How to Build Cross-Departmental Alliances to Tackle Insider Risk
Security teams can’t manage insider risk alone — cross-departmental collaboration is key to early risk identification and mitigation The 5 steps to Fostering a Collaborative Insider Risk Approach Align on Common Goals and Objectives Develop Mutual Trust and Communication Implement Joint Policies and Processes Leverage Technology to Create a Common Operating Picture Track and Report…
Read MoreHow to Mitigate Insider Risk Throughout the Employee Lifecycle
This checklist will help you determine the effectiveness of your insider risk management processes throughout these three phases of an employee or contractor’s lifecycle:
Read MoreOvercoming Common Challenges in Identity Research and POI Management
In this episode Host Chuck Randolph speaks with Ian Johnson, Threat Manager on the Coinbase Protective Intelligence team, about the evolving landscape of security in the FinTech industry. They discuss Ian’s career path, the challenges and opportunities in managing life safety threats, and how technology and Artificial Intelligence are transforming investigative processes in corporate security.…
Read MoreHow to Make Your Security Teams More Effective
Top security managers use the power of research and case management This article was originally published on Securityinfowatch.com. Here’s a true story that many in the security field may find familiar. After an acquisition almost doubled the size of a major grocery wholesaler, the company’s corporate security team started training leaders to identify concerning behaviors…
Read MoreThe Real World Inspiration Behind Jack Carr’s Latest Thriller, Targeted: Beirut
In this episode Join host Fred Burton and Jack Carr, a former Navy SEAL and New York Times bestselling author, discussing pivotal moments in military history and their implications for modern-day operations. One of the most knowledgeable voices in military history and fiction, Jack shares insights from his new book, Targeted Beirut, focusing on the…
Read MoreBuilding The Next Generation of Travel Risk and Critical Event Management Solutions
Combining world-class emergency services expertise from International SOS with Ontic’s purpose-built platform to strengthen global workforce protection Today, we announced a partnership with International SOS, the global leader in travel risk management, security and medical assistance, and crisis response. Together, we are building the next generation of Travel Risk and Critical Event Management solutions with…
Read MoreNavigating the Workplace Violence Threat Management Process
An overview of how to investigate workplace violence incidents, make an assessment, and intervene when necessary As a corporate security professional, you know organizations across all industries face various workplace violence risks. And the evolving threat landscape can make prevention feel overwhelming, but it doesn’t have to be. By following a workplace violence threat management…
Read MoreCounterterrorism Insights: A Deep Dive with Dr. Matthew Levitt
In this episode Fred Burton interviews Dr. Matthew Levitt, a renowned expert in counterterrorism and intelligence. Dr. Levitt shares insights from his extensive career, including his work with the FBI, his time at the U.S. Department of Treasury, and his current role at the Washington Institute for Near East Policy. They discuss the development of…
Read MoreHow to Modernize Security Operations Centers
GSOC modernization is a journey that starts with understanding your unique business needs This article was originally published in ASIS Security Management Magazine. In the past decade, global security operations centers (GSOCs) have been in their early adolescence. They were focused on baseline physical security functions such as monitoring alarm systems and video surveillance feeds.…
Read MoreFrom Apache Pilot to Author: Don Bentley’s Journey to Writing Bestselling Thrillers
In this episode Join us in a conversation with Don Bentley, a New York Times bestselling author famous for his work in the Matt Drake, Tom Clancy Jack Ryan Jr., and Vince Flynn Mitch Rapp series, and most recently his work Capture or Kill: A Mitch Rapp Novel. Don shares his unique experiences from being…
Read MoreGaining Stakeholder and Employee Support for Your Insider Risk Program
How to build trust with your employees and stakeholders through training, empathy, and effective communication What’s in a name? We have all heard, been involved in, or led conversations regarding what to name our insider threat program. The industry standard has always been “Insider Threat,” yet many in the corporate setting find this term too…
Read MoreSummit 2025 Business Justification Email
Thanks for your interest in attending Ontic Summit 2025! To make sure you’re able to attend, we have put together this template that outlines the benefits — for you and your team — of attending. Template for Ontic Clients Template for All Others To use the templates, simply copy, paste, and customize them to fit…
Read MoreThe Intersection of History and Ethics in Intelligence Operations
In this episode In this episode, Fred Burton sits down with Lewis Sage-Passant, Global Head of Intelligence at Novo Nordisk, to discuss his new book, Beyond States and Spies. Lewis shares insights from his career in military intelligence, private sector intelligence, and his extensive research into the history and ethics of intelligence operations. Tune in to…
Read MoreSetting Up Your Insider Risk Program for Success
Watch our webinar to learn the critical elements of establishing a successful insider risk program, including:
Read MoreWho Owns Implementation of California’s New Workplace Violence Prevention Law?
Managing compliance takes a collaborative effort from several different departments, but security teams are uniquely positioned to lead the collaboration This article was originally posted in ASIS Security Management Magazine. Employers in California had a 1 July deadline to comply with SB 553, the state law mandating that employers establish workplace violence prevention programs. The question…
Read MoreFrost Radar™: Digital Intelligence Solutions, 2024
Download your free copy of the report to gain insights on:
Read More