations, or status. Classic attack…
Read MoreInvestigative Journalist Spotlights Failure in Supply Chain Security
When patients seek medical care, they trust that any recommended prescriptions will help them cure or prevent an illness. However, time and time again, the distribution system for compounded drugs leaves room for error — with drugs being made too fast, without having to be tracked and counted, and lacking FDA approval. This absence of…
Read MoreThe Case Files: Robert Gregory Bowers
In this blog series, we explore historical events to teach us what pre-incident indicators were present to reduce the chance of bad things happening in the future. History tells us that there is no detail too small, as even the slightest move off-center can set off an unfortunate domino effect. In this Case File, we…
Read MoreInside the Mind of a Protective Intelligence Thought Leader
This podcast was originally featured on The Great Conversation. Listen in as Ron Worman, Founder and Managing Director of The Sage Group, gets inside the mind of Ontic’s Fred Burton, a former police officer, special agent and New York Times best-selling author who has the history and credentials to provide thought leadership around protective intelligence;…
Read MoreThe JFK Assassination: When Protection Changed Forever
Whether you remember where you were when JFK was assassinated or have read about it since, we can all agree that there are many elements that remain unclear. Decades later, witnesses are sharing new details and angles to the case that changed protection forever. In this episode, the authors of The Lone Star Speaks: Untold…
Read MoreLevel Up Your Threat Hunting Game: Creating Intelligence from Anomalies and Patterns
In this whitepaper, learn the elements of threat hunting, including:
Read MorePublic Figure Attackers in the United States, 1995-2015
In 2016 FBI Supervisory Special Agent Molly Amman and I completed a study of public figure attackers in the United States between 1995-2015. Our attempt was to update the work of the Exceptional Case Study Project (ECSP) conducted by Dr. Robert Fein and Bryan Vossekuil while with the U.S. Secret Service. We wanted to see…
Read MoreHostile Termination Preparedness
This checklist explores key criteria to consider, including:
Read MoreHow to Quantify Risk with Global Crisis Management Expert Scott McHugh
The feeling of surprise is a dreaded one among security practitioners and decision makers. Despite warnings and signals that provide context that a threat is approaching, it can be difficult for security teams to accept the forecast until a threat is imminent. In this episode, Fred Burton discusses the value of accurately assessing risk and…
Read MoreSupervisory Special Agent Wendy Bashnan on the Three Factors That Shape Human Capital
You don’t have to look too far to realize that the threat landscape is evolving dramatically. With that comes an increased need for a workforce that expands far beyond day-to-day tactical skills. As the lead advisor of all security and law enforcement training programs and policies for the Diplomatic Security Service (DSS), Wendy Bashnan is…
Read More